diff --git a/scan_results/archived_18_10_scan.pyt b/scan_results/archived_18_10_scan.pyt deleted file mode 100644 index 7e8173e0..00000000 --- a/scan_results/archived_18_10_scan.pyt +++ /dev/null @@ -1,16590 +0,0 @@ -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-11 18:14:36.283896 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-11 18:14:38.118531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-11 18:14:39.802222 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-11 18:15:01.560131 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-11 18:15:31.945990 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-11 18:15:34.648207 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-11 18:15:40.015333 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-11 18:15:40.525272 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-11 18:16:33.925018 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/flask_sqlalchemy/__init__.py -Scanned: 2016-10-11 18:16:36.461562 -No vulnerabilities found. - - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-11 18:16:38.804206 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-11 18:16:41.854468 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-11 18:16:44.056582 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-11 18:17:33.470098 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-11 18:17:36.276229 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-11 18:17:38.585148 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-11 18:17:39.891936 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-11 18:17:44.604381 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-11 18:18:05.563985 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-11 18:18:36.975871 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-11 18:18:38.464376 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-11 18:18:40.181802 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-11 18:18:41.982922 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-11 18:18:43.378892 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-11 18:18:44.759847 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-11 18:18:46.603485 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-11 18:19:05.919632 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-11 18:19:34.640362 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-11 18:19:38.116710 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-11 18:19:40.474051 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/skeleton/skeleton/__init__.py -Scanned: 2016-10-11 18:19:42.842073 -No vulnerabilities found. - - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-11 18:19:44.664503 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-11 18:19:47.693675 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-11 18:20:07.212612 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-11 18:20:34.666352 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-11 18:20:37.571363 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-11 18:20:39.976691 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-11 18:20:44.079990 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-11 18:20:46.200057 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/app/main.py -Scanned: 2016-10-11 18:20:47.420114 -No vulnerabilities found. - - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-11 18:20:48.703898 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-11 18:20:50.083954 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-11 18:21:07.497903 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-11 18:21:41.351971 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-11 18:21:43.098312 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-11 18:21:49.312440 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-11 18:21:50.924319 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-11 18:22:35.066156 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-11 18:22:37.987421 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-11 18:22:42.941041 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-11 18:22:47.423300 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-11 18:22:48.702782 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-11 18:22:50.112654 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-11 18:22:51.349585 -No vulnerabilities found. - - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-11 20:18:02.901113 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-11 20:18:04.733731 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-11 20:18:06.463184 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-11 20:18:28.134558 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-11 20:18:58.811346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-11 20:19:01.387226 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-11 20:19:06.731978 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-11 20:19:08.554292 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-11 20:19:59.910739 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/flask_sqlalchemy/__init__.py -Scanned: 2016-10-11 20:20:02.376825 -No vulnerabilities found. - - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-11 20:20:04.670993 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-11 20:20:08.751428 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-11 20:20:10.514371 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-11 20:20:58.792617 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-11 20:21:02.665251 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-11 20:21:04.984108 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-11 20:21:06.288957 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-11 20:21:10.958518 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-11 20:21:31.831404 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-11 20:22:03.188112 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-11 20:22:04.658253 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-11 20:22:06.362786 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-11 20:22:08.117388 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-11 20:22:09.381476 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-11 20:22:10.656376 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-11 20:22:13.020246 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-11 20:22:31.391063 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-11 20:22:59.763295 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-11 20:23:04.057223 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-11 20:23:06.645265 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/skeleton/skeleton/__init__.py -Scanned: 2016-10-11 20:23:08.943721 -No vulnerabilities found. - - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-11 20:23:11.425157 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-11 20:23:14.777997 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-11 20:23:32.562510 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-11 20:23:59.907993 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-11 20:24:03.771246 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-11 20:24:06.197794 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-11 20:24:09.673244 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-11 20:24:11.860935 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/app/main.py -Scanned: 2016-10-11 20:24:13.103872 -No vulnerabilities found. - - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-11 20:24:14.388275 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-11 20:24:16.742093 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-11 20:24:32.193765 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-11 20:25:07.064759 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-11 20:25:09.813807 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-11 20:25:15.112722 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-11 20:25:17.793755 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-11 20:26:00.804157 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-11 20:26:04.598207 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-11 20:26:10.503276 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-11 20:26:12.854565 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-11 20:26:14.077631 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-11 20:26:15.411397 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-11 20:26:17.688867 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-11 20:27:00.983942 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-11 20:27:04.753702 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-11 20:27:07.331298 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-11 20:27:10.570125 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-11 20:27:11.905794 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-11 20:27:16.453420 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-11 20:27:18.261312 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-11 20:27:34.357683 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-11 20:28:05.200904 -No vulnerabilities found. - - -zzzsochi/Flask-Gravatar -https://github.com/zzzsochi/Flask-Gravatar -Entry file: Flask-Gravatar/tests/test_core.py -Scanned: 2016-10-11 20:28:11.286584 -No vulnerabilities found. - - -dag/flask-zodb -https://github.com/dag/flask-zodb -Entry file: flask-zodb/flask_zodb.py -Scanned: 2016-10-11 20:28:13.024724 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -zen4ever/route53manager -https://github.com/zen4ever/route53manager -Entry file: route53manager/route53/__init__.py -Scanned: 2016-10-11 20:28:14.506566 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-kitchensink -https://github.com/mitsuhiko/flask-kitchensink -Entry file: flask-kitchensink/example-code/hello.py -Scanned: 2016-10-11 20:28:15.827475 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyeseast/flask-docviewer -https://github.com/eyeseast/flask-docviewer -Entry file: flask-docviewer/docviewer/app.py -Scanned: 2016-10-11 20:28:17.076736 -No vulnerabilities found. - - -dag/flask-attest -https://github.com/dag/flask-attest -Entry file: flask-attest/tests.py -Scanned: 2016-10-11 20:28:18.609829 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ekalinin/flask-noextref -https://github.com/ekalinin/flask-noextref -Entry file: flask-noextref/test_noextref.py -Scanned: 2016-10-11 20:28:34.557573 -No vulnerabilities found. - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-11 20:29:08.108805 -Vulnerability 1: -File: flitter/flitter/controllers/user.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flitter/flitter/controllers/user.py - > Line 24: session['user'] = username - File: flitter/flitter/controllers/user.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry.entries',username=username)) - File: flitter/flitter/controllers/user.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('signup.html',error=error) - File: flitter/flitter/controllers/user.py - > Line 15: ret_MAYBE_FUNCTION_NAME = redirect_to_user_page() -File: flitter/flitter/controllers/user.py - > reaches line 25, trigger word "flash(": - flash('Welcome, {0}.'.format(username)) - - - -aaront/calcmymarks2 -https://github.com/aaront/calcmymarks2 -Entry file: calcmymarks2/main.py -Scanned: 2016-10-11 20:29:12.154045 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-feedback -https://github.com/mitsuhiko/flask-feedback -Entry file: flask-feedback/feedback.py -Scanned: 2016-10-11 20:29:15.244469 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilsaj/flask-admin-old -https://github.com/wilsaj/flask-admin-old -Entry file: flask-admin-old/test_admin.py -Scanned: 2016-10-11 20:29:23.129953 -No vulnerabilities found. - - -leandrosilva/flaskito -https://github.com/leandrosilva/flaskito -Entry file: flaskito/src/flaskito.py -Scanned: 2016-10-11 20:29:26.674720 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/Flask-API-Server -https://github.com/marchon/Flask-API-Server -Entry file: Flask-API-Server/apiserver/tests/app.py -Scanned: 2016-10-11 20:29:28.074325 -No vulnerabilities found. - - -kapilreddy/Shabda-Sangraha -https://github.com/kapilreddy/Shabda-Sangraha -Entry file: Shabda-Sangraha/dict.py -Scanned: 2016-10-11 20:30:06.776461 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tooxie/flask-syrinx -https://github.com/tooxie/flask-syrinx -Entry file: flask-syrinx/syrinx/__init__.py -Scanned: 2016-10-11 20:30:08.433792 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshourisman/flask-shortly -https://github.com/joshourisman/flask-shortly -Entry file: flask-shortly/shortly/__init__.py -Scanned: 2016-10-11 20:30:12.254774 -No vulnerabilities found. - - -jamiltron/fitgen -https://github.com/jamiltron/fitgen -Entry file: fitgen/fitgen.py -Scanned: 2016-10-11 20:30:17.552958 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomviner/Flask-Name-that-actor-or-movie -https://github.com/tomviner/Flask-Name-that-actor-or-movie -Entry file: Flask-Name-that-actor-or-movie/namer.py -Scanned: 2016-10-11 20:30:28.240315 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/flylons -https://github.com/marchon/flylons -Entry file: flylons/application/__init__.py -Scanned: 2016-10-11 20:30:34.784109 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/checkinmapper -https://github.com/marchon/checkinmapper -Entry file: checkinmapper/checkinmapper.py -Scanned: 2016-10-11 20:31:03.158769 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -comfuture/simplesite -https://github.com/comfuture/simplesite -Entry file: simplesite/simplesite/core.py -Scanned: 2016-10-11 20:31:08.583387 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zachwill/flask-engine -https://github.com/zachwill/flask-engine -Entry file: flask-engine/libs/flask/sessions.py -Scanned: 2016-10-11 20:31:15.171914 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spantaleev/flask-sijax -https://github.com/spantaleev/flask-sijax -Entry file: flask-sijax/examples/comet.py -Scanned: 2016-10-11 20:31:16.640469 -No vulnerabilities found. - - -utahta/Flask-MVC-Pattern -https://github.com/utahta/Flask-MVC-Pattern -Entry file: Flask-MVC-Pattern/main.py -Scanned: 2016-10-11 20:31:18.025292 -No vulnerabilities found. - - -jzempel/flask-exceptional -https://github.com/jzempel/flask-exceptional -Entry file: flask-exceptional/flask_exceptional.py -Scanned: 2016-10-11 20:31:25.571791 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qsnake/flask -https://github.com/qsnake/flask -Entry file: flask/setup.py -Scanned: 2016-10-11 20:31:35.805946 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joeyespo/flask-scaffold -https://github.com/joeyespo/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-11 20:32:03.340606 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iwebhosting/collectd-flask -https://github.com/iwebhosting/collectd-flask -Entry file: collectd-flask/collectdflask.py -Scanned: 2016-10-11 20:32:08.773220 -No vulnerabilities found. - - -yxm0513/flask-ims -https://github.com/yxm0513/flask-ims -Entry file: flask-ims/flask/sessions.py -Scanned: 2016-10-11 20:32:11.645504 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fay/flask-skeleton -https://github.com/fay/flask-skeleton -Entry file: flask-skeleton/app/__init__.py -Scanned: 2016-10-11 20:32:14.639639 -No vulnerabilities found. - - -joshourisman/flask-beans -https://github.com/joshourisman/flask-beans -Entry file: flask-beans/beans.py -Scanned: 2016-10-11 20:32:16.918063 -No vulnerabilities found. - - -jjinux/pyteladventure -https://github.com/jjinux/pyteladventure -Entry file: pyteladventure/pyteladventure/__init__.py -Scanned: 2016-10-11 20:32:18.436538 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mchambliss/flask -https://github.com/mchambliss/flask -Entry file: flask/webapp/webapp/__init__.py -Scanned: 2016-10-11 20:32:35.963912 -No vulnerabilities found. - - -robi42/backbone-flask -https://github.com/robi42/backbone-flask -Entry file: backbone-flask/app.py -Scanned: 2016-10-11 20:33:16.298780 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-11 20:33:17.767123 -No vulnerabilities found. - - -joshfinnie/Flask-shrtn -https://github.com/joshfinnie/Flask-shrtn -Entry file: Flask-shrtn/Flask-shrtn.py -Scanned: 2016-10-11 20:33:19.211552 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomatohater/goonhilly -https://github.com/tomatohater/goonhilly -Entry file: goonhilly/goonhilly.py -Scanned: 2016-10-11 20:33:29.962796 -No vulnerabilities found. - - -jmoiron/jmoiron.net -https://github.com/jmoiron/jmoiron.net -Entry file: None -Scanned: 2016-10-11 20:33:36.934717 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jmoiron/jmoiron.net. - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-11 20:35:45.968871 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-11 20:35:47.816039 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-11 20:35:49.520772 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-11 20:36:12.624403 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-11 20:36:41.917490 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-11 20:36:44.277824 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-11 20:36:49.538608 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-11 20:36:51.268231 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-11 20:37:43.676399 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/flask_sqlalchemy/__init__.py -Scanned: 2016-10-11 20:37:46.094982 -No vulnerabilities found. - - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-11 20:37:48.392978 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-11 20:37:51.477595 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-11 20:37:53.332393 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-11 20:38:42.882299 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-11 20:38:45.768680 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-11 20:38:48.090057 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-11 20:38:49.376864 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-11 20:38:54.057496 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-11 20:39:15.931396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-11 20:39:46.429910 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-11 20:39:47.898204 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-11 20:39:49.565852 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-11 20:39:51.370459 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-11 20:39:52.702048 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-11 20:39:54.012555 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-11 20:39:55.827702 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-11 20:40:16.217215 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-11 20:42:36.743612 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-11 20:42:38.552705 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-11 20:42:40.260848 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-11 20:43:06.046684 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-11 20:43:32.250289 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-11 20:43:35.133269 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-11 20:43:40.425365 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-11 20:43:42.261659 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-11 20:44:34.525610 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/flask_sqlalchemy/__init__.py -Scanned: 2016-10-11 20:44:36.903381 -No vulnerabilities found. - - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-11 20:44:39.291022 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-11 20:44:42.340859 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-11 20:44:44.200542 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-11 20:45:32.504830 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-11 20:45:37.378271 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-11 20:45:39.645429 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-11 20:45:41.034402 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-11 20:45:44.770003 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-11 20:46:09.650635 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-11 20:46:38.025988 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-11 20:46:39.600106 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-11 20:46:41.327422 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-11 20:46:43.161709 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-11 20:46:44.513177 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-11 20:46:45.797387 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-11 20:46:47.654996 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-11 20:47:10.000649 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-11 20:47:33.570445 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-11 20:47:38.833148 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-11 20:47:41.220398 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-11 20:47:43.329781 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-11 20:47:45.213880 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-11 20:47:48.655874 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-11 20:48:11.280976 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-11 20:48:34.261254 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-11 20:48:39.138526 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-11 20:48:40.610743 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-11 20:48:44.078267 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-11 20:48:46.279412 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/app/main.py -Scanned: 2016-10-11 20:48:47.552567 -No vulnerabilities found. - - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-11 20:48:48.854078 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-11 20:48:50.216954 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-11 20:49:10.634653 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-11 20:49:41.657426 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-11 20:49:43.520256 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-11 20:49:49.936798 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-11 20:49:51.646827 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-11 20:50:34.942610 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-11 20:50:41.483224 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-11 20:50:43.492102 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-11 20:50:46.907168 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-11 20:50:49.198148 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-11 20:50:50.551784 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-11 20:50:51.946271 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-11 20:51:35.848176 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-11 20:51:41.527399 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-11 20:51:43.164416 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-11 20:51:44.405603 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-11 20:51:45.831106 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-11 20:51:51.459423 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-11 20:51:53.291116 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-11 20:52:12.227586 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-11 20:52:42.115718 -No vulnerabilities found. - - -zzzsochi/Flask-Gravatar -https://github.com/zzzsochi/Flask-Gravatar -Entry file: Flask-Gravatar/tests/test_core.py -Scanned: 2016-10-11 20:52:45.255653 -No vulnerabilities found. - - -dag/flask-zodb -https://github.com/dag/flask-zodb -Entry file: flask-zodb/flask_zodb.py -Scanned: 2016-10-11 20:52:46.958417 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -zen4ever/route53manager -https://github.com/zen4ever/route53manager -Entry file: route53manager/route53/__init__.py -Scanned: 2016-10-11 20:52:48.473707 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-kitchensink -https://github.com/mitsuhiko/flask-kitchensink -Entry file: flask-kitchensink/example-code/hello.py -Scanned: 2016-10-11 20:52:49.863513 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyeseast/flask-docviewer -https://github.com/eyeseast/flask-docviewer -Entry file: flask-docviewer/docviewer/app.py -Scanned: 2016-10-11 20:52:51.127515 -No vulnerabilities found. - - -dag/flask-attest -https://github.com/dag/flask-attest -Entry file: flask-attest/tests.py -Scanned: 2016-10-11 20:52:53.661894 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ekalinin/flask-noextref -https://github.com/ekalinin/flask-noextref -Entry file: flask-noextref/test_noextref.py -Scanned: 2016-10-11 20:53:12.131982 -No vulnerabilities found. - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-11 20:53:43.743938 -Vulnerability 1: -File: flitter/flitter/controllers/user.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flitter/flitter/controllers/user.py - > Line 24: session['user'] = username - File: flitter/flitter/controllers/user.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry.entries',username=username)) - File: flitter/flitter/controllers/user.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('signup.html',error=error) - File: flitter/flitter/controllers/user.py - > Line 15: ret_MAYBE_FUNCTION_NAME = redirect_to_user_page() -File: flitter/flitter/controllers/user.py - > reaches line 25, trigger word "flash(": - flash('Welcome, {0}.'.format(username)) - - - -aaront/calcmymarks2 -https://github.com/aaront/calcmymarks2 -Entry file: calcmymarks2/main.py -Scanned: 2016-10-11 20:53:45.755115 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-feedback -https://github.com/mitsuhiko/flask-feedback -Entry file: flask-feedback/feedback.py -Scanned: 2016-10-11 20:53:48.841976 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilsaj/flask-admin-old -https://github.com/wilsaj/flask-admin-old -Entry file: flask-admin-old/test_admin.py -Scanned: 2016-10-11 20:53:56.830004 -No vulnerabilities found. - - -leandrosilva/flaskito -https://github.com/leandrosilva/flaskito -Entry file: flaskito/src/flaskito.py -Scanned: 2016-10-11 20:54:00.399699 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/Flask-API-Server -https://github.com/marchon/Flask-API-Server -Entry file: Flask-API-Server/apiserver/tests/app.py -Scanned: 2016-10-11 20:54:01.769239 -No vulnerabilities found. - - -kapilreddy/Shabda-Sangraha -https://github.com/kapilreddy/Shabda-Sangraha -Entry file: Shabda-Sangraha/dict.py -Scanned: 2016-10-11 20:54:43.029733 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tooxie/flask-syrinx -https://github.com/tooxie/flask-syrinx -Entry file: flask-syrinx/syrinx/__init__.py -Scanned: 2016-10-11 20:54:44.610366 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshourisman/flask-shortly -https://github.com/joshourisman/flask-shortly -Entry file: flask-shortly/shortly/__init__.py -Scanned: 2016-10-11 20:54:46.511023 -No vulnerabilities found. - - -jamiltron/fitgen -https://github.com/jamiltron/fitgen -Entry file: fitgen/fitgen.py -Scanned: 2016-10-11 20:54:50.924599 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomviner/Flask-Name-that-actor-or-movie -https://github.com/tomviner/Flask-Name-that-actor-or-movie -Entry file: Flask-Name-that-actor-or-movie/namer.py -Scanned: 2016-10-11 20:55:01.705222 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/flylons -https://github.com/marchon/flylons -Entry file: flylons/application/__init__.py -Scanned: 2016-10-11 20:55:13.114927 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/checkinmapper -https://github.com/marchon/checkinmapper -Entry file: checkinmapper/checkinmapper.py -Scanned: 2016-10-11 20:55:38.726118 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -comfuture/simplesite -https://github.com/comfuture/simplesite -Entry file: simplesite/simplesite/core.py -Scanned: 2016-10-11 20:55:45.095413 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zachwill/flask-engine -https://github.com/zachwill/flask-engine -Entry file: flask-engine/libs/flask/sessions.py -Scanned: 2016-10-11 20:55:49.588402 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spantaleev/flask-sijax -https://github.com/spantaleev/flask-sijax -Entry file: flask-sijax/examples/comet.py -Scanned: 2016-10-11 20:55:51.028357 -No vulnerabilities found. - - -utahta/Flask-MVC-Pattern -https://github.com/utahta/Flask-MVC-Pattern -Entry file: Flask-MVC-Pattern/main.py -Scanned: 2016-10-11 20:55:52.251325 -No vulnerabilities found. - - -jzempel/flask-exceptional -https://github.com/jzempel/flask-exceptional -Entry file: flask-exceptional/flask_exceptional.py -Scanned: 2016-10-11 20:55:58.752232 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qsnake/flask -https://github.com/qsnake/flask -Entry file: flask/setup.py -Scanned: 2016-10-11 20:56:13.333311 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -joeyespo/flask-scaffold -https://github.com/joeyespo/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-11 20:56:37.838407 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iwebhosting/collectd-flask -https://github.com/iwebhosting/collectd-flask -Entry file: collectd-flask/collectdflask.py -Scanned: 2016-10-11 20:56:45.283478 -No vulnerabilities found. - - -yxm0513/flask-ims -https://github.com/yxm0513/flask-ims -Entry file: flask-ims/flask/sessions.py -Scanned: 2016-10-11 20:56:48.246922 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fay/flask-skeleton -https://github.com/fay/flask-skeleton -Entry file: flask-skeleton/app/__init__.py -Scanned: 2016-10-11 20:56:50.268491 -No vulnerabilities found. - - -joshourisman/flask-beans -https://github.com/joshourisman/flask-beans -Entry file: flask-beans/beans.py -Scanned: 2016-10-11 20:56:51.585840 -No vulnerabilities found. - - -jjinux/pyteladventure -https://github.com/jjinux/pyteladventure -Entry file: pyteladventure/pyteladventure/__init__.py -Scanned: 2016-10-11 20:56:53.134963 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mchambliss/flask -https://github.com/mchambliss/flask -Entry file: flask/setup.py -Scanned: 2016-10-11 20:57:13.393638 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -robi42/backbone-flask -https://github.com/robi42/backbone-flask -Entry file: backbone-flask/app.py -Scanned: 2016-10-11 20:57:51.343535 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-11 20:57:52.824851 -No vulnerabilities found. - - -joshfinnie/Flask-shrtn -https://github.com/joshfinnie/Flask-shrtn -Entry file: Flask-shrtn/Flask-shrtn.py -Scanned: 2016-10-11 20:57:54.323434 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomatohater/goonhilly -https://github.com/tomatohater/goonhilly -Entry file: goonhilly/goonhilly.py -Scanned: 2016-10-11 20:58:03.090592 -No vulnerabilities found. - - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 10:51:13.668182 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-12 10:51:14.636615 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-12 10:51:17.230215 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-12 10:51:39.714840 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-12 10:52:10.879643 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-12 10:52:11.928089 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-12 10:52:16.263660 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-12 10:52:17.787351 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-12 10:53:11.874384 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/flask_sqlalchemy/__init__.py -Scanned: 2016-10-12 10:53:15.325422 -No vulnerabilities found. - - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-12 10:53:17.663919 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-12 10:53:18.635388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-12 10:53:19.139297 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-12 10:54:13.724573 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-12 10:54:14.209633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-12 10:54:17.425839 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-12 10:54:18.788238 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-12 10:54:22.158419 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-12 10:54:40.686327 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-12 10:55:16.578803 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-12 10:55:18.073059 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-12 10:55:18.621464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-12 10:55:20.339051 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-12 10:55:21.666413 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-12 10:55:22.944759 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-12 10:55:23.442279 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-12 10:55:40.958702 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-12 10:56:14.354096 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-12 10:56:18.942385 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-12 10:56:23.823614 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 10:56:25.847724 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-12 10:56:28.630445 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-12 10:56:34.301242 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-12 10:56:44.282652 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-12 10:57:14.620813 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-12 10:57:15.112022 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-12 10:57:20.435850 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-12 10:57:28.191712 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-12 10:57:28.731593 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-12 10:57:29.215738 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-12 10:57:30.433573 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-12 10:57:35.778860 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-12 10:57:43.186206 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-12 10:58:21.624757 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-12 10:58:26.355806 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-12 10:58:30.705084 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-12 10:58:37.406081 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-12 10:59:15.552737 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-12 10:59:18.793431 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-12 10:59:25.788838 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-12 10:59:30.212830 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-12 10:59:31.937115 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-12 10:59:34.028492 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-12 10:59:36.312836 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-12 11:00:16.494760 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-12 11:00:18.638953 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-12 11:00:21.185543 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-12 11:00:27.472412 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-12 11:00:28.887407 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-12 11:00:35.099928 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-12 11:00:35.602345 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-12 11:00:44.121941 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-12 11:01:18.017175 -No vulnerabilities found. - - -zzzsochi/Flask-Gravatar -https://github.com/zzzsochi/Flask-Gravatar -Entry file: Flask-Gravatar/tests/test_core.py -Scanned: 2016-10-12 11:01:28.054158 -No vulnerabilities found. - - -dag/flask-zodb -https://github.com/dag/flask-zodb -Entry file: flask-zodb/flask_zodb.py -Scanned: 2016-10-12 11:01:28.589605 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -zen4ever/route53manager -https://github.com/zen4ever/route53manager -Entry file: route53manager/route53/__init__.py -Scanned: 2016-10-12 11:01:31.074035 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-kitchensink -https://github.com/mitsuhiko/flask-kitchensink -Entry file: flask-kitchensink/example-code/hello.py -Scanned: 2016-10-12 11:01:31.574720 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyeseast/flask-docviewer -https://github.com/eyeseast/flask-docviewer -Entry file: flask-docviewer/docviewer/app.py -Scanned: 2016-10-12 11:01:34.915753 -No vulnerabilities found. - - -dag/flask-attest -https://github.com/dag/flask-attest -Entry file: flask-attest/tests.py -Scanned: 2016-10-12 11:01:36.447853 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ekalinin/flask-noextref -https://github.com/ekalinin/flask-noextref -Entry file: flask-noextref/test_noextref.py -Scanned: 2016-10-12 11:01:45.880468 -No vulnerabilities found. - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-12 11:02:23.447235 -Vulnerability 1: -File: flitter/flitter/controllers/user.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flitter/flitter/controllers/user.py - > Line 24: session['user'] = username - File: flitter/flitter/controllers/user.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry.entries',username=username)) - File: flitter/flitter/controllers/user.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('signup.html',error=error) - File: flitter/flitter/controllers/user.py - > Line 15: ret_MAYBE_FUNCTION_NAME = redirect_to_user_page() -File: flitter/flitter/controllers/user.py - > reaches line 25, trigger word "flash(": - flash('Welcome, {0}.'.format(username)) - - - -aaront/calcmymarks2 -https://github.com/aaront/calcmymarks2 -Entry file: calcmymarks2/main.py -Scanned: 2016-10-12 11:02:27.978172 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-feedback -https://github.com/mitsuhiko/flask-feedback -Entry file: flask-feedback/feedback.py -Scanned: 2016-10-12 11:02:31.118557 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilsaj/flask-admin-old -https://github.com/wilsaj/flask-admin-old -Entry file: flask-admin-old/test_admin.py -Scanned: 2016-10-12 11:02:40.262705 -No vulnerabilities found. - - -leandrosilva/flaskito -https://github.com/leandrosilva/flaskito -Entry file: flaskito/src/flaskito.py -Scanned: 2016-10-12 11:02:40.808059 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/Flask-API-Server -https://github.com/marchon/Flask-API-Server -Entry file: Flask-API-Server/apiserver/tests/app.py -Scanned: 2016-10-12 11:02:42.212158 -No vulnerabilities found. - - -kapilreddy/Shabda-Sangraha -https://github.com/kapilreddy/Shabda-Sangraha -Entry file: Shabda-Sangraha/dict.py -Scanned: 2016-10-12 11:03:18.228825 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tooxie/flask-syrinx -https://github.com/tooxie/flask-syrinx -Entry file: flask-syrinx/syrinx/__init__.py -Scanned: 2016-10-12 11:03:18.749245 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshourisman/flask-shortly -https://github.com/joshourisman/flask-shortly -Entry file: flask-shortly/shortly/__init__.py -Scanned: 2016-10-12 11:03:29.579930 -No vulnerabilities found. - - -jamiltron/fitgen -https://github.com/jamiltron/fitgen -Entry file: fitgen/fitgen.py -Scanned: 2016-10-12 11:03:32.048841 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomviner/Flask-Name-that-actor-or-movie -https://github.com/tomviner/Flask-Name-that-actor-or-movie -Entry file: Flask-Name-that-actor-or-movie/namer.py -Scanned: 2016-10-12 11:03:42.021253 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/flylons -https://github.com/marchon/flylons -Entry file: flylons/application/__init__.py -Scanned: 2016-10-12 11:03:46.522199 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/checkinmapper -https://github.com/marchon/checkinmapper -Entry file: checkinmapper/checkinmapper.py -Scanned: 2016-10-12 11:04:19.155118 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -comfuture/simplesite -https://github.com/comfuture/simplesite -Entry file: simplesite/simplesite/core.py -Scanned: 2016-10-12 11:04:19.650495 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zachwill/flask-engine -https://github.com/zachwill/flask-engine -Entry file: flask-engine/libs/flask/sessions.py -Scanned: 2016-10-12 11:04:30.222180 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spantaleev/flask-sijax -https://github.com/spantaleev/flask-sijax -Entry file: flask-sijax/examples/comet.py -Scanned: 2016-10-12 11:04:32.981106 -No vulnerabilities found. - - -utahta/Flask-MVC-Pattern -https://github.com/utahta/Flask-MVC-Pattern -Entry file: Flask-MVC-Pattern/main.py -Scanned: 2016-10-12 11:04:34.330586 -No vulnerabilities found. - - -jzempel/flask-exceptional -https://github.com/jzempel/flask-exceptional -Entry file: flask-exceptional/flask_exceptional.py -Scanned: 2016-10-12 11:04:41.827599 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qsnake/flask -https://github.com/qsnake/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 11:04:47.533167 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -joeyespo/flask-scaffold -https://github.com/joeyespo/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-12 11:05:20.071201 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iwebhosting/collectd-flask -https://github.com/iwebhosting/collectd-flask -Entry file: collectd-flask/collectdflask.py -Scanned: 2016-10-12 11:05:21.385958 -No vulnerabilities found. - - -yxm0513/flask-ims -https://github.com/yxm0513/flask-ims -Entry file: flask-ims/flask/sessions.py -Scanned: 2016-10-12 11:05:24.911632 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fay/flask-skeleton -https://github.com/fay/flask-skeleton -Entry file: flask-skeleton/app/__init__.py -Scanned: 2016-10-12 11:05:31.992316 -No vulnerabilities found. - - -joshourisman/flask-beans -https://github.com/joshourisman/flask-beans -Entry file: flask-beans/beans.py -Scanned: 2016-10-12 11:05:33.402271 -No vulnerabilities found. - - -jjinux/pyteladventure -https://github.com/jjinux/pyteladventure -Entry file: pyteladventure/pyteladventure/__init__.py -Scanned: 2016-10-12 11:05:33.943424 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mchambliss/flask -https://github.com/mchambliss/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 11:05:47.985021 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -robi42/backbone-flask -https://github.com/robi42/backbone-flask -Entry file: backbone-flask/app.py -Scanned: 2016-10-12 11:06:31.417371 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-12 11:06:34.148915 -No vulnerabilities found. - - -joshfinnie/Flask-shrtn -https://github.com/joshfinnie/Flask-shrtn -Entry file: Flask-shrtn/Flask-shrtn.py -Scanned: 2016-10-12 11:06:34.659245 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomatohater/goonhilly -https://github.com/tomatohater/goonhilly -Entry file: goonhilly/goonhilly.py -Scanned: 2016-10-12 11:06:44.407577 -No vulnerabilities found. - - -jmoiron/jmoiron.net -https://github.com/jmoiron/jmoiron.net -Entry file: None -Scanned: 2016-10-12 11:06:47.920224 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fzuslide/video_new -https://github.com/fzuslide/video_new -Entry file: video_new/application.py -Scanned: 2016-10-12 11:07:22.185506 -No vulnerabilities found. - - -tomatohater/lydon -https://github.com/tomatohater/lydon -Entry file: lydon/lydon/__init__.py -Scanned: 2016-10-12 11:07:23.584083 -No vulnerabilities found. - - -williamratcliff/django-feedback -https://github.com/williamratcliff/django-feedback -Entry file: django-feedback/feedback.py -Scanned: 2016-10-12 11:07:35.524462 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joelbm24/blog -https://github.com/joelbm24/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-12 11:07:37.359068 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoprocker/mylons -https://github.com/hoprocker/mylons -Entry file: mylons/lib/python2.5/site-packages/Flask-0.6.1-py2.5.egg/flask/app.py -Scanned: 2016-10-12 11:07:50.214469 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crisisking/bsg-raffle -https://github.com/crisisking/bsg-raffle -Entry file: bsg-raffle/raffle.py -Scanned: 2016-10-12 11:07:51.527350 -Vulnerability 1: -File: bsg-raffle/raffle.py - > User input at line 39, trigger word "form[": - user_id = int(request.form['user_id']) -File: bsg-raffle/raffle.py - > reaches line 42, trigger word "execute(": - g.db.execute('INSERT INTO winners(participant_id, prize_name) - VALUES (?, ?)', (user_id, prize)) - -Vulnerability 2: -File: bsg-raffle/raffle.py - > User input at line 40, trigger word "form[": - prize = request.form['prize'] -Reassigned in: - File: bsg-raffle/raffle.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('winner_added.html',name=username[0], prize=prize) -File: bsg-raffle/raffle.py - > reaches line 42, trigger word "execute(": - g.db.execute('INSERT INTO winners(participant_id, prize_name) - VALUES (?, ?)', (user_id, prize)) - -Vulnerability 3: -File: bsg-raffle/raffle.py - > User input at line 66, trigger word "form[": - username = request.form['username'] -File: bsg-raffle/raffle.py - > reaches line 68, trigger word "execute(": - g.db.execute('INSERT INTO participants(name) - VALUES (?)', (username)) - -Vulnerability 4: -File: bsg-raffle/raffle.py - > User input at line 66, trigger word "form[": - username = request.form['username'] -File: bsg-raffle/raffle.py - > reaches line 70, trigger word "flash(": - flash('%s added successfully!' % username) - - - -adamgreig/pyautopull -https://github.com/adamgreig/pyautopull -Entry file: pyautopull/pyautopull.py -Scanned: 2016-10-12 11:07:52.799237 -No vulnerabilities found. - - -sean-/flask-skeleton -https://github.com/sean-/flask-skeleton -Entry file: None -Scanned: 2016-10-12 11:08:24.461484 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sean-/flask-skeleton. - -Runscope/httpbin -https://github.com/Runscope/httpbin -Entry file: httpbin/httpbin/filters.py -Scanned: 2016-10-12 11:08:29.242038 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -hasgeek/flask-lastuser -https://github.com/hasgeek/flask-lastuser -Entry file: flask-lastuser/tests/test_mergeuser.py -Scanned: 2016-10-12 11:08:33.373966 -No vulnerabilities found. - - -BooBSD/flask-odesk -https://github.com/BooBSD/flask-odesk -Entry file: flask-odesk/tests.py -Scanned: 2016-10-12 11:08:35.310785 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cool-shark/redimon -https://github.com/cool-shark/redimon -Entry file: redimon/src/redimon/app.py -Scanned: 2016-10-12 11:08:38.289505 -No vulnerabilities found. - - -pcsanwald/flask_site -https://github.com/pcsanwald/flask_site -Entry file: flask_site/mysite.py -Scanned: 2016-10-12 11:08:56.683660 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-12 11:08:58.171678 -No vulnerabilities found. - - -dag/flask-sassy -https://github.com/dag/flask-sassy -Entry file: flask-sassy/tests/__init__.py -Scanned: 2016-10-12 11:09:23.482712 -No vulnerabilities found. - - -charlieevett/jiffy-portal -https://github.com/charlieevett/jiffy-portal -Entry file: jiffy-portal/portal/app.py -Scanned: 2016-10-12 11:09:24.843851 -No vulnerabilities found. - - -tomekwojcik/Flask-Module-Static-Files -https://github.com/tomekwojcik/Flask-Module-Static-Files -Entry file: Flask-Module-Static-Files/stest/__init__.py -Scanned: 2016-10-12 11:09:28.204510 -No vulnerabilities found. - - -justjkk/dotpath -https://github.com/justjkk/dotpath -Entry file: dotpath/run.py -Scanned: 2016-10-12 11:09:35.945826 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -almet/semantic-bookclub -https://github.com/almet/semantic-bookclub -Entry file: semantic-bookclub/app/web.py -Scanned: 2016-10-12 11:09:37.782215 -Vulnerability 1: -File: semantic-bookclub/app/web.py - > User input at line 81, trigger word ".data": - book_title = dict(self.book.choices)[self.book.data] -File: semantic-bookclub/app/web.py - > reaches line 82, trigger word "flash(": - flash('%s have successfully borrowed %s' % (self.borrower.data, book_title)) - -Vulnerability 2: -File: semantic-bookclub/app/web.py - > User input at line 101, trigger word ".data": - member = Member.get_by(foaf_givenName=self.member.data).one() -File: semantic-bookclub/app/web.py - > reaches line 105, trigger word "flash(": - flash('%s now owns %s' % (member.foaf_givenName.first, book.dcterms_title.first)) - -Vulnerability 3: -File: semantic-bookclub/app/web.py - > User input at line 102, trigger word ".data": - book = Book.get_by(dcterms_identifier=self.book.data).one() -File: semantic-bookclub/app/web.py - > reaches line 105, trigger word "flash(": - flash('%s now owns %s' % (member.foaf_givenName.first, book.dcterms_title.first)) - - - -t9md/snippy -https://github.com/t9md/snippy -Entry file: snippy/snippy.py -Scanned: 2016-10-12 11:09:40.655158 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stehem/Tywna -https://github.com/stehem/Tywna -Entry file: Tywna/application/__init__.py -Scanned: 2016-10-12 11:09:49.655978 -No vulnerabilities found. - - -hoprocker/mylons -https://github.com/hoprocker/mylons -Entry file: mylons/lib/python2.5/site-packages/Flask-0.6.1-py2.5.egg/flask/app.py -Scanned: 2016-10-12 11:09:53.880523 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 11:15:54.516424 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-12 11:15:55.848453 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-12 11:15:58.448862 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-12 11:16:17.877380 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-12 11:16:52.031000 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-12 11:16:53.053320 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-12 11:16:57.372208 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-12 11:16:59.890526 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-12 11:17:52.896335 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/flask_sqlalchemy/__init__.py -Scanned: 2016-10-12 11:17:56.227788 -No vulnerabilities found. - - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-12 11:17:58.556232 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-12 11:17:59.535710 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-12 11:18:00.050654 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-12 11:18:54.597942 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-12 11:18:55.096452 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-12 11:18:58.332176 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-12 11:18:59.684683 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-12 11:19:03.117748 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-12 11:19:19.669833 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-12 11:19:57.507869 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-12 11:19:59.004026 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-12 11:19:59.513265 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-12 11:20:01.269898 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-12 11:20:02.606417 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-12 11:20:03.815211 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-12 11:20:04.316454 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-12 11:20:19.840101 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-12 11:20:54.115519 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-12 11:21:00.676557 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-12 11:21:05.552772 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 11:21:07.951989 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-12 11:21:10.809470 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-12 11:21:16.373100 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-12 11:21:23.321705 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-12 11:21:54.620864 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-12 11:21:57.116735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-12 11:22:02.510494 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-12 11:22:10.209914 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-12 11:22:10.773206 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-12 11:22:11.254909 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-12 11:22:12.601083 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-12 11:22:17.959594 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-12 11:22:21.325209 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-12 11:23:03.703426 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-12 11:23:08.490724 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-12 11:23:12.875082 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-12 11:23:18.908785 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-12 11:23:55.064886 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-12 11:24:00.131390 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-12 11:24:08.125750 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-12 11:24:11.116450 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-12 11:24:12.362494 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-12 11:24:13.710153 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-12 11:24:19.058712 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-12 11:24:55.217969 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-12 11:24:59.216084 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-12 11:25:02.770636 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-12 11:25:09.013884 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-12 11:25:10.387781 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-12 11:25:15.243710 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-12 11:25:18.735218 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-12 11:25:22.246866 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-12 11:25:59.173671 -No vulnerabilities found. - - -zzzsochi/Flask-Gravatar -https://github.com/zzzsochi/Flask-Gravatar -Entry file: Flask-Gravatar/tests/test_core.py -Scanned: 2016-10-12 11:26:10.258894 -No vulnerabilities found. - - -dag/flask-zodb -https://github.com/dag/flask-zodb -Entry file: flask-zodb/flask_zodb.py -Scanned: 2016-10-12 11:26:10.790190 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -zen4ever/route53manager -https://github.com/zen4ever/route53manager -Entry file: route53manager/route53/__init__.py -Scanned: 2016-10-12 11:26:12.284978 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-kitchensink -https://github.com/mitsuhiko/flask-kitchensink -Entry file: flask-kitchensink/example-code/hello.py -Scanned: 2016-10-12 11:26:12.789352 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyeseast/flask-docviewer -https://github.com/eyeseast/flask-docviewer -Entry file: flask-docviewer/docviewer/app.py -Scanned: 2016-10-12 11:26:15.176493 -No vulnerabilities found. - - -dag/flask-attest -https://github.com/dag/flask-attest -Entry file: flask-attest/tests.py -Scanned: 2016-10-12 11:26:19.717352 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ekalinin/flask-noextref -https://github.com/ekalinin/flask-noextref -Entry file: flask-noextref/test_noextref.py -Scanned: 2016-10-12 11:26:24.099729 -No vulnerabilities found. - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-12 11:27:05.621605 -Vulnerability 1: -File: flitter/flitter/controllers/user.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flitter/flitter/controllers/user.py - > Line 24: session['user'] = username - File: flitter/flitter/controllers/user.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry.entries',username=username)) - File: flitter/flitter/controllers/user.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('signup.html',error=error) - File: flitter/flitter/controllers/user.py - > Line 15: ret_MAYBE_FUNCTION_NAME = redirect_to_user_page() -File: flitter/flitter/controllers/user.py - > reaches line 25, trigger word "flash(": - flash('Welcome, {0}.'.format(username)) - - - -aaront/calcmymarks2 -https://github.com/aaront/calcmymarks2 -Entry file: calcmymarks2/main.py -Scanned: 2016-10-12 11:27:10.147448 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-feedback -https://github.com/mitsuhiko/flask-feedback -Entry file: flask-feedback/feedback.py -Scanned: 2016-10-12 11:27:13.252191 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilsaj/flask-admin-old -https://github.com/wilsaj/flask-admin-old -Entry file: flask-admin-old/test_admin.py -Scanned: 2016-10-12 11:27:22.460832 -No vulnerabilities found. - - -leandrosilva/flaskito -https://github.com/leandrosilva/flaskito -Entry file: flaskito/src/flaskito.py -Scanned: 2016-10-12 11:27:22.980595 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/Flask-API-Server -https://github.com/marchon/Flask-API-Server -Entry file: Flask-API-Server/apiserver/tests/app.py -Scanned: 2016-10-12 11:27:24.361399 -No vulnerabilities found. - - -kapilreddy/Shabda-Sangraha -https://github.com/kapilreddy/Shabda-Sangraha -Entry file: Shabda-Sangraha/dict.py -Scanned: 2016-10-12 11:27:57.431839 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tooxie/flask-syrinx -https://github.com/tooxie/flask-syrinx -Entry file: flask-syrinx/syrinx/__init__.py -Scanned: 2016-10-12 11:27:59.946753 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshourisman/flask-shortly -https://github.com/joshourisman/flask-shortly -Entry file: flask-shortly/shortly/__init__.py -Scanned: 2016-10-12 11:28:11.718036 -No vulnerabilities found. - - -jamiltron/fitgen -https://github.com/jamiltron/fitgen -Entry file: fitgen/fitgen.py -Scanned: 2016-10-12 11:28:14.172837 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomviner/Flask-Name-that-actor-or-movie -https://github.com/tomviner/Flask-Name-that-actor-or-movie -Entry file: Flask-Name-that-actor-or-movie/namer.py -Scanned: 2016-10-12 11:28:24.143336 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/flylons -https://github.com/marchon/flylons -Entry file: flylons/application/__init__.py -Scanned: 2016-10-12 11:28:25.639273 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/checkinmapper -https://github.com/marchon/checkinmapper -Entry file: checkinmapper/checkinmapper.py -Scanned: 2016-10-12 11:28:58.248105 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -comfuture/simplesite -https://github.com/comfuture/simplesite -Entry file: simplesite/simplesite/core.py -Scanned: 2016-10-12 11:29:00.750205 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zachwill/flask-engine -https://github.com/zachwill/flask-engine -Entry file: flask-engine/libs/flask/sessions.py -Scanned: 2016-10-12 11:29:12.363933 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spantaleev/flask-sijax -https://github.com/spantaleev/flask-sijax -Entry file: flask-sijax/examples/comet.py -Scanned: 2016-10-12 11:29:14.880983 -No vulnerabilities found. - - -utahta/Flask-MVC-Pattern -https://github.com/utahta/Flask-MVC-Pattern -Entry file: Flask-MVC-Pattern/main.py -Scanned: 2016-10-12 11:29:16.154647 -No vulnerabilities found. - - -jzempel/flask-exceptional -https://github.com/jzempel/flask-exceptional -Entry file: flask-exceptional/flask_exceptional.py -Scanned: 2016-10-12 11:29:24.663794 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qsnake/flask -https://github.com/qsnake/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 11:29:27.181156 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -joeyespo/flask-scaffold -https://github.com/joeyespo/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-12 11:29:58.710538 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iwebhosting/collectd-flask -https://github.com/iwebhosting/collectd-flask -Entry file: collectd-flask/collectdflask.py -Scanned: 2016-10-12 11:30:02.109127 -No vulnerabilities found. - - -yxm0513/flask-ims -https://github.com/yxm0513/flask-ims -Entry file: flask-ims/flask/sessions.py -Scanned: 2016-10-12 11:30:06.652162 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fay/flask-skeleton -https://github.com/fay/flask-skeleton -Entry file: flask-skeleton/app/__init__.py -Scanned: 2016-10-12 11:30:13.706687 -No vulnerabilities found. - - -joshourisman/flask-beans -https://github.com/joshourisman/flask-beans -Entry file: flask-beans/beans.py -Scanned: 2016-10-12 11:30:14.971086 -No vulnerabilities found. - - -jjinux/pyteladventure -https://github.com/jjinux/pyteladventure -Entry file: pyteladventure/pyteladventure/__init__.py -Scanned: 2016-10-12 11:30:15.493923 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mchambliss/flask -https://github.com/mchambliss/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 11:30:27.720142 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -robi42/backbone-flask -https://github.com/robi42/backbone-flask -Entry file: backbone-flask/app.py -Scanned: 2016-10-12 11:31:13.159092 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-12 11:31:15.598321 -No vulnerabilities found. - - -joshfinnie/Flask-shrtn -https://github.com/joshfinnie/Flask-shrtn -Entry file: Flask-shrtn/Flask-shrtn.py -Scanned: 2016-10-12 11:31:16.117102 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomatohater/goonhilly -https://github.com/tomatohater/goonhilly -Entry file: goonhilly/goonhilly.py -Scanned: 2016-10-12 11:31:26.880532 -No vulnerabilities found. - - -jmoiron/jmoiron.net -https://github.com/jmoiron/jmoiron.net -Entry file: None -Scanned: 2016-10-12 11:31:27.382591 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fzuslide/video_new -https://github.com/fzuslide/video_new -Entry file: video_new/application.py -Scanned: 2016-10-12 11:32:00.749636 -No vulnerabilities found. - - -tomatohater/lydon -https://github.com/tomatohater/lydon -Entry file: lydon/lydon/__init__.py -Scanned: 2016-10-12 11:32:03.136169 -No vulnerabilities found. - - -williamratcliff/django-feedback -https://github.com/williamratcliff/django-feedback -Entry file: django-feedback/feedback.py -Scanned: 2016-10-12 11:32:13.604654 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joelbm24/blog -https://github.com/joelbm24/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-12 11:32:16.560850 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoprocker/mylons -https://github.com/hoprocker/mylons -Entry file: mylons/lib/python2.5/site-packages/Flask-0.6.1-py2.5.egg/flask/app.py -Scanned: 2016-10-12 11:32:26.138507 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crisisking/bsg-raffle -https://github.com/crisisking/bsg-raffle -Entry file: bsg-raffle/raffle.py -Scanned: 2016-10-12 11:32:27.462969 -Vulnerability 1: -File: bsg-raffle/raffle.py - > User input at line 39, trigger word "form[": - user_id = int(request.form['user_id']) -File: bsg-raffle/raffle.py - > reaches line 42, trigger word "execute(": - g.db.execute('INSERT INTO winners(participant_id, prize_name) - VALUES (?, ?)', (user_id, prize)) - -Vulnerability 2: -File: bsg-raffle/raffle.py - > User input at line 40, trigger word "form[": - prize = request.form['prize'] -Reassigned in: - File: bsg-raffle/raffle.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('winner_added.html',name=username[0], prize=prize) -File: bsg-raffle/raffle.py - > reaches line 42, trigger word "execute(": - g.db.execute('INSERT INTO winners(participant_id, prize_name) - VALUES (?, ?)', (user_id, prize)) - -Vulnerability 3: -File: bsg-raffle/raffle.py - > User input at line 66, trigger word "form[": - username = request.form['username'] -File: bsg-raffle/raffle.py - > reaches line 68, trigger word "execute(": - g.db.execute('INSERT INTO participants(name) - VALUES (?)', (username)) - -Vulnerability 4: -File: bsg-raffle/raffle.py - > User input at line 66, trigger word "form[": - username = request.form['username'] -File: bsg-raffle/raffle.py - > reaches line 70, trigger word "flash(": - flash('%s added successfully!' % username) - - - -adamgreig/pyautopull -https://github.com/adamgreig/pyautopull -Entry file: pyautopull/pyautopull.py -Scanned: 2016-10-12 11:32:28.704165 -No vulnerabilities found. - - -sean-/flask-skeleton -https://github.com/sean-/flask-skeleton -Entry file: None -Scanned: 2016-10-12 11:33:04.339922 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sean-/flask-skeleton. - -Runscope/httpbin -https://github.com/Runscope/httpbin -Entry file: httpbin/httpbin/filters.py -Scanned: 2016-10-12 11:33:07.877518 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -hasgeek/flask-lastuser -https://github.com/hasgeek/flask-lastuser -Entry file: flask-lastuser/tests/test_mergeuser.py -Scanned: 2016-10-12 11:33:14.976242 -No vulnerabilities found. - - -BooBSD/flask-odesk -https://github.com/BooBSD/flask-odesk -Entry file: flask-odesk/tests.py -Scanned: 2016-10-12 11:33:15.463472 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cool-shark/redimon -https://github.com/cool-shark/redimon -Entry file: redimon/src/redimon/app.py -Scanned: 2016-10-12 11:33:16.851933 -No vulnerabilities found. - - -pcsanwald/flask_site -https://github.com/pcsanwald/flask_site -Entry file: flask_site/mysite.py -Scanned: 2016-10-12 11:33:27.317945 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-12 11:33:29.828356 -No vulnerabilities found. - - -dag/flask-sassy -https://github.com/dag/flask-sassy -Entry file: flask-sassy/tests/__init__.py -Scanned: 2016-10-12 11:34:01.262757 -No vulnerabilities found. - - -charlieevett/jiffy-portal -https://github.com/charlieevett/jiffy-portal -Entry file: jiffy-portal/portal/app.py -Scanned: 2016-10-12 11:34:04.699312 -No vulnerabilities found. - - -tomekwojcik/Flask-Module-Static-Files -https://github.com/tomekwojcik/Flask-Module-Static-Files -Entry file: Flask-Module-Static-Files/stest/__init__.py -Scanned: 2016-10-12 11:34:08.969320 -No vulnerabilities found. - - -justjkk/dotpath -https://github.com/justjkk/dotpath -Entry file: dotpath/run.py -Scanned: 2016-10-12 11:34:13.499245 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -almet/semantic-bookclub -https://github.com/almet/semantic-bookclub -Entry file: semantic-bookclub/app/web.py -Scanned: 2016-10-12 11:34:17.337277 -Vulnerability 1: -File: semantic-bookclub/app/web.py - > User input at line 81, trigger word ".data": - book_title = dict(self.book.choices)[self.book.data] -File: semantic-bookclub/app/web.py - > reaches line 82, trigger word "flash(": - flash('%s have successfully borrowed %s' % (self.borrower.data, book_title)) - -Vulnerability 2: -File: semantic-bookclub/app/web.py - > User input at line 101, trigger word ".data": - member = Member.get_by(foaf_givenName=self.member.data).one() -File: semantic-bookclub/app/web.py - > reaches line 105, trigger word "flash(": - flash('%s now owns %s' % (member.foaf_givenName.first, book.dcterms_title.first)) - -Vulnerability 3: -File: semantic-bookclub/app/web.py - > User input at line 102, trigger word ".data": - book = Book.get_by(dcterms_identifier=self.book.data).one() -File: semantic-bookclub/app/web.py - > reaches line 105, trigger word "flash(": - flash('%s now owns %s' % (member.foaf_givenName.first, book.dcterms_title.first)) - - - -t9md/snippy -https://github.com/t9md/snippy -Entry file: snippy/snippy.py -Scanned: 2016-10-12 11:34:18.309468 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stehem/Tywna -https://github.com/stehem/Tywna -Entry file: Tywna/application/__init__.py -Scanned: 2016-10-12 11:34:32.328849 -No vulnerabilities found. - - -hoprocker/mylons -https://github.com/hoprocker/mylons -Entry file: mylons/lib/python2.5/site-packages/Flask-0.6.1-py2.5.egg/flask/app.py -Scanned: 2016-10-12 11:34:32.952468 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/bitpit-https-bridge -https://github.com/maxcountryman/bitpit-https-bridge -Entry file: bitpit-https-bridge/httpstobitpit/__init__.py -Scanned: 2016-10-12 11:34:34.431404 -No vulnerabilities found. - - -maxcountryman/flask-bcrypt -https://github.com/maxcountryman/flask-bcrypt -Entry file: flask-bcrypt/flask_bcrypt.py -Scanned: 2016-10-12 11:35:06.138757 -No vulnerabilities found. - - -kennethreitz-archive/flask-rest -https://github.com/kennethreitz-archive/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-12 11:35:14.904026 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tdryer/flask-forum -https://github.com/tdryer/flask-forum -Entry file: flask-forum/app.py -Scanned: 2016-10-12 11:35:17.200403 -Vulnerability 1: -File: flask-forum/app.py - > User input at line 124, trigger word ".data": - new_topic_id = post_topic(form.subject.data, form.content.data) -Reassigned in: - File: flask-forum/app.py - > Line 127: ret_MAYBE_FUNCTION_NAME = render_template('newtopic.html',form=form) -File: flask-forum/app.py - > reaches line 126, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/topic/' + new_topic_id) - -Vulnerability 2: -File: flask-forum/app.py - > User input at line 196, trigger word ".data": - username = form.username.data -File: flask-forum/app.py - > reaches line 199, trigger word "execute(": - g.db.execute('INSERT INTO users (username, password_hash) values (?, ?)', [username, pw_hash]) - -Vulnerability 3: -File: flask-forum/app.py - > User input at line 197, trigger word ".data": - password = form.password1.data -Reassigned in: - File: flask-forum/app.py - > Line 198: pw_hash = hashpw(password, gensalt()) -File: flask-forum/app.py - > reaches line 199, trigger word "execute(": - g.db.execute('INSERT INTO users (username, password_hash) values (?, ?)', [username, pw_hash]) - - - -dqminh/flask-mongoobject -https://github.com/dqminh/flask-mongoobject -Entry file: flask-mongoobject/examples_hello.py -Scanned: 2016-10-12 11:35:19.541113 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gmonnerat/flask-sandbox -https://github.com/gmonnerat/flask-sandbox -Entry file: flask-sandbox/hello/hello.py -Scanned: 2016-10-12 11:35:20.719564 -No vulnerabilities found. - - -DarkSector/wombat -https://github.com/DarkSector/wombat -Entry file: wombat/wombatdb.py -Scanned: 2016-10-12 11:35:31.666327 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lOlIl/Flask---Local-election -https://github.com/lOlIl/Flask---Local-election -Entry file: Flask---Local-election/app.py -Scanned: 2016-10-12 11:35:34.523187 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -paulftw/appengine-flask-template -https://github.com/paulftw/appengine-flask-template -Entry file: appengine-flask-template/app/app.py -Scanned: 2016-10-12 11:35:36.050201 -No vulnerabilities found. - - -flores/aquadoc -https://github.com/flores/aquadoc -Entry file: aquadoc/aquadoc.py -Scanned: 2016-10-12 11:36:05.806672 -No vulnerabilities found. - - -jorgeatorres/cotufa -https://github.com/jorgeatorres/cotufa -Entry file: cotufa/cotufa.py -Scanned: 2016-10-12 11:36:10.108515 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mbr/flask-kvsession -https://github.com/mbr/flask-kvsession -Entry file: flask-kvsession/tests/conftest.py -Scanned: 2016-10-12 11:36:21.042654 -No vulnerabilities found. - - -radekstepan/Flask-Skeleton-App -https://github.com/radekstepan/Flask-Skeleton-App -Entry file: Flask-Skeleton-App/flask_app.py -Scanned: 2016-10-12 11:36:29.837232 -No vulnerabilities found. - - -utahta/flask-on-fluxflex -https://github.com/utahta/flask-on-fluxflex -Entry file: flask-on-fluxflex/app/__init__.py -Scanned: 2016-10-12 11:36:36.580340 -No vulnerabilities found. - - -femmerling/brunch-flask-gae-skeleton -https://github.com/femmerling/brunch-flask-gae-skeleton -Entry file: brunch-flask-gae-skeleton/gae/main.py -Scanned: 2016-10-12 11:37:05.783703 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amcameron/gchartsdemo -https://github.com/amcameron/gchartsdemo -Entry file: gchartsdemo/charts.py -Scanned: 2016-10-12 11:37:07.081166 -No vulnerabilities found. - - -bagyr/flaskPage -https://github.com/bagyr/flaskPage -Entry file: flaskPage/__init__.py -Scanned: 2016-10-12 11:37:10.324337 -No vulnerabilities found. - - -sbook/flask-script -https://github.com/sbook/flask-script -Entry file: flask-script/tests.py -Scanned: 2016-10-12 11:37:21.901765 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joemarct/flask-gae-app -https://github.com/joemarct/flask-gae-app -Entry file: flask-gae-app/flask/app.py -Scanned: 2016-10-12 11:37:26.330492 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Bhagyashree-Mandora/The-Python-Task -https://github.com/Bhagyashree-Mandora/The-Python-Task -Entry file: The-Python-Task/main.py -Scanned: 2016-10-12 11:37:30.594048 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -piratesolutions/ps-website -https://github.com/piratesolutions/ps-website -Entry file: ps-website/app.py -Scanned: 2016-10-12 11:37:36.250528 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samrat/blogengine -https://github.com/samrat/blogengine -Entry file: blogengine/blogengine.py -Scanned: 2016-10-12 11:37:37.579346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TimFletcher/cmprss -https://github.com/TimFletcher/cmprss -Entry file: cmprss/cmprss.py -Scanned: 2016-10-12 11:38:03.839833 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyvanee/mappy -https://github.com/andyvanee/mappy -Entry file: mappy/mappy.py -Scanned: 2016-10-12 11:38:09.611105 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -barnslig/foreveralonebook -https://github.com/barnslig/foreveralonebook -Entry file: foreveralonebook/foreveralonebook.py -Scanned: 2016-10-12 11:38:16.511996 -Vulnerability 1: -File: foreveralonebook/foreveralonebook.py - > User input at line 47, trigger word "form[": - entry = escape(request.form['entry']) -File: foreveralonebook/foreveralonebook.py - > reaches line 57, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_posts (u_id, content) VALUES ({0}, '{1}');'.format(session['u_id'], entry)) - -Vulnerability 2: -File: foreveralonebook/foreveralonebook.py - > User input at line 113, trigger word "form[": - password = hashlib.sha1(request.form['new_pw']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 115, trigger word "execute(": - g.db.cur.execute('UPDATE feabook_user SET password = '{0}' WHERE id = '{1}';'.format(password, session['u_id'])) - -Vulnerability 3: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 157, trigger word "execute(": - g.db.cur.execute('SELECT username FROM feabook_user WHERE username = '{0}';'.format(username)) - -Vulnerability 4: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 164, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_user (username, password) VALUES ('{0}', '{1}');'.format(username, password)) - -Vulnerability 5: -File: foreveralonebook/foreveralonebook.py - > User input at line 152, trigger word "form[": - password = hashlib.sha1(request.form['password']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 164, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_user (username, password) VALUES ('{0}', '{1}');'.format(username, password)) - -Vulnerability 6: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 169, trigger word "execute(": - g.db.cur.execute('SELECT id, username FROM feabook_user WHERE username = '{0}';'.format(username)) - -Vulnerability 7: -File: foreveralonebook/foreveralonebook.py - > User input at line 193, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 222: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 223: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 197, trigger word "execute(": - g.db.cur.execute('SELECT id, username, password FROM feabook_user WHERE username = '{0}' AND password = '{1}';'.format(username, password)) - -Vulnerability 8: -File: foreveralonebook/foreveralonebook.py - > User input at line 194, trigger word "form[": - password = hashlib.sha1(request.form['password']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 197, trigger word "execute(": - g.db.cur.execute('SELECT id, username, password FROM feabook_user WHERE username = '{0}' AND password = '{1}';'.format(username, password)) - - - -geek22com/referral_dashboard_engine -https://github.com/geek22com/referral_dashboard_engine -Entry file: referral_dashboard_engine/heymoose/__init__.py -Scanned: 2016-10-12 11:38:38.059056 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dqminh/flask-lettuce -https://github.com/dqminh/flask-lettuce -Entry file: flask-lettuce/test.py -Scanned: 2016-10-12 11:38:40.538882 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -radekstepan/FlaskBudget -https://github.com/radekstepan/FlaskBudget -Entry file: FlaskBudget/budget.py -Scanned: 2016-10-12 11:38:43.380604 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -UfSoft/Flask-MenuBuilder -https://github.com/UfSoft/Flask-MenuBuilder -Entry file: Flask-MenuBuilder/tests/test_menuitem.py -Scanned: 2016-10-12 11:39:04.781805 -No vulnerabilities found. - - -gregglind/flask-tool -https://github.com/gregglind/flask-tool -Entry file: flask-tool/flasktool/console.py -Scanned: 2016-10-12 11:39:09.106773 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kblin/flask-downloader -https://github.com/kblin/flask-downloader -Entry file: flask-downloader/tests.py -Scanned: 2016-10-12 11:39:11.397014 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/flog -https://github.com/maxcountryman/flog -Entry file: flog/flog/__init__.py -Scanned: 2016-10-12 11:39:16.971065 -No vulnerabilities found. - - -sublee/Flask-Handler -https://github.com/sublee/Flask-Handler -Entry file: None -Scanned: 2016-10-12 11:39:19.172297 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sublee/Flask-Handler. - -Ramblurr/pyqdb -https://github.com/Ramblurr/pyqdb -Entry file: pyqdb/src/pyqdb.py -Scanned: 2016-10-12 11:39:41.706633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zackster/DijScrape--flask-rewrite- -https://github.com/zackster/DijScrape--flask-rewrite- -Entry file: DijScrape--flask-rewrite-/dijscrape.py -Scanned: 2016-10-12 11:39:43.007832 -No vulnerabilities found. - - -asenchi/pomp -https://github.com/asenchi/pomp -Entry file: pomp/pomp/pomp.py -Scanned: 2016-10-12 11:39:44.222280 -No vulnerabilities found. - - -tshirtman/snakenest -https://github.com/tshirtman/snakenest -Entry file: snakenest/main.py -Scanned: 2016-10-12 11:40:05.507537 -No vulnerabilities found. - - -jvreeland/Python-Web-Service-for-Android-GMaps-AsyncTask-Demo -https://github.com/jvreeland/Python-Web-Service-for-Android-GMaps-AsyncTask-Demo -Entry file: Python-Web-Service-for-Android-GMaps-AsyncTask-Demo/gmaps.py -Scanned: 2016-10-12 11:40:08.822876 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Python-Web-Service-for-Android-GMaps-AsyncTask-Demo/env/lib/python2.7/genericpath.py - -triposo/geocodecache -https://github.com/triposo/geocodecache -Entry file: geocodecache/geocodecache.py -Scanned: 2016-10-12 11:40:12.037405 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -toastwaffle/ToDoQuick -https://github.com/toastwaffle/ToDoQuick -Entry file: ToDoQuick/todoquick.py -Scanned: 2016-10-12 11:40:17.521473 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coleifer/flask-peewee -https://github.com/coleifer/flask-peewee -Entry file: flask-peewee/example/app.py -Scanned: 2016-10-12 11:40:43.406112 -Vulnerability 1: -File: flask-peewee/example/admin.py - > User input at line 27, trigger word "get(": - next = request.form.get('next') or self.dashboard_url() -File: flask-peewee/example/admin.py - > reaches line 28, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - - - -jeanphix/Flask-Dashed -https://github.com/jeanphix/Flask-Dashed -Entry file: Flask-Dashed/examples/sqlalchemy_backend.py -Scanned: 2016-10-12 11:40:46.914641 -No vulnerabilities found. - - -jarus/flask-mongokit -https://github.com/jarus/flask-mongokit -Entry file: flask-mongokit/tests/test_base.py -Scanned: 2016-10-12 11:40:48.633588 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -namlook/flask-apibee -https://github.com/namlook/flask-apibee -Entry file: flask-apibee/example/app.py -Scanned: 2016-10-12 11:40:50.397922 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -voluntas/heroku-template-flask -https://github.com/voluntas/heroku-template-flask -Entry file: heroku-template-flask/snowflake/__init__.py -Scanned: 2016-10-12 11:41:05.638508 -No vulnerabilities found. - - -Deepwalker/Flask-Bundle -https://github.com/Deepwalker/Flask-Bundle -Entry file: Flask-Bundle/samples/simple.py -Scanned: 2016-10-12 11:41:17.925434 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sunlightlabs/flask-districtoffices -https://github.com/sunlightlabs/flask-districtoffices -Entry file: flask-districtoffices/districtoffices.py -Scanned: 2016-10-12 11:41:20.762993 -No vulnerabilities found. - - -quanticle/flask_blog -https://github.com/quanticle/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-12 11:41:49.091710 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garrettr/haps -https://github.com/garrettr/haps -Entry file: haps/quickstart.py -Scanned: 2016-10-12 11:41:50.427669 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dsully/sitter -https://github.com/dsully/sitter -Entry file: sitter/sitter/__init__.py -Scanned: 2016-10-12 11:42:08.404544 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahri/nodeblog -https://github.com/ahri/nodeblog -Entry file: nodeblog/blog.py -Scanned: 2016-10-12 11:42:09.603762 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/celeb -https://github.com/maxcountryman/celeb -Entry file: celeb/celeb/__init__.py -Scanned: 2016-10-12 11:42:13.168036 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/PO -https://github.com/marchon/PO -Entry file: PO/main.py -Scanned: 2016-10-12 11:42:18.422899 -No vulnerabilities found. - - -slok/xlarrakoetxeaorg -https://github.com/slok/xlarrakoetxeaorg -Entry file: xlarrakoetxeaorg/mysite/blog/__init__.py -Scanned: 2016-10-12 11:42:21.811173 -No vulnerabilities found. - - -boboppie/pyLiftOver -https://github.com/boboppie/pyLiftOver -Entry file: pyLiftOver/flask/lift-over-app.py -Scanned: 2016-10-12 11:42:41.223391 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -no0p/homepage -https://github.com/no0p/homepage -Entry file: homepage/site.py -Scanned: 2016-10-12 11:42:50.007821 -No vulnerabilities found. - - -tjosten/python-push -https://github.com/tjosten/python-push -Entry file: python-push/push.py -Scanned: 2016-10-12 11:42:51.333854 -No vulnerabilities found. - - -Joshkunz/PyChannel -https://github.com/Joshkunz/PyChannel -Entry file: PyChannel/PyChannel/__init__.py -Scanned: 2016-10-12 11:42:55.674942 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cbess/ytlinker -https://github.com/cbess/ytlinker -Entry file: ytlinker/flask/app.py -Scanned: 2016-10-12 11:42:58.676915 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -openshift/flask-example -https://github.com/openshift/flask-example -Entry file: flask-example/wsgi/myflaskapp.py -Scanned: 2016-10-12 11:43:10.877484 -No vulnerabilities found. - - -wasabi0522/flaskr -https://github.com/wasabi0522/flaskr -Entry file: flaskr/flaskr/__init__.py -Scanned: 2016-10-12 11:43:42.596557 -No vulnerabilities found. - - -amehta/Flaskly -https://github.com/amehta/Flaskly -Entry file: Flaskly/flaskly.py -Scanned: 2016-10-12 11:43:51.351508 -Vulnerability 1: -File: Flaskly/flaskly.py - > User input at line 73, trigger word "form[": - url = request.form['long_url'] -Reassigned in: - File: Flaskly/flaskly.py - > Line 74: short = pickShortUrl(url) -File: Flaskly/flaskly.py - > reaches line 75, trigger word "flash(": - flash('Short Url http:/localhost/' + short) - - - -fyears/flaskr-redis -https://github.com/fyears/flaskr-redis -Entry file: flaskr-redis/app.py -Scanned: 2016-10-12 11:43:57.110854 -No vulnerabilities found. - - -Jc2k/flask-example -https://github.com/Jc2k/flask-example -Entry file: flask-example/web.py -Scanned: 2016-10-12 11:44:07.392733 -No vulnerabilities found. - - -brainTrain/flasktest -https://github.com/brainTrain/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-12 11:44:12.273099 -No vulnerabilities found. - - -proles/flaskr -https://github.com/proles/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 11:44:13.548165 -No vulnerabilities found. - - -joeyespo/hello-redis-tasks -https://github.com/joeyespo/hello-redis-tasks -Entry file: hello-redis-tasks/hello_redis_tasks.py -Scanned: 2016-10-12 11:44:18.936738 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cemk/flask-expander -https://github.com/cemk/flask-expander -Entry file: flask-expander/expand.py -Scanned: 2016-10-12 11:44:21.140556 -No vulnerabilities found. - - -pygraz/old-flask-website -https://github.com/pygraz/old-flask-website -Entry file: old-flask-website/pygraz_website/__init__.py -Scanned: 2016-10-12 11:44:43.216139 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thomasballinger/Utok -https://github.com/thomasballinger/Utok -Entry file: Utok/webapp.py -Scanned: 2016-10-12 11:44:55.393617 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lcruz/Igualitos-appengine -https://github.com/lcruz/Igualitos-appengine -Entry file: Igualitos-appengine/config.py -Scanned: 2016-10-12 11:44:59.608222 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hettan/MyPortfolio -https://github.com/hettan/MyPortfolio -Entry file: MyPortfolio/web/myFlaskProject.py -Scanned: 2016-10-12 11:45:10.546097 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lcruz/igualitos -https://github.com/lcruz/igualitos -Entry file: igualitos/config.py -Scanned: 2016-10-12 11:45:11.924631 -No vulnerabilities found. - - -agonzalezro/gplus-blog -https://github.com/agonzalezro/gplus-blog -Entry file: gplus-blog/gplusblog/__init__.py -Scanned: 2016-10-12 11:45:14.326097 -No vulnerabilities found. - - -fwenzel/strassendeutsch -https://github.com/fwenzel/strassendeutsch -Entry file: strassendeutsch/woerterbuch/__init__.py -Scanned: 2016-10-12 11:45:22.858964 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lzyy/chat -https://github.com/lzyy/chat -Entry file: chat/src/app.py -Scanned: 2016-10-12 11:45:52.518876 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ferhensil/flask-example -https://github.com/ferhensil/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-12 11:45:54.005297 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jeanphix/flask-dashed-demo -https://github.com/jeanphix/flask-dashed-demo -Entry file: flask-dashed-demo/app.py -Scanned: 2016-10-12 11:46:08.774736 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kenkam/msgbrd -https://github.com/kenkam/msgbrd -Entry file: msgbrd/app.py -Scanned: 2016-10-12 11:46:12.143973 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -grigouze/flask-jenkins-radiator -https://github.com/grigouze/flask-jenkins-radiator -Entry file: flask-jenkins-radiator/radiator/radiator.py -Scanned: 2016-10-12 11:46:15.385954 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rduplain/flask-jquery-autosave-example -https://github.com/rduplain/flask-jquery-autosave-example -Entry file: flask-jquery-autosave-example/app.py -Scanned: 2016-10-12 11:46:19.951095 -No vulnerabilities found. - - -kracekumar/Gummi -https://github.com/kracekumar/Gummi -Entry file: Gummi/gummi/tests/test.py -Scanned: 2016-10-12 11:46:27.518422 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ivoscc/qchaes -https://github.com/ivoscc/qchaes -Entry file: qchaes/runserver.py -Scanned: 2016-10-12 11:46:48.356326 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fdemmer/flask-principal -https://github.com/fdemmer/flask-principal -Entry file: flask-principal/tests/test_principal.py -Scanned: 2016-10-12 11:46:53.049136 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dasevilla/evernote-oauth-example -https://github.com/dasevilla/evernote-oauth-example -Entry file: evernote-oauth-example/webapp.py -Scanned: 2016-10-12 11:46:54.328780 -No vulnerabilities found. - - -zeninthehome/flaskr -https://github.com/zeninthehome/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 11:47:09.149316 -No vulnerabilities found. - - -joshfinnie/Flacker-News -https://github.com/joshfinnie/Flacker-News -Entry file: Flacker-News/flacker-news/app.py -Scanned: 2016-10-12 11:47:12.375265 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -moneill/uber-flask -https://github.com/moneill/uber-flask -Entry file: uber-flask/uber.py -Scanned: 2016-10-12 11:47:18.150655 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: uber-flask/env/lib/python2.7/genericpath.py - -nubela/radar-backend -https://github.com/nubela/radar-backend -Entry file: radar-backend/src/radar.py -Scanned: 2016-10-12 11:47:20.802894 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TxSSC/the-questionator -https://github.com/TxSSC/the-questionator -Entry file: the-questionator/questionator/__init__.py -Scanned: 2016-10-12 11:47:23.926894 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -satonaoya/flask-epio-skelton -https://github.com/satonaoya/flask-epio-skelton -Entry file: flask-epio-skelton/app.py -Scanned: 2016-10-12 11:47:44.213852 -No vulnerabilities found. - - -marksteve/bookmarks -https://github.com/marksteve/bookmarks -Entry file: bookmarks/bookmarks.py -Scanned: 2016-10-12 11:47:48.576422 -No vulnerabilities found. - - -paradoxxxzero/polldance -https://github.com/paradoxxxzero/polldance -Entry file: polldance/dance.py -Scanned: 2016-10-12 11:47:52.839796 -No vulnerabilities found. - - -flebel/Egami -https://github.com/flebel/Egami -Entry file: Egami/egami.py -Scanned: 2016-10-12 11:47:55.262516 -No vulnerabilities found. - - -mitsuhiko/flask-pastebin -https://github.com/mitsuhiko/flask-pastebin -Entry file: flask-pastebin/pastebin.py -Scanned: 2016-10-12 11:48:09.636700 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -maxcountryman/flask-seasurf -https://github.com/maxcountryman/flask-seasurf -Entry file: flask-seasurf/test_seasurf.py -Scanned: 2016-10-12 11:48:15.408984 -No vulnerabilities found. - - -maxcountryman/logmon -https://github.com/maxcountryman/logmon -Entry file: logmon/logmon/__init__.py -Scanned: 2016-10-12 11:48:21.403409 -No vulnerabilities found. - - -hasgeek/coaster -https://github.com/hasgeek/coaster -Entry file: coaster/tests/test_render_with.py -Scanned: 2016-10-12 11:48:25.435980 -No vulnerabilities found. - - -craigkerstiens/flask-helloworld -https://github.com/craigkerstiens/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-12 11:48:44.722068 -No vulnerabilities found. - - -jarodl/flask-github -https://github.com/jarodl/flask-github -Entry file: flask-github/example/example.py -Scanned: 2016-10-12 11:48:49.907936 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ahri/flask-mustache -https://github.com/ahri/flask-mustache -Entry file: flask-mustache/tests/test_mustache.py -Scanned: 2016-10-12 11:48:53.265139 -No vulnerabilities found. - - -gears/flask-gears -https://github.com/gears/flask-gears -Entry file: flask-gears/example/app.py -Scanned: 2016-10-12 11:48:55.680087 -No vulnerabilities found. - - -mitsuhiko/tugraz-flask-demo -https://github.com/mitsuhiko/tugraz-flask-demo -Entry file: tugraz-flask-demo/pastebin.py -Scanned: 2016-10-12 11:49:09.470460 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mattoufoutu/flask-project-templates -https://github.com/mattoufoutu/flask-project-templates -Entry file: None -Scanned: 2016-10-12 11:49:13.793814 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mattoufoutu/flask-project-templates. - -svieira/Budget-Manager -https://github.com/svieira/Budget-Manager -Entry file: None -Scanned: 2016-10-12 11:49:24.361296 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/svieira/Budget-Manager. - -solarmist/Flaskr -https://github.com/solarmist/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-12 11:49:45.692776 -No vulnerabilities found. - - -cybertoast/flask-router -https://github.com/cybertoast/flask-router -Entry file: flask-router/test_router.py -Scanned: 2016-10-12 11:49:53.521304 -No vulnerabilities found. - - -srusskih/Flask-application-template -https://github.com/srusskih/Flask-application-template -Entry file: Flask-application-template/myapp/myapp.py -Scanned: 2016-10-12 11:50:00.408036 -No vulnerabilities found. - - -Rootbuzz/heroku-basic-flask-app -https://github.com/Rootbuzz/heroku-basic-flask-app -Entry file: heroku-basic-flask-app/sso.py -Scanned: 2016-10-12 11:50:09.716698 -No vulnerabilities found. - - -adgaudio/async-webapp---gevent--psycopg2--flask -https://github.com/adgaudio/async-webapp---gevent--psycopg2--flask -Entry file: async-webapp---gevent--psycopg2--flask/app.py -Scanned: 2016-10-12 11:50:14.080925 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/chatter -https://github.com/maxcountryman/chatter -Entry file: chatter/chatter/__init__.py -Scanned: 2016-10-12 11:50:17.456391 -No vulnerabilities found. - - -zeak/pyProx -https://github.com/zeak/pyProx -Entry file: pyProx/pyProx.py -Scanned: 2016-10-12 11:50:21.682947 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -subchild/iStockUtils -https://github.com/subchild/iStockUtils -Entry file: iStockUtils/istockutils.py -Scanned: 2016-10-12 11:50:25.114441 -No vulnerabilities found. - - -tsoporan/read.list -https://github.com/tsoporan/read.list -Entry file: None -Scanned: 2016-10-12 11:50:46.484740 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tsoporan/read.list. - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 11:55:21.638541 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-12 11:55:23.492755 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-12 11:55:25.915194 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-12 11:55:44.905155 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-12 11:56:18.994942 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-12 11:56:19.983892 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-12 11:56:25.211555 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-12 11:56:26.706709 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-12 11:57:19.741620 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/flask_sqlalchemy/__init__.py -Scanned: 2016-10-12 11:57:22.956761 -No vulnerabilities found. - - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-12 11:57:25.310716 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-12 11:57:26.295718 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-12 11:57:26.802105 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-12 11:58:21.327935 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-12 11:58:21.825770 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-12 11:58:25.162199 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-12 11:58:26.506619 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-12 11:58:29.748422 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-12 11:58:47.319699 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-12 11:59:23.945036 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-12 11:59:25.480635 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-12 11:59:25.994046 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-12 11:59:27.822835 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-12 11:59:29.178735 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-12 11:59:30.505459 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-12 11:59:31.017526 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-12 11:59:47.548423 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-12 12:00:21.889466 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-12 12:00:27.163888 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-12 12:00:31.704163 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 12:00:33.939244 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-12 12:00:36.490418 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-12 12:00:41.763282 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-12 12:00:50.414701 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-12 12:01:22.804336 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-12 12:01:24.326954 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-12 12:01:28.762048 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-12 12:01:35.726036 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-12 12:01:36.316101 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-12 12:01:36.810388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-12 12:01:38.022774 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-12 12:01:43.408100 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-12 12:01:48.799094 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-12 12:02:30.166471 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-12 12:02:34.352294 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-12 12:02:39.092885 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-12 12:02:44.028999 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-12 12:03:23.188540 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-12 12:03:28.019595 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-12 12:03:33.039504 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-12 12:03:37.019949 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-12 12:03:38.305599 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-12 12:03:39.677816 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-12 12:03:44.581522 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-12 12:04:23.724289 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-12 12:04:27.711280 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-12 12:04:29.235883 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-12 12:04:34.671436 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-12 12:04:36.067823 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-12 12:04:40.818594 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-12 12:04:43.327054 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-12 12:04:49.821017 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-12 12:05:27.667744 -No vulnerabilities found. - - -zzzsochi/Flask-Gravatar -https://github.com/zzzsochi/Flask-Gravatar -Entry file: Flask-Gravatar/tests/test_core.py -Scanned: 2016-10-12 12:05:35.701436 -No vulnerabilities found. - - -dag/flask-zodb -https://github.com/dag/flask-zodb -Entry file: flask-zodb/flask_zodb.py -Scanned: 2016-10-12 12:05:36.205198 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -zen4ever/route53manager -https://github.com/zen4ever/route53manager -Entry file: route53manager/route53/__init__.py -Scanned: 2016-10-12 12:05:37.689483 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-kitchensink -https://github.com/mitsuhiko/flask-kitchensink -Entry file: flask-kitchensink/example-code/hello.py -Scanned: 2016-10-12 12:05:38.186808 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyeseast/flask-docviewer -https://github.com/eyeseast/flask-docviewer -Entry file: flask-docviewer/docviewer/app.py -Scanned: 2016-10-12 12:05:40.391480 -No vulnerabilities found. - - -dag/flask-attest -https://github.com/dag/flask-attest -Entry file: flask-attest/tests.py -Scanned: 2016-10-12 12:05:43.897677 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ekalinin/flask-noextref -https://github.com/ekalinin/flask-noextref -Entry file: flask-noextref/test_noextref.py -Scanned: 2016-10-12 12:05:51.246056 -No vulnerabilities found. - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-12 12:06:31.682444 -Vulnerability 1: -File: flitter/flitter/controllers/user.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flitter/flitter/controllers/user.py - > Line 24: session['user'] = username - File: flitter/flitter/controllers/user.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry.entries',username=username)) - File: flitter/flitter/controllers/user.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('signup.html',error=error) - File: flitter/flitter/controllers/user.py - > Line 15: ret_MAYBE_FUNCTION_NAME = redirect_to_user_page() -File: flitter/flitter/controllers/user.py - > reaches line 25, trigger word "flash(": - flash('Welcome, {0}.'.format(username)) - - - -aaront/calcmymarks2 -https://github.com/aaront/calcmymarks2 -Entry file: calcmymarks2/main.py -Scanned: 2016-10-12 12:06:35.424739 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-feedback -https://github.com/mitsuhiko/flask-feedback -Entry file: flask-feedback/feedback.py -Scanned: 2016-10-12 12:06:38.501265 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilsaj/flask-admin-old -https://github.com/wilsaj/flask-admin-old -Entry file: flask-admin-old/test_admin.py -Scanned: 2016-10-12 12:06:52.840414 -No vulnerabilities found. - - -leandrosilva/flaskito -https://github.com/leandrosilva/flaskito -Entry file: flaskito/src/flaskito.py -Scanned: 2016-10-12 12:06:53.348744 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/Flask-API-Server -https://github.com/marchon/Flask-API-Server -Entry file: Flask-API-Server/apiserver/tests/app.py -Scanned: 2016-10-12 12:06:54.656291 -No vulnerabilities found. - - -kapilreddy/Shabda-Sangraha -https://github.com/kapilreddy/Shabda-Sangraha -Entry file: Shabda-Sangraha/dict.py -Scanned: 2016-10-12 12:07:25.723386 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tooxie/flask-syrinx -https://github.com/tooxie/flask-syrinx -Entry file: flask-syrinx/syrinx/__init__.py -Scanned: 2016-10-12 12:07:28.222070 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshourisman/flask-shortly -https://github.com/joshourisman/flask-shortly -Entry file: flask-shortly/shortly/__init__.py -Scanned: 2016-10-12 12:07:36.155691 -No vulnerabilities found. - - -jamiltron/fitgen -https://github.com/jamiltron/fitgen -Entry file: fitgen/fitgen.py -Scanned: 2016-10-12 12:07:39.634963 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomviner/Flask-Name-that-actor-or-movie -https://github.com/tomviner/Flask-Name-that-actor-or-movie -Entry file: Flask-Name-that-actor-or-movie/namer.py -Scanned: 2016-10-12 12:07:54.619638 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/flylons -https://github.com/marchon/flylons -Entry file: flylons/application/__init__.py -Scanned: 2016-10-12 12:07:56.149703 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/checkinmapper -https://github.com/marchon/checkinmapper -Entry file: checkinmapper/checkinmapper.py -Scanned: 2016-10-12 12:08:26.749423 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -comfuture/simplesite -https://github.com/comfuture/simplesite -Entry file: simplesite/simplesite/core.py -Scanned: 2016-10-12 12:08:28.235760 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zachwill/flask-engine -https://github.com/zachwill/flask-engine -Entry file: flask-engine/libs/flask/sessions.py -Scanned: 2016-10-12 12:08:37.851052 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spantaleev/flask-sijax -https://github.com/spantaleev/flask-sijax -Entry file: flask-sijax/examples/comet.py -Scanned: 2016-10-12 12:08:40.342604 -No vulnerabilities found. - - -utahta/Flask-MVC-Pattern -https://github.com/utahta/Flask-MVC-Pattern -Entry file: Flask-MVC-Pattern/main.py -Scanned: 2016-10-12 12:08:41.555144 -No vulnerabilities found. - - -jzempel/flask-exceptional -https://github.com/jzempel/flask-exceptional -Entry file: flask-exceptional/flask_exceptional.py -Scanned: 2016-10-12 12:08:55.053773 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qsnake/flask -https://github.com/qsnake/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 12:08:57.728894 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -joeyespo/flask-scaffold -https://github.com/joeyespo/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-12 12:09:27.257834 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iwebhosting/collectd-flask -https://github.com/iwebhosting/collectd-flask -Entry file: collectd-flask/collectdflask.py -Scanned: 2016-10-12 12:09:29.609269 -No vulnerabilities found. - - -yxm0513/flask-ims -https://github.com/yxm0513/flask-ims -Entry file: flask-ims/flask/sessions.py -Scanned: 2016-10-12 12:09:32.164454 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fay/flask-skeleton -https://github.com/fay/flask-skeleton -Entry file: flask-skeleton/app/__init__.py -Scanned: 2016-10-12 12:09:39.247408 -No vulnerabilities found. - - -joshourisman/flask-beans -https://github.com/joshourisman/flask-beans -Entry file: flask-beans/beans.py -Scanned: 2016-10-12 12:09:40.567081 -No vulnerabilities found. - - -jjinux/pyteladventure -https://github.com/jjinux/pyteladventure -Entry file: pyteladventure/pyteladventure/__init__.py -Scanned: 2016-10-12 12:09:41.105620 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mchambliss/flask -https://github.com/mchambliss/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 12:09:58.381620 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -robi42/backbone-flask -https://github.com/robi42/backbone-flask -Entry file: backbone-flask/app.py -Scanned: 2016-10-12 12:10:38.903926 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-12 12:10:41.436829 -No vulnerabilities found. - - -joshfinnie/Flask-shrtn -https://github.com/joshfinnie/Flask-shrtn -Entry file: Flask-shrtn/Flask-shrtn.py -Scanned: 2016-10-12 12:10:41.974436 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomatohater/goonhilly -https://github.com/tomatohater/goonhilly -Entry file: goonhilly/goonhilly.py -Scanned: 2016-10-12 12:10:57.755633 -No vulnerabilities found. - - -jmoiron/jmoiron.net -https://github.com/jmoiron/jmoiron.net -Entry file: None -Scanned: 2016-10-12 12:10:58.301544 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fzuslide/video_new -https://github.com/fzuslide/video_new -Entry file: video_new/application.py -Scanned: 2016-10-12 12:11:29.589033 -No vulnerabilities found. - - -tomatohater/lydon -https://github.com/tomatohater/lydon -Entry file: lydon/lydon/__init__.py -Scanned: 2016-10-12 12:11:30.941624 -No vulnerabilities found. - - -williamratcliff/django-feedback -https://github.com/williamratcliff/django-feedback -Entry file: django-feedback/feedback.py -Scanned: 2016-10-12 12:11:40.861992 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joelbm24/blog -https://github.com/joelbm24/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-12 12:11:42.348631 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoprocker/mylons -https://github.com/hoprocker/mylons -Entry file: mylons/lib/python2.5/site-packages/Flask-0.6.1-py2.5.egg/flask/app.py -Scanned: 2016-10-12 12:11:56.920396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crisisking/bsg-raffle -https://github.com/crisisking/bsg-raffle -Entry file: bsg-raffle/raffle.py -Scanned: 2016-10-12 12:11:58.259096 -Vulnerability 1: -File: bsg-raffle/raffle.py - > User input at line 39, trigger word "form[": - user_id = int(request.form['user_id']) -File: bsg-raffle/raffle.py - > reaches line 42, trigger word "execute(": - g.db.execute('INSERT INTO winners(participant_id, prize_name) - VALUES (?, ?)', (user_id, prize)) - -Vulnerability 2: -File: bsg-raffle/raffle.py - > User input at line 40, trigger word "form[": - prize = request.form['prize'] -Reassigned in: - File: bsg-raffle/raffle.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('winner_added.html',name=username[0], prize=prize) -File: bsg-raffle/raffle.py - > reaches line 42, trigger word "execute(": - g.db.execute('INSERT INTO winners(participant_id, prize_name) - VALUES (?, ?)', (user_id, prize)) - -Vulnerability 3: -File: bsg-raffle/raffle.py - > User input at line 66, trigger word "form[": - username = request.form['username'] -File: bsg-raffle/raffle.py - > reaches line 68, trigger word "execute(": - g.db.execute('INSERT INTO participants(name) - VALUES (?)', (username)) - -Vulnerability 4: -File: bsg-raffle/raffle.py - > User input at line 66, trigger word "form[": - username = request.form['username'] -File: bsg-raffle/raffle.py - > reaches line 70, trigger word "flash(": - flash('%s added successfully!' % username) - - - -adamgreig/pyautopull -https://github.com/adamgreig/pyautopull -Entry file: pyautopull/pyautopull.py -Scanned: 2016-10-12 12:11:59.453870 -No vulnerabilities found. - - -sean-/flask-skeleton -https://github.com/sean-/flask-skeleton -Entry file: None -Scanned: 2016-10-12 12:12:31.989693 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sean-/flask-skeleton. - -Runscope/httpbin -https://github.com/Runscope/httpbin -Entry file: httpbin/httpbin/filters.py -Scanned: 2016-10-12 12:12:33.536901 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -hasgeek/flask-lastuser -https://github.com/hasgeek/flask-lastuser -Entry file: flask-lastuser/tests/test_mergeuser.py -Scanned: 2016-10-12 12:12:38.510543 -No vulnerabilities found. - - -BooBSD/flask-odesk -https://github.com/BooBSD/flask-odesk -Entry file: flask-odesk/tests.py -Scanned: 2016-10-12 12:12:39.997657 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cool-shark/redimon -https://github.com/cool-shark/redimon -Entry file: redimon/src/redimon/app.py -Scanned: 2016-10-12 12:12:42.408167 -No vulnerabilities found. - - -pcsanwald/flask_site -https://github.com/pcsanwald/flask_site -Entry file: flask_site/mysite.py -Scanned: 2016-10-12 12:12:57.842988 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-12 12:13:00.224529 -No vulnerabilities found. - - -dag/flask-sassy -https://github.com/dag/flask-sassy -Entry file: flask-sassy/tests/__init__.py -Scanned: 2016-10-12 12:13:30.485664 -No vulnerabilities found. - - -charlieevett/jiffy-portal -https://github.com/charlieevett/jiffy-portal -Entry file: jiffy-portal/portal/app.py -Scanned: 2016-10-12 12:13:31.793183 -No vulnerabilities found. - - -tomekwojcik/Flask-Module-Static-Files -https://github.com/tomekwojcik/Flask-Module-Static-Files -Entry file: Flask-Module-Static-Files/stest/__init__.py -Scanned: 2016-10-12 12:13:35.402936 -No vulnerabilities found. - - -justjkk/dotpath -https://github.com/justjkk/dotpath -Entry file: dotpath/run.py -Scanned: 2016-10-12 12:13:37.904416 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -almet/semantic-bookclub -https://github.com/almet/semantic-bookclub -Entry file: semantic-bookclub/app/web.py -Scanned: 2016-10-12 12:13:41.579333 -Vulnerability 1: -File: semantic-bookclub/app/web.py - > User input at line 81, trigger word ".data": - book_title = dict(self.book.choices)[self.book.data] -File: semantic-bookclub/app/web.py - > reaches line 82, trigger word "flash(": - flash('%s have successfully borrowed %s' % (self.borrower.data, book_title)) - -Vulnerability 2: -File: semantic-bookclub/app/web.py - > User input at line 101, trigger word ".data": - member = Member.get_by(foaf_givenName=self.member.data).one() -File: semantic-bookclub/app/web.py - > reaches line 105, trigger word "flash(": - flash('%s now owns %s' % (member.foaf_givenName.first, book.dcterms_title.first)) - -Vulnerability 3: -File: semantic-bookclub/app/web.py - > User input at line 102, trigger word ".data": - book = Book.get_by(dcterms_identifier=self.book.data).one() -File: semantic-bookclub/app/web.py - > reaches line 105, trigger word "flash(": - flash('%s now owns %s' % (member.foaf_givenName.first, book.dcterms_title.first)) - - - -t9md/snippy -https://github.com/t9md/snippy -Entry file: snippy/snippy.py -Scanned: 2016-10-12 12:13:43.532933 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stehem/Tywna -https://github.com/stehem/Tywna -Entry file: Tywna/application/__init__.py -Scanned: 2016-10-12 12:14:02.079328 -No vulnerabilities found. - - -hoprocker/mylons -https://github.com/hoprocker/mylons -Entry file: mylons/lib/python2.5/site-packages/Flask-0.6.1-py2.5.egg/flask/app.py -Scanned: 2016-10-12 12:14:02.620172 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/bitpit-https-bridge -https://github.com/maxcountryman/bitpit-https-bridge -Entry file: bitpit-https-bridge/httpstobitpit/__init__.py -Scanned: 2016-10-12 12:14:03.831115 -No vulnerabilities found. - - -maxcountryman/flask-bcrypt -https://github.com/maxcountryman/flask-bcrypt -Entry file: flask-bcrypt/flask_bcrypt.py -Scanned: 2016-10-12 12:14:33.558663 -No vulnerabilities found. - - -kennethreitz-archive/flask-rest -https://github.com/kennethreitz-archive/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-12 12:14:38.504566 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tdryer/flask-forum -https://github.com/tdryer/flask-forum -Entry file: flask-forum/app.py -Scanned: 2016-10-12 12:14:41.853407 -Vulnerability 1: -File: flask-forum/app.py - > User input at line 124, trigger word ".data": - new_topic_id = post_topic(form.subject.data, form.content.data) -Reassigned in: - File: flask-forum/app.py - > Line 127: ret_MAYBE_FUNCTION_NAME = render_template('newtopic.html',form=form) -File: flask-forum/app.py - > reaches line 126, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/topic/' + new_topic_id) - -Vulnerability 2: -File: flask-forum/app.py - > User input at line 196, trigger word ".data": - username = form.username.data -File: flask-forum/app.py - > reaches line 199, trigger word "execute(": - g.db.execute('INSERT INTO users (username, password_hash) values (?, ?)', [username, pw_hash]) - -Vulnerability 3: -File: flask-forum/app.py - > User input at line 197, trigger word ".data": - password = form.password1.data -Reassigned in: - File: flask-forum/app.py - > Line 198: pw_hash = hashpw(password, gensalt()) -File: flask-forum/app.py - > reaches line 199, trigger word "execute(": - g.db.execute('INSERT INTO users (username, password_hash) values (?, ?)', [username, pw_hash]) - - - -dqminh/flask-mongoobject -https://github.com/dqminh/flask-mongoobject -Entry file: flask-mongoobject/examples_hello.py -Scanned: 2016-10-12 12:14:42.353361 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gmonnerat/flask-sandbox -https://github.com/gmonnerat/flask-sandbox -Entry file: flask-sandbox/hello/hello.py -Scanned: 2016-10-12 12:14:44.539449 -No vulnerabilities found. - - -DarkSector/wombat -https://github.com/DarkSector/wombat -Entry file: wombat/wombatdb.py -Scanned: 2016-10-12 12:14:58.049244 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lOlIl/Flask---Local-election -https://github.com/lOlIl/Flask---Local-election -Entry file: Flask---Local-election/app.py -Scanned: 2016-10-12 12:15:03.596872 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -paulftw/appengine-flask-template -https://github.com/paulftw/appengine-flask-template -Entry file: appengine-flask-template/app/app.py -Scanned: 2016-10-12 12:15:05.145597 -No vulnerabilities found. - - -flores/aquadoc -https://github.com/flores/aquadoc -Entry file: aquadoc/aquadoc.py -Scanned: 2016-10-12 12:15:33.031328 -No vulnerabilities found. - - -jorgeatorres/cotufa -https://github.com/jorgeatorres/cotufa -Entry file: cotufa/cotufa.py -Scanned: 2016-10-12 12:15:35.553712 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mbr/flask-kvsession -https://github.com/mbr/flask-kvsession -Entry file: flask-kvsession/tests/conftest.py -Scanned: 2016-10-12 12:15:44.525849 -No vulnerabilities found. - - -radekstepan/Flask-Skeleton-App -https://github.com/radekstepan/Flask-Skeleton-App -Entry file: Flask-Skeleton-App/flask_app.py -Scanned: 2016-10-12 12:15:59.342887 -No vulnerabilities found. - - -utahta/flask-on-fluxflex -https://github.com/utahta/flask-on-fluxflex -Entry file: flask-on-fluxflex/app/__init__.py -Scanned: 2016-10-12 12:16:05.171936 -No vulnerabilities found. - - -femmerling/brunch-flask-gae-skeleton -https://github.com/femmerling/brunch-flask-gae-skeleton -Entry file: brunch-flask-gae-skeleton/gae/main.py -Scanned: 2016-10-12 12:16:30.806499 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amcameron/gchartsdemo -https://github.com/amcameron/gchartsdemo -Entry file: gchartsdemo/charts.py -Scanned: 2016-10-12 12:16:33.244522 -No vulnerabilities found. - - -bagyr/flaskPage -https://github.com/bagyr/flaskPage -Entry file: flaskPage/__init__.py -Scanned: 2016-10-12 12:16:36.447848 -No vulnerabilities found. - - -sbook/flask-script -https://github.com/sbook/flask-script -Entry file: flask-script/tests.py -Scanned: 2016-10-12 12:16:43.917209 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joemarct/flask-gae-app -https://github.com/joemarct/flask-gae-app -Entry file: flask-gae-app/flask/app.py -Scanned: 2016-10-12 12:16:45.461156 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Bhagyashree-Mandora/The-Python-Task -https://github.com/Bhagyashree-Mandora/The-Python-Task -Entry file: The-Python-Task/main.py -Scanned: 2016-10-12 12:16:58.963418 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -piratesolutions/ps-website -https://github.com/piratesolutions/ps-website -Entry file: ps-website/app.py -Scanned: 2016-10-12 12:17:04.451166 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samrat/blogengine -https://github.com/samrat/blogengine -Entry file: blogengine/blogengine.py -Scanned: 2016-10-12 12:17:04.952873 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TimFletcher/cmprss -https://github.com/TimFletcher/cmprss -Entry file: cmprss/cmprss.py -Scanned: 2016-10-12 12:17:31.496648 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyvanee/mappy -https://github.com/andyvanee/mappy -Entry file: mappy/mappy.py -Scanned: 2016-10-12 12:17:33.033407 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -barnslig/foreveralonebook -https://github.com/barnslig/foreveralonebook -Entry file: foreveralonebook/foreveralonebook.py -Scanned: 2016-10-12 12:17:40.966467 -Vulnerability 1: -File: foreveralonebook/foreveralonebook.py - > User input at line 47, trigger word "form[": - entry = escape(request.form['entry']) -File: foreveralonebook/foreveralonebook.py - > reaches line 57, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_posts (u_id, content) VALUES ({0}, '{1}');'.format(session['u_id'], entry)) - -Vulnerability 2: -File: foreveralonebook/foreveralonebook.py - > User input at line 113, trigger word "form[": - password = hashlib.sha1(request.form['new_pw']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 115, trigger word "execute(": - g.db.cur.execute('UPDATE feabook_user SET password = '{0}' WHERE id = '{1}';'.format(password, session['u_id'])) - -Vulnerability 3: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 157, trigger word "execute(": - g.db.cur.execute('SELECT username FROM feabook_user WHERE username = '{0}';'.format(username)) - -Vulnerability 4: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 164, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_user (username, password) VALUES ('{0}', '{1}');'.format(username, password)) - -Vulnerability 5: -File: foreveralonebook/foreveralonebook.py - > User input at line 152, trigger word "form[": - password = hashlib.sha1(request.form['password']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 164, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_user (username, password) VALUES ('{0}', '{1}');'.format(username, password)) - -Vulnerability 6: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 169, trigger word "execute(": - g.db.cur.execute('SELECT id, username FROM feabook_user WHERE username = '{0}';'.format(username)) - -Vulnerability 7: -File: foreveralonebook/foreveralonebook.py - > User input at line 193, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 222: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 223: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 197, trigger word "execute(": - g.db.cur.execute('SELECT id, username, password FROM feabook_user WHERE username = '{0}' AND password = '{1}';'.format(username, password)) - -Vulnerability 8: -File: foreveralonebook/foreveralonebook.py - > User input at line 194, trigger word "form[": - password = hashlib.sha1(request.form['password']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 197, trigger word "execute(": - g.db.cur.execute('SELECT id, username, password FROM feabook_user WHERE username = '{0}' AND password = '{1}';'.format(username, password)) - - - -geek22com/referral_dashboard_engine -https://github.com/geek22com/referral_dashboard_engine -Entry file: referral_dashboard_engine/heymoose/__init__.py -Scanned: 2016-10-12 12:17:42.492704 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dqminh/flask-lettuce -https://github.com/dqminh/flask-lettuce -Entry file: flask-lettuce/test.py -Scanned: 2016-10-12 12:17:59.097593 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -radekstepan/FlaskBudget -https://github.com/radekstepan/FlaskBudget -Entry file: FlaskBudget/budget.py -Scanned: 2016-10-12 12:18:05.068596 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -UfSoft/Flask-MenuBuilder -https://github.com/UfSoft/Flask-MenuBuilder -Entry file: Flask-MenuBuilder/tests/test_menuitem.py -Scanned: 2016-10-12 12:18:32.528617 -No vulnerabilities found. - - -gregglind/flask-tool -https://github.com/gregglind/flask-tool -Entry file: flask-tool/flasktool/console.py -Scanned: 2016-10-12 12:18:33.025150 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kblin/flask-downloader -https://github.com/kblin/flask-downloader -Entry file: flask-downloader/tests.py -Scanned: 2016-10-12 12:18:37.533900 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/flog -https://github.com/maxcountryman/flog -Entry file: flog/flog/__init__.py -Scanned: 2016-10-12 12:18:41.118091 -No vulnerabilities found. - - -sublee/Flask-Handler -https://github.com/sublee/Flask-Handler -Entry file: None -Scanned: 2016-10-12 12:18:43.369480 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sublee/Flask-Handler. - -Ramblurr/pyqdb -https://github.com/Ramblurr/pyqdb -Entry file: pyqdb/src/pyqdb.py -Scanned: 2016-10-12 12:18:59.829996 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zackster/DijScrape--flask-rewrite- -https://github.com/zackster/DijScrape--flask-rewrite- -Entry file: DijScrape--flask-rewrite-/dijscrape.py -Scanned: 2016-10-12 12:19:06.204963 -No vulnerabilities found. - - -asenchi/pomp -https://github.com/asenchi/pomp -Entry file: pomp/pomp/pomp.py -Scanned: 2016-10-12 12:19:07.426265 -No vulnerabilities found. - - -tshirtman/snakenest -https://github.com/tshirtman/snakenest -Entry file: snakenest/main.py -Scanned: 2016-10-12 12:19:32.915416 -No vulnerabilities found. - - -jvreeland/Python-Web-Service-for-Android-GMaps-AsyncTask-Demo -https://github.com/jvreeland/Python-Web-Service-for-Android-GMaps-AsyncTask-Demo -Entry file: Python-Web-Service-for-Android-GMaps-AsyncTask-Demo/gmaps.py -Scanned: 2016-10-12 12:19:33.425214 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Python-Web-Service-for-Android-GMaps-AsyncTask-Demo/env/lib/python2.7/genericpath.py - -triposo/geocodecache -https://github.com/triposo/geocodecache -Entry file: geocodecache/geocodecache.py -Scanned: 2016-10-12 12:19:37.940476 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -toastwaffle/ToDoQuick -https://github.com/toastwaffle/ToDoQuick -Entry file: ToDoQuick/todoquick.py -Scanned: 2016-10-12 12:19:40.460543 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coleifer/flask-peewee -https://github.com/coleifer/flask-peewee -Entry file: flask-peewee/example/app.py -Scanned: 2016-10-12 12:19:49.036506 -Vulnerability 1: -File: flask-peewee/example/admin.py - > User input at line 27, trigger word "get(": - next = request.form.get('next') or self.dashboard_url() -File: flask-peewee/example/admin.py - > reaches line 28, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - - - -jeanphix/Flask-Dashed -https://github.com/jeanphix/Flask-Dashed -Entry file: Flask-Dashed/examples/sqlalchemy_backend.py -Scanned: 2016-10-12 12:19:52.247429 -No vulnerabilities found. - - -jarus/flask-mongokit -https://github.com/jarus/flask-mongokit -Entry file: flask-mongokit/tests/test_base.py -Scanned: 2016-10-12 12:20:00.749606 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -namlook/flask-apibee -https://github.com/namlook/flask-apibee -Entry file: flask-apibee/example/app.py -Scanned: 2016-10-12 12:20:06.771773 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -voluntas/heroku-template-flask -https://github.com/voluntas/heroku-template-flask -Entry file: heroku-template-flask/snowflake/__init__.py -Scanned: 2016-10-12 12:20:33.367822 -No vulnerabilities found. - - -Deepwalker/Flask-Bundle -https://github.com/Deepwalker/Flask-Bundle -Entry file: Flask-Bundle/samples/simple.py -Scanned: 2016-10-12 12:20:40.819091 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sunlightlabs/flask-districtoffices -https://github.com/sunlightlabs/flask-districtoffices -Entry file: flask-districtoffices/districtoffices.py -Scanned: 2016-10-12 12:20:44.568020 -No vulnerabilities found. - - -quanticle/flask_blog -https://github.com/quanticle/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-12 12:21:01.019698 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garrettr/haps -https://github.com/garrettr/haps -Entry file: haps/quickstart.py -Scanned: 2016-10-12 12:21:06.535766 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dsully/sitter -https://github.com/dsully/sitter -Entry file: sitter/sitter/__init__.py -Scanned: 2016-10-12 12:21:32.540916 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahri/nodeblog -https://github.com/ahri/nodeblog -Entry file: nodeblog/blog.py -Scanned: 2016-10-12 12:21:34.040130 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/celeb -https://github.com/maxcountryman/celeb -Entry file: celeb/celeb/__init__.py -Scanned: 2016-10-12 12:21:38.533610 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/PO -https://github.com/marchon/PO -Entry file: PO/main.py -Scanned: 2016-10-12 12:21:41.755232 -No vulnerabilities found. - - -slok/xlarrakoetxeaorg -https://github.com/slok/xlarrakoetxeaorg -Entry file: xlarrakoetxeaorg/mysite/blog/__init__.py -Scanned: 2016-10-12 12:21:45.942104 -No vulnerabilities found. - - -boboppie/pyLiftOver -https://github.com/boboppie/pyLiftOver -Entry file: pyLiftOver/flask/lift-over-app.py -Scanned: 2016-10-12 12:21:46.427439 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -no0p/homepage -https://github.com/no0p/homepage -Entry file: homepage/site.py -Scanned: 2016-10-12 12:21:54.888876 -No vulnerabilities found. - - -tjosten/python-push -https://github.com/tjosten/python-push -Entry file: python-push/push.py -Scanned: 2016-10-12 12:22:02.119525 -No vulnerabilities found. - - -Joshkunz/PyChannel -https://github.com/Joshkunz/PyChannel -Entry file: PyChannel/PyChannel/__init__.py -Scanned: 2016-10-12 12:22:06.623856 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cbess/ytlinker -https://github.com/cbess/ytlinker -Entry file: ytlinker/flask/app.py -Scanned: 2016-10-12 12:22:07.113311 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -openshift/flask-example -https://github.com/openshift/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-12 12:22:34.352514 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wasabi0522/flaskr -https://github.com/wasabi0522/flaskr -Entry file: flaskr/flaskr/__init__.py -Scanned: 2016-10-12 12:22:48.859681 -No vulnerabilities found. - - -amehta/Flaskly -https://github.com/amehta/Flaskly -Entry file: Flaskly/flaskly.py -Scanned: 2016-10-12 12:23:02.614207 -Vulnerability 1: -File: Flaskly/flaskly.py - > User input at line 73, trigger word "form[": - url = request.form['long_url'] -Reassigned in: - File: Flaskly/flaskly.py - > Line 74: short = pickShortUrl(url) -File: Flaskly/flaskly.py - > reaches line 75, trigger word "flash(": - flash('Short Url http:/localhost/' + short) - - - -fyears/flaskr-redis -https://github.com/fyears/flaskr-redis -Entry file: flaskr-redis/app.py -Scanned: 2016-10-12 12:23:08.424484 -No vulnerabilities found. - - -Jc2k/flask-example -https://github.com/Jc2k/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-12 12:23:32.967891 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brainTrain/flasktest -https://github.com/brainTrain/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-12 12:23:36.678545 -No vulnerabilities found. - - -proles/flaskr -https://github.com/proles/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 12:23:40.017868 -No vulnerabilities found. - - -joeyespo/hello-redis-tasks -https://github.com/joeyespo/hello-redis-tasks -Entry file: hello-redis-tasks/hello_redis_tasks.py -Scanned: 2016-10-12 12:23:41.529599 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cemk/flask-expander -https://github.com/cemk/flask-expander -Entry file: flask-expander/expand.py -Scanned: 2016-10-12 12:23:45.860918 -No vulnerabilities found. - - -pygraz/old-flask-website -https://github.com/pygraz/old-flask-website -Entry file: old-flask-website/pygraz_website/__init__.py -Scanned: 2016-10-12 12:23:47.374795 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thomasballinger/Utok -https://github.com/thomasballinger/Utok -Entry file: Utok/webapp.py -Scanned: 2016-10-12 12:24:07.803901 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lcruz/Igualitos-appengine -https://github.com/lcruz/Igualitos-appengine -Entry file: Igualitos-appengine/config.py -Scanned: 2016-10-12 12:24:08.307123 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hettan/MyPortfolio -https://github.com/hettan/MyPortfolio -Entry file: MyPortfolio/web/myFlaskProject.py -Scanned: 2016-10-12 12:24:33.827218 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lcruz/igualitos -https://github.com/lcruz/igualitos -Entry file: igualitos/config.py -Scanned: 2016-10-12 12:24:36.147290 -No vulnerabilities found. - - -agonzalezro/gplus-blog -https://github.com/agonzalezro/gplus-blog -Entry file: gplus-blog/gplusblog/__init__.py -Scanned: 2016-10-12 12:24:40.473477 -No vulnerabilities found. - - -fwenzel/strassendeutsch -https://github.com/fwenzel/strassendeutsch -Entry file: strassendeutsch/woerterbuch/__init__.py -Scanned: 2016-10-12 12:24:45.449410 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lzyy/chat -https://github.com/lzyy/chat -Entry file: chat/src/app.py -Scanned: 2016-10-12 12:25:03.054136 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ferhensil/flask-example -https://github.com/ferhensil/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-12 12:25:08.545560 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jeanphix/flask-dashed-demo -https://github.com/jeanphix/flask-dashed-demo -Entry file: flask-dashed-demo/app.py -Scanned: 2016-10-12 12:25:34.557590 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kenkam/msgbrd -https://github.com/kenkam/msgbrd -Entry file: msgbrd/app.py -Scanned: 2016-10-12 12:25:36.042594 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -grigouze/flask-jenkins-radiator -https://github.com/grigouze/flask-jenkins-radiator -Entry file: flask-jenkins-radiator/radiator/radiator.py -Scanned: 2016-10-12 12:25:40.532820 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rduplain/flask-jquery-autosave-example -https://github.com/rduplain/flask-jquery-autosave-example -Entry file: flask-jquery-autosave-example/app.py -Scanned: 2016-10-12 12:25:43.027713 -No vulnerabilities found. - - -kracekumar/Gummi -https://github.com/kracekumar/Gummi -Entry file: Gummi/gummi/tests/test.py -Scanned: 2016-10-12 12:25:45.523943 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ivoscc/qchaes -https://github.com/ivoscc/qchaes -Entry file: qchaes/runserver.py -Scanned: 2016-10-12 12:25:53.490277 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fdemmer/flask-principal -https://github.com/fdemmer/flask-principal -Entry file: flask-principal/tests/test_principal.py -Scanned: 2016-10-12 12:26:03.984227 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dasevilla/evernote-oauth-example -https://github.com/dasevilla/evernote-oauth-example -Entry file: evernote-oauth-example/webapp.py -Scanned: 2016-10-12 12:26:10.257573 -No vulnerabilities found. - - -zeninthehome/flaskr -https://github.com/zeninthehome/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 12:26:36.043686 -No vulnerabilities found. - - -joshfinnie/Flacker-News -https://github.com/joshfinnie/Flacker-News -Entry file: Flacker-News/flacker-news/app.py -Scanned: 2016-10-12 12:26:36.532682 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -moneill/uber-flask -https://github.com/moneill/uber-flask -Entry file: uber-flask/uber.py -Scanned: 2016-10-12 12:26:41.127210 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: uber-flask/env/lib/python2.7/genericpath.py - -nubela/radar-backend -https://github.com/nubela/radar-backend -Entry file: radar-backend/src/radar.py -Scanned: 2016-10-12 12:26:42.631278 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TxSSC/the-questionator -https://github.com/TxSSC/the-questionator -Entry file: the-questionator/questionator/__init__.py -Scanned: 2016-10-12 12:26:46.127026 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -satonaoya/flask-epio-skelton -https://github.com/satonaoya/flask-epio-skelton -Entry file: flask-epio-skelton/app.py -Scanned: 2016-10-12 12:26:49.342735 -No vulnerabilities found. - - -marksteve/bookmarks -https://github.com/marksteve/bookmarks -Entry file: bookmarks/bookmarks.py -Scanned: 2016-10-12 12:26:54.694335 -No vulnerabilities found. - - -paradoxxxzero/polldance -https://github.com/paradoxxxzero/polldance -Entry file: polldance/dance.py -Scanned: 2016-10-12 12:27:05.063307 -No vulnerabilities found. - - -flebel/Egami -https://github.com/flebel/Egami -Entry file: Egami/egami.py -Scanned: 2016-10-12 12:27:10.518027 -No vulnerabilities found. - - -mitsuhiko/flask-pastebin -https://github.com/mitsuhiko/flask-pastebin -Entry file: flask-pastebin/pastebin.py -Scanned: 2016-10-12 12:27:35.669546 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -maxcountryman/flask-seasurf -https://github.com/maxcountryman/flask-seasurf -Entry file: flask-seasurf/test_seasurf.py -Scanned: 2016-10-12 12:27:40.187109 -No vulnerabilities found. - - -maxcountryman/logmon -https://github.com/maxcountryman/logmon -Entry file: logmon/logmon/__init__.py -Scanned: 2016-10-12 12:27:44.108433 -No vulnerabilities found. - - -hasgeek/coaster -https://github.com/hasgeek/coaster -Entry file: coaster/tests/test_render_with.py -Scanned: 2016-10-12 12:27:48.849550 -No vulnerabilities found. - - -craigkerstiens/flask-helloworld -https://github.com/craigkerstiens/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-12 12:27:50.180842 -No vulnerabilities found. - - -jarodl/flask-github -https://github.com/jarodl/flask-github -Entry file: flask-github/example/example.py -Scanned: 2016-10-12 12:27:54.968873 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ahri/flask-mustache -https://github.com/ahri/flask-mustache -Entry file: flask-mustache/tests/test_mustache.py -Scanned: 2016-10-12 12:28:05.274701 -No vulnerabilities found. - - -gears/flask-gears -https://github.com/gears/flask-gears -Entry file: flask-gears/example/app.py -Scanned: 2016-10-12 12:28:10.642112 -No vulnerabilities found. - - -mitsuhiko/tugraz-flask-demo -https://github.com/mitsuhiko/tugraz-flask-demo -Entry file: tugraz-flask-demo/pastebin.py -Scanned: 2016-10-12 12:28:36.683726 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mattoufoutu/flask-project-templates -https://github.com/mattoufoutu/flask-project-templates -Entry file: None -Scanned: 2016-10-12 12:28:37.925599 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mattoufoutu/flask-project-templates. - -svieira/Budget-Manager -https://github.com/svieira/Budget-Manager -Entry file: None -Scanned: 2016-10-12 12:28:48.442112 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/svieira/Budget-Manager. - -solarmist/Flaskr -https://github.com/solarmist/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-12 12:28:50.719980 -No vulnerabilities found. - - -cybertoast/flask-router -https://github.com/cybertoast/flask-router -Entry file: flask-router/test_router.py -Scanned: 2016-10-12 12:29:05.437150 -No vulnerabilities found. - - -srusskih/Flask-application-template -https://github.com/srusskih/Flask-application-template -Entry file: Flask-application-template/myapp/myapp.py -Scanned: 2016-10-12 12:29:12.294736 -No vulnerabilities found. - - -Rootbuzz/heroku-basic-flask-app -https://github.com/Rootbuzz/heroku-basic-flask-app -Entry file: heroku-basic-flask-app/sso.py -Scanned: 2016-10-12 12:29:37.614441 -No vulnerabilities found. - - -adgaudio/async-webapp---gevent--psycopg2--flask -https://github.com/adgaudio/async-webapp---gevent--psycopg2--flask -Entry file: async-webapp---gevent--psycopg2--flask/app.py -Scanned: 2016-10-12 12:29:38.101795 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/chatter -https://github.com/maxcountryman/chatter -Entry file: chatter/chatter/__init__.py -Scanned: 2016-10-12 12:29:43.574357 -No vulnerabilities found. - - -zeak/pyProx -https://github.com/zeak/pyProx -Entry file: pyProx/pyProx.py -Scanned: 2016-10-12 12:29:44.059332 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -subchild/iStockUtils -https://github.com/subchild/iStockUtils -Entry file: iStockUtils/istockutils.py -Scanned: 2016-10-12 12:29:48.387438 -No vulnerabilities found. - - -tsoporan/read.list -https://github.com/tsoporan/read.list -Entry file: None -Scanned: 2016-10-12 12:29:50.880827 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dcrosta/flask-pymongo -https://github.com/dcrosta/flask-pymongo -Entry file: flask-pymongo/examples/wiki/wiki.py -Scanned: 2016-10-12 12:30:06.266805 -No vulnerabilities found. - - -jamesward/flaskbars -https://github.com/jamesward/flaskbars -Entry file: flaskbars/web.py -Scanned: 2016-10-12 12:30:11.659081 -No vulnerabilities found. - - -jarus/flask-fillin -https://github.com/jarus/flask-fillin -Entry file: flask-fillin/test_app/__init__.py -Scanned: 2016-10-12 12:30:13.034255 -No vulnerabilities found. - - -noisebridge/flask-noiselist -https://github.com/noisebridge/flask-noiselist -Entry file: flask-noiselist/src/noiselist/__init__.py -Scanned: 2016-10-12 12:30:38.451330 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -givp/Flask-MongoDB-Project -https://github.com/givp/Flask-MongoDB-Project -Entry file: Flask-MongoDB-Project/myapp.py -Scanned: 2016-10-12 12:30:39.722056 -No vulnerabilities found. - - -maxcountryman/logmon -https://github.com/maxcountryman/logmon -Entry file: logmon/logmon/__init__.py -Scanned: 2016-10-12 12:30:44.191916 -No vulnerabilities found. - - -wgkoro/flask_mongodb -https://github.com/wgkoro/flask_mongodb -Entry file: flask_mongodb/app/app.py -Scanned: 2016-10-12 12:30:45.416344 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danbruegge/flaskeleton -https://github.com/danbruegge/flaskeleton -Entry file: flaskeleton/app/__init__.py -Scanned: 2016-10-12 12:30:50.020440 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spoqa/flask-beaker -https://github.com/spoqa/flask-beaker -Entry file: flask-beaker/test_beaker.py -Scanned: 2016-10-12 12:31:06.235956 -No vulnerabilities found. - - -BenjaminMalley/FlaskUser -https://github.com/BenjaminMalley/FlaskUser -Entry file: FlaskUser/tests/user_api_tests.py -Scanned: 2016-10-12 12:31:12.673652 -No vulnerabilities found. - - -mattoufoutu/flask-project-templates -https://github.com/mattoufoutu/flask-project-templates -Entry file: None -Scanned: 2016-10-12 12:31:13.164116 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mattoufoutu/flask-project-templates. - -jparise/flask-facebook -https://github.com/jparise/flask-facebook -Entry file: flask-facebook/tests/test_facebook.py -Scanned: 2016-10-12 12:31:38.555192 -No vulnerabilities found. - - -codeb2cc/flask-examples -https://github.com/codeb2cc/flask-examples -Entry file: flask-examples/minitwit/minitwit.py -Scanned: 2016-10-12 12:31:40.113004 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -Opentaste/bombolone -https://github.com/Opentaste/bombolone -Entry file: bombolone/bombolone/app.py -Scanned: 2016-10-12 12:31:48.273874 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahamilton55/flaskr -https://github.com/ahamilton55/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 12:31:49.633292 -No vulnerabilities found. - - -rbastian/flaskr -https://github.com/rbastian/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 12:31:50.840477 -No vulnerabilities found. - - -RyanMcG/Bits-Books -https://github.com/RyanMcG/Bits-Books -Entry file: Bits-Books/web.py -Scanned: 2016-10-12 12:31:56.266286 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -practo/r5d4 -https://github.com/practo/r5d4 -Entry file: r5d4/r5d4/__init__.py -Scanned: 2016-10-12 12:31:57.697824 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -youknowone/flask-skeleton -https://github.com/youknowone/flask-skeleton -Entry file: None -Scanned: 2016-10-12 12:32:06.228708 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/youknowone/flask-skeleton. - -nourlcn/flask-note -https://github.com/nourlcn/flask-note -Entry file: flask-note/note.py -Scanned: 2016-10-12 12:32:18.456588 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -w1mvy/flask_on_gae -https://github.com/w1mvy/flask_on_gae -Entry file: flask_on_gae/src/main.py -Scanned: 2016-10-12 12:32:21.068044 -No vulnerabilities found. - - -yukatou/flask-board_test -https://github.com/yukatou/flask-board_test -Entry file: flask-board_test/board/__init__.py -Scanned: 2016-10-12 12:32:39.452633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neilmiddleton/heroku_flask_example -https://github.com/neilmiddleton/heroku_flask_example -Entry file: heroku_flask_example/web.py -Scanned: 2016-10-12 12:32:40.693972 -No vulnerabilities found. - - -dhathorn/Blaskr -https://github.com/dhathorn/Blaskr -Entry file: Blaskr/blaskr/__init__.py -Scanned: 2016-10-12 12:32:45.278255 -No vulnerabilities found. - - -drewlustro/trackcircle -https://github.com/drewlustro/trackcircle -Entry file: None -Scanned: 2016-10-12 12:32:56.525274 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nicolaiarocci/flask-mimerender -https://github.com/nicolaiarocci/flask-mimerender -Entry file: flask-mimerender/src/example.py -Scanned: 2016-10-12 12:33:07.666462 -No vulnerabilities found. - - -ducu/rq-dashboard -https://github.com/ducu/rq-dashboard -Entry file: rq-dashboard/rq_dashboard/cli.py -Scanned: 2016-10-12 12:33:15.066186 -No vulnerabilities found. - - -ryands/flasknews -https://github.com/ryands/flasknews -Entry file: flasknews/news.py -Scanned: 2016-10-12 12:33:20.431971 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rsenk330/Flask-Cake -https://github.com/rsenk330/Flask-Cake -Entry file: Flask-Cake/flask_cake/tests/test_cake.py -Scanned: 2016-10-12 12:33:41.158791 -No vulnerabilities found. - - -jasonwyatt/Flask-ErrorMail -https://github.com/jasonwyatt/Flask-ErrorMail -Entry file: Flask-ErrorMail/example/simple.py -Scanned: 2016-10-12 12:33:42.579437 -No vulnerabilities found. - - -brocaar/flask-views -https://github.com/brocaar/flask-views -Entry file: flask-views/flask_views/tests/functional/base.py -Scanned: 2016-10-12 12:33:50.725248 -No vulnerabilities found. - - -simonz05/flask-wtf -https://github.com/simonz05/flask-wtf -Entry file: flask-wtf/examples/recaptcha/app.py -Scanned: 2016-10-12 12:33:59.192452 -No vulnerabilities found. - - -nivardus/flask-sl -https://github.com/nivardus/flask-sl -Entry file: flask-sl/examples/app.py -Scanned: 2016-10-12 12:34:00.526309 -No vulnerabilities found. - - -andersoncardoso/flaskle -https://github.com/andersoncardoso/flaskle -Entry file: flaskle/flaskle.py -Scanned: 2016-10-12 12:34:01.867088 -No vulnerabilities found. - - -ferronrsmith/flask_projects -https://github.com/ferronrsmith/flask_projects -Entry file: flask_projects/flask_orm/ormapp.py -Scanned: 2016-10-12 12:34:11.852743 -No vulnerabilities found. - - -spanners/flask-blog -https://github.com/spanners/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 12:34:14.129259 -No vulnerabilities found. - - -kvesteri/flask-generic-views -https://github.com/kvesteri/flask-generic-views -Entry file: flask-generic-views/tests/__init__.py -Scanned: 2016-10-12 12:34:20.703612 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ehazlett/coiapi-flask -https://github.com/ehazlett/coiapi-flask -Entry file: coiapi-flask/coiapi/__init__.py -Scanned: 2016-10-12 12:34:40.118743 -No vulnerabilities found. - - -rmasters/progress-flask -https://github.com/rmasters/progress-flask -Entry file: progress-flask/progress.py -Scanned: 2016-10-12 12:34:45.806811 -No vulnerabilities found. - - -RDFLib/rdflib-web -https://github.com/RDFLib/rdflib-web -Entry file: rdflib-web/rdflib_web/lod.py -Scanned: 2016-10-12 12:34:51.597665 -Vulnerability 1: -File: rdflib-web/rdflib_web/lod.py - > User input at line 515, trigger word ".data": - path = 'lod.data' -Reassigned in: - File: rdflib-web/rdflib_web/lod.py - > Line 518: path = 'lod.page' - File: rdflib-web/rdflib_web/lod.py - > Line 532: ret_MAYBE_FUNCTION_NAME = redirect(url, 303) -File: rdflib-web/rdflib_web/lod.py - > reaches line 523, trigger word "url_for(": - url = url_for(path,type_=type_, label=label, format_=ext) - -Vulnerability 2: -File: rdflib-web/rdflib_web/lod.py - > User input at line 515, trigger word ".data": - path = 'lod.data' -Reassigned in: - File: rdflib-web/rdflib_web/lod.py - > Line 518: path = 'lod.page' - File: rdflib-web/rdflib_web/lod.py - > Line 532: ret_MAYBE_FUNCTION_NAME = redirect(url, 303) -File: rdflib-web/rdflib_web/lod.py - > reaches line 525, trigger word "url_for(": - url = url_for(path,type_=type_, label=label) - -Vulnerability 3: -File: rdflib-web/rdflib_web/lod.py - > User input at line 515, trigger word ".data": - path = 'lod.data' -Reassigned in: - File: rdflib-web/rdflib_web/lod.py - > Line 518: path = 'lod.page' - File: rdflib-web/rdflib_web/lod.py - > Line 532: ret_MAYBE_FUNCTION_NAME = redirect(url, 303) -File: rdflib-web/rdflib_web/lod.py - > reaches line 528, trigger word "url_for(": - url = url_for(path,label=label, format_=ext) - -Vulnerability 4: -File: rdflib-web/rdflib_web/lod.py - > User input at line 515, trigger word ".data": - path = 'lod.data' -Reassigned in: - File: rdflib-web/rdflib_web/lod.py - > Line 518: path = 'lod.page' - File: rdflib-web/rdflib_web/lod.py - > Line 532: ret_MAYBE_FUNCTION_NAME = redirect(url, 303) -File: rdflib-web/rdflib_web/lod.py - > reaches line 530, trigger word "url_for(": - url = url_for(path,label=label) - -Vulnerability 5: -File: rdflib-web/rdflib_web/lod.py - > User input at line 511, trigger word "get(": - mimetype = mimeutils.best_match([mimeutils.RDFXML_MIME, mimeutils.N3_MIME, mimeutils.NTRIPLES_MIME, mimeutils.HTML_MIME], request.headers.get('Accept')) -Reassigned in: - File: rdflib-web/rdflib_web/lod.py - > Line 516: ext = '.' + mimeutils.mime_to_format(mimetype) - File: rdflib-web/rdflib_web/lod.py - > Line 519: ext = '' - File: rdflib-web/rdflib_web/lod.py - > Line 523: url = url_for(path,type_=type_, label=label, format_=ext) - File: rdflib-web/rdflib_web/lod.py - > Line 525: url = url_for(path,type_=type_, label=label) - File: rdflib-web/rdflib_web/lod.py - > Line 528: url = url_for(path,label=label, format_=ext) - File: rdflib-web/rdflib_web/lod.py - > Line 530: url = url_for(path,label=label) -File: rdflib-web/rdflib_web/lod.py - > reaches line 532, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url, 303) - - - -zen4ever/goose-in-flask -https://github.com/zen4ever/goose-in-flask -Entry file: goose-in-flask/application.py -Scanned: 2016-10-12 12:35:07.251034 -No vulnerabilities found. - - -thinker007/flaskr -https://github.com/thinker007/flaskr -Entry file: flaskr/flaskr/flaskr.py -Scanned: 2016-10-12 12:35:08.649063 -No vulnerabilities found. - - -FND/Flask-RoutingManifest -https://github.com/FND/Flask-RoutingManifest -Entry file: Flask-RoutingManifest/test/test_manifest.py -Scanned: 2016-10-12 12:35:09.862719 -No vulnerabilities found. - - -Fluxx/trappist -https://github.com/Fluxx/trappist -Entry file: trappist/tests/test_app.py -Scanned: 2016-10-12 12:35:11.519641 -No vulnerabilities found. - - -babymastodon/host_flask -https://github.com/babymastodon/host_flask -Entry file: host_flask/templates/wsgi/template.py -Scanned: 2016-10-12 12:35:21.394963 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cirode/test_flask_app -https://github.com/cirode/test_flask_app -Entry file: None -Scanned: 2016-10-12 12:35:44.194251 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cirode/test_flask_app. - -Opentaste/tiramisu-homepage -https://github.com/Opentaste/tiramisu-homepage -Entry file: tiramisu-homepage/libs/flask/app.py -Scanned: 2016-10-12 12:35:54.183192 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fogleman/Boggle -https://github.com/fogleman/Boggle -Entry file: Boggle/__init__.py -Scanned: 2016-10-12 12:36:01.288871 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hickford/footballer-or-pasta -https://github.com/hickford/footballer-or-pasta -Entry file: footballer-or-pasta/app.py -Scanned: 2016-10-12 12:36:11.584076 -No vulnerabilities found. - - -drnlm/Sutekh-Web -https://github.com/drnlm/Sutekh-Web -Entry file: Sutekh-Web/sutekhweb.py -Scanned: 2016-10-12 12:36:15.100548 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mahmoudhossam/blog -https://github.com/mahmoudhossam/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-12 12:36:20.594107 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -polera/practical_python_deployments -https://github.com/polera/practical_python_deployments -Entry file: practical_python_deployments/app.py -Scanned: 2016-10-12 12:36:41.030412 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eamonbanta/simple_calendar -https://github.com/eamonbanta/simple_calendar -Entry file: simple_calendar/index.py -Scanned: 2016-10-12 12:36:46.864304 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flask-admin/flask-admin -https://github.com/flask-admin/flask-admin -Entry file: flask-admin/flask_admin/tests/test_form_upload.py -Scanned: 2016-10-12 12:37:10.543104 -No vulnerabilities found. - - -maxcountryman/flask-login -https://github.com/maxcountryman/flask-login -Entry file: flask-login/test_login.py -Scanned: 2016-10-12 12:37:13.089082 -Vulnerability 1: -File: flask-login/flask_login/login_manager.py - > User input at line 393, trigger word "get(": - cookie_name = config.get('REMEMBER_COOKIE_NAME', COOKIE_NAME) -File: flask-login/flask_login/login_manager.py - > reaches line 412, trigger word "set_cookie(": - response.set_cookie(cookie_name,value=data, expires=expires, domain=domain, path=path, secure=secure, httponly=httponly) - - - -mattupstate/flask-security -https://github.com/mattupstate/flask-security -Entry file: flask-security/tests/conftest.py -Scanned: 2016-10-12 12:37:16.549372 -No vulnerabilities found. - - -jfinkels/flask-restless -https://github.com/jfinkels/flask-restless -Entry file: flask-restless/examples/clients/jquery/__main__.py -Scanned: 2016-10-12 12:37:21.667422 -No vulnerabilities found. - - -lepture/flask-wtf -https://github.com/lepture/flask-wtf -Entry file: flask-wtf/examples/recaptcha/app.py -Scanned: 2016-10-12 12:37:24.784198 -No vulnerabilities found. - - -smurfix/flask-script -https://github.com/smurfix/flask-script -Entry file: flask-script/tests.py -Scanned: 2016-10-12 12:37:25.272012 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattupstate/flask-mail -https://github.com/mattupstate/flask-mail -Entry file: flask-mail/tests.py -Scanned: 2016-10-12 12:37:42.926416 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jarus/flask-testing -https://github.com/jarus/flask-testing -Entry file: flask-testing/examples/twill_site/todos/__init__.py -Scanned: 2016-10-12 12:37:45.726699 -No vulnerabilities found. - - -jpvanhal/flask-split -https://github.com/jpvanhal/flask-split -Entry file: flask-split/tests/__init__.py -Scanned: 2016-10-12 12:37:47.169207 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gyllstromk/Flask-WhooshAlchemy -https://github.com/gyllstromk/Flask-WhooshAlchemy -Entry file: Flask-WhooshAlchemy/test/test_all.py -Scanned: 2016-10-12 12:37:52.788283 -No vulnerabilities found. - - -dormouse/Flask_Docs_ZhCn -https://github.com/dormouse/Flask_Docs_ZhCn -Entry file: Flask_Docs_ZhCn/flask/sessions.py -Scanned: 2016-10-12 12:38:05.440332 -No vulnerabilities found. - - -mattupstate/flask-social-example -https://github.com/mattupstate/flask-social-example -Entry file: flask-social-example/app/__init__.py -Scanned: 2016-10-12 12:38:13.261863 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dplepage/flask-raptor -https://github.com/dplepage/flask-raptor -Entry file: flask-raptor/tests.py -Scanned: 2016-10-12 12:38:23.759291 -No vulnerabilities found. - - -mdipierro/gluino -https://github.com/mdipierro/gluino -Entry file: gluino/flask_example.py -Scanned: 2016-10-12 12:38:47.310039 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lanius/flask-mitten -https://github.com/lanius/flask-mitten -Entry file: flask-mitten/example/app.py -Scanned: 2016-10-12 12:38:48.609016 -No vulnerabilities found. - - -iwanbk/flasktor -https://github.com/iwanbk/flasktor -Entry file: flasktor/flasktor.py -Scanned: 2016-10-12 12:38:52.837797 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rafaelnovello/Flaskbook -https://github.com/rafaelnovello/Flaskbook -Entry file: Flaskbook/maps.py -Scanned: 2016-10-12 12:39:01.050575 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benselme/flask-makotemplates -https://github.com/benselme/flask-makotemplates -Entry file: flask-makotemplates/tests/test_mako.py -Scanned: 2016-10-12 12:39:13.419400 -No vulnerabilities found. - - -burningion/Flask-Dotcloud -https://github.com/burningion/Flask-Dotcloud -Entry file: Flask-Dotcloud/project/webapp/app.py -Scanned: 2016-10-12 12:39:14.620725 -No vulnerabilities found. - - -jmstaley/virtualenvwrapper.flask -https://github.com/jmstaley/virtualenvwrapper.flask -Entry file: None -Scanned: 2016-10-12 12:39:18.912625 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jmstaley/virtualenvwrapper.flask. - -asciimoo/potion -https://github.com/asciimoo/potion -Entry file: potion/potion/webapp.py -Scanned: 2016-10-12 12:39:25.510107 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mgdelacroix/gist-flask -https://github.com/mgdelacroix/gist-flask -Entry file: gist-flask/gist-flask.py -Scanned: 2016-10-12 12:39:27.797364 -No vulnerabilities found. - - -radiosilence/Flask-Suave -https://github.com/radiosilence/Flask-Suave -Entry file: None -Scanned: 2016-10-12 12:39:43.477065 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/radiosilence/Flask-Suave. - -synchrone/skyms -https://github.com/synchrone/skyms -Entry file: skyms/skyms/app.py -Scanned: 2016-10-12 12:39:46.824038 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jason2506/flask-reqarg -https://github.com/jason2506/flask-reqarg -Entry file: flask-reqarg/tests/test_reqarg.py -Scanned: 2016-10-12 12:40:13.917607 -No vulnerabilities found. - - -ngilbert/flask_blog -https://github.com/ngilbert/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-12 12:40:14.401726 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maskota/flask-starter -https://github.com/maskota/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-12 12:40:19.615635 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mateo41/simpleRest -https://github.com/mateo41/simpleRest -Entry file: simpleRest/sdge_rest.py -Scanned: 2016-10-12 12:40:28.576033 -No vulnerabilities found. - - -ghallberg/stuffster -https://github.com/ghallberg/stuffster -Entry file: stuffster/stuffster.py -Scanned: 2016-10-12 12:40:44.000489 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -robin-wittler/easypeasy -https://github.com/robin-wittler/easypeasy -Entry file: easypeasy/blog.py -Scanned: 2016-10-12 12:40:49.868150 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tonyblundell/socialdump -https://github.com/tonyblundell/socialdump -Entry file: socialdump/socialdump.py -Scanned: 2016-10-12 12:40:54.545461 -No vulnerabilities found. - - -samalba/geventwebsocket-on-dotcloud -https://github.com/samalba/geventwebsocket-on-dotcloud -Entry file: geventwebsocket-on-dotcloud/app.py -Scanned: 2016-10-12 12:41:14.230769 -No vulnerabilities found. - - -FND/statusq -https://github.com/FND/statusq -Entry file: statusq/statusq/__init__.py -Scanned: 2016-10-12 12:41:15.529179 -No vulnerabilities found. - - -octaflop/mrna -https://github.com/octaflop/mrna -Entry file: mrna/mrna/app.py -Scanned: 2016-10-12 12:41:19.812870 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jasonmc/Tweets-GAE-app -https://github.com/jasonmc/Tweets-GAE-app -Entry file: Tweets-GAE-app/libs/flask/app.py -Scanned: 2016-10-12 12:41:26.660813 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gcollazo/bcapi -https://github.com/gcollazo/bcapi -Entry file: bcapi/bcapi.py -Scanned: 2016-10-12 12:41:28.965031 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EtnaTraining/todolist-python-server -https://github.com/EtnaTraining/todolist-python-server -Entry file: todolist-python-server/server.py -Scanned: 2016-10-12 12:41:47.674704 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simakazi/webcarcollection -https://github.com/simakazi/webcarcollection -Entry file: webcarcollection/webcarcollection/__init__.py -Scanned: 2016-10-12 12:41:52.570411 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -guzelgoz/hezenhotel -https://github.com/guzelgoz/hezenhotel -Entry file: hezenhotel/hezenhotel.py -Scanned: 2016-10-12 12:41:57.943676 -No vulnerabilities found. - - -hansonkd/FlaskBootstrapSecurity -https://github.com/hansonkd/FlaskBootstrapSecurity -Entry file: None -Scanned: 2016-10-12 12:42:15.926133 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hansonkd/FlaskBootstrapSecurity. - -playpauseandstop/Flask-Dropbox -https://github.com/playpauseandstop/Flask-Dropbox -Entry file: Flask-Dropbox/testapp/app.py -Scanned: 2016-10-12 12:42:17.682901 -No vulnerabilities found. - - -RobSpectre/Twilio-Hackpack-for-Heroku-and-Flask -https://github.com/RobSpectre/Twilio-Hackpack-for-Heroku-and-Flask -Entry file: None -Scanned: 2016-10-12 12:42:20.318147 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/RobSpectre/Twilio-Hackpack-for-Heroku-and-Flask. - -lmeunier/flaskup -https://github.com/lmeunier/flaskup -Entry file: flaskup/flaskup/__init__.py -Scanned: 2016-10-12 12:42:29.657703 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajford/flask-sendmail -https://github.com/ajford/flask-sendmail -Entry file: flask-sendmail/tests.py -Scanned: 2016-10-12 12:42:45.029953 -No vulnerabilities found. - - -playpauseandstop/Flask-LazyViews -https://github.com/playpauseandstop/Flask-LazyViews -Entry file: None -Scanned: 2016-10-12 12:42:48.603213 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/playpauseandstop/Flask-LazyViews. - -elmcitylabs/ECL-Facebook -https://github.com/elmcitylabs/ECL-Facebook -Entry file: ECL-Facebook/examples/flask_example/example_app.py -Scanned: 2016-10-12 12:42:51.463265 -No vulnerabilities found. - - -tokuda109/flask-docs-ja -https://github.com/tokuda109/flask-docs-ja -Entry file: flask-docs-ja/setup.py -Scanned: 2016-10-12 12:43:07.747654 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rafaelnovello/Flaskbook -https://github.com/rafaelnovello/Flaskbook -Entry file: Flaskbook/maps.py -Scanned: 2016-10-12 12:43:16.691849 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benselme/flask-makotemplates -https://github.com/benselme/flask-makotemplates -Entry file: flask-makotemplates/tests/test_mako.py -Scanned: 2016-10-12 12:43:20.028950 -No vulnerabilities found. - - -joealcorn/PyPaste -https://github.com/joealcorn/PyPaste -Entry file: PyPaste/PyPaste/__init__.py -Scanned: 2016-10-12 12:43:26.779417 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wooptoo/flask-seed -https://github.com/wooptoo/flask-seed -Entry file: flask-seed/app.py -Scanned: 2016-10-12 12:43:29.967992 -Vulnerability 1: -File: flask-seed/app.py - > User input at line 67, trigger word "form[": - user = request.form['name'] -Reassigned in: - File: flask-seed/app.py - > Line 73: d = 'name''email'useremail - File: flask-seed/app.py - > Line 75: d = 'error''user exists' -File: flask-seed/app.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(d) - -Vulnerability 2: -File: flask-seed/app.py - > User input at line 68, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: flask-seed/app.py - > Line 73: d = 'name''email'useremail - File: flask-seed/app.py - > Line 75: d = 'error''user exists' -File: flask-seed/app.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(d) - - - -fanzeyi/wobbuffet -https://github.com/fanzeyi/wobbuffet -Entry file: wobbuffet/wobbuffet.py -Scanned: 2016-10-12 12:43:56.753808 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -higumachan/flask_twitter -https://github.com/higumachan/flask_twitter -Entry file: flask_twitter/example/app.py -Scanned: 2016-10-12 12:44:05.072341 -No vulnerabilities found. - - -djworth/flask-sessions -https://github.com/djworth/flask-sessions -Entry file: flask-sessions/web.py -Scanned: 2016-10-12 12:44:17.786111 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -axil/flask-test -https://github.com/axil/flask-test -Entry file: flask-test/hello.py -Scanned: 2016-10-12 12:44:26.466281 -No vulnerabilities found. - - -dtotheb/Flask-Control -https://github.com/dtotheb/Flask-Control -Entry file: Flask-Control/FlaskControl.py -Scanned: 2016-10-12 12:44:30.770086 -Vulnerability 1: -File: Flask-Control/FlaskControl.py - > User input at line 30, trigger word "get(": - pid = request.args.get('pid') -Reassigned in: - File: Flask-Control/FlaskControl.py - > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(url_for('procs',p=pid)) -File: Flask-Control/FlaskControl.py - > reaches line 31, trigger word "subprocess.call(": - subprocess.call(['kill', pid]) - - - -yoshiki256/flask_bbs -https://github.com/yoshiki256/flask_bbs -Entry file: flask_bbs/flaskr.py -Scanned: 2016-10-12 12:44:46.026841 -No vulnerabilities found. - - -robotment/flask-twitter -https://github.com/robotment/flask-twitter -Entry file: flask-twitter/twitter/__init__.py -Scanned: 2016-10-12 12:44:49.448523 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nickah/Flask-Blog -https://github.com/nickah/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-12 12:44:51.621589 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paulbarbu/flask-upload -https://github.com/paulbarbu/flask-upload -Entry file: flask-upload/index.py -Scanned: 2016-10-12 12:44:56.965606 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zwass/Heroku-Flask-Starter -https://github.com/zwass/Heroku-Flask-Starter -Entry file: Heroku-Flask-Starter/app.py -Scanned: 2016-10-12 12:45:16.679572 -No vulnerabilities found. - - -aparrish/Simple-Flask-Example -https://github.com/aparrish/Simple-Flask-Example -Entry file: Simple-Flask-Example/concord.py -Scanned: 2016-10-12 12:45:17.963417 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benbenben1010/flask-shark-experiment -https://github.com/benbenben1010/flask-shark-experiment -Entry file: flask-shark-experiment/src/rooms.py -Scanned: 2016-10-12 12:45:23.183319 -No vulnerabilities found. - - -xlevus/appengine-flask-template -https://github.com/xlevus/appengine-flask-template -Entry file: appengine-flask-template/web.py -Scanned: 2016-10-12 12:45:27.409179 -No vulnerabilities found. - - -30loops/flask-on-30loops -https://github.com/30loops/flask-on-30loops -Entry file: flask-on-30loops/hello.py -Scanned: 2016-10-12 12:45:31.605401 -No vulnerabilities found. - - -melpomene/Berlin-Books-Flask -https://github.com/melpomene/Berlin-Books-Flask -Entry file: Berlin-Books-Flask/main.py -Scanned: 2016-10-12 12:45:47.055541 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mateo41/simpleRest -https://github.com/mateo41/simpleRest -Entry file: simpleRest/sdge_rest.py -Scanned: 2016-10-12 12:45:49.471414 -No vulnerabilities found. - - -samalba/geventwebsocket-on-dotcloud -https://github.com/samalba/geventwebsocket-on-dotcloud -Entry file: geventwebsocket-on-dotcloud/app.py -Scanned: 2016-10-12 12:45:51.655630 -No vulnerabilities found. - - -yoshiki256/flaskr_on_fluxflex -https://github.com/yoshiki256/flaskr_on_fluxflex -Entry file: flaskr_on_fluxflex/flaskr.py -Scanned: 2016-10-12 12:45:56.879128 -No vulnerabilities found. - - -mygulamali/Geodesics -https://github.com/mygulamali/Geodesics -Entry file: Geodesics/geodesics.py -Scanned: 2016-10-12 12:46:17.724665 -No vulnerabilities found. - - -rmasters/mdpages -https://github.com/rmasters/mdpages -Entry file: mdpages/mdpages.py -Scanned: 2016-10-12 12:46:18.912863 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vmihailenco/ndbunq-example -https://github.com/vmihailenco/ndbunq-example -Entry file: ndbunq-example/app/app.py -Scanned: 2016-10-12 12:46:21.113208 -No vulnerabilities found. - - -gofetch/fetchweb -https://github.com/gofetch/fetchweb -Entry file: fetchweb/fetchweb/__init__.py -Scanned: 2016-10-12 12:46:28.657938 -Vulnerability 1: -File: fetchweb/fetchweb/views.py - > User input at line 144, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: fetchweb/fetchweb/views.py - > Line 147: filename = secure_filename(file.filename) -File: fetchweb/fetchweb/views.py - > reaches line 148, trigger word "flash(": - flash('uploaded file: %s' % filename) - -Vulnerability 2: -File: fetchweb/fetchweb/views.py - > User input at line 145, trigger word "form[": - url = request.form['torrent-url'] -File: fetchweb/fetchweb/views.py - > reaches line 150, trigger word "flash(": - flash('uploaded url: %s' % url) - - - -vr3v3n/TODO -https://github.com/vr3v3n/TODO -Entry file: TODO/todo.py -Scanned: 2016-10-12 12:46:31.960895 -No vulnerabilities found. - - -robertberry/rbrt-blog -https://github.com/robertberry/rbrt-blog -Entry file: rbrt-blog/blog.py -Scanned: 2016-10-12 12:46:47.337209 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yoshiki256/shingeki_mederu_python -https://github.com/yoshiki256/shingeki_mederu_python -Entry file: shingeki_mederu_python/shingeki.py -Scanned: 2016-10-12 12:46:49.642980 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cjmeyer/quincy -https://github.com/cjmeyer/quincy -Entry file: None -Scanned: 2016-10-12 12:46:52.152731 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cjmeyer/quincy. - -rdallasgray/archie-webservice -https://github.com/rdallasgray/archie-webservice -Entry file: archie-webservice/archie/__init__.py -Scanned: 2016-10-12 12:47:22.087507 -No vulnerabilities found. - - -swinton/Closest-UK-City -https://github.com/swinton/Closest-UK-City -Entry file: Closest-UK-City/webapp.py -Scanned: 2016-10-12 12:47:23.298291 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jamalzkhan/dropshare -https://github.com/jamalzkhan/dropshare -Entry file: dropshare/app.py -Scanned: 2016-10-12 12:47:24.582414 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flyingclimber/LegalTally -https://github.com/flyingclimber/LegalTally -Entry file: LegalTally/legaltally.py -Scanned: 2016-10-12 12:47:28.893515 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -playpauseandstop/Flask-Dropbox -https://github.com/playpauseandstop/Flask-Dropbox -Entry file: Flask-Dropbox/testapp/app.py -Scanned: 2016-10-12 12:47:52.487951 -No vulnerabilities found. - - -jpvanhal/flask-basicauth -https://github.com/jpvanhal/flask-basicauth -Entry file: flask-basicauth/test_basicauth.py -Scanned: 2016-10-12 12:48:07.310499 -No vulnerabilities found. - - -mattupstate/flask-negotiate -https://github.com/mattupstate/flask-negotiate -Entry file: flask-negotiate/tests.py -Scanned: 2016-10-12 12:48:18.678245 -No vulnerabilities found. - - -ajford/flask-sendmail -https://github.com/ajford/flask-sendmail -Entry file: flask-sendmail/tests.py -Scanned: 2016-10-12 12:48:23.999775 -No vulnerabilities found. - - -dileeshvar/flask -https://github.com/dileeshvar/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 12:48:48.779924 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jpvanhal/flask-xuacompatible -https://github.com/jpvanhal/flask-xuacompatible -Entry file: flask-xuacompatible/flask_xuacompatible.py -Scanned: 2016-10-12 12:48:50.985522 -No vulnerabilities found. - - -ihor/FlaskTest -https://github.com/ihor/FlaskTest -Entry file: FlaskTest/FileShare/app.py -Scanned: 2016-10-12 12:48:52.300289 -No vulnerabilities found. - - -mrigor/url-shortener -https://github.com/mrigor/url-shortener -Entry file: url-shortener/url_shortener.py -Scanned: 2016-10-12 12:48:58.516906 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gumho/minimal-flask-gae-template -https://github.com/gumho/minimal-flask-gae-template -Entry file: minimal-flask-gae-template/packages/flask/sessions.py -Scanned: 2016-10-12 12:49:09.395375 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jamesward/hello-python-flask -https://github.com/jamesward/hello-python-flask -Entry file: hello-python-flask/web.py -Scanned: 2016-10-12 12:49:18.648274 -No vulnerabilities found. - - -khanhnguyenqk/flask-example -https://github.com/khanhnguyenqk/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-12 12:49:24.620516 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fnava621/flask-blog -https://github.com/fnava621/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 12:49:51.906325 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -higumachan/ladytile_flask -https://github.com/higumachan/ladytile_flask -Entry file: ladytile_flask/app.py -Scanned: 2016-10-12 12:49:53.086849 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gkoberger/gkoberger-flask -https://github.com/gkoberger/gkoberger-flask -Entry file: gkoberger-flask/app.py -Scanned: 2016-10-12 12:49:59.337330 -No vulnerabilities found. - - -teerytko/nokiantorpedo-flask -https://github.com/teerytko/nokiantorpedo-flask -Entry file: nokiantorpedo-flask/src/userapp.py -Scanned: 2016-10-12 12:50:00.689165 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pewpewarrows/Prometheus-Flask -https://github.com/Pewpewarrows/Prometheus-Flask -Entry file: None -Scanned: 2016-10-12 12:50:10.723881 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pewpewarrows/Prometheus-Flask. - -jrheard/task-flask -https://github.com/jrheard/task-flask -Entry file: task-flask/task-flask/app.py -Scanned: 2016-10-12 12:50:19.001811 -No vulnerabilities found. - - -alekzvik/testing-fs -https://github.com/alekzvik/testing-fs -Entry file: testing-fs/simple_app.py -Scanned: 2016-10-12 12:50:25.200362 -No vulnerabilities found. - - -yefim/TwilioPusherFlask -https://github.com/yefim/TwilioPusherFlask -Entry file: TwilioPusherFlask/app.py -Scanned: 2016-10-12 12:50:35.632372 -No vulnerabilities found. - - -rduplain/flask-svg-example -https://github.com/rduplain/flask-svg-example -Entry file: flask-svg-example/app.py -Scanned: 2016-10-12 12:50:36.864404 -No vulnerabilities found. - - -nulogy/competition-flask-bootstrap -https://github.com/nulogy/competition-flask-bootstrap -Entry file: competition-flask-bootstrap/app.py -Scanned: 2016-10-12 12:50:38.056787 -No vulnerabilities found. - - -pythonclt/cltwit -https://github.com/pythonclt/cltwit -Entry file: cltwit/minitwit.py -Scanned: 2016-10-12 12:50:49.433564 -No vulnerabilities found. - - -mikejarrett/company-time-clock -https://github.com/mikejarrett/company-time-clock -Entry file: company-time-clock/timeclock/webapp/__init__.py -Scanned: 2016-10-12 12:50:53.909464 -No vulnerabilities found. - - -lyaunzbe/Foo -https://github.com/lyaunzbe/Foo -Entry file: Foo/foo.py -Scanned: 2016-10-12 12:50:55.101124 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fnava621/heroku-flaskstyle-test -https://github.com/fnava621/heroku-flaskstyle-test -Entry file: heroku-flaskstyle-test/app.py -Scanned: 2016-10-12 12:51:04.503886 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: heroku-flaskstyle-test/.#app.py - -gofetch/fetchweb -https://github.com/gofetch/fetchweb -Entry file: fetchweb/fetchweb/__init__.py -Scanned: 2016-10-12 12:51:09.151487 -Vulnerability 1: -File: fetchweb/fetchweb/views.py - > User input at line 144, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: fetchweb/fetchweb/views.py - > Line 147: filename = secure_filename(file.filename) -File: fetchweb/fetchweb/views.py - > reaches line 148, trigger word "flash(": - flash('uploaded file: %s' % filename) - -Vulnerability 2: -File: fetchweb/fetchweb/views.py - > User input at line 145, trigger word "form[": - url = request.form['torrent-url'] -File: fetchweb/fetchweb/views.py - > reaches line 150, trigger word "flash(": - flash('uploaded url: %s' % url) - - - -rDaffa/Firstlight-Alarm -https://github.com/rDaffa/Firstlight-Alarm -Entry file: Firstlight-Alarm/app.py -Scanned: 2016-10-12 12:51:19.408719 -No vulnerabilities found. - - -metllord/stumble_score_py -https://github.com/metllord/stumble_score_py -Entry file: stumble_score_py/web.py -Scanned: 2016-10-12 12:51:26.325642 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tetsuharu/tawlkbox -https://github.com/tetsuharu/tawlkbox -Entry file: tawlkbox/__init__.py -Scanned: 2016-10-12 12:51:27.513616 -No vulnerabilities found. - - -mbr/flask-bootstrap -https://github.com/mbr/flask-bootstrap -Entry file: flask-bootstrap/sample_application/__init__.py -Scanned: 2016-10-12 12:51:42.023936 -No vulnerabilities found. - - -closeio/flask-mongorest -https://github.com/closeio/flask-mongorest -Entry file: flask-mongorest/example/app.py -Scanned: 2016-10-12 12:51:51.468672 -No vulnerabilities found. - - -mattupstate/flask-principal -https://github.com/mattupstate/flask-principal -Entry file: flask-principal/tests/test_principal.py -Scanned: 2016-10-12 12:51:52.951769 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dansimau/flask-bootstrap -https://github.com/dansimau/flask-bootstrap -Entry file: flask-bootstrap/app/__init__.py -Scanned: 2016-10-12 12:51:55.681426 -No vulnerabilities found. - - -thrisp/flask-celery-example -https://github.com/thrisp/flask-celery-example -Entry file: flask-celery-example/app.py -Scanned: 2016-10-12 12:52:01.990956 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jhezjkp/flask-principal -https://github.com/jhezjkp/flask-principal -Entry file: flask-principal/tests/test_principal.py -Scanned: 2016-10-12 12:52:08.474128 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yefim/flask-heroku-sample -https://github.com/yefim/flask-heroku-sample -Entry file: flask-heroku-sample/app.py -Scanned: 2016-10-12 12:52:19.711991 -No vulnerabilities found. - - -whichlight/flask-tweepy-oauth -https://github.com/whichlight/flask-tweepy-oauth -Entry file: flask-tweepy-oauth/server.py -Scanned: 2016-10-12 12:52:25.949429 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kofrasa/flask-apputils -https://github.com/kofrasa/flask-apputils -Entry file: flask-apputils/tests/routing/__init__.py -Scanned: 2016-10-12 12:52:39.003331 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cpdean/heroku-flask-postgresql-template -https://github.com/cpdean/heroku-flask-postgresql-template -Entry file: heroku-flask-postgresql-template/app.py -Scanned: 2016-10-12 12:52:40.198650 -No vulnerabilities found. - - -asascience-open/Flask_Social_Auth -https://github.com/asascience-open/Flask_Social_Auth -Entry file: Flask_Social_Auth/flask_social_auth/__init__.py -Scanned: 2016-10-12 12:52:50.440694 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aldryncore/webservices -https://github.com/aldryncore/webservices -Entry file: webservices/examples/flask_app/app.py -Scanned: 2016-10-12 12:52:54.755768 -No vulnerabilities found. - - -mattupstate/flask-stache -https://github.com/mattupstate/flask-stache -Entry file: flask-stache/example/__init__.py -Scanned: 2016-10-12 12:52:56.066601 -No vulnerabilities found. - - -rdegges/flask-skel -https://github.com/rdegges/flask-skel -Entry file: flask-skel/skel/__init__.py -Scanned: 2016-10-12 12:53:02.292390 -No vulnerabilities found. - - -svieira/Flask-HipPocket -https://github.com/svieira/Flask-HipPocket -Entry file: Flask-HipPocket/flask_hippocket/pocket.py -Scanned: 2016-10-12 12:53:09.738539 -Vulnerability 1: -File: Flask-HipPocket/flask_hippocket/tests/mapper.py - > User input at line 38, trigger word "get(": - rv = tc.get('/') -File: Flask-HipPocket/flask_hippocket/tests/mapper.py - > reaches line 39, trigger word "url_for(": - self.assertTrue('The url for url_for('endpoint_name') is /' in rv.data.decode('utf-8')) - - - -honza/oauth-service -https://github.com/honza/oauth-service -Entry file: oauth-service/frontend/app.py -Scanned: 2016-10-12 12:53:26.563521 -No vulnerabilities found. - - -albertmatyi/flaskgaellery -https://github.com/albertmatyi/flaskgaellery -Entry file: flaskgaellery/flask/sessions.py -Scanned: 2016-10-12 12:53:30.508973 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dougwt/ilmd-flask -https://github.com/dougwt/ilmd-flask -Entry file: ilmd-flask/app/__init__.py -Scanned: 2016-10-12 12:53:40.499417 -No vulnerabilities found. - - -dpflug/flask-barcodes -https://github.com/dpflug/flask-barcodes -Entry file: flask-barcodes/barcodes/__init__.py -Scanned: 2016-10-12 12:53:41.700784 -No vulnerabilities found. - - -feltnerm/flask-boilerplate -https://github.com/feltnerm/flask-boilerplate -Entry file: flask-boilerplate/apps/__init__.py -Scanned: 2016-10-12 12:53:51.403437 -No vulnerabilities found. - - -Dorianux/flask-yafowil -https://github.com/Dorianux/flask-yafowil -Entry file: flask-yafowil/example/srv.py -Scanned: 2016-10-12 12:53:55.936994 -No vulnerabilities found. - - -linyupark/flaskapps -https://github.com/linyupark/flaskapps -Entry file: flaskapps/example/__init__.py -Scanned: 2016-10-12 12:53:57.235942 -No vulnerabilities found. - - -tophatmonocle/lti_tool_provider_example_flask -https://github.com/tophatmonocle/lti_tool_provider_example_flask -Entry file: lti_tool_provider_example_flask/tool_provider.py -Scanned: 2016-10-12 12:54:02.551298 -No vulnerabilities found. - - -bradmontgomery/mempy-flask-tutorial -https://github.com/bradmontgomery/mempy-flask-tutorial -Entry file: mempy-flask-tutorial/hello.py -Scanned: 2016-10-12 12:54:09.883369 -No vulnerabilities found. - - -jaav/flaskbone1 -https://github.com/jaav/flaskbone1 -Entry file: flaskbone1/src/flask/sessions.py -Scanned: 2016-10-12 12:54:28.440201 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -grimpy/lxcweb -https://github.com/grimpy/lxcweb -Entry file: lxcweb/lxcweb.py -Scanned: 2016-10-12 12:54:30.329048 -No vulnerabilities found. - - -tophatmonocle/lti_tool_consumer_example_flask -https://github.com/tophatmonocle/lti_tool_consumer_example_flask -Entry file: lti_tool_consumer_example_flask/tool_consumer.py -Scanned: 2016-10-12 12:54:42.043666 -No vulnerabilities found. - - -mbowcock/flask-rest -https://github.com/mbowcock/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-12 12:54:50.569148 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -newsapps/flask-bakery -https://github.com/newsapps/flask-bakery -Entry file: flask-bakery/app.py -Scanned: 2016-10-12 12:54:55.851291 -No vulnerabilities found. - - -mnbbrown/flask-sample -https://github.com/mnbbrown/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-12 12:54:58.167280 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vmihailenco/flask-hello -https://github.com/vmihailenco/flask-hello -Entry file: flask-hello/blibb_api/hello.py -Scanned: 2016-10-12 12:55:03.378873 -No vulnerabilities found. - - -mbr/flask-obscurity -https://github.com/mbr/flask-obscurity -Entry file: flask-obscurity/tests/test_extension.py -Scanned: 2016-10-12 12:55:10.729474 -No vulnerabilities found. - - -yiwinking/flask_project -https://github.com/yiwinking/flask_project -Entry file: flask_project/flaskr.py -Scanned: 2016-10-12 12:55:20.975521 -No vulnerabilities found. - - -bdelbosc/restapp -https://github.com/bdelbosc/restapp -Entry file: restapp/restapp/__init__.py -Scanned: 2016-10-12 12:55:27.375253 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miguel250/miguelpz-core -https://github.com/miguel250/miguelpz-core -Entry file: miguelpz-core/app/config/__init__.py -Scanned: 2016-10-12 12:55:30.815852 -No vulnerabilities found. - - -rduplain/flask-svg-example -https://github.com/rduplain/flask-svg-example -Entry file: flask-svg-example/app.py -Scanned: 2016-10-12 12:55:40.057828 -No vulnerabilities found. - - -sergray/Flask-MailErrors -https://github.com/sergray/Flask-MailErrors -Entry file: Flask-MailErrors/tests.py -Scanned: 2016-10-12 12:55:42.296884 -No vulnerabilities found. - - -kalimatas/writedownme -https://github.com/kalimatas/writedownme -Entry file: writedownme/flask/sessions.py -Scanned: 2016-10-12 12:55:57.222261 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dbrgn/schlagzeilengenerator -https://github.com/dbrgn/schlagzeilengenerator -Entry file: schlagzeilengenerator/app/app.py -Scanned: 2016-10-12 12:55:58.962705 -No vulnerabilities found. - - -martyanov/minitwit -https://github.com/martyanov/minitwit -Entry file: minitwit/minitwit.py -Scanned: 2016-10-12 12:56:04.382142 -No vulnerabilities found. - - -sethtrain/buntin.org -https://github.com/sethtrain/buntin.org -Entry file: None -Scanned: 2016-10-12 12:56:10.605182 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sethtrain/buntin.org. - -karanlyons/bestthing -https://github.com/karanlyons/bestthing -Entry file: bestthing/bestthing/__init__.py -Scanned: 2016-10-12 12:56:21.958535 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sneeu/board -https://github.com/sneeu/board -Entry file: board/board.py -Scanned: 2016-10-12 12:56:30.699222 -No vulnerabilities found. - - -omerk/spotify-http-control -https://github.com/omerk/spotify-http-control -Entry file: spotify-http-control/control.py -Scanned: 2016-10-12 12:56:40.970356 -No vulnerabilities found. - - -mfa/weight-app -https://github.com/mfa/weight-app -Entry file: weight-app/weight/main.py -Scanned: 2016-10-12 12:56:44.230905 -Vulnerability 1: -File: weight-app/weight/views.py - > User input at line 43, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: weight-app/weight/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: weight-app/weight/views.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('.index')) - -Vulnerability 2: -File: weight-app/weight/views.py - > User input at line 43, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: weight-app/weight/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: weight-app/weight/views.py - > reaches line 44, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('.index')) - -Vulnerability 3: -File: weight-app/weight/views.py - > User input at line 103, trigger word "get(": - wid = request.args.get('wid') -Reassigned in: - File: weight-app/weight/views.py - > Line 107: elem = Weight.query.get(wid) - File: weight-app/weight/views.py - > Line 123: form = WeightForm(obj=elem) - File: weight-app/weight/views.py - > Line 129: form = WeightForm() - File: weight-app/weight/views.py - > Line 138: elem = Weight(weight=request.form['weight']) - File: weight-app/weight/views.py - > Line 166: form.scale_name.data = elem.scale_name - File: weight-app/weight/views.py - > Line 170: form.scale_name.data = u1.default_scale_name - File: weight-app/weight/views.py - > Line 172: ret_MAYBE_FUNCTION_NAME = render_template('weight_edit.html',form=form, wrange=range(wmin, wmax)) - File: weight-app/weight/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('weight_list.html',elements=elements.items, paginate=elements, show_comment=False) -File: weight-app/weight/views.py - > reaches line 154, trigger word "flash(": - flash('Data saved [%s with %s]' % (elem.wdate, elem.weight), 'info') - -Vulnerability 4: -File: weight-app/weight/views.py - > User input at line 107, trigger word "get(": - elem = Weight.query.get(wid) -Reassigned in: - File: weight-app/weight/views.py - > Line 123: form = WeightForm(obj=elem) - File: weight-app/weight/views.py - > Line 129: form = WeightForm() - File: weight-app/weight/views.py - > Line 138: elem = Weight(weight=request.form['weight']) - File: weight-app/weight/views.py - > Line 166: form.scale_name.data = elem.scale_name - File: weight-app/weight/views.py - > Line 170: form.scale_name.data = u1.default_scale_name - File: weight-app/weight/views.py - > Line 172: ret_MAYBE_FUNCTION_NAME = render_template('weight_edit.html',form=form, wrange=range(wmin, wmax)) - File: weight-app/weight/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('weight_list.html',elements=elements.items, paginate=elements, show_comment=False) -File: weight-app/weight/views.py - > reaches line 154, trigger word "flash(": - flash('Data saved [%s with %s]' % (elem.wdate, elem.weight), 'info') - -Vulnerability 5: -File: weight-app/weight/views.py - > User input at line 138, trigger word "form[": - elem = Weight(weight=request.form['weight']) -Reassigned in: - File: weight-app/weight/views.py - > Line 107: elem = Weight.query.get(wid) - File: weight-app/weight/views.py - > Line 123: form = WeightForm(obj=elem) - File: weight-app/weight/views.py - > Line 129: form = WeightForm() - File: weight-app/weight/views.py - > Line 166: form.scale_name.data = elem.scale_name - File: weight-app/weight/views.py - > Line 170: form.scale_name.data = u1.default_scale_name - File: weight-app/weight/views.py - > Line 172: ret_MAYBE_FUNCTION_NAME = render_template('weight_edit.html',form=form, wrange=range(wmin, wmax)) - File: weight-app/weight/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('weight_list.html',elements=elements.items, paginate=elements, show_comment=False) -File: weight-app/weight/views.py - > reaches line 154, trigger word "flash(": - flash('Data saved [%s with %s]' % (elem.wdate, elem.weight), 'info') - - - -dsosby/pycanoed -https://github.com/dsosby/pycanoed -Entry file: pycanoed/app.py -Scanned: 2016-10-12 12:56:54.124340 -No vulnerabilities found. - - -danlamanna/Jackhammer-Gateway -https://github.com/danlamanna/Jackhammer-Gateway -Entry file: Jackhammer-Gateway/api.py -Scanned: 2016-10-12 12:56:56.475325 -No vulnerabilities found. - - -digiblink/reflaskr -https://github.com/digiblink/reflaskr -Entry file: reflaskr/app.py -Scanned: 2016-10-12 12:56:59.070047 -No vulnerabilities found. - - -Maplecroft/Ansel -https://github.com/Maplecroft/Ansel -Entry file: Ansel/app.py -Scanned: 2016-10-12 12:57:10.919864 -No vulnerabilities found. - - -mattupstate/flask-rq -https://github.com/mattupstate/flask-rq -Entry file: flask-rq/tests/flaskrq_tests.py -Scanned: 2016-10-12 12:57:31.052963 -No vulnerabilities found. - - -klen/Flask-Foundation -https://github.com/klen/Flask-Foundation -Entry file: Flask-Foundation/base/app.py -Scanned: 2016-10-12 12:57:42.852093 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ib-lundgren/flask-oauthprovider -https://github.com/ib-lundgren/flask-oauthprovider -Entry file: flask-oauthprovider/examples/client.py -Scanned: 2016-10-12 12:57:44.708991 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sashka/flask-googleauth -https://github.com/sashka/flask-googleauth -Entry file: flask-googleauth/flask_googleauth.py -Scanned: 2016-10-12 12:57:53.078523 -No vulnerabilities found. - - -benselme/flask-mako -https://github.com/benselme/flask-mako -Entry file: flask-mako/flask_mako.py -Scanned: 2016-10-12 12:57:57.643986 -No vulnerabilities found. - - -chriszf/flask_todolist -https://github.com/chriszf/flask_todolist -Entry file: flask_todolist/todolist/model.py -Scanned: 2016-10-12 12:58:10.819268 -No vulnerabilities found. - - -srusskih/flask-uploads -https://github.com/srusskih/flask-uploads -Entry file: flask-uploads/tests/test-uploads.py -Scanned: 2016-10-12 12:58:23.349387 -No vulnerabilities found. - - -Kozea/Flask-WeasyPrint -https://github.com/Kozea/Flask-WeasyPrint -Entry file: Flask-WeasyPrint/flask_weasyprint/tests.py -Scanned: 2016-10-12 12:58:28.920582 -No vulnerabilities found. - - -mattupstate/flask-environments -https://github.com/mattupstate/flask-environments -Entry file: flask-environments/tests/__init__.py -Scanned: 2016-10-12 12:58:31.289403 -No vulnerabilities found. - - -kofrasa/flask-apputils -https://github.com/kofrasa/flask-apputils -Entry file: flask-apputils/tests/routing/__init__.py -Scanned: 2016-10-12 12:58:44.268178 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DeaconDesperado/Flask-SQLAlchemy-Example -https://github.com/DeaconDesperado/Flask-SQLAlchemy-Example -Entry file: Flask-SQLAlchemy-Example/testapp.py -Scanned: 2016-10-12 12:58:53.536171 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -closeio/flask-common -https://github.com/closeio/flask-common -Entry file: flask-common/tests/__init__.py -Scanned: 2016-10-12 12:58:58.503067 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahri/flask-snooze -https://github.com/ahri/flask-snooze -Entry file: flask-snooze/tests/test_snooze.py -Scanned: 2016-10-12 12:58:59.818705 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jokull/flask-halalchemy -https://github.com/jokull/flask-halalchemy -Entry file: flask-halalchemy/test_example.py -Scanned: 2016-10-12 12:59:05.129345 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kofrasa/flaskapp -https://github.com/kofrasa/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-12 12:59:11.432783 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomasd/flask-emailactivation -https://github.com/tomasd/flask-emailactivation -Entry file: flask-emailactivation/tests/test_activation.py -Scanned: 2016-10-12 12:59:23.769079 -No vulnerabilities found. - - -asgoel/flask-twitter -https://github.com/asgoel/flask-twitter -Entry file: flask-twitter/twitter/__init__.py -Scanned: 2016-10-12 12:59:41.225433 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AnIrishDuck/flask-mako-legacy -https://github.com/AnIrishDuck/flask-mako-legacy -Entry file: flask-mako-legacy/test_flask_mako.py -Scanned: 2016-10-12 12:59:45.586936 -No vulnerabilities found. - - -fdb/fliki -https://github.com/fdb/fliki -Entry file: fliki/fliki.py -Scanned: 2016-10-12 12:59:53.834703 -No vulnerabilities found. - - -lazy-coders/mt_scrapper -https://github.com/lazy-coders/mt_scrapper -Entry file: mt_scrapper/mt_scrapper.py -Scanned: 2016-10-12 13:00:00.596999 -No vulnerabilities found. - - -Senso/fiasco-flask -https://github.com/Senso/fiasco-flask -Entry file: fiasco-flask/fiasco/__init__.py -Scanned: 2016-10-12 13:00:02.056635 -Vulnerability 1: -File: fiasco-flask/fiasco/views.py - > User input at line 109, trigger word ".data": - playset = models.Playset(name=form.name.data, desc=form.description.data, owner=session['uid']) -Reassigned in: - File: fiasco-flask/fiasco/views.py - > Line 119: n_table = models.Details(playset.id, 'need', need_detail) - File: fiasco-flask/fiasco/views.py - > Line 120: o_table = models.Details(playset.id, 'object', obj_detail) - File: fiasco-flask/fiasco/views.py - > Line 121: l_table = models.Details(playset.id, 'location', loc_detail) - File: fiasco-flask/fiasco/views.py - > Line 122: r_table = models.Details(playset.id, 'relationship', rel_detail) - File: fiasco-flask/fiasco/views.py - > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('new_playset.html',error=error, form=form) - File: fiasco-flask/fiasco/views.py - > Line 102: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: fiasco-flask/fiasco/views.py - > reaches line 131, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/edit_playset/' + str(playset.id)) - - - -encodes/flask-snippet -https://github.com/encodes/flask-snippet -Entry file: flask-snippet/app/__init__.py -Scanned: 2016-10-12 13:00:06.035374 -Vulnerability 1: -File: flask-snippet/app/users/views.py - > User input at line 35, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-snippet/app/users/views.py - > Line 40: session['user_id'] = user.id -File: flask-snippet/app/users/views.py - > reaches line 41, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -SmartViking/MaBlag -https://github.com/SmartViking/MaBlag -Entry file: MaBlag/blog.py -Scanned: 2016-10-12 13:00:24.708351 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -keithfancher/Flaskr -https://github.com/keithfancher/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-12 13:00:30.015953 -No vulnerabilities found. - - -daviddedden/flaskr -https://github.com/daviddedden/flaskr -Entry file: flaskr/test.py -Scanned: 2016-10-12 13:00:36.674004 -No vulnerabilities found. - - -tophatmonocle/lti_tool_provider_example_flask -https://github.com/tophatmonocle/lti_tool_provider_example_flask -Entry file: lti_tool_provider_example_flask/tool_provider.py -Scanned: 2016-10-12 13:00:43.013222 -No vulnerabilities found. - - -filipecifali/Flask-Ping-Site -https://github.com/filipecifali/Flask-Ping-Site -Entry file: Flask-Ping-Site/flaskSite.py -Scanned: 2016-10-12 13:00:46.366107 -No vulnerabilities found. - - -DanielKinsman/flask-pyjs-jsonrpc-test -https://github.com/DanielKinsman/flask-pyjs-jsonrpc-test -Entry file: flask-pyjs-jsonrpc-test/web.py -Scanned: 2016-10-12 13:00:54.651434 -No vulnerabilities found. - - -whichlight/flask-couchdb-binary-image-labeler -https://github.com/whichlight/flask-couchdb-binary-image-labeler -Entry file: flask-couchdb-binary-image-labeler/server.py -Scanned: 2016-10-12 13:01:01.551915 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tophatmonocle/lti_tool_consumer_example_flask -https://github.com/tophatmonocle/lti_tool_consumer_example_flask -Entry file: lti_tool_consumer_example_flask/tool_consumer.py -Scanned: 2016-10-12 13:01:06.324098 -No vulnerabilities found. - - -melignus/Appengine-Help-Desk -https://github.com/melignus/Appengine-Help-Desk -Entry file: Appengine-Help-Desk/app.py -Scanned: 2016-10-12 13:01:18.184328 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dustinmm80/flask_test -https://github.com/dustinmm80/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-12 13:01:24.656466 -No vulnerabilities found. - - -curiousleo/kardiopraxis-flask -https://github.com/curiousleo/kardiopraxis-flask -Entry file: kardiopraxis-flask/kardiopraxis.py -Scanned: 2016-10-12 13:01:58.524020 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -encodes/flask-finance -https://github.com/encodes/flask-finance -Entry file: flask-finance/app/__init__.py -Scanned: 2016-10-12 13:01:59.842438 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ramin32/Flask-Template -https://github.com/ramin32/Flask-Template -Entry file: Flask-Template/project_name/__init__.py -Scanned: 2016-10-12 13:02:03.039611 -No vulnerabilities found. - - -toastercup/flask-scormcloud -https://github.com/toastercup/flask-scormcloud -Entry file: flask-scormcloud/manage.py -Scanned: 2016-10-12 13:02:06.346959 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -weldan/flask_setup -https://github.com/weldan/flask_setup -Entry file: flask_setup/app.py -Scanned: 2016-10-12 13:02:12.657298 -No vulnerabilities found. - - -michellesun/flask_ms -https://github.com/michellesun/flask_ms -Entry file: flask_ms/flaskr.py -Scanned: 2016-10-12 13:02:25.574561 -No vulnerabilities found. - - -shea256/flask-project-template -https://github.com/shea256/flask-project-template -Entry file: flask-project-template/app.py -Scanned: 2016-10-12 13:02:35.461214 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-project-template/venv/lib/python2.7/genericpath.py - -Kinghack/flask-oauth-china -https://github.com/Kinghack/flask-oauth-china -Entry file: flask-oauth-china/example/facebook.py -Scanned: 2016-10-12 13:02:37.044397 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -StefanWallin/python-Flask-lab -https://github.com/StefanWallin/python-Flask-lab -Entry file: python-Flask-lab/app.py -Scanned: 2016-10-12 13:02:44.304432 -No vulnerabilities found. - - -rvause/project-base-flask -https://github.com/rvause/project-base-flask -Entry file: None -Scanned: 2016-10-12 13:02:55.075196 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rvause/project-base-flask. - -emilianox/opener -https://github.com/emilianox/opener -Entry file: opener/opener.py -Scanned: 2016-10-12 13:03:00.417339 -No vulnerabilities found. - - -oksana-slu/sqlfla -https://github.com/oksana-slu/sqlfla -Entry file: sqlfla/eventor/__init__.py -Scanned: 2016-10-12 13:03:06.427888 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -johngriffin/ldpy-api -https://github.com/johngriffin/ldpy-api -Entry file: ldpy-api/app.py -Scanned: 2016-10-12 13:03:07.721029 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nryoung/Array-Size -https://github.com/nryoung/Array-Size -Entry file: Array-Size/raid.py -Scanned: 2016-10-12 13:03:13.036701 -No vulnerabilities found. - - -ciaron/pandaflask_old -https://github.com/ciaron/pandaflask_old -Entry file: pandaflask_old/pandachrome.py -Scanned: 2016-10-12 13:03:37.132845 -Vulnerability 1: -File: pandaflask_old/pandachrome.py - > User input at line 208, trigger word "get(": - title = request.form.get('title') -Reassigned in: - File: pandaflask_old/pandachrome.py - > Line 217: category = Category(title=title, description=description, owner_id=owner.id) -File: pandaflask_old/pandachrome.py - > reaches line 218, trigger word "flash(": - flash('successfully created new category ' + title) - -Vulnerability 2: -File: pandaflask_old/pandachrome.py - > User input at line 230, trigger word "get(": - title = request.form.get('title') -Reassigned in: - File: pandaflask_old/pandachrome.py - > Line 240: project = Project(title=title, description=description, category_id=category_id, owner_id=owner.id) -File: pandaflask_old/pandachrome.py - > reaches line 241, trigger word "flash(": - flash('successfully created new project ' + title + ', category ' + category_id) - -Vulnerability 3: -File: pandaflask_old/pandachrome.py - > User input at line 232, trigger word "get(": - category_id = request.form.get('category_id') -Reassigned in: - File: pandaflask_old/pandachrome.py - > Line 240: project = Project(title=title, description=description, category_id=category_id, owner_id=owner.id) -File: pandaflask_old/pandachrome.py - > reaches line 241, trigger word "flash(": - flash('successfully created new project ' + title + ', category ' + category_id) - - - -dlitvakb/MOVEapp -https://github.com/dlitvakb/MOVEapp -Entry file: MOVEapp/appserver.py -Scanned: 2016-10-12 13:03:38.745269 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -clee/boilerplate -https://github.com/clee/boilerplate -Entry file: boilerplate/boilerplate.py -Scanned: 2016-10-12 13:03:44.982625 -No vulnerabilities found. - - -hvnsweeting/mtaskflask -https://github.com/hvnsweeting/mtaskflask -Entry file: mtaskflask/mtask.py -Scanned: 2016-10-12 13:03:47.421687 -No vulnerabilities found. - - -keithfancher/Stories -https://github.com/keithfancher/Stories -Entry file: Stories/stories.py -Scanned: 2016-10-12 13:03:55.831750 -No vulnerabilities found. - - -t20/henhealth -https://github.com/t20/henhealth -Entry file: henhealth/hen.py -Scanned: 2016-10-12 13:04:01.726293 -No vulnerabilities found. - - -klinkin/vksunshine -https://github.com/klinkin/vksunshine -Entry file: vksunshine/vksunshine/application.py -Scanned: 2016-10-12 13:04:09.553183 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ChrisAnn/FRog -https://github.com/ChrisAnn/FRog -Entry file: FRog/FRog.py -Scanned: 2016-10-12 13:04:10.786763 -No vulnerabilities found. - - -hirish/DinnerDesignr -https://github.com/hirish/DinnerDesignr -Entry file: DinnerDesignr/dinnerDesignr.py -Scanned: 2016-10-12 13:04:13.906876 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jakecoffman/flask-tutorial -https://github.com/jakecoffman/flask-tutorial -Entry file: flask-tutorial/part 6 - databases/flaskr.py -Scanned: 2016-10-12 13:04:33.882139 -No vulnerabilities found. - - -syrusakbary/Flask-SuperAdmin -https://github.com/syrusakbary/Flask-SuperAdmin -Entry file: Flask-SuperAdmin/flask_superadmin/tests/test_model.py -Scanned: 2016-10-12 13:04:43.296498 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -guotie/flaskbbs -https://github.com/guotie/flaskbbs -Entry file: flaskbbs/flaskcommon/auth/views.py -Scanned: 2016-10-12 13:04:46.487607 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rdegges/flask-dynamo -https://github.com/rdegges/flask-dynamo -Entry file: flask-dynamo/tests/test_manager.py -Scanned: 2016-10-12 13:04:48.991646 -No vulnerabilities found. - - -maxcountryman/flask-themes -https://github.com/maxcountryman/flask-themes -Entry file: flask-themes/tests/test-themes.py -Scanned: 2016-10-12 13:04:56.707715 -No vulnerabilities found. - - -klen/Flask-Collect -https://github.com/klen/Flask-Collect -Entry file: Flask-Collect/flask_collect/collect.py -Scanned: 2016-10-12 13:05:02.624962 -No vulnerabilities found. - - -kvesteri/flask-storage -https://github.com/kvesteri/flask-storage -Entry file: flask-storage/tests/__init__.py -Scanned: 2016-10-12 13:05:11.976758 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thesteve0/openshift-mongo-flask-example -https://github.com/thesteve0/openshift-mongo-flask-example -Entry file: openshift-mongo-flask-example/wsgi/myflaskapp.py -Scanned: 2016-10-12 13:05:13.423039 -No vulnerabilities found. - - -zeraholladay/Flask-Oauth2-Example -https://github.com/zeraholladay/Flask-Oauth2-Example -Entry file: Flask-Oauth2-Example/app.py -Scanned: 2016-10-12 13:05:34.275471 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mtth/kit -https://github.com/mtth/kit -Entry file: kit/examples/poller/poller/app/views.py -Scanned: 2016-10-12 13:05:45.137207 -No vulnerabilities found. - - -codecool/flask-app-structure -https://github.com/codecool/flask-app-structure -Entry file: flask-app-structure/myapp/__init__.py -Scanned: 2016-10-12 13:05:46.626977 -No vulnerabilities found. - - -DeaconDesperado/Flask-SQLAlchemy-Example -https://github.com/DeaconDesperado/Flask-SQLAlchemy-Example -Entry file: Flask-SQLAlchemy-Example/testapp.py -Scanned: 2016-10-12 13:05:47.113148 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kvesteri/flask-test -https://github.com/kvesteri/flask-test -Entry file: flask-test/tests/__init__.py -Scanned: 2016-10-12 13:05:56.715689 -No vulnerabilities found. - - -ipconfiger/pyImageServer -https://github.com/ipconfiger/pyImageServer -Entry file: pyImageServer/serv.py -Scanned: 2016-10-12 13:06:12.045633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Khan/flask-wtf -https://github.com/Khan/flask-wtf -Entry file: flask-wtf/examples/recaptcha/app.py -Scanned: 2016-10-12 13:06:16.087352 -No vulnerabilities found. - - -ravenac95/flask-command -https://github.com/ravenac95/flask-command -Entry file: flask-command/tests/fixtures/factory_app.py -Scanned: 2016-10-12 13:06:27.426933 -No vulnerabilities found. - - -encodes/flask-snippet -https://github.com/encodes/flask-snippet -Entry file: flask-snippet/app/__init__.py -Scanned: 2016-10-12 13:06:47.340887 -Vulnerability 1: -File: flask-snippet/app/users/views.py - > User input at line 35, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-snippet/app/users/views.py - > Line 40: session['user_id'] = user.id -File: flask-snippet/app/users/views.py - > reaches line 41, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -vaus/Flaskyll -https://github.com/vaus/Flaskyll -Entry file: Flaskyll/scripts/flaskyll.py -Scanned: 2016-10-12 13:06:48.629387 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -christianpbrink/flaskdemo -https://github.com/christianpbrink/flaskdemo -Entry file: flaskdemo/src/flaskdemo/__init__.py -Scanned: 2016-10-12 13:06:57.004546 -No vulnerabilities found. - - -vsergeyev/flasklutskio -https://github.com/vsergeyev/flasklutskio -Entry file: flasklutskio/app.py -Scanned: 2016-10-12 13:07:02.208082 -No vulnerabilities found. - - -lb1a/flaskplay -https://github.com/lb1a/flaskplay -Entry file: flaskplay/flaskr.py -Scanned: 2016-10-12 13:07:05.522263 -No vulnerabilities found. - - -fdb/helloflask -https://github.com/fdb/helloflask -Entry file: helloflask/helloflask.py -Scanned: 2016-10-12 13:07:12.775375 -No vulnerabilities found. - - -gparuthi/FlaskServer -https://github.com/gparuthi/FlaskServer -Entry file: FlaskServer/server.py -Scanned: 2016-10-12 13:07:35.015874 -No vulnerabilities found. - - -iambibhas/flask-blog -https://github.com/iambibhas/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 13:07:46.012549 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -alexisbellido/flask-basics -https://github.com/alexisbellido/flask-basics -Entry file: flask-basics/hello.py -Scanned: 2016-10-12 13:07:49.377384 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akaptur/Flask-tutorial -https://github.com/akaptur/Flask-tutorial -Entry file: Flask-tutorial/flask_app.py -Scanned: 2016-10-12 13:07:57.602640 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ihptru/Ubot-flask -https://github.com/ihptru/Ubot-flask -Entry file: Ubot-flask/ubotflask.py -Scanned: 2016-10-12 13:08:02.811997 -No vulnerabilities found. - - -Dipsomaniac/Flask-Mixer -https://github.com/Dipsomaniac/Flask-Mixer -Entry file: Flask-Mixer/tests/__init__.py -Scanned: 2016-10-12 13:08:06.493025 -No vulnerabilities found. - - -bx2/handbag-flask -https://github.com/bx2/handbag-flask -Entry file: handbag-flask/flaskapp-template/app.py -Scanned: 2016-10-12 13:08:13.725345 -No vulnerabilities found. - - -whoeverest/NSND-Upvoting -https://github.com/whoeverest/NSND-Upvoting -Entry file: NSND-Upvoting/upvote-list.py -Scanned: 2016-10-12 13:08:35.891237 -No vulnerabilities found. - - -naudo/flask-hello-world -https://github.com/naudo/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-12 13:08:45.813047 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -Smil3y/MyFlaskr -https://github.com/Smil3y/MyFlaskr -Entry file: MyFlaskr/flaskr.py -Scanned: 2016-10-12 13:08:58.116558 -No vulnerabilities found. - - -jonathancone/helloflask -https://github.com/jonathancone/helloflask -Entry file: helloflask/app.py -Scanned: 2016-10-12 13:09:03.954453 -No vulnerabilities found. - - -vicould/simple_blog -https://github.com/vicould/simple_blog -Entry file: simple_blog/blog.py -Scanned: 2016-10-12 13:09:06.535283 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -rafax/flush -https://github.com/rafax/flush -Entry file: flush/flush.py -Scanned: 2016-10-12 13:09:14.707096 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fenbox/chord -https://github.com/fenbox/chord -Entry file: chord/chord.py -Scanned: 2016-10-12 13:09:16.100953 -No vulnerabilities found. - - -R2Drink2/r2drink2-server -https://github.com/R2Drink2/r2drink2-server -Entry file: None -Scanned: 2016-10-12 13:09:29.521179 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/R2Drink2/r2drink2-server. - -mafrosis/youtube-dl -https://github.com/mafrosis/youtube-dl -Entry file: youtube-dl/youtube_dl/__init__.py -Scanned: 2016-10-12 13:09:37.377731 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrwilson/git-serve -https://github.com/mrwilson/git-serve -Entry file: git-serve/git_serve/app.py -Scanned: 2016-10-12 13:09:47.160282 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -allaud/Sufx -https://github.com/allaud/Sufx -Entry file: Sufx/app.py -Scanned: 2016-10-12 13:09:51.324123 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miniatureape/etsy-api-demo -https://github.com/miniatureape/etsy-api-demo -Entry file: etsy-api-demo/app.py -Scanned: 2016-10-12 13:09:58.709380 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -troythewolfe/nNest -https://github.com/troythewolfe/nNest -Entry file: None -Scanned: 2016-10-12 13:10:08.287042 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/troythewolfe/nNest. - -andor44/lohere- -https://github.com/andor44/lohere- -Entry file: lohere-/lohereminusz.py -Scanned: 2016-10-12 13:10:09.837871 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -richard-to/dashgourd-web-api -https://github.com/richard-to/dashgourd-web-api -Entry file: dashgourd-web-api/example/app.py -Scanned: 2016-10-12 13:10:14.102310 -No vulnerabilities found. - - -pyloque/doumail_machine -https://github.com/pyloque/doumail_machine -Entry file: doumail_machine/main.py -Scanned: 2016-10-12 13:10:17.039812 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -clee/boilerplate -https://github.com/clee/boilerplate -Entry file: boilerplate/boilerplate.py -Scanned: 2016-10-12 13:10:30.363281 -No vulnerabilities found. - - -ashutoshrishi/adventuresontheweb -https://github.com/ashutoshrishi/adventuresontheweb -Entry file: adventuresontheweb/flask/sessions.py -Scanned: 2016-10-12 13:10:41.174355 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -trenta3dev/wafwfy -https://github.com/trenta3dev/wafwfy -Entry file: wafwfy/wafwfy/__init__.py -Scanned: 2016-10-12 13:10:43.585764 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bendavis78/irclog -https://github.com/bendavis78/irclog -Entry file: irclog/app.py -Scanned: 2016-10-12 13:10:47.886744 -No vulnerabilities found. - - -practo/MyCQ -https://github.com/practo/MyCQ -Entry file: MyCQ/mycq/__init__.py -Scanned: 2016-10-12 13:10:51.381249 -No vulnerabilities found. - - -sijinjoseph/multunus-puzzle -https://github.com/sijinjoseph/multunus-puzzle -Entry file: multunus-puzzle/src/app.py -Scanned: 2016-10-12 13:11:00.519742 -Vulnerability 1: -File: multunus-puzzle/src/app.py - > User input at line 21, trigger word "form[": - redirect_to = url_for('tagcloud',twitterhandle=request.form['handle']) -Reassigned in: - File: multunus-puzzle/src/app.py - > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: multunus-puzzle/src/app.py - > reaches line 22, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(redirect_to) - - - -gaker/slides -https://github.com/gaker/slides -Entry file: slides/slides.py -Scanned: 2016-10-12 13:11:05.162249 -No vulnerabilities found. - - -addumb/toyapp -https://github.com/addumb/toyapp -Entry file: toyapp/toy/__init__.py -Scanned: 2016-10-12 13:11:16.558195 -Vulnerability 1: -File: toyapp/toy/views.py - > User input at line 77, trigger word "form[": - val = float(request.form['value']) -Reassigned in: - File: toyapp/toy/views.py - > Line 86: ret_MAYBE_FUNCTION_NAME = 'Setting %s to %s at %s' % (key, val, str(ts)) -File: toyapp/toy/views.py - > reaches line 83, trigger word "execute(": - g.db.execute('insert into events (key, value, ts) values (?, ?, ?)', (key, val, ts)) - -Vulnerability 2: -File: toyapp/toy/views.py - > User input at line 79, trigger word "form[": - ts = float(request.form['ts']) -Reassigned in: - File: toyapp/toy/views.py - > Line 81: ts = time.time() - File: toyapp/toy/views.py - > Line 86: ret_MAYBE_FUNCTION_NAME = 'Setting %s to %s at %s' % (key, val, str(ts)) -File: toyapp/toy/views.py - > reaches line 83, trigger word "execute(": - g.db.execute('insert into events (key, value, ts) values (?, ?, ?)', (key, val, ts)) - - - -petezhut/BigDay -https://github.com/petezhut/BigDay -Entry file: BigDay/app.py -Scanned: 2016-10-12 13:11:30.989786 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -akabaker/remote_rgb -https://github.com/akabaker/remote_rgb -Entry file: remote_rgb/app.py -Scanned: 2016-10-12 13:11:38.271123 -No vulnerabilities found. - - -kyubuns/favme -https://github.com/kyubuns/favme -Entry file: favme/hello.py -Scanned: 2016-10-12 13:11:42.614613 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joelverhagen/flask-rauth -https://github.com/joelverhagen/flask-rauth -Entry file: flask-rauth/example/facebook.py -Scanned: 2016-10-12 13:11:52.924250 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mattupstate/flask-security-example -https://github.com/mattupstate/flask-security-example -Entry file: flask-security-example/app.py -Scanned: 2016-10-12 13:11:59.354066 -No vulnerabilities found. - - -MichaelDiBernardo/ddd-flask-example -https://github.com/MichaelDiBernardo/ddd-flask-example -Entry file: ddd-flask-example/blogex/blogex_app.py -Scanned: 2016-10-12 13:12:05.744774 -No vulnerabilities found. - - -FelixLoether/flask-image-upload-thing -https://github.com/FelixLoether/flask-image-upload-thing -Entry file: flask-image-upload-thing/example.py -Scanned: 2016-10-12 13:12:11.994286 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jjjjeeffff/flask-skeleton -https://github.com/jjjjeeffff/flask-skeleton -Entry file: None -Scanned: 2016-10-12 13:12:14.539710 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jjjjeeffff/flask-skeleton. - -mgood/flask-failsafe -https://github.com/mgood/flask-failsafe -Entry file: flask-failsafe/test/test_app.py -Scanned: 2016-10-12 13:12:17.059555 -No vulnerabilities found. - - -arvindkhadri/flask-social -https://github.com/arvindkhadri/flask-social -Entry file: flask-social/tests/test_app/__init__.py -Scanned: 2016-10-12 13:12:39.630176 -No vulnerabilities found. - - -dantezhu/flask_util_js -https://github.com/dantezhu/flask_util_js -Entry file: flask_util_js/examples/main.py -Scanned: 2016-10-12 13:12:43.113923 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kielpedia/flask-sqlalchemy-postgres-heroku-example -https://github.com/kielpedia/flask-sqlalchemy-postgres-heroku-example -Entry file: flask-sqlalchemy-postgres-heroku-example/Flasktest/__init__.py -Scanned: 2016-10-12 13:12:52.904325 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yamatt/flask-blog -https://github.com/yamatt/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 13:12:59.468185 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -marconi/flask-chat -https://github.com/marconi/flask-chat -Entry file: flask-chat/chat.py -Scanned: 2016-10-12 13:13:07.071325 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rjurney/enron-python-flask-cassandra-pig -https://github.com/rjurney/enron-python-flask-cassandra-pig -Entry file: enron-python-flask-cassandra-pig/index.py -Scanned: 2016-10-12 13:13:11.440649 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KaviCorp/flask_pysaml2 -https://github.com/KaviCorp/flask_pysaml2 -Entry file: flask_pysaml2/tests/test_saml.py -Scanned: 2016-10-12 13:13:16.267570 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paulchakravarti/flask-skeleton -https://github.com/paulchakravarti/flask-skeleton -Entry file: None -Scanned: 2016-10-12 13:13:38.776063 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/paulchakravarti/flask-skeleton. - -tomekwojcik/flask-htauth -https://github.com/tomekwojcik/flask-htauth -Entry file: flask-htauth/example.py -Scanned: 2016-10-12 13:13:43.965794 -No vulnerabilities found. - - -skual/backend-flask -https://github.com/skual/backend-flask -Entry file: None -Scanned: 2016-10-12 13:13:49.404256 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/skual/backend-flask. - -memeticlabs/flask-mongokit -https://github.com/memeticlabs/flask-mongokit -Entry file: flask-mongokit/tests/test_base.py -Scanned: 2016-10-12 13:14:00.431464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mokshaproject/moksha-flask-hello_world -https://github.com/mokshaproject/moksha-flask-hello_world -Entry file: moksha-flask-hello_world/tutorial.py -Scanned: 2016-10-12 13:14:16.751782 -No vulnerabilities found. - - -geekforbrains/squid -https://github.com/geekforbrains/squid -Entry file: squid/run.py -Scanned: 2016-10-12 13:14:18.430023 -No vulnerabilities found. - - -fallingfree/flask-principal-simple-example -https://github.com/fallingfree/flask-principal-simple-example -Entry file: flask-principal-simple-example/auth.py -Scanned: 2016-10-12 13:14:32.881458 -Vulnerability 1: -File: flask-principal-simple-example/auth.py - > User input at line 136, trigger word ".data": - user = User.query.filter(User.username == form.username.data).first() -File: flask-principal-simple-example/auth.py - > reaches line 143, trigger word "flash(": - flash('欢迎你, %s' % user.username) - - - -trilan/stencil-flask -https://github.com/trilan/stencil-flask -Entry file: stencil-flask/stencil_flask/template/{app_name}/__init__.py -Scanned: 2016-10-12 13:14:43.665918 -No vulnerabilities found. - - -yangjiandong/flaskr -https://github.com/yangjiandong/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 13:14:50.117381 -No vulnerabilities found. - - -NEETFUTURE/flaskr -https://github.com/NEETFUTURE/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 13:14:54.535962 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -narendranag/Flaskr -https://github.com/narendranag/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-12 13:15:07.353136 -No vulnerabilities found. - - -luanfonceca/flaskbook -https://github.com/luanfonceca/flaskbook -Entry file: flaskbook/mange.py -Scanned: 2016-10-12 13:15:12.738485 -No vulnerabilities found. - - -johnschimmel/ITP-DWD-Fall2012-Week3-First-Server -https://github.com/johnschimmel/ITP-DWD-Fall2012-Week3-First-Server -Entry file: ITP-DWD-Fall2012-Week3-First-Server/app.py -Scanned: 2016-10-12 13:15:17.156799 -No vulnerabilities found. - - -saltycrane/flask-principal-example -https://github.com/saltycrane/flask-principal-example -Entry file: flask-principal-example/main.py -Scanned: 2016-10-12 13:15:18.381670 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KrzysztofWilczek/FlaskMaschines -https://github.com/KrzysztofWilczek/FlaskMaschines -Entry file: FlaskMaschines/app.py -Scanned: 2016-10-12 13:15:34.750181 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -trenta3dev/ziga -https://github.com/trenta3dev/ziga -Entry file: ziga/ziga/__init__.py -Scanned: 2016-10-12 13:15:41.121804 -No vulnerabilities found. - - -DeaconDesperado/flask_skel -https://github.com/DeaconDesperado/flask_skel -Entry file: flask_skel/listener.py -Scanned: 2016-10-12 13:15:54.551823 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -calebmadrigal/flask-adventures -https://github.com/calebmadrigal/flask-adventures -Entry file: flask-adventures/annuity_calculator.py -Scanned: 2016-10-12 13:16:02.388685 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchibbins/simple-flask -https://github.com/marchibbins/simple-flask -Entry file: simple-flask/simple-flask.py -Scanned: 2016-10-12 13:16:17.660627 -No vulnerabilities found. - - -iambibhas/flask-blog -https://github.com/iambibhas/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 13:16:18.199177 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -imiric/flask-scaffold -https://github.com/imiric/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-12 13:16:41.207937 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arvs/CURC-flask -https://github.com/arvs/CURC-flask -Entry file: CURC-flask/app.py -Scanned: 2016-10-12 13:16:56.693226 -No vulnerabilities found. - - -suneel0101/flask-adventure -https://github.com/suneel0101/flask-adventure -Entry file: flask-adventure/app.py -Scanned: 2016-10-12 13:16:57.961160 -No vulnerabilities found. - - -memeticlabs/Redis-Flask -https://github.com/memeticlabs/Redis-Flask -Entry file: Redis-Flask/flask_redis.py -Scanned: 2016-10-12 13:17:03.223743 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DartmouthHackerClub/flask_template -https://github.com/DartmouthHackerClub/flask_template -Entry file: flask_template/app.py -Scanned: 2016-10-12 13:17:08.563856 -Vulnerability 1: -File: flask_template/flask_cas.py - > User input at line 19, trigger word "get(": - r = requests.get(validate_url) -Reassigned in: - File: flask_template/flask_cas.py - > Line 20: doc = etree.fromstring(r.text) -File: flask_template/flask_cas.py - > reaches line 22, trigger word "replace(": - ret_MAYBE_FUNCTION_NAME = dict(((key.replace('{http://www.yale.edu/tp/cas}', ''), value) for (key, value) in recursive_dict(doc[0])[1].items())) - - - -bozoid/testblog -https://github.com/bozoid/testblog -Entry file: testblog/index.py -Scanned: 2016-10-12 13:17:19.672932 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: testblog/venv/lib/python2.7/genericpath.py - -alfredhq/alfred-listener -https://github.com/alfredhq/alfred-listener -Entry file: alfred-listener/alfred_listener/__init__.py -Scanned: 2016-10-12 13:17:21.237882 -No vulnerabilities found. - - -dhruvbaldawa/cj_calc -https://github.com/dhruvbaldawa/cj_calc -Entry file: cj_calc/app.py -Scanned: 2016-10-12 13:17:22.640533 -No vulnerabilities found. - - -openplans/shareabouts-flask-client -https://github.com/openplans/shareabouts-flask-client -Entry file: None -Scanned: 2016-10-12 13:17:44.486359 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/openplans/shareabouts-flask-client. - -hagino3000/flask-project-template -https://github.com/hagino3000/flask-project-template -Entry file: flask-project-template/app.py -Scanned: 2016-10-12 13:17:45.070074 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-project-template/venv/lib/python2.7/genericpath.py - -imaimiami/heroku_flask_template -https://github.com/imaimiami/heroku_flask_template -Entry file: heroku_flask_template/app/__init__.py -Scanned: 2016-10-12 13:17:59.229191 -No vulnerabilities found. - - -jhorman/sample-flask-project -https://github.com/jhorman/sample-flask-project -Entry file: sample-flask-project/app.py -Scanned: 2016-10-12 13:18:03.581829 -No vulnerabilities found. - - -infinitylx/test-task -https://github.com/infinitylx/test-task -Entry file: test-task/application.py -Scanned: 2016-10-12 13:18:15.032205 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amaudy/flaskr-tutorial -https://github.com/amaudy/flaskr-tutorial -Entry file: flaskr-tutorial/flaskr.py -Scanned: 2016-10-12 13:18:21.416547 -No vulnerabilities found. - - -gavinb/flaskr-eb -https://github.com/gavinb/flaskr-eb -Entry file: flaskr-eb/flaskr.py -Scanned: 2016-10-12 13:18:22.701371 -No vulnerabilities found. - - -vkukushkin88/test_books -https://github.com/vkukushkin88/test_books -Entry file: test_books/db/db_models.py -Scanned: 2016-10-12 13:18:42.501846 -No vulnerabilities found. - - -nicolashery/safire -https://github.com/nicolashery/safire -Entry file: safire/app.py -Scanned: 2016-10-12 13:18:45.755713 -No vulnerabilities found. - - -fjarri/publicfields-backend -https://github.com/fjarri/publicfields-backend -Entry file: publicfields-backend/backend/__init__.py -Scanned: 2016-10-12 13:18:53.187355 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -sdornan/imgination -https://github.com/sdornan/imgination -Entry file: imgination/application.py -Scanned: 2016-10-12 13:18:59.709915 -No vulnerabilities found. - - -Citizen01/Kozea-project1 -https://github.com/Citizen01/Kozea-project1 -Entry file: Kozea-project1/index.py -Scanned: 2016-10-12 13:19:06.654375 -Vulnerability 1: -File: Kozea-project1/index.py - > User input at line 110, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: Kozea-project1/index.py - > Line 122: session['username'] = username - File: Kozea-project1/index.py - > Line 123: session['id'] = User.query.filter_by(username=username).first().id - File: Kozea-project1/index.py - > Line 121: session['logged_in'] = True -File: Kozea-project1/index.py - > reaches line 124, trigger word "flash(": - flash('Welcome on Kozupload, %s !' % username, 'success') - - - -noise/fortune-redis -https://github.com/noise/fortune-redis -Entry file: fortune-redis/fortune_server.py -Scanned: 2016-10-12 13:19:12.312959 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ipedrazas/surl -https://github.com/ipedrazas/surl -Entry file: surl/shortener.py -Scanned: 2016-10-12 13:19:14.640729 -Vulnerability 1: -File: surl/shortener.py - > User input at line 88, trigger word "form[": - link = request.form['link'] -Reassigned in: - File: surl/shortener.py - > Line 92: url = objects.find_one('link'link) -File: surl/shortener.py - > reaches line 95, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('url'URL + url['url_id']) - -Vulnerability 2: -File: surl/shortener.py - > User input at line 88, trigger word "form[": - link = request.form['link'] -Reassigned in: - File: surl/shortener.py - > Line 92: url = objects.find_one('link'link) -File: surl/shortener.py - > reaches line 97, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('url'URL + short_id(link)) - - - -dash1291/grabset -https://github.com/dash1291/grabset -Entry file: grabset/grabset.py -Scanned: 2016-10-12 13:19:22.020201 -No vulnerabilities found. - - -alexmic/trippin -https://github.com/alexmic/trippin -Entry file: trippin/server.py -Scanned: 2016-10-12 13:19:25.036109 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aquaya/sawyer -https://github.com/aquaya/sawyer -Entry file: sawyer/application/__init__.py -Scanned: 2016-10-12 13:19:35.785832 -No vulnerabilities found. - - -metermaid/thirstybot -https://github.com/metermaid/thirstybot -Entry file: thirstybot/app.py -Scanned: 2016-10-12 13:19:43.821589 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -timney/meblog -https://github.com/timney/meblog -Entry file: meblog/app.py -Scanned: 2016-10-12 13:19:51.008304 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -oxtopus/barkeeper -https://github.com/oxtopus/barkeeper -Entry file: barkeeper/barkeeper/app.py -Scanned: 2016-10-12 13:19:59.748767 -No vulnerabilities found. - - -ngopal/quote_generator -https://github.com/ngopal/quote_generator -Entry file: quote_generator/main.py -Scanned: 2016-10-12 13:20:04.384353 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wesleyk/WhoPaid -https://github.com/wesleyk/WhoPaid -Entry file: WhoPaid/WhoPaid.py -Scanned: 2016-10-12 13:20:09.823973 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smanek/challenge -https://github.com/smanek/challenge -Entry file: challenge/challenge.py -Scanned: 2016-10-12 13:20:15.313877 -No vulnerabilities found. - - -neocxi/coursemonitor -https://github.com/neocxi/coursemonitor -Entry file: coursemonitor/flask/sessions.py -Scanned: 2016-10-12 13:20:25.720493 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alfg/inviteme -https://github.com/alfg/inviteme -Entry file: inviteme/inviteme.py -Scanned: 2016-10-12 13:20:27.064471 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kfigaj/FizzBuzzPro -https://github.com/kfigaj/FizzBuzzPro -Entry file: FizzBuzzPro/FizzBuzzPro/fizzbuzz.py -Scanned: 2016-10-12 13:20:35.347105 -No vulnerabilities found. - - -richardneish/lists -https://github.com/richardneish/lists -Entry file: lists/lists/__init__.py -Scanned: 2016-10-12 13:20:43.658444 -No vulnerabilities found. - - -MalphasWats/pyDimension -https://github.com/MalphasWats/pyDimension -Entry file: pyDimension/pyDimension/__init__.py -Scanned: 2016-10-12 13:20:47.070330 -Vulnerability 1: -File: pyDimension/pyDimension/views.py - > User input at line 43, trigger word "form[": - filename = request.form['filename'] -Reassigned in: - File: pyDimension/pyDimension/views.py - > Line 45: filename = '%s.txt' % safe_title - File: pyDimension/pyDimension/views.py - > Line 48: articleFile = codecs.open('%s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),encoding='utf-8', mode='w') - File: pyDimension/pyDimension/views.py - > Line 59: filename = '%s_%s' % (date, get_safe_filename(request.form['filename'])) - File: pyDimension/pyDimension/views.py - > Line 61: filename = get_safe_filename(request.form['filename']) - File: pyDimension/pyDimension/views.py - > Line 64: filename = '%s_%s.txt' % (date, safe_title) -File: pyDimension/pyDimension/views.py - > reaches line 50, trigger word "flash(": - flash('There was a problem accessing the file %s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),category='error') - -Vulnerability 2: -File: pyDimension/pyDimension/views.py - > User input at line 59, trigger word "form[": - filename = '%s_%s' % (date, get_safe_filename(request.form['filename'])) -Reassigned in: - File: pyDimension/pyDimension/views.py - > Line 43: filename = request.form['filename'] - File: pyDimension/pyDimension/views.py - > Line 45: filename = '%s.txt' % safe_title - File: pyDimension/pyDimension/views.py - > Line 48: articleFile = codecs.open('%s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),encoding='utf-8', mode='w') - File: pyDimension/pyDimension/views.py - > Line 61: filename = get_safe_filename(request.form['filename']) - File: pyDimension/pyDimension/views.py - > Line 64: filename = '%s_%s.txt' % (date, safe_title) -File: pyDimension/pyDimension/views.py - > reaches line 50, trigger word "flash(": - flash('There was a problem accessing the file %s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),category='error') - -Vulnerability 3: -File: pyDimension/pyDimension/views.py - > User input at line 61, trigger word "form[": - filename = get_safe_filename(request.form['filename']) -Reassigned in: - File: pyDimension/pyDimension/views.py - > Line 43: filename = request.form['filename'] - File: pyDimension/pyDimension/views.py - > Line 45: filename = '%s.txt' % safe_title - File: pyDimension/pyDimension/views.py - > Line 48: articleFile = codecs.open('%s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),encoding='utf-8', mode='w') - File: pyDimension/pyDimension/views.py - > Line 59: filename = '%s_%s' % (date, get_safe_filename(request.form['filename'])) - File: pyDimension/pyDimension/views.py - > Line 64: filename = '%s_%s.txt' % (date, safe_title) -File: pyDimension/pyDimension/views.py - > reaches line 50, trigger word "flash(": - flash('There was a problem accessing the file %s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),category='error') - -Vulnerability 4: -File: pyDimension/pyDimension/access_control.py - > User input at line 20, trigger word "form[": - next = request.form['next'] -Reassigned in: - File: pyDimension/pyDimension/access_control.py - > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(url_for('control_panel')) - File: pyDimension/pyDimension/access_control.py - > Line 31: ret_MAYBE_FUNCTION_NAME = render_template('login.html',next=request.args.get('next')) -File: pyDimension/pyDimension/access_control.py - > reaches line 25, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - - - -DanielleSucher/Text-Donation -https://github.com/DanielleSucher/Text-Donation -Entry file: Text-Donation/app.py -Scanned: 2016-10-12 13:20:52.433497 -No vulnerabilities found. - - -flask-restful/flask-restful -https://github.com/flask-restful/flask-restful -Entry file: flask-restful/flask_restful/__init__.py -Scanned: 2016-10-12 13:21:08.123430 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -rozza/flask-tumblelog -https://github.com/rozza/flask-tumblelog -Entry file: flask-tumblelog/tumblelog/__init__.py -Scanned: 2016-10-12 13:21:10.459300 -No vulnerabilities found. - - -lixxu/flask-paginate -https://github.com/lixxu/flask-paginate -Entry file: flask-paginate/example/app.py -Scanned: 2016-10-12 13:21:16.731464 -No vulnerabilities found. - - -e-dard/flask-s3 -https://github.com/e-dard/flask-s3 -Entry file: flask-s3/test_flask_static.py -Scanned: 2016-10-12 13:21:28.427980 -No vulnerabilities found. - - -singingwolfboy/flask-misaka -https://github.com/singingwolfboy/flask-misaka -Entry file: flask-misaka/tests.py -Scanned: 2016-10-12 13:21:48.597468 -No vulnerabilities found. - - -rangermeier/flaskberry -https://github.com/rangermeier/flaskberry -Entry file: flaskberry/flaskberry/__init__.py -Scanned: 2016-10-12 13:22:03.325416 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -magaman384/flask-autocomplete -https://github.com/magaman384/flask-autocomplete -Entry file: flask-autocomplete/tests/test.py -Scanned: 2016-10-12 13:22:16.721238 -No vulnerabilities found. - - -GrexIt/flask-login-oauth2 -https://github.com/GrexIt/flask-login-oauth2 -Entry file: None -Scanned: 2016-10-12 13:22:28.528499 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/GrexIt/flask-login-oauth2. - -kielpedia/flask-sqlalchemy-postgres-heroku-example -https://github.com/kielpedia/flask-sqlalchemy-postgres-heroku-example -Entry file: flask-sqlalchemy-postgres-heroku-example/Flasktest/__init__.py -Scanned: 2016-10-12 13:22:35.018578 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -renstrom/passbook_flask_example -https://github.com/renstrom/passbook_flask_example -Entry file: passbook_flask_example/app.py -Scanned: 2016-10-12 13:22:44.353855 -No vulnerabilities found. - - -teozkr/Flask-Pushrod -https://github.com/teozkr/Flask-Pushrod -Entry file: Flask-Pushrod/examples/pushrodr/step3.py -Scanned: 2016-10-12 13:22:54.442338 -No vulnerabilities found. - - -KaviCorp/flask_pysaml2 -https://github.com/KaviCorp/flask_pysaml2 -Entry file: flask_pysaml2/tests/test_saml.py -Scanned: 2016-10-12 13:23:00.943356 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MostAwesomeDude/flask-holster -https://github.com/MostAwesomeDude/flask-holster -Entry file: flask-holster/test.py -Scanned: 2016-10-12 13:23:06.648868 -No vulnerabilities found. - - -stevenewey/ssedemo -https://github.com/stevenewey/ssedemo -Entry file: ssedemo/sse_server.py -Scanned: 2016-10-12 13:23:22.907803 -No vulnerabilities found. - - -LarryEitel/gsapi -https://github.com/LarryEitel/gsapi -Entry file: gsapi/gsapi/run.py -Scanned: 2016-10-12 13:23:27.129004 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gracedme/flaskblog -https://github.com/gracedme/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-12 13:23:29.222341 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -car34/flasktut -https://github.com/car34/flasktut -Entry file: flasktut/app/__init__.py -Scanned: 2016-10-12 13:23:36.587309 -No vulnerabilities found. - - -Pokom/flasking -https://github.com/Pokom/flasking -Entry file: flasking/flaskr.py -Scanned: 2016-10-12 13:23:48.556240 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasking/venv/lib/python2.7/genericpath.py - -jasonamyers/flaskr -https://github.com/jasonamyers/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 13:23:49.069797 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nirix-old/flaskapp -https://github.com/nirix-old/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-12 13:23:52.578829 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -femmerling/EmeraldBox -https://github.com/femmerling/EmeraldBox -Entry file: EmeraldBox/app/__init__.py -Scanned: 2016-10-12 13:24:07.464481 -No vulnerabilities found. - - -corysandahl/FlaskAPI -https://github.com/corysandahl/FlaskAPI -Entry file: FlaskAPI/ProdAPI.py -Scanned: 2016-10-12 13:24:08.728415 -No vulnerabilities found. - - -pearkes/invite -https://github.com/pearkes/invite -Entry file: invite/app.py -Scanned: 2016-10-12 13:24:12.050691 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MalphasWats/flask-blueprint-loader -https://github.com/MalphasWats/flask-blueprint-loader -Entry file: flask-blueprint-loader/dashboard/dashboard.py -Scanned: 2016-10-12 13:24:24.363949 -No vulnerabilities found. - - -tswast/cryptogram-flask -https://github.com/tswast/cryptogram-flask -Entry file: cryptogram-flask/cryptogram.py -Scanned: 2016-10-12 13:24:29.119141 -No vulnerabilities found. - - -Fibio/flask-mongoset -https://github.com/Fibio/flask-mongoset -Entry file: flask-mongoset/flask_mongoset.py -Scanned: 2016-10-12 13:24:38.110207 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suneel0101/flask-hn -https://github.com/suneel0101/flask-hn -Entry file: flask-hn/app.py -Scanned: 2016-10-12 13:24:45.330288 -No vulnerabilities found. - - -lvidarte/flask-examples -https://github.com/lvidarte/flask-examples -Entry file: flask-examples/minitwit/minitwit.py -Scanned: 2016-10-12 13:24:49.845267 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mstriemer/todo-flask -https://github.com/mstriemer/todo-flask -Entry file: todo-flask/todo.py -Scanned: 2016-10-12 13:24:54.054162 -No vulnerabilities found. - - -tribbettz/flask-microblog -https://github.com/tribbettz/flask-microblog -Entry file: flask-microblog/app/__init__.py -Scanned: 2016-10-12 13:25:02.450867 -No vulnerabilities found. - - -codecool/flask-uploads -https://github.com/codecool/flask-uploads -Entry file: flask-uploads/test-uploads.py -Scanned: 2016-10-12 13:25:12.892028 -No vulnerabilities found. - - -nirix-old/mantid_flask -https://github.com/nirix-old/mantid_flask -Entry file: None -Scanned: 2016-10-12 13:25:25.359928 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nirix-old/mantid_flask. - -DartmouthHackerClub/blitzlistr-flask -https://github.com/DartmouthHackerClub/blitzlistr-flask -Entry file: blitzlistr-flask/app.py -Scanned: 2016-10-12 13:25:29.685293 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -otsuarez/flask-blog -https://github.com/otsuarez/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 13:25:30.219965 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -philwade/flask-presentation -https://github.com/philwade/flask-presentation -Entry file: flask-presentation/code/loop.py -Scanned: 2016-10-12 13:25:38.254344 -No vulnerabilities found. - - -mattdeboard/flask-cloudfront -https://github.com/mattdeboard/flask-cloudfront -Entry file: flask-cloudfront/flask_cloudfront/tests/base.py -Scanned: 2016-10-12 13:25:45.595652 -No vulnerabilities found. - - -apjd/flask-gae -https://github.com/apjd/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-12 13:25:50.129142 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -demitri/DMFlaskTemplate -https://github.com/demitri/DMFlaskTemplate -Entry file: DMFlaskTemplate/myapplication/myapplication/__init__.py -Scanned: 2016-10-12 13:26:03.077933 -No vulnerabilities found. - - -Zanfa/Twilio-SMS-Voting -https://github.com/Zanfa/Twilio-SMS-Voting -Entry file: Twilio-SMS-Voting/server.py -Scanned: 2016-10-12 13:26:10.579397 -No vulnerabilities found. - - -jvoisin/pyste -https://github.com/jvoisin/pyste -Entry file: pyste/flaskr.py -Scanned: 2016-10-12 13:26:12.873364 -Vulnerability 1: -File: pyste/flaskr.py - > User input at line 57, trigger word "form[": - delta = datetime.timedelta(seconds=int(request.form['expiration'])) -Reassigned in: - File: pyste/flaskr.py - > Line 58: expiration = datetime.datetime.now() + delta - File: pyste/flaskr.py - > Line 60: expiration = datetime.datetime(1, 1, 1) -File: pyste/flaskr.py - > reaches line 69, trigger word "execute(": - g.db.execute('INSERT INTO PASTE (id, title, expiration, content) VALUES (?, ?, ?, ?)', (identifier, request.form['title'], expiration, paste)) - -Vulnerability 2: -File: pyste/flaskr.py - > User input at line 62, trigger word "form[": - identifier = hashlib.sha1(request.form['input'] + time.ctime()).hexdigest()[8] -Reassigned in: - File: pyste/flaskr.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('index.html',identifier=identifier, url=request.url) - File: pyste/flaskr.py - > Line 79: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: pyste/flaskr.py - > Line 55: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: pyste/flaskr.py - > reaches line 69, trigger word "execute(": - g.db.execute('INSERT INTO PASTE (id, title, expiration, content) VALUES (?, ?, ?, ?)', (identifier, request.form['title'], expiration, paste)) - -Vulnerability 3: -File: pyste/flaskr.py - > User input at line 63, trigger word "form[": - paste = highlight(request.form['input'], guess_lexer(request.form['input']), HtmlFormatter(linenos='table')) -File: pyste/flaskr.py - > reaches line 69, trigger word "execute(": - g.db.execute('INSERT INTO PASTE (id, title, expiration, content) VALUES (?, ?, ?, ?)', (identifier, request.form['title'], expiration, paste)) - - - -codeanu/flask-login-oauth2 -https://github.com/codeanu/flask-login-oauth2 -Entry file: None -Scanned: 2016-10-12 13:26:25.372040 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codeanu/flask-login-oauth2. - -sclabs/flask.gilgi.org -https://github.com/sclabs/flask.gilgi.org -Entry file: None -Scanned: 2016-10-12 13:26:46.442681 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sclabs/flask.gilgi.org. - -MalphasWats/instruments -https://github.com/MalphasWats/instruments -Entry file: instruments/instruments/__init__.py -Scanned: 2016-10-12 13:26:53.030298 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -msapoz/toothsometreats -https://github.com/msapoz/toothsometreats -Entry file: toothsometreats/toothsome.py -Scanned: 2016-10-12 13:26:55.372450 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -george25c/helloflask -https://github.com/george25c/helloflask -Entry file: helloflask/app.py -Scanned: 2016-10-12 13:27:03.644724 -No vulnerabilities found. - - -nirix/alchemyflask -https://github.com/nirix/alchemyflask -Entry file: alchemyflask/app.py -Scanned: 2016-10-12 13:27:10.909958 -No vulnerabilities found. - - -pwyf/IATI-Implementation-Schedules -https://github.com/pwyf/IATI-Implementation-Schedules -Entry file: IATI-Implementation-Schedules/impschedules/__init__.py -Scanned: 2016-10-12 13:27:17.130121 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sigmavirus24/subscribed -https://github.com/sigmavirus24/subscribed -Entry file: subscribed/subscribed/app.py -Scanned: 2016-10-12 13:27:26.481977 -No vulnerabilities found. - - -gbaldera/todo -https://github.com/gbaldera/todo -Entry file: todo/todo/__init__.py -Scanned: 2016-10-12 13:27:30.264255 -No vulnerabilities found. - - -mgill25/Blog -https://github.com/mgill25/Blog -Entry file: Blog/Blog/__init__.py -Scanned: 2016-10-12 13:27:38.080369 -No vulnerabilities found. - - -hernamesbarbara/NAICS -https://github.com/hernamesbarbara/NAICS -Entry file: NAICS/app.py -Scanned: 2016-10-12 13:27:54.489834 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scwu/Evernote-Blog-Engine -https://github.com/scwu/Evernote-Blog-Engine -Entry file: Evernote-Blog-Engine/blog.py -Scanned: 2016-10-12 13:27:55.783947 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ybz/yaniv_bz -https://github.com/ybz/yaniv_bz -Entry file: yaniv_bz/app.py -Scanned: 2016-10-12 13:28:14.032735 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jul/wsgi_social_experminet -https://github.com/jul/wsgi_social_experminet -Entry file: wsgi_social_experminet/www/socialize.py -Scanned: 2016-10-12 13:28:27.286165 -No vulnerabilities found. - - -bezfeng/skinmd-frontend -https://github.com/bezfeng/skinmd-frontend -Entry file: skinmd-frontend/script_server.py -Scanned: 2016-10-12 13:28:35.890902 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -barosl/photox -https://github.com/barosl/photox -Entry file: photox/photox.py -Scanned: 2016-10-12 13:28:37.217309 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thomasboyt/txtRPG -https://github.com/thomasboyt/txtRPG -Entry file: txtRPG/rpg_app/__init__.py -Scanned: 2016-10-12 13:28:38.471760 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smanek/challenge -https://github.com/smanek/challenge -Entry file: challenge/challenge.py -Scanned: 2016-10-12 13:28:52.408420 -No vulnerabilities found. - - -hacksu/ksu-flash-info -https://github.com/hacksu/ksu-flash-info -Entry file: ksu-flash-info/app.py -Scanned: 2016-10-12 13:28:56.969312 -No vulnerabilities found. - - -adamcharnock/docsite -https://github.com/adamcharnock/docsite -Entry file: docsite/server.py -Scanned: 2016-10-12 13:29:04.208287 -No vulnerabilities found. - - -qnub/cavy -https://github.com/qnub/cavy -Entry file: cavy/project/flask/sessions.py -Scanned: 2016-10-12 13:29:17.606269 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DazWorrall/flask-sse -https://github.com/DazWorrall/flask-sse -Entry file: flask-sse/example/example.py -Scanned: 2016-10-12 13:29:37.578339 -No vulnerabilities found. - - -hobbeswalsh/flask-sillywalk -https://github.com/hobbeswalsh/flask-sillywalk -Entry file: flask-sillywalk/flask_sillywalk/sillywalk.py -Scanned: 2016-10-12 13:29:39.126072 -No vulnerabilities found. - - -twip/flask_twip -https://github.com/twip/flask_twip -Entry file: flask_twip/examples/heroku/app.py -Scanned: 2016-10-12 13:29:47.659278 -No vulnerabilities found. - - -doobeh/Flask-S3-Uploader -https://github.com/doobeh/Flask-S3-Uploader -Entry file: Flask-S3-Uploader/app.py -Scanned: 2016-10-12 13:29:57.502712 -No vulnerabilities found. - - -tzulberti/Flask-PyPi-Proxy -https://github.com/tzulberti/Flask-PyPi-Proxy -Entry file: Flask-PyPi-Proxy/flask_pypi_proxy/app.py -Scanned: 2016-10-12 13:30:13.677935 -No vulnerabilities found. - - -rehandalal/flask-funnel -https://github.com/rehandalal/flask-funnel -Entry file: flask-funnel/flask_funnel/tests/test_funnel.py -Scanned: 2016-10-12 13:30:31.383107 -No vulnerabilities found. - - -rbin/OctoFlask -https://github.com/rbin/OctoFlask -Entry file: OctoFlask/__init__.py -Scanned: 2016-10-12 13:30:33.884427 -No vulnerabilities found. - - -mimming/python-flask-google-api-starter -https://github.com/mimming/python-flask-google-api-starter -Entry file: python-flask-google-api-starter/cal.py -Scanned: 2016-10-12 13:30:38.108452 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MichelleGlauser/Flask -https://github.com/MichelleGlauser/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-12 13:30:47.829311 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tzangms/python-websocket-example -https://github.com/tzangms/python-websocket-example -Entry file: python-websocket-example/app/__init__.py -Scanned: 2016-10-12 13:30:57.550211 -No vulnerabilities found. - - -jakecoffman/flask-bootstrap -https://github.com/jakecoffman/flask-bootstrap -Entry file: flask-bootstrap/flaskr.py -Scanned: 2016-10-12 13:31:05.454313 -No vulnerabilities found. - - -lomatus/flask2sae -https://github.com/lomatus/flask2sae -Entry file: flask2sae/1/app/__init__.py -Scanned: 2016-10-12 13:31:13.920013 -No vulnerabilities found. - - -Roasbeef/FlaskrNews -https://github.com/Roasbeef/FlaskrNews -Entry file: FlaskrNews/libs/flask/sessions.py -Scanned: 2016-10-12 13:31:19.748548 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marksteve/flask-stathat -https://github.com/marksteve/flask-stathat -Entry file: flask-stathat/example.py -Scanned: 2016-10-12 13:31:29.163057 -No vulnerabilities found. - - -byslee3/Flask_Tutorial -https://github.com/byslee3/Flask_Tutorial -Entry file: Flask_Tutorial/flaskr.py -Scanned: 2016-10-12 13:31:33.537966 -No vulnerabilities found. - - -gzb1985/flask-boilerplate -https://github.com/gzb1985/flask-boilerplate -Entry file: flask-boilerplate/flask_boilerplate/__init__.py -Scanned: 2016-10-12 13:31:39.722575 -No vulnerabilities found. - - -scolex/flask-forum -https://github.com/scolex/flask-forum -Entry file: flask-forum/app/__init__.py -Scanned: 2016-10-12 13:31:40.934856 -No vulnerabilities found. - - -bwghughes/flasksse -https://github.com/bwghughes/flasksse -Entry file: flasksse/app.py -Scanned: 2016-10-12 13:31:48.133318 -No vulnerabilities found. - - -soccermetrics/flask-skeleton -https://github.com/soccermetrics/flask-skeleton -Entry file: None -Scanned: 2016-10-12 13:31:57.135181 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/soccermetrics/flask-skeleton. - -kvesteri/flask-jinjahelpers -https://github.com/kvesteri/flask-jinjahelpers -Entry file: flask-jinjahelpers/tests/__init__.py -Scanned: 2016-10-12 13:32:05.471905 -No vulnerabilities found. - - -jmhobbs/redboard -https://github.com/jmhobbs/redboard -Entry file: redboard/src/redboard_server.py -Scanned: 2016-10-12 13:32:13.810791 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kates/flask-mold -https://github.com/kates/flask-mold -Entry file: flask-mold/app.py -Scanned: 2016-10-12 13:32:17.454370 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JanStevens/ArduinoPi-Python -https://github.com/JanStevens/ArduinoPi-Python -Entry file: ArduinoPi-Python/main.py -Scanned: 2016-10-12 13:32:29.802002 -No vulnerabilities found. - - -landakram/microblog -https://github.com/landakram/microblog -Entry file: microblog/app.py -Scanned: 2016-10-12 13:32:34.202474 -No vulnerabilities found. - - -mies/wercker-flask-api -https://github.com/mies/wercker-flask-api -Entry file: wercker-flask-api/app.py -Scanned: 2016-10-12 13:32:39.410707 -No vulnerabilities found. - - -dengmin/base_framework_flask -https://github.com/dengmin/base_framework_flask -Entry file: None -Scanned: 2016-10-12 13:32:41.701117 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dengmin/base_framework_flask. - -tquach/talent-curator -https://github.com/tquach/talent-curator -Entry file: talent-curator/talent_curator/__init__.py -Scanned: 2016-10-12 13:32:53.788810 -No vulnerabilities found. - - -vitalk/flask-mailer -https://github.com/vitalk/flask-mailer -Entry file: flask-mailer/tests/conftest.py -Scanned: 2016-10-12 13:32:55.453309 -No vulnerabilities found. - - -drdaeman/flask-toybox -https://github.com/drdaeman/flask-toybox -Entry file: flask-toybox/tests/test_negotiation.py -Scanned: 2016-10-12 13:32:58.933590 -No vulnerabilities found. - - -lorden/flaskeleton -https://github.com/lorden/flaskeleton -Entry file: flaskeleton/app/__init__.py -Scanned: 2016-10-12 13:33:05.427999 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -daneoshiga/flaskr -https://github.com/daneoshiga/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 13:33:13.973328 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Khady/flaskdotahorrible -https://github.com/Khady/flaskdotahorrible -Entry file: flaskdotahorrible/dota2.py -Scanned: 2016-10-12 13:33:23.762190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Ruke89/FlaskSite -https://github.com/Ruke89/FlaskSite -Entry file: FlaskSite/runServer.py -Scanned: 2016-10-12 13:33:34.737411 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tribbettz/flask-mongo-tumblelog -https://github.com/tribbettz/flask-mongo-tumblelog -Entry file: flask-mongo-tumblelog/app/__init__.py -Scanned: 2016-10-12 13:33:40.530268 -No vulnerabilities found. - - -tobiasandtobias/flask-assetslite -https://github.com/tobiasandtobias/flask-assetslite -Entry file: flask-assetslite/tests/tests.py -Scanned: 2016-10-12 13:33:41.929248 -No vulnerabilities found. - - -zhangcheng/Flask-Sandbox -https://github.com/zhangcheng/Flask-Sandbox -Entry file: Flask-Sandbox/src/app.py -Scanned: 2016-10-12 13:33:49.267220 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kracekumar/flask-apache -https://github.com/kracekumar/flask-apache -Entry file: flask-apache/app.py -Scanned: 2016-10-12 13:33:58.960301 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bcho-archive/flask-bootstrap -https://github.com/bcho-archive/flask-bootstrap -Entry file: flask-bootstrap/origin/app.py -Scanned: 2016-10-12 13:34:06.177263 -No vulnerabilities found. - - -standyro/flask-testbed -https://github.com/standyro/flask-testbed -Entry file: flask-testbed/test.py -Scanned: 2016-10-12 13:34:15.428278 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sfermigier/flask-linktester -https://github.com/sfermigier/flask-linktester -Entry file: flask-linktester/tests/dummy_app.py -Scanned: 2016-10-12 13:34:17.942940 -No vulnerabilities found. - - -mstriemer/todo-flask -https://github.com/mstriemer/todo-flask -Entry file: todo-flask/todo.py -Scanned: 2016-10-12 13:34:41.133211 -No vulnerabilities found. - - -kageurufu/flask-couchdb -https://github.com/kageurufu/flask-couchdb -Entry file: flask-couchdb/example/guestbook.py -Scanned: 2016-10-12 13:34:42.553418 -No vulnerabilities found. - - -jharkins/restful-flask -https://github.com/jharkins/restful-flask -Entry file: restful-flask/rest_ideas.py -Scanned: 2016-10-12 13:34:49.786309 -No vulnerabilities found. - - -yeradis/flask-nanoblog -https://github.com/yeradis/flask-nanoblog -Entry file: flask-nanoblog/nanoblog/__init__.py -Scanned: 2016-10-12 13:34:56.249264 -No vulnerabilities found. - - -lubiana/flask-quotedb -https://github.com/lubiana/flask-quotedb -Entry file: flask-quotedb/app/__init__.py -Scanned: 2016-10-12 13:34:59.479633 -No vulnerabilities found. - - -mercul3s/flask_tutorial -https://github.com/mercul3s/flask_tutorial -Entry file: flask_tutorial/flaskr.py -Scanned: 2016-10-12 13:35:06.752767 -No vulnerabilities found. - - -SAFeSEA/pyEssayAnalyser -https://github.com/SAFeSEA/pyEssayAnalyser -Entry file: pyEssayAnalyser/src/pyEssayAnalyser.py -Scanned: 2016-10-12 13:35:20.438932 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-js-hostname-example -https://github.com/mitsuhiko/flask-js-hostname-example -Entry file: flask-js-hostname-example/testapp.py -Scanned: 2016-10-12 13:35:37.151566 -No vulnerabilities found. - - -proto/flask-simple-blog -https://github.com/proto/flask-simple-blog -Entry file: flask-simple-blog/app.py -Scanned: 2016-10-12 13:35:41.349056 -No vulnerabilities found. - - -colinkahn/flask-redis-browserid -https://github.com/colinkahn/flask-redis-browserid -Entry file: flask-redis-browserid/run.py -Scanned: 2016-10-12 13:35:42.569808 -No vulnerabilities found. - - -pleomax00/flask-mongo-skel -https://github.com/pleomax00/flask-mongo-skel -Entry file: flask-mongo-skel/src/thirdparty/flask/sessions.py -Scanned: 2016-10-12 13:36:03.056853 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iolab12/python_flask_demo -https://github.com/iolab12/python_flask_demo -Entry file: python_flask_demo/todo.py -Scanned: 2016-10-12 13:36:16.828192 -No vulnerabilities found. - - -eneldoserrata/flask-python-dominicana-apps -https://github.com/eneldoserrata/flask-python-dominicana-apps -Entry file: flask-python-dominicana-apps/app/__init__.py -Scanned: 2016-10-12 13:36:19.030930 -No vulnerabilities found. - - -shinderuman/python_flask_helloworld -https://github.com/shinderuman/python_flask_helloworld -Entry file: python_flask_helloworld/app.py -Scanned: 2016-10-12 13:36:35.410503 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python_flask_helloworld/lib/python2.7/genericpath.py - -ilyapuchka/PyObjC-FlaskAdmin -https://github.com/ilyapuchka/PyObjC-FlaskAdmin -Entry file: PyObjC-FlaskAdmin/myadmin/__init__.py -Scanned: 2016-10-12 13:36:37.759284 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tnebel/minitwit -https://github.com/tnebel/minitwit -Entry file: minitwit/minitwit.py -Scanned: 2016-10-12 13:36:56.530186 -No vulnerabilities found. - - -renn999/PyBlogtle -https://github.com/renn999/PyBlogtle -Entry file: None -Scanned: 2016-10-12 13:37:00.814029 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/renn999/PyBlogtle. - -bezfeng/skinmd-frontend -https://github.com/bezfeng/skinmd-frontend -Entry file: skinmd-frontend/script_server.py -Scanned: 2016-10-12 13:37:30.770965 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -orangejulius/jlink -https://github.com/orangejulius/jlink -Entry file: jlink/jlink.py -Scanned: 2016-10-12 13:37:38.036192 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sramana/meetup-photos -https://github.com/sramana/meetup-photos -Entry file: meetup-photos/main.py -Scanned: 2016-10-12 13:37:42.567358 -No vulnerabilities found. - - -DartmouthHackerClub/dnd_search -https://github.com/DartmouthHackerClub/dnd_search -Entry file: dnd_search/app.py -Scanned: 2016-10-12 13:37:43.877160 -No vulnerabilities found. - - -bigsnarfdude/netflix_examples -https://github.com/bigsnarfdude/netflix_examples -Entry file: netflix_examples/flask_hello_world.py -Scanned: 2016-10-12 13:37:50.197722 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kierandarcy/qrimage -https://github.com/kierandarcy/qrimage -Entry file: qrimage/app.py -Scanned: 2016-10-12 13:37:56.533033 -No vulnerabilities found. - - -ekaputra07/poredit -https://github.com/ekaputra07/poredit -Entry file: poredit/poredit/poredit.py -Scanned: 2016-10-12 13:38:01.310990 -No vulnerabilities found. - - -jualvarez/worktracker -https://github.com/jualvarez/worktracker -Entry file: worktracker/worktracker.py -Scanned: 2016-10-12 13:38:08.688458 -Vulnerability 1: -File: worktracker/worktracker.py - > User input at line 146, trigger word "get(": - project = g.db.query(Project).get(id) -Reassigned in: - File: worktracker/worktracker.py - > Line 142: project = None - File: worktracker/worktracker.py - > Line 154: project = Project(request.form['name']) - File: worktracker/worktracker.py - > Line 159: ret_MAYBE_FUNCTION_NAME = render_template('project_show.html',project=project, projects=projects) -File: worktracker/worktracker.py - > reaches line 158, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('%s%d' % (url_for('project_show'), project.id)) - -Vulnerability 2: -File: worktracker/worktracker.py - > User input at line 154, trigger word "form[": - project = Project(request.form['name']) -Reassigned in: - File: worktracker/worktracker.py - > Line 142: project = None - File: worktracker/worktracker.py - > Line 146: project = g.db.query(Project).get(id) - File: worktracker/worktracker.py - > Line 159: ret_MAYBE_FUNCTION_NAME = render_template('project_show.html',project=project, projects=projects) -File: worktracker/worktracker.py - > reaches line 158, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('%s%d' % (url_for('project_show'), project.id)) - -Vulnerability 3: -File: worktracker/worktracker.py - > User input at line 146, trigger word "get(": - project = g.db.query(Project).get(id) -Reassigned in: - File: worktracker/worktracker.py - > Line 142: project = None - File: worktracker/worktracker.py - > Line 154: project = Project(request.form['name']) - File: worktracker/worktracker.py - > Line 159: ret_MAYBE_FUNCTION_NAME = render_template('project_show.html',project=project, projects=projects) -File: worktracker/worktracker.py - > reaches line 158, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect('%s%d' % (url_for('project_show'), project.id)) - -Vulnerability 4: -File: worktracker/worktracker.py - > User input at line 154, trigger word "form[": - project = Project(request.form['name']) -Reassigned in: - File: worktracker/worktracker.py - > Line 142: project = None - File: worktracker/worktracker.py - > Line 146: project = g.db.query(Project).get(id) - File: worktracker/worktracker.py - > Line 159: ret_MAYBE_FUNCTION_NAME = render_template('project_show.html',project=project, projects=projects) -File: worktracker/worktracker.py - > reaches line 158, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect('%s%d' % (url_for('project_show'), project.id)) - - - -rochacon/simple-gapps-group-signup -https://github.com/rochacon/simple-gapps-group-signup -Entry file: simple-gapps-group-signup/app.py -Scanned: 2016-10-12 13:38:17.943142 -No vulnerabilities found. - - -Timothee/Passeplat -https://github.com/Timothee/Passeplat -Entry file: Passeplat/passeplat.py -Scanned: 2016-10-12 13:38:20.287871 -No vulnerabilities found. - - -blazarus/Link-Shortener -https://github.com/blazarus/Link-Shortener -Entry file: Link-Shortener/linkshort/__init__.py -Scanned: 2016-10-12 13:38:31.560362 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cenobites/flask-jsonrpc -https://github.com/cenobites/flask-jsonrpc -Entry file: flask-jsonrpc/run.py -Scanned: 2016-10-12 13:38:45.200719 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -insynchq/flask-googlelogin -https://github.com/insynchq/flask-googlelogin -Entry file: flask-googlelogin/example_offline.py -Scanned: 2016-10-12 13:38:51.180471 -No vulnerabilities found. - - -shea256/flask-app-generator -https://github.com/shea256/flask-app-generator -Entry file: flask-app-generator/resources/basic_app/app.py -Scanned: 2016-10-12 13:38:57.615558 -No vulnerabilities found. - - -albertogg/flask-bootstrap-skel -https://github.com/albertogg/flask-bootstrap-skel -Entry file: flask-bootstrap-skel/application/__init__.py -Scanned: 2016-10-12 13:39:01.603545 -No vulnerabilities found. - - -alecthomas/flask_injector -https://github.com/alecthomas/flask_injector -Entry file: flask_injector/flask_injector_tests.py -Scanned: 2016-10-12 13:39:09.356330 -No vulnerabilities found. - - -ema/flask-moresql -https://github.com/ema/flask-moresql -Entry file: flask-moresql/flask_moresql.py -Scanned: 2016-10-12 13:39:18.775509 -No vulnerabilities found. - - -gregorynicholas/flask-gae_blobstore -https://github.com/gregorynicholas/flask-gae_blobstore -Entry file: flask-gae_blobstore/flask_gae_blobstore_tests.py -Scanned: 2016-10-12 13:39:33.343477 -No vulnerabilities found. - - -icecreammatt/flask-empty -https://github.com/icecreammatt/flask-empty -Entry file: flask-empty/app/__init__.py -Scanned: 2016-10-12 13:39:43.937267 -No vulnerabilities found. - - -david-torres/flask-quickstart -https://github.com/david-torres/flask-quickstart -Entry file: flask-quickstart/application/__init__.py -Scanned: 2016-10-12 13:39:48.038419 -No vulnerabilities found. - - -rahulbot/GV-GetToKnow-flask -https://github.com/rahulbot/GV-GetToKnow-flask -Entry file: GV-GetToKnow-flask/gettoknow.py -Scanned: 2016-10-12 13:39:58.158202 -No vulnerabilities found. - - -oturing/flask-br -https://github.com/oturing/flask-br -Entry file: flask-br/examples/flaskr/flaskr.py -Scanned: 2016-10-12 13:40:02.932922 -No vulnerabilities found. - - -ismaild/flaskr-bdd -https://github.com/ismaild/flaskr-bdd -Entry file: flaskr-bdd/flaskr.py -Scanned: 2016-10-12 13:40:09.235049 -No vulnerabilities found. - - -regadas/flask-tornado-websocket -https://github.com/regadas/flask-tornado-websocket -Entry file: flask-tornado-websocket/app/__init__.py -Scanned: 2016-10-12 13:40:19.567686 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lomatus/flask2sae -https://github.com/lomatus/flask2sae -Entry file: flask2sae/1/app/__init__.py -Scanned: 2016-10-12 13:40:22.003146 -No vulnerabilities found. - - -yaniv-aknin/aknin-flask-skeleton -https://github.com/yaniv-aknin/aknin-flask-skeleton -Entry file: aknin-flask-skeleton/application/app.py -Scanned: 2016-10-12 13:40:47.985078 -No vulnerabilities found. - - -marksteve/flask-stathat -https://github.com/marksteve/flask-stathat -Entry file: flask-stathat/example.py -Scanned: 2016-10-12 13:40:52.308830 -No vulnerabilities found. - - -pengfei-xue/openshift-flask-mongdb -https://github.com/pengfei-xue/openshift-flask-mongdb -Entry file: openshift-flask-mongdb/blog/main.py -Scanned: 2016-10-12 13:40:59.931906 -Vulnerability 1: -File: openshift-flask-mongdb/blog/blueprints/apis/views.py - > User input at line 27, trigger word "get(": - term = request.args.get('term', None) -File: openshift-flask-mongdb/blog/blueprints/apis/views.py - > reaches line 33, trigger word "filter(": - result = list(filter(term.lower() in tag.lower(), set(result))) - - - -ncweinhold/flask-knockout-example -https://github.com/ncweinhold/flask-knockout-example -Entry file: flask-knockout-example/app.py -Scanned: 2016-10-12 13:41:02.180501 -No vulnerabilities found. - - -gkoberger/flask-heroku -https://github.com/gkoberger/flask-heroku -Entry file: flask-heroku/app.py -Scanned: 2016-10-12 13:41:09.886356 -No vulnerabilities found. - - -theho/flask-riak-skeleton -https://github.com/theho/flask-riak-skeleton -Entry file: None -Scanned: 2016-10-12 13:41:20.946708 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/theho/flask-riak-skeleton. - -davirtavares/flask-complexform -https://github.com/davirtavares/flask-complexform -Entry file: flask-complexform/testeflask.py -Scanned: 2016-10-12 13:41:40.132495 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brab/flaskr -https://github.com/brab/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 13:41:42.626186 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lmeunier/flasktodo -https://github.com/lmeunier/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-12 13:41:51.668143 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lqwinters/Flaskr -https://github.com/lqwinters/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-12 13:42:02.367955 -No vulnerabilities found. - - -thermosilla/flaskapp -https://github.com/thermosilla/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-12 13:42:08.875822 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marcus-darden/flask1 -https://github.com/marcus-darden/flask1 -Entry file: flask1/app.py -Scanned: 2016-10-12 13:42:22.585366 -No vulnerabilities found. - - -Alir3z4/flask-microblog-sqlalchemy -https://github.com/Alir3z4/flask-microblog-sqlalchemy -Entry file: flask-microblog-sqlalchemy/app/__init__.py -Scanned: 2016-10-12 13:42:34.326724 -No vulnerabilities found. - - -seansawyer/foh -https://github.com/seansawyer/foh -Entry file: foh/foh/__init__.py -Scanned: 2016-10-12 13:42:40.683688 -No vulnerabilities found. - - -feik/flask-blog -https://github.com/feik/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 13:42:43.222828 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -randallm/whatsthehomework_flask -https://github.com/randallm/whatsthehomework_flask -Entry file: whatsthehomework_flask/wth/__init__.py -Scanned: 2016-10-12 13:42:53.124644 -No vulnerabilities found. - - -robottaway/flask_websocket -https://github.com/robottaway/flask_websocket -Entry file: flask_websocket/app/__init__.py -Scanned: 2016-10-12 13:43:02.829495 -No vulnerabilities found. - - -vladke/flask-blog -https://github.com/vladke/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 13:43:09.383104 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -protunt/flask-blog -https://github.com/protunt/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 13:43:22.452199 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -makotoworld/flask-example -https://github.com/makotoworld/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-12 13:43:33.980359 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikepea/flask_playing -https://github.com/mikepea/flask_playing -Entry file: None -Scanned: 2016-10-12 13:43:41.289941 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mikepea/flask_playing. - -feigner/flask-testbed -https://github.com/feigner/flask-testbed -Entry file: flask-testbed/test.py -Scanned: 2016-10-12 13:43:43.850532 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smileyteresa/flask-blog -https://github.com/smileyteresa/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 13:43:48.389628 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -naot-said/test-flask -https://github.com/naot-said/test-flask -Entry file: test-flask/hello.py -Scanned: 2016-10-12 13:43:53.709265 -No vulnerabilities found. - - -shabda/learning_flask -https://github.com/shabda/learning_flask -Entry file: learning_flask/flaskr/flaskr.py -Scanned: 2016-10-12 13:44:00.011379 -No vulnerabilities found. - - -RainCT/flask-template-with-social -https://github.com/RainCT/flask-template-with-social -Entry file: flask-template-with-social/webapp/__init__.py -Scanned: 2016-10-12 13:44:23.961396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rdmurphy/flask-reservoir-jsonp-wrapper -https://github.com/rdmurphy/flask-reservoir-jsonp-wrapper -Entry file: flask-reservoir-jsonp-wrapper/grabber.py -Scanned: 2016-10-12 13:44:45.213195 -No vulnerabilities found. - - -gagansaini/example-python-flask -https://github.com/gagansaini/example-python-flask -Entry file: example-python-flask/app.py -Scanned: 2016-10-12 13:44:50.281278 -No vulnerabilities found. - - -ncweinhold/flask-code-sharing -https://github.com/ncweinhold/flask-code-sharing -Entry file: flask-code-sharing/pasteapp/__init__.py -Scanned: 2016-10-12 13:44:54.775632 -No vulnerabilities found. - - -iolab12/flask_demo_2 -https://github.com/iolab12/flask_demo_2 -Entry file: flask_demo_2/polls.py -Scanned: 2016-10-12 13:45:03.673385 -No vulnerabilities found. - - -plaes/wirexfers-flask-demo -https://github.com/plaes/wirexfers-flask-demo -Entry file: wirexfers-flask-demo/wirexfers_flask_demo/__init__.py -Scanned: 2016-10-12 13:45:11.003410 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -yeojz/skeleton-bottle-flask -https://github.com/yeojz/skeleton-bottle-flask -Entry file: skeleton-bottle-flask/thirdparty/flask/sessions.py -Scanned: 2016-10-12 13:45:26.656319 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -drawcode/flask-template-basic -https://github.com/drawcode/flask-template-basic -Entry file: flask-template-basic/app/__init__.py -Scanned: 2016-10-12 13:45:27.990834 -Vulnerability 1: -File: flask-template-basic/app/users/views.py - > User input at line 33, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-template-basic/app/users/views.py - > Line 38: session['user_id'] = user.id -File: flask-template-basic/app/users/views.py - > reaches line 39, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -nanorepublica/secret-santa -https://github.com/nanorepublica/secret-santa -Entry file: secret-santa/secret_santa.py -Scanned: 2016-10-12 13:45:36.697018 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ardinor/yamazumi -https://github.com/ardinor/yamazumi -Entry file: yamazumi/yamazumi/__init__.py -Scanned: 2016-10-12 13:45:41.910962 -No vulnerabilities found. - - -seme0021/flaskr-reader -https://github.com/seme0021/flaskr-reader -Entry file: flaskr-reader/app.py -Scanned: 2016-10-12 13:45:46.900635 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vijaym123/FaceDetection-SimpleCVandFlask -https://github.com/vijaym123/FaceDetection-SimpleCVandFlask -Entry file: FaceDetection-SimpleCVandFlask/upload.py -Scanned: 2016-10-12 13:45:54.744315 -No vulnerabilities found. - - -ryanc/mmmpaste -https://github.com/ryanc/mmmpaste -Entry file: mmmpaste/mmmpaste/__init__.py -Scanned: 2016-10-12 13:46:01.527853 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rowandh/pytorrent -https://github.com/rowandh/pytorrent -Entry file: pytorrent/bt/Tracker.py -Scanned: 2016-10-12 13:46:22.817717 -No vulnerabilities found. - - -gatesphere/ptah -https://github.com/gatesphere/ptah -Entry file: ptah/sitebuilder.py -Scanned: 2016-10-12 13:46:28.140704 -No vulnerabilities found. - - -ericevenchick/site -https://github.com/ericevenchick/site -Entry file: site/site.py -Scanned: 2016-10-12 13:46:45.010055 -No vulnerabilities found. - - -wantsomechocolate/PythonWebsite -https://github.com/wantsomechocolate/PythonWebsite -Entry file: PythonWebsite/app.py -Scanned: 2016-10-12 13:46:53.281970 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jineshpaloor/Mysite -https://github.com/jineshpaloor/Mysite -Entry file: Mysite/home.py -Scanned: 2016-10-12 13:46:54.740602 -No vulnerabilities found. - - -schinken/py-powerctrl -https://github.com/schinken/py-powerctrl -Entry file: py-powerctrl/main.py -Scanned: 2016-10-12 13:47:01.478781 -No vulnerabilities found. - - -rudolpho/kazapp -https://github.com/rudolpho/kazapp -Entry file: kazapp/kazapp.py -Scanned: 2016-10-12 13:47:05.519818 -No vulnerabilities found. - - -daleobrien/bootflask -https://github.com/daleobrien/bootflask -Entry file: bootflask/main.py -Scanned: 2016-10-12 13:47:12.270256 -No vulnerabilities found. - - -nerdguy/httpfirmata -https://github.com/nerdguy/httpfirmata -Entry file: httpfirmata/httpfirmata/server.py -Scanned: 2016-10-12 13:47:23.817518 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -anusharanganathan/diskMonitor -https://github.com/anusharanganathan/diskMonitor -Entry file: diskMonitor/webui.py -Scanned: 2016-10-12 13:47:29.168196 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leibatt/forms -https://github.com/leibatt/forms -Entry file: forms/form_serv.py -Scanned: 2016-10-12 13:47:35.498099 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tjstum/isawyou-too -https://github.com/tjstum/isawyou-too -Entry file: isawyou-too/isy/__init__.py -Scanned: 2016-10-12 13:47:43.873754 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Foxboron/FoxBlog -https://github.com/Foxboron/FoxBlog -Entry file: FoxBlog/app/__init__.py -Scanned: 2016-10-12 13:47:54.805667 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbit/uwsgicc -https://github.com/unbit/uwsgicc -Entry file: uwsgicc/uwsgicc.py -Scanned: 2016-10-12 13:47:56.424543 -No vulnerabilities found. - - -jmhobbs/batsdboard -https://github.com/jmhobbs/batsdboard -Entry file: batsdboard/src/batsdboard_server.py -Scanned: 2016-10-12 13:48:01.647280 -No vulnerabilities found. - - -LarryEitel/pyfem -https://github.com/LarryEitel/pyfem -Entry file: pyfem/pyfem/app.py -Scanned: 2016-10-12 13:48:06.576963 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hciudad/webhook_listener -https://github.com/hciudad/webhook_listener -Entry file: webhook_listener/app.py -Scanned: 2016-10-12 13:48:11.785953 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sagnew/secret_santa -https://github.com/sagnew/secret_santa -Entry file: secret_santa/app.py -Scanned: 2016-10-12 13:48:32.936241 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vc4a/vc4a-python-example -https://github.com/vc4a/vc4a-python-example -Entry file: vc4a-python-example/app.py -Scanned: 2016-10-12 13:48:44.635456 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lpolepeddi/intro-to-flask -https://github.com/lpolepeddi/intro-to-flask -Entry file: intro-to-flask/intro_to_flask/__init__.py -Scanned: 2016-10-12 13:48:55.424395 -No vulnerabilities found. - - -miguelgrinberg/microblog -https://github.com/miguelgrinberg/microblog -Entry file: microblog/app/__init__.py -Scanned: 2016-10-12 13:48:57.830594 -No vulnerabilities found. - - -saltycrane/flask-jquery-ajax-example -https://github.com/saltycrane/flask-jquery-ajax-example -Entry file: None -Scanned: 2016-10-12 13:49:02.023053 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example. - -jdiez17/flask-paypal -https://github.com/jdiez17/flask-paypal -Entry file: flask-paypal/app.py -Scanned: 2016-10-12 13:49:05.277442 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-12 13:49:12.678515 -No vulnerabilities found. - - -tarbell-project/tarbell -https://github.com/tarbell-project/tarbell -Entry file: tarbell/tarbell/app.py -Scanned: 2016-10-12 13:49:31.498211 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -trtg/flask_assets_tutorial -https://github.com/trtg/flask_assets_tutorial -Entry file: flask_assets_tutorial/example/__init__.py -Scanned: 2016-10-12 13:49:33.272926 -No vulnerabilities found. - - -allanlei/flask-email -https://github.com/allanlei/flask-email -Entry file: flask-email/tests/__init__.py -Scanned: 2016-10-12 13:49:36.988683 -No vulnerabilities found. - - -maxcnunes/flaskgaedemo -https://github.com/maxcnunes/flaskgaedemo -Entry file: flaskgaedemo/main.py -Scanned: 2016-10-12 13:50:04.505876 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -domenicosolazzo/flask_examples -https://github.com/domenicosolazzo/flask_examples -Entry file: flask_examples/logger_example.py -Scanned: 2016-10-12 13:50:05.868971 -No vulnerabilities found. - - -akostyuk/flask-dbmigrate -https://github.com/akostyuk/flask-dbmigrate -Entry file: flask-dbmigrate/tests.py -Scanned: 2016-10-12 13:50:25.702059 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -50onRed/phillypug-flask -https://github.com/50onRed/phillypug-flask -Entry file: phillypug-flask/phillypug/app.py -Scanned: 2016-10-12 13:50:32.994836 -No vulnerabilities found. - - -booo/flask-gtfs -https://github.com/booo/flask-gtfs -Entry file: None -Scanned: 2016-10-12 13:50:45.840718 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/booo/flask-gtfs. - -Blender3D/Flask-LESS -https://github.com/Blender3D/Flask-LESS -Entry file: Flask-LESS/flask_less.py -Scanned: 2016-10-12 13:50:49.161501 -No vulnerabilities found. - - -sagarrakshe/flaskr -https://github.com/sagarrakshe/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 13:50:54.664985 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hex/flaskr -https://github.com/hex/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 13:50:56.164066 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -faruken/flask-web.py-jvm -https://github.com/faruken/flask-web.py-jvm -Entry file: None -Scanned: 2016-10-12 13:51:05.877306 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/faruken/flask-web.py-jvm. - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-12 13:51:14.524800 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eddawong/FlaskStudy -https://github.com/eddawong/FlaskStudy -Entry file: FlaskStudy/main.py -Scanned: 2016-10-12 13:51:25.811469 -No vulnerabilities found. - - -nerevu/prometheus -https://github.com/nerevu/prometheus -Entry file: prometheus/app/__init__.py -Scanned: 2016-10-12 13:51:36.590628 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -floweb/liensdujour -https://github.com/floweb/liensdujour -Entry file: liensdujour/liensdujour/liensdujour.py -Scanned: 2016-10-12 13:51:38.233468 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -becdot/adventures-in-text -https://github.com/becdot/adventures-in-text -Entry file: adventures-in-text/db_methods.py -Scanned: 2016-10-12 13:51:47.390862 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dirn/Flask-Simon -https://github.com/dirn/Flask-Simon -Entry file: Flask-Simon/examples/flaskr/flaskr.py -Scanned: 2016-10-12 13:51:49.885114 -No vulnerabilities found. - - -parryjacob/flask-boilerplate -https://github.com/parryjacob/flask-boilerplate -Entry file: flask-boilerplate/project/__init__.py -Scanned: 2016-10-12 13:51:56.261210 -No vulnerabilities found. - - -scottdnz/flask_skeleton -https://github.com/scottdnz/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-12 13:51:57.678062 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -protunt/flask-blog -https://github.com/protunt/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 13:52:02.221598 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -jpercent/flask-control -https://github.com/jpercent/flask-control -Entry file: flask-control/example.py -Scanned: 2016-10-12 13:52:06.467372 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -caub/flask-geo -https://github.com/caub/flask-geo -Entry file: flask-geo/myMap.py -Scanned: 2016-10-12 13:52:15.266945 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Ceasar/pocket_flask -https://github.com/Ceasar/pocket_flask -Entry file: pocket_flask/app/__init__.py -Scanned: 2016-10-12 13:52:27.097817 -No vulnerabilities found. - - -masayang/flask_dev -https://github.com/masayang/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-12 13:52:33.710558 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rhyselsmore/flask-modus -https://github.com/rhyselsmore/flask-modus -Entry file: flask-modus/test_flask_modus.py -Scanned: 2016-10-12 13:52:37.996067 -No vulnerabilities found. - - -pavlenko-volodymyr/flask-study -https://github.com/pavlenko-volodymyr/flask-study -Entry file: flask-study/src/app/__init__.py -Scanned: 2016-10-12 13:52:47.258072 -No vulnerabilities found. - - -slizadel/flask-gitrcv -https://github.com/slizadel/flask-gitrcv -Entry file: flask-gitrcv/flask-gitrcv/gitrcv.py -Scanned: 2016-10-12 13:52:50.464100 -No vulnerabilities found. - - -apjd/flask-heroku -https://github.com/apjd/flask-heroku -Entry file: flask-heroku/flasky.py -Scanned: 2016-10-12 13:52:56.731837 -No vulnerabilities found. - - -scardine/flask-locale -https://github.com/scardine/flask-locale -Entry file: flask-locale/tests/__init__.py -Scanned: 2016-10-12 13:52:58.072817 -No vulnerabilities found. - - -CMGS/poll -https://github.com/CMGS/poll -Entry file: poll/app.py -Scanned: 2016-10-12 13:53:11.859555 -No vulnerabilities found. - - -hoh/perfume -https://github.com/hoh/perfume -Entry file: perfume/perfume/__init__.py -Scanned: 2016-10-12 13:53:15.695519 -No vulnerabilities found. - - -alph486/SimpleFlaskAPI -https://github.com/alph486/SimpleFlaskAPI -Entry file: SimpleFlaskAPI/app.py -Scanned: 2016-10-12 13:53:26.959463 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunilJacob/Paint-app-using-Flask -https://github.com/JunilJacob/Paint-app-using-Flask -Entry file: Paint-app-using-Flask/hello.py -Scanned: 2016-10-12 13:53:34.619987 -Vulnerability 1: -File: Paint-app-using-Flask/hello.py - > User input at line 12, trigger word "form[": - name = request.form['pname'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 16: iname = (name) -File: Paint-app-using-Flask/hello.py - > reaches line 18, trigger word "execute(": - c.execute('DELETE FROM Image WHERE file=?', iname) - -Vulnerability 2: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 19, trigger word "execute(": - c.execute('INSERT INTO Image VALUES (?,?)', image) - -Vulnerability 3: -File: Paint-app-using-Flask/hello.py - > User input at line 12, trigger word "form[": - name = request.form['pname'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 16: iname = (name) -File: Paint-app-using-Flask/hello.py - > reaches line 19, trigger word "execute(": - c.execute('INSERT INTO Image VALUES (?,?)', image) - -Vulnerability 4: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 36, trigger word "render_template(": - resp = Response('' + render_template('paint.html'),status=200, mimetype='html') - - - -dimfox/flask-mega-tutorial -https://github.com/dimfox/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-12 13:53:38.868558 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liuxuecheng/python_flask_guestbook -https://github.com/liuxuecheng/python_flask_guestbook -Entry file: python_flask_guestbook/main.py -Scanned: 2016-10-12 13:53:48.144709 -No vulnerabilities found. - - -callahad/temp-flask-persona-demo -https://github.com/callahad/temp-flask-persona-demo -Entry file: temp-flask-persona-demo/example.py -Scanned: 2016-10-12 13:53:57.097975 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshsee/GAE-flask-cms -https://github.com/joshsee/GAE-flask-cms -Entry file: GAE-flask-cms/flask/sessions.py -Scanned: 2016-10-12 13:54:01.495134 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshkurz/exi -https://github.com/joshkurz/exi -Entry file: exi/exi/tests/security/test_app/__init__.py -Scanned: 2016-10-12 13:54:04.828414 -No vulnerabilities found. - - -marsella/andrea -https://github.com/marsella/andrea -Entry file: andrea/init.py -Scanned: 2016-10-12 13:54:20.388868 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py - -ffiiccuuss/torouterui -https://github.com/ffiiccuuss/torouterui -Entry file: torouterui/torouterui/__init__.py -Scanned: 2016-10-12 13:54:28.061837 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thoughtnirvana/redux -https://github.com/thoughtnirvana/redux -Entry file: redux/main.py -Scanned: 2016-10-12 13:54:35.515263 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dogrdon/txtr -https://github.com/dogrdon/txtr -Entry file: txtr/txtr.py -Scanned: 2016-10-12 13:54:44.602440 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -booo/baedproject -https://github.com/booo/baedproject -Entry file: baedproject/app.py -Scanned: 2016-10-12 13:54:48.839661 -No vulnerabilities found. - - -embr/multithon -https://github.com/embr/multithon -Entry file: multithon/multithon.py -Scanned: 2016-10-12 13:54:52.593537 -No vulnerabilities found. - - -skinofstars/monkey -https://github.com/skinofstars/monkey -Entry file: monkey/app.py -Scanned: 2016-10-12 13:54:57.847174 -No vulnerabilities found. - - -zhoutuo/dota2bbq -https://github.com/zhoutuo/dota2bbq -Entry file: dota2bbq/wsgi.py -Scanned: 2016-10-12 13:55:07.124512 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattoufoutu/TrendnetStalker -https://github.com/mattoufoutu/TrendnetStalker -Entry file: TrendnetStalker/TrendnetStalker/__init__.py -Scanned: 2016-10-12 13:55:08.457080 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kalimatas/herokuflask -https://github.com/kalimatas/herokuflask -Entry file: herokuflask/app.py -Scanned: 2016-10-12 13:55:14.674758 -No vulnerabilities found. - - -norbert/helloflask -https://github.com/norbert/helloflask -Entry file: helloflask/app.py -Scanned: 2016-10-12 13:55:16.910689 -No vulnerabilities found. - - -ahawker/jpool -https://github.com/ahawker/jpool -Entry file: None -Scanned: 2016-10-12 13:55:29.077388 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool. - -Pusungwi/lobotomizer -https://github.com/Pusungwi/lobotomizer -Entry file: None -Scanned: 2016-10-12 13:55:34.445606 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pusungwi/lobotomizer. - -perjo927/Portfolio -https://github.com/perjo927/Portfolio -Entry file: Portfolio/server.py -Scanned: 2016-10-12 13:55:43.570832 -No vulnerabilities found. - - -cyrilaub/myMap_python -https://github.com/cyrilaub/myMap_python -Entry file: myMap_python/myMap.py -Scanned: 2016-10-12 13:55:50.225618 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sburns/switchboard -https://github.com/sburns/switchboard -Entry file: switchboard/sample_app.py -Scanned: 2016-10-12 13:55:52.524029 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -takosuke/pizzasuicideclub -https://github.com/takosuke/pizzasuicideclub -Entry file: pizzasuicideclub/psc_app/__init__.py -Scanned: 2016-10-12 13:56:05.567672 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -MaxPresman/tempymail -https://github.com/MaxPresman/tempymail -Entry file: tempymail/flask_frontend.py -Scanned: 2016-10-12 13:56:07.179239 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bogdan-kulynych/cloudlectures -https://github.com/bogdan-kulynych/cloudlectures -Entry file: cloudlectures/flask/sessions.py -Scanned: 2016-10-12 13:56:10.669756 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neilduncan/FlickrPlaceholders -https://github.com/neilduncan/FlickrPlaceholders -Entry file: FlickrPlaceholders/main.py -Scanned: 2016-10-12 13:56:17.367424 -No vulnerabilities found. - - -sysr-q/phi -https://github.com/sysr-q/phi -Entry file: phi/phi/phi.py -Scanned: 2016-10-12 13:56:30.666941 -No vulnerabilities found. - - -DanielleSucher/BookQueue -https://github.com/DanielleSucher/BookQueue -Entry file: BookQueue/app.py -Scanned: 2016-10-12 13:56:35.005309 -Vulnerability 1: -File: BookQueue/app.py - > User input at line 145, trigger word "form[": - from_email = request.form['sender'].lower() -File: BookQueue/app.py - > reaches line 146, trigger word "filter(": - query = User.query.filter(User.email == from_email) - - - -msergdeez/vwcontrol -https://github.com/msergdeez/vwcontrol -Entry file: vwcontrol/vwcontrol.py -Scanned: 2016-10-12 13:56:41.913658 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amaterasu-/placeholder -https://github.com/amaterasu-/placeholder -Entry file: placeholder/image.py -Scanned: 2016-10-12 13:56:50.113250 -No vulnerabilities found. - - -mjhea0/flask-intro -https://github.com/mjhea0/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-12 13:57:11.181347 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikeboers/Flask-Images -https://github.com/mikeboers/Flask-Images -Entry file: Flask-Images/tests/__init__.py -Scanned: 2016-10-12 13:57:13.368099 -No vulnerabilities found. - - -bkabrda/flask-whooshee -https://github.com/bkabrda/flask-whooshee -Entry file: flask-whooshee/test.py -Scanned: 2016-10-12 13:57:16.112110 -No vulnerabilities found. - - -koon-kai/kiblog -https://github.com/koon-kai/kiblog -Entry file: kiblog/app.py -Scanned: 2016-10-12 13:57:29.266217 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -deepgully/me -https://github.com/deepgully/me -Entry file: me/settings.py -Scanned: 2016-10-12 13:57:41.306585 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -berlotto/flask-app-template -https://github.com/berlotto/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-12 13:57:42.663685 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -corydolphin/flask-jsonpify -https://github.com/corydolphin/flask-jsonpify -Entry file: flask-jsonpify/test.py -Scanned: 2016-10-12 13:57:51.079518 -No vulnerabilities found. - - -mickey06/Flask-principal-example -https://github.com/mickey06/Flask-principal-example -Entry file: Flask-principal-example/FPrincipals.py -Scanned: 2016-10-12 13:57:54.505401 -No vulnerabilities found. - - -crazygit/flask -https://github.com/crazygit/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 13:57:59.433515 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -joelrojo/flask -https://github.com/joelrojo/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 13:58:07.301392 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -wingu/flask_filters -https://github.com/wingu/flask_filters -Entry file: flask_filters/test_flask_filters.py -Scanned: 2016-10-12 13:58:18.599340 -No vulnerabilities found. - - -seanrose/box-arcade -https://github.com/seanrose/box-arcade -Entry file: box-arcade/app/__init__.py -Scanned: 2016-10-12 13:58:34.075958 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -techniq/flask-wdb -https://github.com/techniq/flask-wdb -Entry file: flask-wdb/example.py -Scanned: 2016-10-12 13:58:36.998524 -No vulnerabilities found. - - -eadmundo/flask-static-blog -https://github.com/eadmundo/flask-static-blog -Entry file: flask-static-blog/app/__init__.py -Scanned: 2016-10-12 13:58:51.913481 -No vulnerabilities found. - - -BuongiornoMIP/Reding -https://github.com/BuongiornoMIP/Reding -Entry file: Reding/reding/app.py -Scanned: 2016-10-12 13:58:57.051779 -No vulnerabilities found. - - -mphuie/flask_base -https://github.com/mphuie/flask_base -Entry file: flask_base/myapp/__init__.py -Scanned: 2016-10-12 13:59:01.966744 -No vulnerabilities found. - - -colwilson/flask-lazyapi -https://github.com/colwilson/flask-lazyapi -Entry file: flask-lazyapi/demo_server.py -Scanned: 2016-10-12 13:59:08.506139 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asgoel/Merge-flask -https://github.com/asgoel/Merge-flask -Entry file: Merge-flask/app.py -Scanned: 2016-10-12 13:59:16.522055 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xiechao06/Flask-DataBrowser -https://github.com/xiechao06/Flask-DataBrowser -Entry file: Flask-DataBrowser/flask_databrowser/test/basetest.py -Scanned: 2016-10-12 13:59:22.550139 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajuna/car-registration -https://github.com/ajuna/car-registration -Entry file: None -Scanned: 2016-10-12 13:59:23.835577 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ajuna/car-registration. - -gregimba/Vodka -https://github.com/gregimba/Vodka -Entry file: Vodka/app.py -Scanned: 2016-10-12 13:59:31.482769 -No vulnerabilities found. - - -corydolphin/flask-olinauth -https://github.com/corydolphin/flask-olinauth -Entry file: flask-olinauth/example.py -Scanned: 2016-10-12 13:59:52.862278 -No vulnerabilities found. - - -theho/flask-wsgi -https://github.com/theho/flask-wsgi -Entry file: flask-wsgi/wsgi.py -Scanned: 2016-10-12 13:59:56.167444 -No vulnerabilities found. - - -0atman/flask-basic -https://github.com/0atman/flask-basic -Entry file: flask-basic/flask-basic.py -Scanned: 2016-10-12 14:00:08.975947 -No vulnerabilities found. - - -danielestevez/flasktutorial -https://github.com/danielestevez/flasktutorial -Entry file: flasktutorial/app/__init__.py -Scanned: 2016-10-12 14:00:24.371826 -No vulnerabilities found. - - -adityaathalye/flaskr -https://github.com/adityaathalye/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 14:00:29.911883 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -knowshan/flaskey -https://github.com/knowshan/flaskey -Entry file: flaskey/app/__init__.py -Scanned: 2016-10-12 14:00:44.759415 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pityonline/flaskr -https://github.com/pityonline/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 14:00:52.287735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyr/flaskapp -https://github.com/andyr/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-12 14:00:55.809647 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -clmns/flasktest -https://github.com/clmns/flasktest -Entry file: flasktest/nachh/app.py -Scanned: 2016-10-12 14:01:01.239899 -No vulnerabilities found. - - -zfdang/memcached-in-openshift -https://github.com/zfdang/memcached-in-openshift -Entry file: memcached-in-openshift/wsgi/main.py -Scanned: 2016-10-12 14:01:14.199811 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Masagin/FlaskCelery -https://github.com/Masagin/FlaskCelery -Entry file: FlaskCelery/flask.py -Scanned: 2016-10-12 14:01:19.511769 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ConceptPending/flaskTemplate -https://github.com/ConceptPending/flaskTemplate -Entry file: flaskTemplate/server.py -Scanned: 2016-10-12 14:01:27.819418 -No vulnerabilities found. - - -AlexMost/Flask-starter -https://github.com/AlexMost/Flask-starter -Entry file: Flask-starter/app.py -Scanned: 2016-10-12 14:01:37.643195 -No vulnerabilities found. - - -prabeesh/Studentapp-Flask -https://github.com/prabeesh/Studentapp-Flask -Entry file: Studentapp-Flask/test.py -Scanned: 2016-10-12 14:01:44.946614 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garethpaul/flask-sample -https://github.com/garethpaul/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-12 14:01:52.470648 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -denz/flask_introspect -https://github.com/denz/flask_introspect -Entry file: flask_introspect/test/test_blueprint.py -Scanned: 2016-10-12 14:02:01.396127 -No vulnerabilities found. - - -EvilDmitri/flask-mikroblog -https://github.com/EvilDmitri/flask-mikroblog -Entry file: flask-mikroblog/app/__init__.py -Scanned: 2016-10-12 14:02:09.819587 -No vulnerabilities found. - - -ekfriis/flask-mbtiles -https://github.com/ekfriis/flask-mbtiles -Entry file: flask-mbtiles/mbtileserver.py -Scanned: 2016-10-12 14:02:14.113834 -No vulnerabilities found. - - -hyaticua/flask-blog -https://github.com/hyaticua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 14:02:19.713415 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -maxcnunes/flask_bravi -https://github.com/maxcnunes/flask_bravi -Entry file: flask_bravi/braviapp/__init__.py -Scanned: 2016-10-12 14:02:25.218704 -No vulnerabilities found. - - -naveenpremchand02/flask_url -https://github.com/naveenpremchand02/flask_url -Entry file: flask_url/url.py -Scanned: 2016-10-12 14:02:38.010159 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhemao/flask_demo -https://github.com/zhemao/flask_demo -Entry file: flask_demo/application.py -Scanned: 2016-10-12 14:02:57.305603 -No vulnerabilities found. - - -dproni/flask_test -https://github.com/dproni/flask_test -Entry file: flask_test/flask_test.py -Scanned: 2016-10-12 14:03:01.598882 -No vulnerabilities found. - - -thearchduke/flask-boiler -https://github.com/thearchduke/flask-boiler -Entry file: None -Scanned: 2016-10-12 14:03:15.144559 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -StefanKjartansson/bower-flask -https://github.com/StefanKjartansson/bower-flask -Entry file: bower-flask/server.py -Scanned: 2016-10-12 14:03:16.365624 -No vulnerabilities found. - - -scardine/flask-locale -https://github.com/scardine/flask-locale -Entry file: flask-locale/tests/__init__.py -Scanned: 2016-10-12 14:03:20.755631 -No vulnerabilities found. - - -tanayseven/Voix -https://github.com/tanayseven/Voix -Entry file: None -Scanned: 2016-10-12 14:03:31.271274 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gatesphere/flaskr-flask-tutorial -https://github.com/gatesphere/flaskr-flask-tutorial -Entry file: flaskr-flask-tutorial/flaskr/flaskr.py -Scanned: 2016-10-12 14:03:32.657102 -No vulnerabilities found. - - -xiechao06/Flask-NavBar -https://github.com/xiechao06/Flask-NavBar -Entry file: Flask-NavBar/flask_nav_bar.py -Scanned: 2016-10-12 14:03:39.106663 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cpdean/flask-oauth-tutorial -https://github.com/cpdean/flask-oauth-tutorial -Entry file: flask-oauth-tutorial/flaskr.py -Scanned: 2016-10-12 14:03:45.464058 -No vulnerabilities found. - - -SalemHarrache-Archive/flask_chat_eventsource -https://github.com/SalemHarrache-Archive/flask_chat_eventsource -Entry file: flask_chat_eventsource/server.py -Scanned: 2016-10-12 14:03:54.805228 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nsfyn55/flask-mega-tutorial -https://github.com/nsfyn55/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-12 14:03:57.384359 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -callahad/temp-flask-persona-demo -https://github.com/callahad/temp-flask-persona-demo -Entry file: temp-flask-persona-demo/example.py -Scanned: 2016-10-12 14:04:00.879160 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kishorekdty/paint_using_flask -https://github.com/kishorekdty/paint_using_flask -Entry file: None -Scanned: 2016-10-12 14:04:10.199020 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kishorekdty/paint_using_flask. - -bazerk/baz-flask-base -https://github.com/bazerk/baz-flask-base -Entry file: baz-flask-base/app/app.py -Scanned: 2016-10-12 14:04:17.156305 -Vulnerability 1: -File: baz-flask-base/app/frontend/views.py - > User input at line 48, trigger word "get(": - form = LoginForm(login=request.args.get('login', None), next=request.args.get('next', None)) -Reassigned in: - File: baz-flask-base/app/frontend/views.py - > Line 52: user = User.authenticate(form.login.data, form.password.data, bcrypt.check_password_hash) - File: baz-flask-base/app/frontend/views.py - > Line 57: session['user_id'] = user.id - File: baz-flask-base/app/frontend/views.py - > Line 65: ret_MAYBE_FUNCTION_NAME = render_template('frontend/login.html',form=form) -File: baz-flask-base/app/frontend/views.py - > reaches line 61, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('') - -Vulnerability 2: -File: baz-flask-base/app/frontend/views.py - > User input at line 52, trigger word ".data": - user = User.authenticate(form.login.data, form.password.data, bcrypt.check_password_hash) -Reassigned in: - File: baz-flask-base/app/frontend/views.py - > Line 57: session['user_id'] = user.id -File: baz-flask-base/app/frontend/views.py - > reaches line 61, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('') - - - -ryanolson/flask-couchdb-schematics -https://github.com/ryanolson/flask-couchdb-schematics -Entry file: flask-couchdb-schematics/example/guestbook.py -Scanned: 2016-10-12 14:04:21.776661 -No vulnerabilities found. - - -pouyan-ghasemi/flask-sql-cms -https://github.com/pouyan-ghasemi/flask-sql-cms -Entry file: flask-sql-cms/app.py -Scanned: 2016-10-12 14:04:33.980272 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshsee/GAE-flask-cms -https://github.com/joshsee/GAE-flask-cms -Entry file: GAE-flask-cms/flask/sessions.py -Scanned: 2016-10-12 14:04:34.524232 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rasheedh/Heroku-Paint-Using-Flask -https://github.com/rasheedh/Heroku-Paint-Using-Flask -Entry file: None -Scanned: 2016-10-12 14:04:39.782075 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Heroku-Paint-Using-Flask. - -Andrey-Khobnya/flask-sessions-mongo -https://github.com/Andrey-Khobnya/flask-sessions-mongo -Entry file: flask-sessions-mongo/flask-sessions-mongo/examples/loginsession.py -Scanned: 2016-10-12 14:04:46.076094 -No vulnerabilities found. - - -rodreegez/flask-twitter-auth -https://github.com/rodreegez/flask-twitter-auth -Entry file: None -Scanned: 2016-10-12 14:04:58.955568 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rodreegez/flask-twitter-auth. - -texuf/myflaskproject -https://github.com/texuf/myflaskproject -Entry file: myflaskproject/hello.py -Scanned: 2016-10-12 14:05:02.267423 -No vulnerabilities found. - - -kshitizrimal/flaskr-modified -https://github.com/kshitizrimal/flaskr-modified -Entry file: flaskr-modified/flaskr.py -Scanned: 2016-10-12 14:05:14.763481 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sreekanthkaralmanna/heroku-paint-app-using-flask -https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask -Entry file: None -Scanned: 2016-10-12 14:05:26.093791 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask. - -prasanthkumara/Heroku-Paint-App-Using--Flask -https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask -Entry file: None -Scanned: 2016-10-12 14:05:35.474076 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask. - -pyxze/PyxzeCorpus -https://github.com/pyxze/PyxzeCorpus -Entry file: PyxzeCorpus/corpus.py -Scanned: 2016-10-12 14:05:40.772630 -No vulnerabilities found. - - -mikewallace1979/milk -https://github.com/mikewallace1979/milk -Entry file: milk/milk.py -Scanned: 2016-10-12 14:05:47.165348 -No vulnerabilities found. - - -ariamoraine/kitten-generator -https://github.com/ariamoraine/kitten-generator -Entry file: kitten-generator/flaskhello.py -Scanned: 2016-10-12 14:05:55.473987 -No vulnerabilities found. - - -goonpug/goonpug-stats -https://github.com/goonpug/goonpug-stats -Entry file: goonpug-stats/goonpug/__init__.py -Scanned: 2016-10-12 14:06:00.884202 -No vulnerabilities found. - - -csesoc/bark-core -https://github.com/csesoc/bark-core -Entry file: bark-core/bark/__init__.py -Scanned: 2016-10-12 14:06:03.931092 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crcsmnky/thehotspot -https://github.com/crcsmnky/thehotspot -Entry file: thehotspot/v2/app.py -Scanned: 2016-10-12 14:06:11.985896 -No vulnerabilities found. - - -etscrivner/sovereign-states -https://github.com/etscrivner/sovereign-states -Entry file: sovereign-states/sovereign_states/api.py -Scanned: 2016-10-12 14:06:17.428656 -No vulnerabilities found. - - -croach/cheap-and-scalable-webistes-with-flask-code -https://github.com/croach/cheap-and-scalable-webistes-with-flask-code -Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py -Scanned: 2016-10-12 14:06:21.779113 -No vulnerabilities found. - - -sreedathns/paint-app-using-heroku-and-flask -https://github.com/sreedathns/paint-app-using-heroku-and-flask -Entry file: None -Scanned: 2016-10-12 14:06:25.990895 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreedathns/paint-app-using-heroku-and-flask. - -nesv/cask -https://github.com/nesv/cask -Entry file: None -Scanned: 2016-10-12 14:06:36.490663 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask. - -igrishaev/youtube-python-api-sample -https://github.com/igrishaev/youtube-python-api-sample -Entry file: youtube-python-api-sample/app.py -Scanned: 2016-10-12 14:06:43.732209 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chadgh/chessy -https://github.com/chadgh/chessy -Entry file: None -Scanned: 2016-10-12 14:06:51.277068 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lee212/fg-ws -https://github.com/lee212/fg-ws -Entry file: fg-ws/fgws/ws/FGWSApps.py -Scanned: 2016-10-12 14:06:55.601786 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simplyluke/dothis -https://github.com/simplyluke/dothis -Entry file: dothis/dothis.py -Scanned: 2016-10-12 14:07:03.414136 -No vulnerabilities found. - - -fusic-com/flask-todo -https://github.com/fusic-com/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-12 14:07:18.660308 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kljensen/async-flask-sqlalchemy-example -https://github.com/kljensen/async-flask-sqlalchemy-example -Entry file: async-flask-sqlalchemy-example/server.py -Scanned: 2016-10-12 14:07:21.978036 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fusic-com/flask-webcache -https://github.com/fusic-com/flask-webcache -Entry file: flask-webcache/contrib/sleepycalc/app.py -Scanned: 2016-10-12 14:07:26.379245 -No vulnerabilities found. - - -rehandalal/flask-mobility -https://github.com/rehandalal/flask-mobility -Entry file: flask-mobility/flask_mobility/tests/test_decorators.py -Scanned: 2016-10-12 14:07:37.048211 -Vulnerability 1: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 46, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 48, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 2: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 46, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 51, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'off') - -Vulnerability 3: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 67, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 69, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 4: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 67, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 72, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'off') - -Vulnerability 5: -File: flask-mobility/flask_mobility/tests/test_mobility.py - > User input at line 33, trigger word "get(": - MOBILE_COOKIE = self.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_mobility.py - > reaches line 36, trigger word "set_cookie(": - self.app.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 6: -File: flask-mobility/flask_mobility/tests/test_mobility.py - > User input at line 33, trigger word "get(": - MOBILE_COOKIE = self.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_mobility.py - > reaches line 40, trigger word "set_cookie(": - self.app.set_cookie('localhost', MOBILE_COOKIE, 'off') - - - -kelp404/Flask-GAE -https://github.com/kelp404/Flask-GAE -Entry file: None -Scanned: 2016-10-12 14:07:44.772996 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wbolster/flask-uuid -https://github.com/wbolster/flask-uuid -Entry file: flask-uuid/test_flask_uuid.py -Scanned: 2016-10-12 14:07:57.135328 -No vulnerabilities found. - - -pyr/url-shortener -https://github.com/pyr/url-shortener -Entry file: url-shortener/url_shortener.py -Scanned: 2016-10-12 14:08:03.133113 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danielholmstrom/flask-alchemyview -https://github.com/danielholmstrom/flask-alchemyview -Entry file: flask-alchemyview/tests/test_with_flask_sqlalchemy.py -Scanned: 2016-10-12 14:08:13.061182 -No vulnerabilities found. - - -kommmy/Flask -https://github.com/kommmy/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-12 14:08:17.585202 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DavidWittman/csrgenerator.com -https://github.com/DavidWittman/csrgenerator.com -Entry file: None -Scanned: 2016-10-12 14:08:23.202910 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/DavidWittman/csrgenerator.com. - -vovantics/flask-bluebone -https://github.com/vovantics/flask-bluebone -Entry file: flask-bluebone/app/app.py -Scanned: 2016-10-12 14:08:26.893467 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -vmi356/filemanager -https://github.com/vmi356/filemanager -Entry file: filemanager/manager.py -Scanned: 2016-10-12 14:08:38.272180 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaysonsantos/jinja-assets-compressor -https://github.com/jaysonsantos/jinja-assets-compressor -Entry file: jinja-assets-compressor/jac/contrib/flask.py -Scanned: 2016-10-12 14:08:57.153282 -No vulnerabilities found. - - -1000ch/flask-handson -https://github.com/1000ch/flask-handson -Entry file: flask-handson/flaskr/__init__.py -Scanned: 2016-10-12 14:09:00.563973 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajuna/car-registration -https://github.com/ajuna/car-registration -Entry file: None -Scanned: 2016-10-12 14:09:04.061809 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ajuna/car-registration. - -cratejoy/flask-experiment -https://github.com/cratejoy/flask-experiment -Entry file: flask-experiment/test/test.py -Scanned: 2016-10-12 14:09:23.785358 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rbika/flaskm -https://github.com/rbika/flaskm -Entry file: flaskm/flaskm.py -Scanned: 2016-10-12 14:09:27.311048 -No vulnerabilities found. - - -jishnujagajeeve/Flaskr -https://github.com/jishnujagajeeve/Flaskr -Entry file: Flaskr/app.py -Scanned: 2016-10-12 14:09:37.664353 -No vulnerabilities found. - - -openfree/flaskr -https://github.com/openfree/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 14:09:41.193216 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -catfive/flaskr -https://github.com/catfive/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 14:09:47.740620 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Basher51/Flaskr -https://github.com/Basher51/Flaskr -Entry file: Flaskr/app.py -Scanned: 2016-10-12 14:09:57.065365 -No vulnerabilities found. - - -nabetama/flaskr -https://github.com/nabetama/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 14:10:00.564179 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikedll/flasksqlitedemo -https://github.com/mikedll/flasksqlitedemo -Entry file: flasksqlitedemo/app.py -Scanned: 2016-10-12 14:10:09.420506 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sagnew/Prank-Roulette -https://github.com/sagnew/Prank-Roulette -Entry file: Prank-Roulette/app.py -Scanned: 2016-10-12 14:10:19.439521 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kaste/FlaskDeferredHandler -https://github.com/kaste/FlaskDeferredHandler -Entry file: FlaskDeferredHandler/flask_handler_test.py -Scanned: 2016-10-12 14:10:20.754539 -No vulnerabilities found. - - -adityaathalye/flaskr2 -https://github.com/adityaathalye/flaskr2 -Entry file: flaskr2/app.py -Scanned: 2016-10-12 14:10:24.038789 -No vulnerabilities found. - - -jpscaletti/authcode -https://github.com/jpscaletti/authcode -Entry file: authcode/examples/default/app.py -Scanned: 2016-10-12 14:10:31.152460 -No vulnerabilities found. - - -abulte/flask-arduino-websocket-sqlite -https://github.com/abulte/flask-arduino-websocket-sqlite -Entry file: flask-arduino-websocket-sqlite/app.py -Scanned: 2016-10-12 14:10:38.635020 -No vulnerabilities found. - - -edouardswiac/linkstash-flask -https://github.com/edouardswiac/linkstash-flask -Entry file: linkstash-flask/app.py -Scanned: 2016-10-12 14:11:01.459969 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samgclarke/flask-microblog -https://github.com/samgclarke/flask-microblog -Entry file: flask-microblog/app/__init__.py -Scanned: 2016-10-12 14:11:14.414431 -No vulnerabilities found. - - -GerardoGR/flask-boilerplate -https://github.com/GerardoGR/flask-boilerplate -Entry file: flask-boilerplate/appname/appname/__init__.py -Scanned: 2016-10-12 14:11:21.737656 -No vulnerabilities found. - - -futuregrid/flask_cm -https://github.com/futuregrid/flask_cm -Entry file: flask_cm/examples/forms/app.py -Scanned: 2016-10-12 14:11:30.418500 -No vulnerabilities found. - - -shunyata/flask-helloworld -https://github.com/shunyata/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-12 14:11:38.780791 -No vulnerabilities found. - - -stephen-allison/basic-flask -https://github.com/stephen-allison/basic-flask -Entry file: None -Scanned: 2016-10-12 14:11:43.179853 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/stephen-allison/basic-flask. - -bollwyvl/flask-reloaded -https://github.com/bollwyvl/flask-reloaded -Entry file: None -Scanned: 2016-10-12 14:11:50.594946 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bollwyvl/flask-reloaded. - -mies/flask-heroku -https://github.com/mies/flask-heroku -Entry file: flask-heroku/main.py -Scanned: 2016-10-12 14:11:58.907363 -No vulnerabilities found. - - -mattolsen1/flask_tumblelog -https://github.com/mattolsen1/flask_tumblelog -Entry file: flask_tumblelog/tumblelog/__init__.py -Scanned: 2016-10-12 14:12:02.378413 -No vulnerabilities found. - - -jonomillin/learning-flask -https://github.com/jonomillin/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-12 14:12:11.364609 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kitanata/flask-demo -https://github.com/kitanata/flask-demo -Entry file: flask-demo/part3.py -Scanned: 2016-10-12 14:12:14.715784 -No vulnerabilities found. - - -rahulthrissur/Flask_app -https://github.com/rahulthrissur/Flask_app -Entry file: Flask_app/test.py -Scanned: 2016-10-12 14:12:22.041835 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DanAlbert/flask-guestbook -https://github.com/DanAlbert/flask-guestbook -Entry file: flask-guestbook/guestbook.py -Scanned: 2016-10-12 14:12:25.354179 -No vulnerabilities found. - - -toastercup/flask-social -https://github.com/toastercup/flask-social -Entry file: flask-social/social/__init__.py -Scanned: 2016-10-12 14:12:39.682272 -No vulnerabilities found. - - -mozillazg/flask-demo -https://github.com/mozillazg/flask-demo -Entry file: None -Scanned: 2016-10-12 14:12:44.211471 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mozillazg/flask-demo. - -nthfloor/Flask_learn -https://github.com/nthfloor/Flask_learn -Entry file: Flask_learn/login_system/flskr.py -Scanned: 2016-10-12 14:12:56.373798 -No vulnerabilities found. - - -kirkeby/empty-flask -https://github.com/kirkeby/empty-flask -Entry file: empty-flask/app/app.py -Scanned: 2016-10-12 14:12:59.855990 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flyingsparx/MongoFlask -https://github.com/flyingsparx/MongoFlask -Entry file: MongoFlask/application.py -Scanned: 2016-10-12 14:13:03.174718 -No vulnerabilities found. - - -berlotto/hero-flask -https://github.com/berlotto/hero-flask -Entry file: hero-flask/hero/__init__.py -Scanned: 2016-10-12 14:13:08.497694 -No vulnerabilities found. - - -hoest/flask-bardienst -https://github.com/hoest/flask-bardienst -Entry file: flask-bardienst/bardienst/__init__.py -Scanned: 2016-10-12 14:13:14.810387 -No vulnerabilities found. - - -rehandalal/buchner -https://github.com/rehandalal/buchner -Entry file: buchner/buchner/project-template/PROJECTMODULE/main.py -Scanned: 2016-10-12 14:13:27.977167 -No vulnerabilities found. - - -vitalk/flask-staticutils -https://github.com/vitalk/flask-staticutils -Entry file: flask-staticutils/tests/test_app/__init__.py -Scanned: 2016-10-12 14:13:29.396898 -No vulnerabilities found. - - -danillosouza/flask-boilerplate -https://github.com/danillosouza/flask-boilerplate -Entry file: flask-boilerplate/app/__init__.py -Scanned: 2016-10-12 14:13:39.950983 -Vulnerability 1: -File: flask-boilerplate/app/users/views.py - > User input at line 36, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-boilerplate/app/users/views.py - > Line 41: session['user_id'] = user.id -File: flask-boilerplate/app/users/views.py - > reaches line 42, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -dogrdon/flask-map -https://github.com/dogrdon/flask-map -Entry file: None -Scanned: 2016-10-12 14:13:48.960781 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chiwong/flask_quickstart -https://github.com/chiwong/flask_quickstart -Entry file: flask_quickstart/hello.py -Scanned: 2016-10-12 14:13:55.533246 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_quickstart/venv_hello/lib/python2.6/genericpath.py - -archieyang/flask_app -https://github.com/archieyang/flask_app -Entry file: flask_app/flask_app.py -Scanned: 2016-10-12 14:14:04.279892 -Vulnerability 1: -File: flask_app/flask_app.py - > User input at line 50, trigger word "form[": - secured_pwd = secure_hash(salt, request.form['password']) -File: flask_app/flask_app.py - > reaches line 52, trigger word "execute(": - g.db.execute('insert into users ( username, salt, password ) values (?, ?, ?)', [request.form['username'], salt, secured_pwd]) - - - -sapid/Flask-Community -https://github.com/sapid/Flask-Community -Entry file: None -Scanned: 2016-10-12 14:14:06.412066 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sapid/Flask-Community. - -eudaimonious/HangmanWebsite -https://github.com/eudaimonious/HangmanWebsite -Entry file: HangmanWebsite/application_hangman.py -Scanned: 2016-10-12 14:14:18.660263 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -grimkeke/miniblog -https://github.com/grimkeke/miniblog -Entry file: miniblog/app/__init__.py -Scanned: 2016-10-12 14:14:23.783419 -No vulnerabilities found. - - -bracken1983/flaskBlogDemo -https://github.com/bracken1983/flaskBlogDemo -Entry file: flaskBlogDemo/flask-sqlalchemy-test.py -Scanned: 2016-10-12 14:14:33.242977 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mmcgahan/flask-labs-bb -https://github.com/mmcgahan/flask-labs-bb -Entry file: flask-labs-bb/flask_labs/__init__.py -Scanned: 2016-10-12 14:14:37.839789 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jaseemkp/flask-students-app -https://github.com/jaseemkp/flask-students-app -Entry file: flask-students-app/students.py -Scanned: 2016-10-12 14:14:44.655092 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -daisuzu/flask-app-sample -https://github.com/daisuzu/flask-app-sample -Entry file: flask-app-sample/db.py -Scanned: 2016-10-12 14:14:51.969177 -No vulnerabilities found. - - -rasheedh/Paint-Using-Flask---Mongodb- -https://github.com/rasheedh/Paint-Using-Flask---Mongodb- -Entry file: None -Scanned: 2016-10-12 14:15:01.445379 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Paint-Using-Flask---Mongodb-. - -ipfans/openshift-flask-template -https://github.com/ipfans/openshift-flask-template -Entry file: openshift-flask-template/wsgi/mainapp.py -Scanned: 2016-10-12 14:15:05.922820 -No vulnerabilities found. - - -minhtuev/flask-google-map-example -https://github.com/minhtuev/flask-google-map-example -Entry file: flask-google-map-example/server.py -Scanned: 2016-10-12 14:15:09.220508 -No vulnerabilities found. - - -garbados/flask-the-gauntlet -https://github.com/garbados/flask-the-gauntlet -Entry file: flask-the-gauntlet/app.py -Scanned: 2016-10-12 14:15:15.524905 -No vulnerabilities found. - - -penpyt/flask-couchdb-auth -https://github.com/penpyt/flask-couchdb-auth -Entry file: flask-couchdb-auth/example/guestbook.py -Scanned: 2016-10-12 14:15:26.548677 -No vulnerabilities found. - - -rodreegez/flask-twitter-auth -https://github.com/rodreegez/flask-twitter-auth -Entry file: None -Scanned: 2016-10-12 14:15:34.055573 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rodreegez/flask-twitter-auth. - -DamnedFacts/flask-hello-world -https://github.com/DamnedFacts/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-12 14:15:39.677582 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -pinchsoft/flask-newrelic-dotcloud -https://github.com/pinchsoft/flask-newrelic-dotcloud -Entry file: flask-newrelic-dotcloud/app.py -Scanned: 2016-10-12 14:15:44.980232 -No vulnerabilities found. - - -NoxDineen/microblog -https://github.com/NoxDineen/microblog -Entry file: microblog/app/__init__.py -Scanned: 2016-10-12 14:16:00.883788 -No vulnerabilities found. - - -PurplePilot/zanzeeba -https://github.com/PurplePilot/zanzeeba -Entry file: zanzeeba/appstd.py -Scanned: 2016-10-12 14:16:11.809248 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pitxon/sivir -https://github.com/Pitxon/sivir -Entry file: sivir/app.py -Scanned: 2016-10-12 14:16:13.113657 -No vulnerabilities found. - - -philangist/url-shorten -https://github.com/philangist/url-shorten -Entry file: url-shorten/shorten.py -Scanned: 2016-10-12 14:16:16.528591 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fabionatali/DigiWebStats -https://github.com/fabionatali/DigiWebStats -Entry file: DigiWebStats/app.py -Scanned: 2016-10-12 14:16:25.182827 -No vulnerabilities found. - - -confessin/addressbook -https://github.com/confessin/addressbook -Entry file: addressbook/addressbook.py -Scanned: 2016-10-12 14:16:26.488498 -No vulnerabilities found. - - -nafur/flmpc -https://github.com/nafur/flmpc -Entry file: flmpc/main.py -Scanned: 2016-10-12 14:16:35.959709 -No vulnerabilities found. - - -ariamoraine/kitten-generator -https://github.com/ariamoraine/kitten-generator -Entry file: kitten-generator/flaskhello.py -Scanned: 2016-10-12 14:16:41.298150 -No vulnerabilities found. - - -hit9/flask-sign-in-with-github.py -https://github.com/hit9/flask-sign-in-with-github.py -Entry file: None -Scanned: 2016-10-12 14:16:45.597744 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hit9/flask-sign-in-with-github.py. - -Kaibin/Condom_Data_Server -https://github.com/Kaibin/Condom_Data_Server -Entry file: Condom_Data_Server/app.py -Scanned: 2016-10-12 14:16:53.029816 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -honestappalachia/honest_site -https://github.com/honestappalachia/honest_site -Entry file: honest_site/run.py -Scanned: 2016-10-12 14:17:01.442880 -Vulnerability 1: -File: honest_site/run.py - > User input at line 36, trigger word "get(": - template = page.meta.get('template', 'default.html') -File: honest_site/run.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,page=page) - - - -daikeshi/one-dollar-metasearch-engine -https://github.com/daikeshi/one-dollar-metasearch-engine -Entry file: one-dollar-metasearch-engine/app/__init__.py -Scanned: 2016-10-12 14:17:10.643261 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -honestappalachia/honest_hiddenservice -https://github.com/honestappalachia/honest_hiddenservice -Entry file: honest_hiddenservice/run.py -Scanned: 2016-10-12 14:17:17.215458 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattupstate/flask-social -https://github.com/mattupstate/flask-social -Entry file: flask-social/tests/test_app/__init__.py -Scanned: 2016-10-12 14:17:28.193815 -No vulnerabilities found. - - -xiyoulaoyuanjia/flaskapp -https://github.com/xiyoulaoyuanjia/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-12 14:17:35.720956 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattupstate/flask-jsonschema -https://github.com/mattupstate/flask-jsonschema -Entry file: flask-jsonschema/tests.py -Scanned: 2016-10-12 14:17:42.085778 -No vulnerabilities found. - - -jawr/flask-contact -https://github.com/jawr/flask-contact -Entry file: flask-contact/main.py -Scanned: 2016-10-12 14:17:46.475497 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -trustrachel/Flask-FeatureFlags -https://github.com/trustrachel/Flask-FeatureFlags -Entry file: Flask-FeatureFlags/tests/fixtures.py -Scanned: 2016-10-12 14:17:54.259278 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -rahulkmr/flask-bigapp-template -https://github.com/rahulkmr/flask-bigapp-template -Entry file: flask-bigapp-template/main.py -Scanned: 2016-10-12 14:18:02.355204 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -whtsky/Flask-WeRoBot -https://github.com/whtsky/Flask-WeRoBot -Entry file: Flask-WeRoBot/flask_werobot.py -Scanned: 2016-10-12 14:18:07.817573 -No vulnerabilities found. - - -kienpham2000/airbrake-flask -https://github.com/kienpham2000/airbrake-flask -Entry file: airbrake-flask/setup.py -Scanned: 2016-10-12 14:18:14.376667 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stef/flask-tlsauth -https://github.com/stef/flask-tlsauth -Entry file: flask-tlsauth/demo/webapp.py -Scanned: 2016-10-12 14:18:16.690910 -No vulnerabilities found. - - -OpenTechSchool/python-flask-code -https://github.com/OpenTechSchool/python-flask-code -Entry file: python-flask-code/core/files-templates/catseverywhere.py -Scanned: 2016-10-12 14:18:26.048684 -No vulnerabilities found. - - -aahluwal/flask -https://github.com/aahluwal/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 14:18:36.443439 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -kennethreitz/elephant -https://github.com/kennethreitz/elephant -Entry file: elephant/elephant.py -Scanned: 2016-10-12 14:18:43.004086 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rollbar/rollbar-flask-example -https://github.com/rollbar/rollbar-flask-example -Entry file: rollbar-flask-example/hello.py -Scanned: 2016-10-12 14:18:47.344037 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lqez/flasky -https://github.com/lqez/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-12 14:18:53.897501 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -florapdx/My-Blog -https://github.com/florapdx/My-Blog -Entry file: My-Blog/sitebuilder.py -Scanned: 2016-10-12 14:19:13.175715 -No vulnerabilities found. - - -clef/sample-flask -https://github.com/clef/sample-flask -Entry file: sample-flask/app.py -Scanned: 2016-10-12 14:19:14.599813 -No vulnerabilities found. - - -Jd007/flask-rest -https://github.com/Jd007/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-12 14:19:25.629617 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simonvc/rover-wasd-server -https://github.com/simonvc/rover-wasd-server -Entry file: rover-wasd-server/wasd_server.py -Scanned: 2016-10-12 14:19:30.000431 -No vulnerabilities found. - - -zeuxisoo/python-flask-social-oauth-facebook -https://github.com/zeuxisoo/python-flask-social-oauth-facebook -Entry file: None -Scanned: 2016-10-12 14:19:37.329461 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeuxisoo/python-flask-social-oauth-facebook. - -lpolepeddi/sightings -https://github.com/lpolepeddi/sightings -Entry file: sightings/routes.py -Scanned: 2016-10-12 14:19:53.016186 -No vulnerabilities found. - - -sholsapp/flask-skeleton -https://github.com/sholsapp/flask-skeleton -Entry file: None -Scanned: 2016-10-12 14:19:54.019420 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sholsapp/flask-skeleton. - -adatlabor/soa-demo -https://github.com/adatlabor/soa-demo -Entry file: soa-demo/service.py -Scanned: 2016-10-12 14:20:07.942172 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -speakingcode/pres-soa-flask-backbone -https://github.com/speakingcode/pres-soa-flask-backbone -Entry file: pres-soa-flask-backbone/notes.py -Scanned: 2016-10-12 14:20:17.268883 -No vulnerabilities found. - - -stef/tlsauth -https://github.com/stef/tlsauth -Entry file: tlsauth/flask-demo/webapp.py -Scanned: 2016-10-12 14:20:18.688554 -No vulnerabilities found. - - -kirang89/flask-boiler -https://github.com/kirang89/flask-boiler -Entry file: None -Scanned: 2016-10-12 14:20:26.191949 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -topherjaynes/flasktut -https://github.com/topherjaynes/flasktut -Entry file: flasktut/app/__init__.py -Scanned: 2016-10-12 14:20:38.672786 -No vulnerabilities found. - - -aerialdomo/flaskblog -https://github.com/aerialdomo/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-12 14:20:43.252396 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -jonascj/flaskr -https://github.com/jonascj/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 14:20:53.784197 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -microamp/flaskel -https://github.com/microamp/flaskel -Entry file: flaskel/flaskel/__init__.py -Scanned: 2016-10-12 14:20:55.252521 -No vulnerabilities found. - - -a2lin/flaskapp -https://github.com/a2lin/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-12 14:21:01.777433 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pinoytech/flaskapp -https://github.com/pinoytech/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-12 14:21:07.280744 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thinboy92/flasktuts -https://github.com/thinboy92/flasktuts -Entry file: flasktuts/app/__init__.py -Scanned: 2016-10-12 14:21:15.820849 -No vulnerabilities found. - - -aahluwal/flaskagain -https://github.com/aahluwal/flaskagain -Entry file: flaskagain/judgement.py -Scanned: 2016-10-12 14:21:24.385541 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskagain/renv/lib/python2.7/genericpath.py - -elboby/flask-config-override -https://github.com/elboby/flask-config-override -Entry file: flask-config-override/flask_config_override/test/test_cookie.py -Scanned: 2016-10-12 14:21:27.820137 -No vulnerabilities found. - - -MrFichter/flask1 -https://github.com/MrFichter/flask1 -Entry file: flask1/flask1.py -Scanned: 2016-10-12 14:21:29.127831 -No vulnerabilities found. - - -guilhermecomum/FlaskTutorial -https://github.com/guilhermecomum/FlaskTutorial -Entry file: FlaskTutorial/flaskr/flaskr.py -Scanned: 2016-10-12 14:21:39.224809 -No vulnerabilities found. - - -sherzberg/flask-native-package -https://github.com/sherzberg/flask-native-package -Entry file: flask-native-package/application.py -Scanned: 2016-10-12 14:21:55.164410 -No vulnerabilities found. - - -landakram/squeak -https://github.com/landakram/squeak -Entry file: squeak/app.py -Scanned: 2016-10-12 14:21:56.687860 -No vulnerabilities found. - - -xrefor/flask_tut -https://github.com/xrefor/flask_tut -Entry file: flask_tut/flaskr.py -Scanned: 2016-10-12 14:22:03.039727 -No vulnerabilities found. - - -y2bishop2y/vagrant.flask -https://github.com/y2bishop2y/vagrant.flask -Entry file: None -Scanned: 2016-10-12 14:22:08.478991 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/y2bishop2y/vagrant.flask. - -markchadwick/flask-empty -https://github.com/markchadwick/flask-empty -Entry file: flask-empty/main.py -Scanned: 2016-10-12 14:22:15.827343 -No vulnerabilities found. - - -McrCoderDojo/Flask-Webapps -https://github.com/McrCoderDojo/Flask-Webapps -Entry file: Flask-Webapps/flask1.py -Scanned: 2016-10-12 14:22:28.737539 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -xjdrew/flask-demo -https://github.com/xjdrew/flask-demo -Entry file: None -Scanned: 2016-10-12 14:22:29.233147 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xjdrew/flask-demo. - -aerialdomo/flask_microblog -https://github.com/aerialdomo/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-12 14:22:42.353570 -No vulnerabilities found. - - -xrefor/flask_stuff -https://github.com/xrefor/flask_stuff -Entry file: flask_stuff/main.py -Scanned: 2016-10-12 14:22:55.173036 -No vulnerabilities found. - - -akbarovs/flask-sandbox -https://github.com/akbarovs/flask-sandbox -Entry file: flask-sandbox/app.py -Scanned: 2016-10-12 14:22:56.477124 -No vulnerabilities found. - - -jcerise/flask-photos -https://github.com/jcerise/flask-photos -Entry file: flask-photos/app.py -Scanned: 2016-10-12 14:23:03.816918 -No vulnerabilities found. - - -adesst/flask-blog -https://github.com/adesst/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 14:23:08.386904 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Hardtack/Flask-Router -https://github.com/Hardtack/Flask-Router -Entry file: Flask-Router/flask_router/tests.py -Scanned: 2016-10-12 14:23:19.661941 -No vulnerabilities found. - - -smdmustaffa/PythonFlask -https://github.com/smdmustaffa/PythonFlask -Entry file: PythonFlask/app/routes.py -Scanned: 2016-10-12 14:23:28.992842 -No vulnerabilities found. - - -jinzhangg/flask-helloworld -https://github.com/jinzhangg/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-12 14:23:30.332755 -No vulnerabilities found. - - -bogavante/mitsuhiko-flask -https://github.com/bogavante/mitsuhiko-flask -Entry file: mitsuhiko-flask/setup.py -Scanned: 2016-10-12 14:23:43.337775 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hardez/Flask-Skeleton -https://github.com/hardez/Flask-Skeleton -Entry file: Flask-Skeleton/app/__init__.py -Scanned: 2016-10-12 14:23:56.636336 -No vulnerabilities found. - - -stfy86/pruebitasFlask -https://github.com/stfy86/pruebitasFlask -Entry file: pruebitasFlask/practica4/src/app/__init__.py -Scanned: 2016-10-12 14:24:09.896929 -No vulnerabilities found. - - -kracekumar/test-flask -https://github.com/kracekumar/test-flask -Entry file: test-flask/app.py -Scanned: 2016-10-12 14:24:17.758582 -No vulnerabilities found. - - -charliecrissman/microblog -https://github.com/charliecrissman/microblog -Entry file: microblog/app/__init__.py -Scanned: 2016-10-12 14:24:29.595252 -No vulnerabilities found. - - -gourneau/anode -https://github.com/gourneau/anode -Entry file: anode/app.py -Scanned: 2016-10-12 14:24:39.514823 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mmahnken/Flask_to_do_list -https://github.com/mmahnken/Flask_to_do_list -Entry file: Flask_to_do_list/tipsy.py -Scanned: 2016-10-12 14:24:56.553443 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -abulte/Flask-Bootstrap-Fanstatic -https://github.com/abulte/Flask-Bootstrap-Fanstatic -Entry file: Flask-Bootstrap-Fanstatic/application/__init__.py -Scanned: 2016-10-12 14:25:04.368316 -No vulnerabilities found. - - -jennyferpinto/Flask_Part_1 -https://github.com/jennyferpinto/Flask_Part_1 -Entry file: Flask_Part_1/tipsy.py -Scanned: 2016-10-12 14:25:09.900585 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stephanienkram/Flask-Log-Tracker -https://github.com/stephanienkram/Flask-Log-Tracker -Entry file: Flask-Log-Tracker/main.py -Scanned: 2016-10-12 14:25:26.696193 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mwmeyer/minimal-flask-socketserver -https://github.com/mwmeyer/minimal-flask-socketserver -Entry file: minimal-flask-socketserver/flash_socket.py -Scanned: 2016-10-12 14:25:30.812243 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rasheedh/Paint-Using-Flask---Mongodb- -https://github.com/rasheedh/Paint-Using-Flask---Mongodb- -Entry file: None -Scanned: 2016-10-12 14:25:31.303219 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Paint-Using-Flask---Mongodb-. - -isms/flask-phonebank-dashboard -https://github.com/isms/flask-phonebank-dashboard -Entry file: flask-phonebank-dashboard/app.py -Scanned: 2016-10-12 14:25:40.310993 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -elboby/flask-test-template -https://github.com/elboby/flask-test-template -Entry file: None -Scanned: 2016-10-12 14:25:46.639964 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/elboby/flask-test-template. - -ndrwdn/flat_flask_layout -https://github.com/ndrwdn/flat_flask_layout -Entry file: flat_flask_layout/sitebuilder.py -Scanned: 2016-10-12 14:25:56.971584 -No vulnerabilities found. - - -jpanganiban/flask-heroku-kickstart -https://github.com/jpanganiban/flask-heroku-kickstart -Entry file: None -Scanned: 2016-10-12 14:25:58.385813 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jpanganiban/flask-heroku-kickstart. - -justinxreese/ajax-calculator-flask -https://github.com/justinxreese/ajax-calculator-flask -Entry file: None -Scanned: 2016-10-12 14:26:08.523470 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -prabeesh/Paintapp-Javascript-Canvas-Flask -https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask -Entry file: Paintapp-Javascript-Canvas-Flask/test.py -Scanned: 2016-10-12 14:26:09.826953 -Vulnerability 1: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 34, trigger word "form[": - imgname = request.form['imagename'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 16: imgname = (imagename) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 23: imgname = row[0] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 19, trigger word "execute(": - cur.execute('SELECT * FROM Image WHERE imgname=?', imgname) - -Vulnerability 2: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 34, trigger word "form[": - imgname = request.form['imagename'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 16: imgname = (imagename) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 23: imgname = row[0] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 42, trigger word "execute(": - cur.execute('INSERT INTO Image VALUES(?, ?)', data) - -Vulnerability 3: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 35, trigger word "form[": - imgdata = request.form['string'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 24: imgdata = row[1] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 25: ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 28: ret_MAYBE_FUNCTION_NAME = resp - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 46: ret_MAYBE_FUNCTION_NAME = resp -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 42, trigger word "execute(": - cur.execute('INSERT INTO Image VALUES(?, ?)', data) - - - -godber/flask-mobile-switch -https://github.com/godber/flask-mobile-switch -Entry file: flask-mobile-switch/missionops/missionops/__init__.py -Scanned: 2016-10-12 14:26:19.477874 -No vulnerabilities found. - - -naveenpremchand02/paintapp-using-Flask -https://github.com/naveenpremchand02/paintapp-using-Flask -Entry file: None -Scanned: 2016-10-12 14:26:20.769600 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/naveenpremchand02/paintapp-using-Flask. - -orkunozbek/deploy_test -https://github.com/orkunozbek/deploy_test -Entry file: deploy_test/app_pack/__init__.py -Scanned: 2016-10-12 14:26:30.103292 -No vulnerabilities found. - - -emi1337/movie_rater -https://github.com/emi1337/movie_rater -Entry file: movie_rater/judgement.py -Scanned: 2016-10-12 14:26:39.175190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chrismeono1022/movie-ratings -https://github.com/chrismeono1022/movie-ratings -Entry file: movie-ratings/judgement.py -Scanned: 2016-10-12 14:26:45.235004 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -y2bishop2y/microengine -https://github.com/y2bishop2y/microengine -Entry file: microengine/lib/flask_sqlalchemy.py -Scanned: 2016-10-12 14:26:52.236265 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajith-herga/searchflask -https://github.com/ajith-herga/searchflask -Entry file: searchflask/new_world.py -Scanned: 2016-10-12 14:26:57.852527 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akshar-raaj/flaks -https://github.com/akshar-raaj/flaks -Entry file: flaks/hello.py -Scanned: 2016-10-12 14:26:59.141050 -No vulnerabilities found. - - -soniacs/cabinet -https://github.com/soniacs/cabinet -Entry file: cabinet/app/__init__.py -Scanned: 2016-10-12 14:27:05.788612 -Vulnerability 1: -File: cabinet/app/views/clients.py - > User input at line 33, trigger word "form[": - client = Client(name=request.form['name'], company=request.form['company'], website=request.form['website'], twitter=request.form['twitter'], email=request.form['email'], telephone=request.form['telephone'], skype=request.form['skype'], street=request.form['street'], street_2=request.form['street_2'], city=request.form['city'], state=request.form['state'], postcode=request.form['postcode'], country=request.form['country'], notes=request.form['notes']) -File: cabinet/app/views/clients.py - > reaches line 50, trigger word "flash(": - flash('Client '%s' was added.' % client.name) - -Vulnerability 2: -File: cabinet/app/views/clients.py - > User input at line 60, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 80: ret_MAYBE_FUNCTION_NAME = render_template('clients/edit.html',title='Edit %s' % client.name, client=client) - File: cabinet/app/views/clients.py - > Line 84: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 78, trigger word "flash(": - flash('Client '%s' has been updated.' % client.name) - -Vulnerability 3: -File: cabinet/app/views/clients.py - > User input at line 89, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 95: ret_MAYBE_FUNCTION_NAME = render_template('clients/delete.html',title='Delete %s' % client.name, client=client) - File: cabinet/app/views/clients.py - > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 93, trigger word "flash(": - flash('Client '%s' has been deleted.' % client.name) - -Vulnerability 4: -File: cabinet/app/views/invoices.py - > User input at line 31, trigger word "get(": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 5: -File: cabinet/app/views/invoices.py - > User input at line 31, trigger word "form[": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 6: -File: cabinet/app/views/invoices.py - > User input at line 32, trigger word "get(": - project = Project.query.get(request.form['project']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 7: -File: cabinet/app/views/invoices.py - > User input at line 32, trigger word "form[": - project = Project.query.get(request.form['project']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 8: -File: cabinet/app/views/invoices.py - > User input at line 33, trigger word "form[": - invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 9: -File: cabinet/app/views/invoices.py - > User input at line 59, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 80: ret_MAYBE_FUNCTION_NAME = render_template('invoices/edit.html',title='Edit Invoice %s' % invoice.name, invoice=invoice, clients=clients, projects=projects) - File: cabinet/app/views/invoices.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 78, trigger word "flash(": - flash('Invoice '%s' has been updated.' % invoice.name) - -Vulnerability 10: -File: cabinet/app/views/invoices.py - > User input at line 91, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 97: ret_MAYBE_FUNCTION_NAME = render_template('invoices/delete.html',title='Delete Invoice %s' % invoice.name, invoice=invoice) - File: cabinet/app/views/invoices.py - > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 95, trigger word "flash(": - flash('Invoice '%s' has been deleted.' % invoice.name) - -Vulnerability 11: -File: cabinet/app/views/projects.py - > User input at line 30, trigger word "get(": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 12: -File: cabinet/app/views/projects.py - > User input at line 30, trigger word "form[": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 13: -File: cabinet/app/views/projects.py - > User input at line 31, trigger word "form[": - project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 14: -File: cabinet/app/views/projects.py - > User input at line 54, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 71: ret_MAYBE_FUNCTION_NAME = render_template('projects/edit.html',title='Edit %s' % project.name, project=project, clients=clients) - File: cabinet/app/views/projects.py - > Line 76: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 69, trigger word "flash(": - flash('Project '%s' has been updated.' % project.name) - -Vulnerability 15: -File: cabinet/app/views/projects.py - > User input at line 81, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('projects/delete.html',title='Delete %s' % project.name, project=project) - File: cabinet/app/views/projects.py - > Line 91: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 85, trigger word "flash(": - flash('Project '%s' has been deleted.' % project.name) - - - -MattStockton/manpage -https://github.com/MattStockton/manpage -Entry file: manpage/app.py -Scanned: 2016-10-12 14:27:10.965731 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qzio/tododis -https://github.com/qzio/tododis -Entry file: tododis/app.py -Scanned: 2016-10-12 14:27:20.060868 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ternup/caddisfly-heroku -https://github.com/ternup/caddisfly-heroku -Entry file: caddisfly-heroku/app.py -Scanned: 2016-10-12 14:27:21.359383 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aromanovich/flask-webtest -https://github.com/aromanovich/flask-webtest -Entry file: flask-webtest/tests/core.py -Scanned: 2016-10-12 14:27:58.597218 -No vulnerabilities found. - - -ashcrow/flask-track-usage -https://github.com/ashcrow/flask-track-usage -Entry file: flask-track-usage/test/__init__.py -Scanned: 2016-10-12 14:28:00.370453 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lepture/flask-shorturl -https://github.com/lepture/flask-shorturl -Entry file: flask-shorturl/test_shorturl.py -Scanned: 2016-10-12 14:28:05.780972 -No vulnerabilities found. - - -mharrys/flask-blog -https://github.com/mharrys/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 14:28:10.333890 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -kienpham2000/airbrake-flask -https://github.com/kienpham2000/airbrake-flask -Entry file: airbrake-flask/setup.py -Scanned: 2016-10-12 14:28:18.837176 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sintezcs/flask -https://github.com/sintezcs/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 14:28:33.735828 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -wangzexin/flask -https://github.com/wangzexin/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 14:28:40.646868 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -samsolariusleo/Flask -https://github.com/samsolariusleo/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-12 14:28:48.188398 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tornado-utils/tornado-restless -https://github.com/tornado-utils/tornado-restless -Entry file: tornado-restless/tests/base.py -Scanned: 2016-10-12 14:28:59.977043 -No vulnerabilities found. - - -adamgreenhall/flask-haml-sass-coffee-template -https://github.com/adamgreenhall/flask-haml-sass-coffee-template -Entry file: flask-haml-sass-coffee-template/app.py -Scanned: 2016-10-12 14:29:05.794183 -No vulnerabilities found. - - -prakhar1989/flask-tuts -https://github.com/prakhar1989/flask-tuts -Entry file: flask-tuts/lesson-2/blogs/__init__.py -Scanned: 2016-10-12 14:29:23.378312 -No vulnerabilities found. - - -Treeki/bitBoard -https://github.com/Treeki/bitBoard -Entry file: bitBoard/bitBoard/__init__.py -Scanned: 2016-10-12 14:29:32.670512 -Vulnerability 1: -File: bitBoard/bitBoard/views/board.py - > User input at line 696, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 703: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 704: url = thread.move_url - File: bitBoard/bitBoard/views/board.py - > Line 730: form = MoveThreadForm(destforum=thread.forum_id) - File: bitBoard/bitBoard/views/board.py - > Line 734: new_forum_id = form.destforum.data - File: bitBoard/bitBoard/views/board.py - > Line 741: old_forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 743: old_forum.post_count -= thread.post_count - File: bitBoard/bitBoard/views/board.py - > Line 745: thread.forum_id = new_forum_id - File: bitBoard/bitBoard/views/board.py - > Line 749: new_forum.post_count += thread.post_count - File: bitBoard/bitBoard/views/board.py - > Line 757: ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=303) - File: bitBoard/bitBoard/views/board.py - > Line 760: ret_MAYBE_FUNCTION_NAME = render_template('move_thread.html',form=form, forum=forum, thread=thread, url=url) -File: bitBoard/bitBoard/views/board.py - > reaches line 710, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url,code=301) - -Vulnerability 2: -File: bitBoard/bitBoard/views/board.py - > User input at line 775, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 782: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 785: url = thread.sticky_url - File: bitBoard/bitBoard/views/board.py - > Line 787: url = thread.lock_url - File: bitBoard/bitBoard/views/board.py - > Line 791: url = thread.follow_url - File: bitBoard/bitBoard/views/board.py - > Line 808: old_value = thread.is_stickied - File: bitBoard/bitBoard/views/board.py - > Line 822: old_value = thread.is_locked - File: bitBoard/bitBoard/views/board.py - > Line 836: old_value = thread.is_followed_by(g.user) - File: bitBoard/bitBoard/views/board.py - > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title) - File: bitBoard/bitBoard/views/board.py - > Line 869: ret_MAYBE_FUNCTION_NAME = form.redirect(url=thread.url) - File: bitBoard/bitBoard/views/board.py - > Line 871: ret_MAYBE_FUNCTION_NAME = render_template('confirm.html',form=form, crumbs_type='thread', forum=forum, thread=thread, final_crumb='%s Thread' % cap_verb, message=message, url=url) -File: bitBoard/bitBoard/views/board.py - > reaches line 802, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url,code=301) - -Vulnerability 3: -File: bitBoard/bitBoard/views/base.py - > User input at line 49, trigger word "get(": - target = get_redirect_target() or url -Reassigned in: - File: bitBoard/bitBoard/views/base.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data) -File: bitBoard/bitBoard/views/base.py - > reaches line 50, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303) - -Vulnerability 4: -File: bitBoard/bitBoard/views/base.py - > User input at line 49, trigger word "get(": - target = get_redirect_target() or url -Reassigned in: - File: bitBoard/bitBoard/views/base.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data) -File: bitBoard/bitBoard/views/base.py - > reaches line 50, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303) - - - -byu-osl/familytree-sample-app -https://github.com/byu-osl/familytree-sample-app -Entry file: familytree-sample-app/app.py -Scanned: 2016-10-12 14:29:36.093621 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kmiasko/flask-barcode -https://github.com/kmiasko/flask-barcode -Entry file: flask-barcode/wsgi.py -Scanned: 2016-10-12 14:29:41.520214 -No vulnerabilities found. - - -jayzcode/helloflask -https://github.com/jayzcode/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-12 14:29:51.633809 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -btomashvili/flasb -https://github.com/btomashvili/flasb -Entry file: None -Scanned: 2016-10-12 14:30:07.467859 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/btomashvili/flasb. - -maxcountryman/flask-simpleoauth -https://github.com/maxcountryman/flask-simpleoauth -Entry file: flask-simpleoauth/flask_simpleoauth/app.py -Scanned: 2016-10-12 14:30:11.830984 -Vulnerability 1: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 30, trigger word "get(": - next_url = request.args.get('next_url', url_for('.index')) -Reassigned in: - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 30, trigger word "url_for(": - next_url = request.args.get('next_url', url_for('.index')) - -Vulnerability 2: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 30, trigger word "get(": - next_url = request.args.get('next_url', url_for('.index')) -Reassigned in: - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 36, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 3: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 42, trigger word "get(": - next_url = request.args.get('next_url', url_for('.login')) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 42, trigger word "url_for(": - next_url = request.args.get('next_url', url_for('.login')) - -Vulnerability 4: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 42, trigger word "get(": - next_url = request.args.get('next_url', url_for('.login')) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - - - -bayazee/flask-mosession -https://github.com/bayazee/flask-mosession -Entry file: flask-mosession/example/example.py -Scanned: 2016-10-12 14:30:21.275097 -No vulnerabilities found. - - -speakingcode/pres-soa-flask-backbone -https://github.com/speakingcode/pres-soa-flask-backbone -Entry file: pres-soa-flask-backbone/notes.py -Scanned: 2016-10-12 14:30:25.540683 -No vulnerabilities found. - - -krushton/flask-api-example -https://github.com/krushton/flask-api-example -Entry file: flask-api-example/app.py -Scanned: 2016-10-12 14:30:31.920519 -No vulnerabilities found. - - -bootandy/flask-sample -https://github.com/bootandy/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-12 14:30:34.441859 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -damour/flaskr -https://github.com/damour/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 14:30:40.974561 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -roshow/flasktutorial -https://github.com/roshow/flasktutorial -Entry file: None -Scanned: 2016-10-12 14:30:56.334252 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jph98/flaskdmg -https://github.com/jph98/flaskdmg -Entry file: flaskdmg/flaskexample.py -Scanned: 2016-10-12 14:30:59.648459 -No vulnerabilities found. - - -akshar-raaj/flaskr -https://github.com/akshar-raaj/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 14:31:01.185267 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fabin/Flaskr -https://github.com/fabin/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-12 14:31:06.626325 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lee814/flaskr -https://github.com/lee814/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 14:31:11.124999 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -codergirl/flaskbabar -https://github.com/codergirl/flaskbabar -Entry file: flaskbabar/hello.py -Scanned: 2016-10-12 14:31:21.573031 -Vulnerability 1: -File: flaskbabar/hello.py - > User input at line 44, trigger word "get(": - new_user = BabarUser(request.args.get('username'), request.args.get('email')) -Reassigned in: - File: flaskbabar/hello.py - > Line 47: json = new_user.id'username''email'new_user.namenew_user.email -File: flaskbabar/hello.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 2: -File: flaskbabar/hello.py - > User input at line 61, trigger word "get(": - the_user = db.session.query(BabarUser).filter_by(id=request.args.get('user_id')).first() -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 3: -File: flaskbabar/hello.py - > User input at line 62, trigger word "get(": - task_name = request.args.get('name') -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 4: -File: flaskbabar/hello.py - > User input at line 63, trigger word "get(": - task_description = request.args.get('description') -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 5: -File: flaskbabar/hello.py - > User input at line 64, trigger word "get(": - dismissable = request.args.get('dismissable') -Reassigned in: - File: flaskbabar/hello.py - > Line 66: dismissable = True - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 6: -File: flaskbabar/hello.py - > User input at line 67, trigger word "get(": - due_date = request.args.get('due_date') -Reassigned in: - File: flaskbabar/hello.py - > Line 69: due_date = datetime.datetime.fromtimestamp(float(due_date)) - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - - - -rajendrakrp/GAE-Flask-OpenID -https://github.com/rajendrakrp/GAE-Flask-OpenID -Entry file: GAE-Flask-OpenID/flask/sessions.py -Scanned: 2016-10-12 14:31:27.089519 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JLtheking/FlaskExample -https://github.com/JLtheking/FlaskExample -Entry file: FlaskExample/routes.py -Scanned: 2016-10-12 14:31:32.642352 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Aussiroth/FlaskPractical -https://github.com/Aussiroth/FlaskPractical -Entry file: FlaskPractical/flask/routes.py -Scanned: 2016-10-12 14:31:36.204879 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -dorajistyle/proposal_center_python_flask_sqlalchemy_jade -https://github.com/dorajistyle/proposal_center_python_flask_sqlalchemy_jade -Entry file: proposal_center_python_flask_sqlalchemy_jade/application/__init__.py -Scanned: 2016-10-12 14:31:43.217840 -No vulnerabilities found. - - -Bob-Thomas/webshopFlask -https://github.com/Bob-Thomas/webshopFlask -Entry file: webshopFlask/webshop.py -Scanned: 2016-10-12 14:31:56.156789 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -haburibe/flask-myapps -https://github.com/haburibe/flask-myapps -Entry file: flask-myapps/todos/todos.py -Scanned: 2016-10-12 14:32:00.465628 -No vulnerabilities found. - - -mykolasmith/flask-leaderboard -https://github.com/mykolasmith/flask-leaderboard -Entry file: flask-leaderboard/leaderboard/__init__.py -Scanned: 2016-10-12 14:32:02.946518 -No vulnerabilities found. - - -betobaz/app_flask -https://github.com/betobaz/app_flask -Entry file: app_flask/app/routes.py -Scanned: 2016-10-12 14:32:07.383223 -No vulnerabilities found. - - -redfive/python-flask -https://github.com/redfive/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-12 14:32:13.528859 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -atbaker/flask-tutorial -https://github.com/atbaker/flask-tutorial -Entry file: flask-tutorial/app/__init__.py -Scanned: 2016-10-12 14:32:33.097668 -No vulnerabilities found. - - -fabin/Flask-Upload -https://github.com/fabin/Flask-Upload -Entry file: Flask-Upload/upload/__init__.py -Scanned: 2016-10-12 14:32:36.409157 -Vulnerability 1: -File: Flask-Upload/upload/__init__.py - > User input at line 24, trigger word "files[": - uploadedFile = request.files['file'] -Reassigned in: - File: Flask-Upload/upload/__init__.py - > Line 26: filename = uploadedFile.filename - File: Flask-Upload/upload/__init__.py - > Line 36: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File (in package)

-
-

- -

- ' -File: Flask-Upload/upload/__init__.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(s.put(DOMAIN_NAME, filename, ob)) - - - -gabrielengel/learn-flask -https://github.com/gabrielengel/learn-flask -Entry file: learn-flask/01-minimal/minimal.py -Scanned: 2016-10-12 14:32:42.768203 -No vulnerabilities found. - - -mutaku/alfred_flask -https://github.com/mutaku/alfred_flask -Entry file: alfred_flask/alfred.py -Scanned: 2016-10-12 14:33:00.588958 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marcilioleite/flask-saude -https://github.com/marcilioleite/flask-saude -Entry file: flask-saude/app/__init__.py -Scanned: 2016-10-12 14:33:04.352135 -No vulnerabilities found. - - -erikgrueter/flask_app -https://github.com/erikgrueter/flask_app -Entry file: None -Scanned: 2016-10-12 14:33:07.664209 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/erikgrueter/flask_app. - -elimgoodman/Personnel-Flask -https://github.com/elimgoodman/Personnel-Flask -Entry file: Personnel-Flask/app/__init__.py -Scanned: 2016-10-12 14:33:13.580290 -No vulnerabilities found. - - -bradmerlin/porty_flask -https://github.com/bradmerlin/porty_flask -Entry file: porty_flask/app.py -Scanned: 2016-10-12 14:33:38.139489 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asap/watchman.flask -https://github.com/asap/watchman.flask -Entry file: None -Scanned: 2016-10-12 14:33:43.457320 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/asap/watchman.flask. - -marksteve/flask-nsq -https://github.com/marksteve/flask-nsq -Entry file: flask-nsq/test.py -Scanned: 2016-10-12 14:33:51.801908 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Duelist/ianb-flask -https://github.com/Duelist/ianb-flask -Entry file: ianb-flask/ianb/__init__.py -Scanned: 2016-10-12 14:34:03.747577 -No vulnerabilities found. - - -Joinhack/agent -https://github.com/Joinhack/agent -Entry file: agent/flask_sqlalchemy.py -Scanned: 2016-10-12 14:34:08.825599 -Vulnerability 1: -File: agent/agent/views/user.py - > User input at line 44, trigger word "form[": - area = request.form['area'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 2: -File: agent/agent/views/user.py - > User input at line 45, trigger word "form[": - name = request.form['section'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 3: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 4: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 5: -File: agent/agent/views/house.py - > User input at line 34, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 36: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 38: data = cmgmt.queryCommunitiesByUserId(user, q) - File: agent/agent/views/house.py - > Line 33: ret_MAYBE_FUNCTION_NAME = jsonify('code''msg'-1'unkown query') -File: agent/agent/views/house.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0toselect(data)) - -Vulnerability 6: -File: agent/agent/views/house.py - > User input at line 45, trigger word "form[": - community_name = request.form['community'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - -Vulnerability 7: -File: agent/agent/views/house.py - > User input at line 46, trigger word "form[": - location = request.form['location'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - - - -lachezar/tada_backend -https://github.com/lachezar/tada_backend -Entry file: tada_backend/todo.py -Scanned: 2016-10-12 14:34:13.568485 -No vulnerabilities found. - - -luxuia/gene_designer -https://github.com/luxuia/gene_designer -Entry file: gene_designer/geneDesigne.py -Scanned: 2016-10-12 14:34:30.346157 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stephanienkram/Flask-Money-Tracker -https://github.com/stephanienkram/Flask-Money-Tracker -Entry file: Flask-Money-Tracker/main.py -Scanned: 2016-10-12 14:34:38.021489 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cismet/sqlparse-flask-webservice -https://github.com/cismet/sqlparse-flask-webservice -Entry file: sqlparse-flask-webservice/sqlparse_webservice.py -Scanned: 2016-10-12 14:34:40.193911 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jonascj/flask_logger_test -https://github.com/jonascj/flask_logger_test -Entry file: flask_logger_test/flask_logger_test.py -Scanned: 2016-10-12 14:34:43.508762 -No vulnerabilities found. - - -rubinovitz/flask-gevent-boiler -https://github.com/rubinovitz/flask-gevent-boiler -Entry file: flask-gevent-boiler/app.py -Scanned: 2016-10-12 14:34:51.852930 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rartavia/flask-babel-example -https://github.com/rartavia/flask-babel-example -Entry file: flask-babel-example/flask-babel-example.py -Scanned: 2016-10-12 14:35:01.202546 -No vulnerabilities found. - - -bradmerlin/mxit-spock_flask -https://github.com/bradmerlin/mxit-spock_flask -Entry file: mxit-spock_flask/app.py -Scanned: 2016-10-12 14:35:04.762651 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elidickinson/flask-proxy-demo -https://github.com/elidickinson/flask-proxy-demo -Entry file: flask-proxy-demo/hello.py -Scanned: 2016-10-12 14:35:08.089074 -No vulnerabilities found. - - -luckypool/flask-blueprints-template -https://github.com/luckypool/flask-blueprints-template -Entry file: flask-blueprints-template/hello/__init__.py -Scanned: 2016-10-12 14:35:23.886799 -No vulnerabilities found. - - -dylanvee/flask-hello-world -https://github.com/dylanvee/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-12 14:35:25.438255 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -chrismeono1022/microblog_flask_tutorial -https://github.com/chrismeono1022/microblog_flask_tutorial -Entry file: microblog_flask_tutorial/app/__init__.py -Scanned: 2016-10-12 14:35:40.320868 -No vulnerabilities found. - - -adamjmarkham/flask-micro-blog -https://github.com/adamjmarkham/flask-micro-blog -Entry file: flask-micro-blog/micro_blog_flask.py -Scanned: 2016-10-12 14:35:43.741730 -No vulnerabilities found. - - -krushton/flask-location-example -https://github.com/krushton/flask-location-example -Entry file: flask-location-example/app.py -Scanned: 2016-10-12 14:35:52.094806 -No vulnerabilities found. - - -david-torres/flask-rest-quickstart -https://github.com/david-torres/flask-rest-quickstart -Entry file: flask-rest-quickstart/application/__init__.py -Scanned: 2016-10-12 14:36:04.936574 -No vulnerabilities found. - - -bradmerlin/mxit-blackjack_flask -https://github.com/bradmerlin/mxit-blackjack_flask -Entry file: mxit-blackjack_flask/app.py -Scanned: 2016-10-12 14:36:11.670591 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyhmltn/stripe-flask-test -https://github.com/andyhmltn/stripe-flask-test -Entry file: stripe-flask-test/main.py -Scanned: 2016-10-12 14:36:14.083667 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -manuclementz/shrt -https://github.com/manuclementz/shrt -Entry file: shrt/app.py -Scanned: 2016-10-12 14:36:26.902706 -No vulnerabilities found. - - -jsutterfield/flaskr-buildout -https://github.com/jsutterfield/flaskr-buildout -Entry file: flaskr-buildout/src/flaskr/flaskr.py -Scanned: 2016-10-12 14:36:38.295831 -No vulnerabilities found. - - -geunieve/ratemyfirefart -https://github.com/geunieve/ratemyfirefart -Entry file: ratemyfirefart/views.py -Scanned: 2016-10-12 14:36:40.644897 -No vulnerabilities found. - - -wangxiaoxiao88/python-bookmanager -https://github.com/wangxiaoxiao88/python-bookmanager -Entry file: python-bookmanager/app.py -Scanned: 2016-10-12 14:36:44.098696 -No vulnerabilities found. - - -Syerram/maintenance-server -https://github.com/Syerram/maintenance-server -Entry file: maintenance-server/run.py -Scanned: 2016-10-12 14:36:52.448419 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -corydolphin/boilerflask-facebook -https://github.com/corydolphin/boilerflask-facebook -Entry file: boilerflask-facebook/boilerflask/__init__.py -Scanned: 2016-10-12 14:37:02.202137 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajith-herga/searchflask -https://github.com/ajith-herga/searchflask -Entry file: searchflask/new_world.py -Scanned: 2016-10-12 14:37:04.716175 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -subdesign/temp_Flaskblog -https://github.com/subdesign/temp_Flaskblog -Entry file: temp_Flaskblog/app.py -Scanned: 2016-10-12 14:37:09.305204 -No vulnerabilities found. - - -bettertest-org/flask_app_skeleton_on_gae -https://github.com/bettertest-org/flask_app_skeleton_on_gae -Entry file: flask_app_skeleton_on_gae/lib/flask/sessions.py -Scanned: 2016-10-12 14:37:16.193267 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liontree/lemonbook -https://github.com/liontree/lemonbook -Entry file: lemonbook/__init__.py -Scanned: 2016-10-12 14:37:29.163011 -Vulnerability 1: -File: lemonbook/common/flask_login.py - > User input at line 227, trigger word "get(": - cookie_name = config.get('REMEMBER_COOKIE_NAME', COOKIE_NAME) -File: lemonbook/common/flask_login.py - > reaches line 237, trigger word "set_cookie(": - response.set_cookie(cookie_name, data,expires=expires, domain=domain) - -Vulnerability 2: -File: lemonbook/views/notes.py - > User input at line 50, trigger word "form[": - date = request.form['date'].strip() -Reassigned in: - File: lemonbook/views/notes.py - > Line 55: date = date.replace('/', '') - File: lemonbook/views/notes.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents) - File: lemonbook/views/notes.py - > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest')) -File: lemonbook/views/notes.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('date',id=user_id, date=date)) - -Vulnerability 3: -File: lemonbook/views/notes.py - > User input at line 50, trigger word "form[": - date = request.form['date'].strip() -Reassigned in: - File: lemonbook/views/notes.py - > Line 55: date = date.replace('/', '') - File: lemonbook/views/notes.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents) - File: lemonbook/views/notes.py - > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest')) -File: lemonbook/views/notes.py - > reaches line 56, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('date',id=user_id, date=date)) - - - -abhiomkar/contacts-rest -https://github.com/abhiomkar/contacts-rest -Entry file: contacts-rest/contacts.py -Scanned: 2016-10-12 14:37:30.456581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Giorgix/thor -https://github.com/Giorgix/thor -Entry file: thor/thor.py -Scanned: 2016-10-12 14:37:34.887173 -No vulnerabilities found. - - -lhr530124/nozomiServer -https://github.com/lhr530124/nozomiServer -Entry file: nozomiServer/app.py -Scanned: 2016-10-12 14:37:44.390970 -No vulnerabilities found. - - -lepture/flask-oauthlib -https://github.com/lepture/flask-oauthlib -Entry file: flask-oauthlib/flask_oauthlib/provider/oauth1.py -Scanned: 2016-10-12 14:37:55.550971 -Vulnerability 1: -File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > User input at line 87, trigger word "get(": - error_endpoint = self.app.config.get('OAUTH1_PROVIDER_ERROR_ENDPOINT') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > Line 90: ret_MAYBE_FUNCTION_NAME = '/oauth/errors' - File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > Line 86: ret_MAYBE_FUNCTION_NAME = error_uri -File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > reaches line 89, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint) - -Vulnerability 2: -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > User input at line 104, trigger word "get(": - error_endpoint = self.app.config.get('OAUTH2_PROVIDER_ERROR_ENDPOINT') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 107: ret_MAYBE_FUNCTION_NAME = '/oauth/errors' - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 103: ret_MAYBE_FUNCTION_NAME = error_uri -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > reaches line 106, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint) - -Vulnerability 3: -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > User input at line 447, trigger word "get(": - redirect_uri = credentials.get('redirect_uri') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 464: ret_MAYBE_FUNCTION_NAME = redirect(add_params_to_uri(self.error_uri, 'error'str(e))) - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 455: ret_MAYBE_FUNCTION_NAME = create_response(ret) - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 458: ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(self.error_uri)) -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > reaches line 461, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(redirect_uri or self.error_uri)) - - - -miguelgrinberg/Flask-HTTPAuth -https://github.com/miguelgrinberg/Flask-HTTPAuth -Entry file: Flask-HTTPAuth/examples/basic_auth.py -Scanned: 2016-10-12 14:38:02.451558 -No vulnerabilities found. - - -cburmeister/flask-bones -https://github.com/cburmeister/flask-bones -Entry file: flask-bones/app/__init__.py -Scanned: 2016-10-12 14:38:06.989823 -No vulnerabilities found. - - -sysr-q/flask-nsa -https://github.com/sysr-q/flask-nsa -Entry file: flask-nsa/example_app.py -Scanned: 2016-10-12 14:38:12.318094 -No vulnerabilities found. - - -lepture/flask-storage -https://github.com/lepture/flask-storage -Entry file: flask-storage/tests/__init__.py -Scanned: 2016-10-12 14:38:13.827581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -plastboks/Flaskmarks -https://github.com/plastboks/Flaskmarks -Entry file: Flaskmarks/flaskmarks/__init__.py -Scanned: 2016-10-12 14:38:38.435685 -Vulnerability 1: -File: Flaskmarks/flaskmarks/views/auth.py - > User input at line 33, trigger word ".data": - u = User.by_uname_or_email(form.username.data) -File: Flaskmarks/flaskmarks/views/auth.py - > reaches line 38, trigger word "flash(": - flash('Welcome %s.' % u.username,category='success') - - - -martinp/jarvis2 -https://github.com/martinp/jarvis2 -Entry file: jarvis2/app/main.py -Scanned: 2016-10-12 14:38:45.072281 -No vulnerabilities found. - - -akhilchandran/flask -https://github.com/akhilchandran/flask -Entry file: flask/setup.py -Scanned: 2016-10-12 14:38:45.967538 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -JamesHoover/Flask -https://github.com/JamesHoover/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-12 14:38:52.520913 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dhanababu-nyros/flask-sqlalchemy -https://github.com/dhanababu-nyros/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-12 14:39:02.841743 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -klen/mixer -https://github.com/klen/mixer -Entry file: mixer/tests/test_flask.py -Scanned: 2016-10-12 14:39:08.636688 -No vulnerabilities found. - - -wrobstory/mcflyin -https://github.com/wrobstory/mcflyin -Entry file: mcflyin/mcflyin/application.py -Scanned: 2016-10-12 14:39:16.032149 -No vulnerabilities found. - - -Hardtack/Flask-Negotiation -https://github.com/Hardtack/Flask-Negotiation -Entry file: Flask-Negotiation/tests/test_negotiation.py -Scanned: 2016-10-12 14:39:25.593617 -No vulnerabilities found. - - -marksteve/flask-redisconfig -https://github.com/marksteve/flask-redisconfig -Entry file: flask-redisconfig/example.py -Scanned: 2016-10-12 14:39:42.015269 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benhosmer/flask-zurb -https://github.com/benhosmer/flask-zurb -Entry file: flask-zurb/app.py -Scanned: 2016-10-12 14:39:50.739116 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mies/getting-started-flask-redis -https://github.com/mies/getting-started-flask-redis -Entry file: getting-started-flask-redis/app.py -Scanned: 2016-10-12 14:39:54.180776 -No vulnerabilities found. - - -eriktaubeneck/flask-twitter-oembedder -https://github.com/eriktaubeneck/flask-twitter-oembedder -Entry file: flask-twitter-oembedder/tests/test_flask_twitter_oembedder.py -Scanned: 2016-10-12 14:40:07.096535 -No vulnerabilities found. - - -DasIch/Flask-MakeStatic -https://github.com/DasIch/Flask-MakeStatic -Entry file: Flask-MakeStatic/flask_makestatic/__init__.py -Scanned: 2016-10-12 14:40:10.775213 -No vulnerabilities found. - - -insynchq/flask-captain -https://github.com/insynchq/flask-captain -Entry file: flask-captain/example.py -Scanned: 2016-10-12 14:40:16.227170 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fedenusy/flaskr -https://github.com/fedenusy/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-12 14:40:24.736689 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottmiao/Flaskr -https://github.com/scottmiao/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-12 14:40:30.253137 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rubensayshi/flaskbp -https://github.com/rubensayshi/flaskbp -Entry file: flaskbp/flaskbp/application.py -Scanned: 2016-10-12 14:40:35.589904 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ovet/flaskboard -https://github.com/ovet/flaskboard -Entry file: flaskboard/flaskboard.py -Scanned: 2016-10-12 14:40:42.923190 -No vulnerabilities found. - - -iaserrat/flaskify -https://github.com/iaserrat/flaskify -Entry file: flaskify/flaskify.py -Scanned: 2016-10-12 14:40:48.240801 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EventMobi/thorium -https://github.com/EventMobi/thorium -Entry file: thorium/thorium/testsuite/test_thoriumflask.py -Scanned: 2016-10-12 14:40:59.010088 -No vulnerabilities found. - - -paraboul/FlaskPress -https://github.com/paraboul/FlaskPress -Entry file: None -Scanned: 2016-10-12 14:41:04.501921 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/paraboul/FlaskPress. - -dl33/FlaskBlog -https://github.com/dl33/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-12 14:41:13.982204 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/flask-ip-hostname-resolvers -https://github.com/flebel/flask-ip-hostname-resolvers -Entry file: flask-ip-hostname-resolvers/ip.py -Scanned: 2016-10-12 14:41:15.320924 -No vulnerabilities found. - - -newbiemasih/Flask-Course -https://github.com/newbiemasih/Flask-Course -Entry file: None -Scanned: 2016-10-12 14:41:21.020571 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -port-/flask-skeleton -https://github.com/port-/flask-skeleton -Entry file: None -Scanned: 2016-10-12 14:41:25.550779 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/port-/flask-skeleton. - -AlexeyMK/gglto_flask -https://github.com/AlexeyMK/gglto_flask -Entry file: gglto_flask/gglto.py -Scanned: 2016-10-12 14:41:36.396231 -No vulnerabilities found. - - -xor-xor/webapp_flask -https://github.com/xor-xor/webapp_flask -Entry file: webapp_flask/app.py -Scanned: 2016-10-12 14:41:43.742528 -No vulnerabilities found. - - -suneel0101/flask-buddy -https://github.com/suneel0101/flask-buddy -Entry file: flask-buddy/server.py -Scanned: 2016-10-12 14:41:49.057019 -No vulnerabilities found. - - -sanoju/GaeFlask -https://github.com/sanoju/GaeFlask -Entry file: GaeFlask/flask/sessions.py -Scanned: 2016-10-12 14:41:57.258634 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kfk/flask-blog -https://github.com/kfk/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-12 14:42:03.806971 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -irakasleibiltaria/flask-tutorial -https://github.com/irakasleibiltaria/flask-tutorial -Entry file: flask-tutorial/hello.py -Scanned: 2016-10-12 14:42:08.134580 -No vulnerabilities found. - - -wodim/flask-test -https://github.com/wodim/flask-test -Entry file: flask-test/hello.py -Scanned: 2016-10-12 14:42:15.490112 -No vulnerabilities found. - - -sammyrulez/flask-grolla -https://github.com/sammyrulez/flask-grolla -Entry file: flask-grolla/tests.py -Scanned: 2016-10-12 14:42:28.145847 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -maxbucknell/vanilla_flask -https://github.com/maxbucknell/vanilla_flask -Entry file: vanilla_flask/vanilla/__init__.py -Scanned: 2016-10-12 14:42:33.041393 -No vulnerabilities found. - - -DamnedFacts/flask-contact -https://github.com/DamnedFacts/flask-contact -Entry file: flask-contact/main.py -Scanned: 2016-10-12 14:42:35.549753 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marcilioleite/flask-websocket -https://github.com/marcilioleite/flask-websocket -Entry file: flask-websocket/server.py -Scanned: 2016-10-12 14:42:43.869135 -No vulnerabilities found. - - -duffy25/sample_flask -https://github.com/duffy25/sample_flask -Entry file: sample_flask/sample_flask.py -Scanned: 2016-10-12 14:42:56.138022 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elijahc/hello_flask -https://github.com/elijahc/hello_flask -Entry file: hello_flask/hello.py -Scanned: 2016-10-12 14:43:05.460034 -No vulnerabilities found. - - -tmadsen/flask-scaffold -https://github.com/tmadsen/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-12 14:43:15.491569 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomashley/flask-template -https://github.com/tomashley/flask-template -Entry file: flask-template/app/urls.py -Scanned: 2016-10-12 14:43:17.947551 -No vulnerabilities found. - - -PromooD/flask-aselect -https://github.com/PromooD/flask-aselect -Entry file: flask-aselect/flask_aselect/core.py -Scanned: 2016-10-12 14:43:29.371071 -No vulnerabilities found. - - -danthemanvsqz/Flask-Demo -https://github.com/danthemanvsqz/Flask-Demo -Entry file: Flask-Demo/contacts.py -Scanned: 2016-10-12 14:43:33.068037 -No vulnerabilities found. - - -nisiotis/flask_app -https://github.com/nisiotis/flask_app -Entry file: None -Scanned: 2016-10-12 14:43:35.567033 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nisiotis/flask_app. - -Joinhack/agent -https://github.com/Joinhack/agent -Entry file: agent/flask_sqlalchemy.py -Scanned: 2016-10-12 14:43:44.544373 -Vulnerability 1: -File: agent/agent/views/user.py - > User input at line 44, trigger word "form[": - area = request.form['area'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 2: -File: agent/agent/views/user.py - > User input at line 45, trigger word "form[": - name = request.form['section'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 3: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 4: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 5: -File: agent/agent/views/house.py - > User input at line 34, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 36: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 38: data = cmgmt.queryCommunitiesByUserId(user, q) - File: agent/agent/views/house.py - > Line 33: ret_MAYBE_FUNCTION_NAME = jsonify('code''msg'-1'unkown query') -File: agent/agent/views/house.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0toselect(data)) - -Vulnerability 6: -File: agent/agent/views/house.py - > User input at line 45, trigger word "form[": - community_name = request.form['community'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - -Vulnerability 7: -File: agent/agent/views/house.py - > User input at line 46, trigger word "form[": - location = request.form['location'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - - - -brianly/flask-mega-tutorial -https://github.com/brianly/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-12 14:43:49.059916 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ivosevicmikica/testiranje -https://github.com/ivosevicmikica/testiranje -Entry file: testiranje/index.py -Scanned: 2016-10-12 14:43:56.391643 -No vulnerabilities found. - - -myevan/microblog -https://github.com/myevan/microblog -Entry file: microblog/views.py -Scanned: 2016-10-12 14:44:05.736915 -No vulnerabilities found. - - -Eleonore9/StreetMap_ChallengePy -https://github.com/Eleonore9/StreetMap_ChallengePy -Entry file: StreetMap_ChallengePy/StreetMap.py -Scanned: 2016-10-12 14:44:09.189241 -No vulnerabilities found. - - -eriktaubeneck/flask-s3-assets-example -https://github.com/eriktaubeneck/flask-s3-assets-example -Entry file: flask-s3-assets-example/app/__init__.py -Scanned: 2016-10-12 14:44:18.586349 -No vulnerabilities found. - - -vasnake/mapfeatureserver -https://github.com/vasnake/mapfeatureserver -Entry file: None -Scanned: 2016-10-12 14:44:31.640826 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vasnake/mapfeatureserver. - -EvilDmitri/FlaskProject_FuncExe -https://github.com/EvilDmitri/FlaskProject_FuncExe -Entry file: None -Scanned: 2016-10-12 14:44:40.329096 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -epelz/flask-fb-demo -https://github.com/epelz/flask-fb-demo -Entry file: flask-fb-demo/main.py -Scanned: 2016-10-12 14:44:44.662680 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tonilxm/1stFlask -https://github.com/tonilxm/1stFlask -Entry file: 1stFlask/src/lib/flask/sessions.py -Scanned: 2016-10-12 14:44:52.719233 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cldershem/WebFlask-CleanTemplate -https://github.com/cldershem/WebFlask-CleanTemplate -Entry file: None -Scanned: 2016-10-12 14:45:01.867190 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -brooks/python-flask-sample -https://github.com/brooks/python-flask-sample -Entry file: python-flask-sample/hello.py -Scanned: 2016-10-12 14:45:10.080208 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py - -palei/Just-Another-Flask-App -https://github.com/palei/Just-Another-Flask-App -Entry file: Just-Another-Flask-App/app/__init__.py -Scanned: 2016-10-12 14:45:11.955515 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -noisufnoc/HowToFlask -https://github.com/noisufnoc/HowToFlask -Entry file: HowToFlask/app.py -Scanned: 2016-10-12 14:45:17.313270 -No vulnerabilities found. - - -FriendCode/python-flask-sample -https://github.com/FriendCode/python-flask-sample -Entry file: python-flask-sample/hello.py -Scanned: 2016-10-12 14:45:28.355221 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py - -wavrin/flask-mongo-site -https://github.com/wavrin/flask-mongo-site -Entry file: flask-mongo-site/blog/__init__.py -Scanned: 2016-10-12 14:45:37.173880 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marulkan/nagios-status-flask -https://github.com/marulkan/nagios-status-flask -Entry file: nagios-status-flask/hello.py -Scanned: 2016-10-12 14:45:45.578018 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thrisp/flarf -https://github.com/thrisp/flarf -Entry file: flarf/examples/example.py -Scanned: 2016-10-12 14:45:51.267171 -No vulnerabilities found. - - -NSkelsey/trance_piano -https://github.com/NSkelsey/trance_piano -Entry file: trance_piano/app.py -Scanned: 2016-10-12 14:46:07.105865 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lhr530124/nozomiServer -https://github.com/lhr530124/nozomiServer -Entry file: nozomiServer/app.py -Scanned: 2016-10-12 14:46:14.478765 -No vulnerabilities found. - - -skrieder/microblog -https://github.com/skrieder/microblog -Entry file: None -Scanned: 2016-10-12 14:46:23.869391 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -carlosvin/cmsflask -https://github.com/carlosvin/cmsflask -Entry file: cmsflask/cmsflask/__init__.py -Scanned: 2016-10-12 14:46:25.301601 -No vulnerabilities found. - - -Sadhanandh/Fb-page-manager -https://github.com/Sadhanandh/Fb-page-manager -Entry file: Fb-page-manager/flask_app.py -Scanned: 2016-10-12 14:46:29.730270 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thomas-/pyshorturls -https://github.com/thomas-/pyshorturls -Entry file: pyshorturls/short.py -Scanned: 2016-10-12 14:46:34.425424 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sangallimarco/arduino_raspberry_garden_ui -https://github.com/sangallimarco/arduino_raspberry_garden_ui -Entry file: arduino_raspberry_garden_ui/main.py -Scanned: 2016-10-12 14:46:39.272644 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sigilioso/long_polling_example -https://github.com/sigilioso/long_polling_example -Entry file: long_polling_example/server.py -Scanned: 2016-10-12 14:46:51.079835 -No vulnerabilities found. - - -zxt/quotl -https://github.com/zxt/quotl -Entry file: quotl/quotl/__init__.py -Scanned: 2016-10-12 14:46:58.570392 -No vulnerabilities found. - - -bdeeney/crudite -https://github.com/bdeeney/crudite -Entry file: crudite/examples/hello_flask.py -Scanned: 2016-10-12 14:47:08.010559 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luhn/address-book -https://github.com/luhn/address-book -Entry file: address-book/app.py -Scanned: 2016-10-12 14:47:12.424179 -No vulnerabilities found. - - -cameronbracken/pitchforksearch -https://github.com/cameronbracken/pitchforksearch -Entry file: pitchforksearch/pitchforksearch/__init__.py -Scanned: 2016-10-12 14:47:18.889167 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chromy/pithy -https://github.com/chromy/pithy -Entry file: None -Scanned: 2016-10-12 14:47:25.320025 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chromy/pithy. - -adedot/countries_project -https://github.com/adedot/countries_project -Entry file: countries_project/flaskr.py -Scanned: 2016-10-12 14:47:29.668758 -No vulnerabilities found. - - -titainium/PRPHOTO -https://github.com/titainium/PRPHOTO -Entry file: PRPHOTO/prphoto.py -Scanned: 2016-10-12 14:47:39.944944 -No vulnerabilities found. - - -keybits/stripe-experiments -https://github.com/keybits/stripe-experiments -Entry file: stripe-experiments/app.py -Scanned: 2016-10-12 14:47:41.296193 -No vulnerabilities found. - - -izaac/twitty -https://github.com/izaac/twitty -Entry file: twitty/twitty.py -Scanned: 2016-10-12 14:47:45.749140 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fc-thrisp-hurrata-dlm-graveyard/flack -https://github.com/fc-thrisp-hurrata-dlm-graveyard/flack -Entry file: flack/tests/test_app/__init__.py -Scanned: 2016-10-12 14:47:52.190188 -No vulnerabilities found. - - -cenk/github-flask -https://github.com/cenk/github-flask -Entry file: github-flask/test_flask_github.py -Scanned: 2016-10-12 14:48:08.630803 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -davidism/basic_flask -https://github.com/davidism/basic_flask -Entry file: basic_flask/basic_app/__init__.py -Scanned: 2016-10-12 14:48:25.923391 -No vulnerabilities found. - - -quokkaproject/quokka -https://github.com/quokkaproject/quokka -Entry file: quokka/quokka/tests/flask_csrf_test_client.py -Scanned: 2016-10-12 14:48:34.458288 -No vulnerabilities found. - - -akprasad/flask-forum -https://github.com/akprasad/flask-forum -Entry file: flask-forum/application/__init__.py -Scanned: 2016-10-12 14:48:41.462998 -No vulnerabilities found. - - -miguelgrinberg/Flask-Runner -https://github.com/miguelgrinberg/Flask-Runner -Entry file: Flask-Runner/examples/runner.py -Scanned: 2016-10-12 14:48:45.995883 -No vulnerabilities found. - - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 08:11:24.915779 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 08:11:26.246544 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 08:11:27.963021 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 08:11:28.473730 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 08:11:29.515950 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 08:11:30.535521 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 08:11:33.880936 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 08:11:34.403575 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 08:11:35.417208 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 08:11:36.440531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-18 08:11:38.682909 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-18 08:11:39.681068 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-18 08:11:40.249110 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-18 08:12:23.420588 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 08:12:23.922133 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-18 08:12:26.173178 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 08:12:27.400028 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 08:12:30.023063 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-18 08:12:30.555396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-18 08:12:33.235919 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-18 08:12:34.691829 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-18 08:12:35.208274 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-18 08:12:37.008561 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-18 08:12:38.326310 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-18 08:12:39.568423 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-18 08:12:40.068455 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-18 08:12:40.570711 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-18 08:12:41.776165 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-18 08:12:42.315914 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-18 08:12:44.780121 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 08:12:46.910307 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-18 08:12:48.690731 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-18 08:12:51.676943 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-18 08:12:54.177473 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-18 08:13:23.567117 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-18 08:13:24.079266 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-18 08:13:25.417470 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-18 08:13:27.829119 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-18 08:13:28.363532 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 08:13:28.864068 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-18 08:13:30.172271 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-18 08:13:32.381019 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-18 08:13:34.162825 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-18 08:13:36.849191 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-18 08:13:38.636915 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-18 08:13:40.938118 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-18 08:13:42.549817 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-18 08:13:43.603072 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-18 08:13:46.041250 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-18 08:13:47.034308 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-18 08:13:48.014451 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-18 08:13:49.208534 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-18 08:13:50.540502 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 08:13:53.887725 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-18 08:14:23.122241 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-18 08:14:25.705746 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-18 08:14:26.232298 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-18 08:14:27.444377 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-18 08:14:28.776840 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-18 08:14:31.747795 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 08:14:32.252219 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-18 08:14:33.773355 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 08:14:36.564019 -No vulnerabilities found. - - -zzzsochi/Flask-Gravatar -https://github.com/zzzsochi/Flask-Gravatar -Entry file: Flask-Gravatar/tests/test_core.py -Scanned: 2016-10-18 08:14:38.562460 -No vulnerabilities found. - - -dag/flask-zodb -https://github.com/dag/flask-zodb -Entry file: flask-zodb/flask_zodb.py -Scanned: 2016-10-18 08:14:39.085435 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -zen4ever/route53manager -https://github.com/zen4ever/route53manager -Entry file: route53manager/route53/__init__.py -Scanned: 2016-10-18 08:14:39.589132 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-kitchensink -https://github.com/mitsuhiko/flask-kitchensink -Entry file: flask-kitchensink/example-code/hello.py -Scanned: 2016-10-18 08:14:40.094300 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyeseast/flask-docviewer -https://github.com/eyeseast/flask-docviewer -Entry file: flask-docviewer/docviewer/app.py -Scanned: 2016-10-18 08:14:41.325448 -No vulnerabilities found. - - -dag/flask-attest -https://github.com/dag/flask-attest -Entry file: flask-attest/tests.py -Scanned: 2016-10-18 08:14:41.865295 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ekalinin/flask-noextref -https://github.com/ekalinin/flask-noextref -Entry file: flask-noextref/test_noextref.py -Scanned: 2016-10-18 08:14:44.192667 -No vulnerabilities found. - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-18 08:14:47.783476 -Vulnerability 1: -File: flitter/flitter/controllers/user.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flitter/flitter/controllers/user.py - > Line 24: session['user'] = username - File: flitter/flitter/controllers/user.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry.entries',username=username)) - File: flitter/flitter/controllers/user.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('signup.html',error=error) - File: flitter/flitter/controllers/user.py - > Line 15: ret_MAYBE_FUNCTION_NAME = redirect_to_user_page() -File: flitter/flitter/controllers/user.py - > reaches line 25, trigger word "flash(": - flash('Welcome, {0}.'.format(username)) - - - -aaront/calcmymarks2 -https://github.com/aaront/calcmymarks2 -Entry file: calcmymarks2/main.py -Scanned: 2016-10-18 08:14:48.304704 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-feedback -https://github.com/mitsuhiko/flask-feedback -Entry file: flask-feedback/feedback.py -Scanned: 2016-10-18 08:14:49.383943 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilsaj/flask-admin-old -https://github.com/wilsaj/flask-admin-old -Entry file: flask-admin-old/test_admin.py -Scanned: 2016-10-18 08:14:58.221312 -No vulnerabilities found. - - -leandrosilva/flaskito -https://github.com/leandrosilva/flaskito -Entry file: flaskito/src/flaskito.py -Scanned: 2016-10-18 08:14:58.774707 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/Flask-API-Server -https://github.com/marchon/Flask-API-Server -Entry file: Flask-API-Server/apiserver/tests/app.py -Scanned: 2016-10-18 08:15:00.118659 -No vulnerabilities found. - - -kapilreddy/Shabda-Sangraha -https://github.com/kapilreddy/Shabda-Sangraha -Entry file: Shabda-Sangraha/dict.py -Scanned: 2016-10-18 08:15:23.150239 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tooxie/flask-syrinx -https://github.com/tooxie/flask-syrinx -Entry file: flask-syrinx/syrinx/__init__.py -Scanned: 2016-10-18 08:15:24.667221 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshourisman/flask-shortly -https://github.com/joshourisman/flask-shortly -Entry file: flask-shortly/shortly/__init__.py -Scanned: 2016-10-18 08:15:28.505207 -No vulnerabilities found. - - diff --git a/scan_results/archived_24_10_scan.pyt b/scan_results/archived_24_10_scan.pyt deleted file mode 100644 index 8c0f8fd8..00000000 --- a/scan_results/archived_24_10_scan.pyt +++ /dev/null @@ -1,139024 +0,0 @@ -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 08:19:42.436429 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 08:19:43.655870 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 08:19:45.364097 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 08:19:45.863042 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 08:19:46.916123 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 08:19:47.933989 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 08:22:56.209701 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 08:22:57.153085 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 08:22:58.859685 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 08:22:59.365883 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 08:23:00.438524 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 08:23:01.468237 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 08:23:04.811273 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 08:23:05.330904 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 08:23:06.309848 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 08:23:07.331669 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 11:41:35.562564 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 11:41:36.659504 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 11:41:40.022878 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 11:41:40.554167 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 11:41:41.671421 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 11:41:42.739624 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 11:41:46.113655 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 11:41:46.624298 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 11:41:47.650436 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 11:41:48.687696 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-18 11:41:51.032280 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-18 11:41:52.070296 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-18 11:41:52.606835 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-18 11:42:34.813432 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 11:42:35.357360 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-18 11:42:37.610225 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 11:42:38.905234 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 11:42:38.905495 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 11:42:44.172662 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 11:42:44.172913 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-18 11:42:44.704949 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-18 11:42:48.301729 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-18 11:42:49.946381 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-18 11:42:50.487107 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-18 11:42:52.361151 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-18 11:42:53.752367 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-18 11:42:55.135776 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-18 11:42:55.656497 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-18 11:42:56.164565 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-18 11:42:57.560567 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-18 11:42:58.097159 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-18 11:43:04.242366 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 11:43:06.464977 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-18 11:43:10.158160 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-18 11:43:16.947372 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-18 11:43:22.000280 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-18 11:43:34.507666 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-18 11:43:36.072990 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-18 11:43:37.470399 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-18 11:43:42.298217 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-18 11:43:42.875724 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 11:43:43.388066 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-18 11:43:44.812093 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-18 11:43:46.239003 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-18 11:43:47.770811 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-18 11:43:51.984241 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-18 11:43:53.920507 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-18 11:43:56.333991 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-18 11:43:58.879143 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-18 11:43:59.985169 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-18 11:44:04.143798 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-18 11:44:05.148825 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-18 11:44:06.193353 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-18 11:44:08.454930 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-18 11:44:11.875376 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 11:44:19.200120 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-18 11:44:34.383681 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-18 11:44:39.060150 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-18 11:44:39.633654 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-18 11:44:40.982438 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-18 11:44:40.982703 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-18 11:44:42.522464 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-18 11:44:45.985672 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-18 11:44:45.985875 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 11:44:46.492996 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-18 11:44:47.028629 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 11:44:49.827669 -No vulnerabilities found. - - -zzzsochi/Flask-Gravatar -https://github.com/zzzsochi/Flask-Gravatar -Entry file: Flask-Gravatar/tests/test_core.py -Scanned: 2016-10-18 11:44:54.119226 -No vulnerabilities found. - - -dag/flask-zodb -https://github.com/dag/flask-zodb -Entry file: flask-zodb/flask_zodb.py -Scanned: 2016-10-18 11:44:54.859121 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -zen4ever/route53manager -https://github.com/zen4ever/route53manager -Entry file: route53manager/route53/__init__.py -Scanned: 2016-10-18 11:44:55.377404 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-kitchensink -https://github.com/mitsuhiko/flask-kitchensink -Entry file: flask-kitchensink/example-code/hello.py -Scanned: 2016-10-18 11:44:55.897829 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyeseast/flask-docviewer -https://github.com/eyeseast/flask-docviewer -Entry file: flask-docviewer/docviewer/app.py -Scanned: 2016-10-18 11:44:57.179508 -No vulnerabilities found. - - -dag/flask-attest -https://github.com/dag/flask-attest -Entry file: flask-attest/tests.py -Scanned: 2016-10-18 11:44:57.731470 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ekalinin/flask-noextref -https://github.com/ekalinin/flask-noextref -Entry file: flask-noextref/test_noextref.py -Scanned: 2016-10-18 11:45:01.231357 -No vulnerabilities found. - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-18 11:45:05.946703 -Vulnerability 1: -File: flitter/flitter/controllers/user.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flitter/flitter/controllers/user.py - > Line 24: session['user'] = username - File: flitter/flitter/controllers/user.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry.entries',username=username)) - File: flitter/flitter/controllers/user.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('signup.html',error=error) - File: flitter/flitter/controllers/user.py - > Line 15: ret_MAYBE_FUNCTION_NAME = redirect_to_user_page() -File: flitter/flitter/controllers/user.py - > reaches line 25, trigger word "flash(": - flash('Welcome, {0}.'.format(username)) - - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-18 11:45:05.946946 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -aaront/calcmymarks2 -https://github.com/aaront/calcmymarks2 -Entry file: calcmymarks2/main.py -Scanned: 2016-10-18 11:45:06.494266 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-feedback -https://github.com/mitsuhiko/flask-feedback -Entry file: flask-feedback/feedback.py -Scanned: 2016-10-18 11:45:07.651123 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilsaj/flask-admin-old -https://github.com/wilsaj/flask-admin-old -Entry file: flask-admin-old/test_admin.py -Scanned: 2016-10-18 11:45:18.132111 -No vulnerabilities found. - - -leandrosilva/flaskito -https://github.com/leandrosilva/flaskito -Entry file: flaskito/src/flaskito.py -Scanned: 2016-10-18 11:45:21.046712 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 14:11:54.283676 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 14:11:55.370283 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 14:11:58.220001 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 14:11:58.741469 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 14:11:59.833654 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 14:12:00.864551 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 14:12:04.096175 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 14:12:04.592227 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 14:12:05.573134 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 14:12:06.581816 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-18 14:12:08.946707 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-18 14:12:09.909178 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-18 14:12:10.401206 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-18 14:12:53.222465 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 14:12:53.747317 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-18 14:12:55.984538 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 14:12:56.498114 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 14:12:56.498287 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 14:12:59.006771 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 14:12:59.007004 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-18 14:12:59.558813 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-18 14:13:02.621316 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-18 14:13:04.084284 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-18 14:13:04.593997 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-18 14:13:06.412361 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-18 14:13:07.623222 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-18 14:13:08.862211 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-18 14:13:09.500208 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-18 14:13:10.006470 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-18 14:13:11.300345 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-18 14:13:11.828363 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-18 14:13:17.317700 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 14:13:19.433969 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-18 14:13:22.596874 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-18 14:13:28.853459 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-18 14:13:33.624171 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-18 14:13:52.895578 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-18 14:13:54.429684 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-18 14:13:55.727953 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-18 14:14:00.013749 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-18 14:14:00.549121 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 14:14:01.056335 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-18 14:14:02.397050 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-18 14:14:03.764227 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-18 14:14:05.135985 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-18 14:14:08.878675 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-18 14:14:10.592705 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-18 14:14:12.838281 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-18 14:14:15.058800 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-18 14:14:16.153446 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-18 14:14:19.784903 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-18 14:14:20.772409 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-18 14:14:21.753289 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-18 14:14:22.966470 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-18 14:14:24.362968 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 14:14:30.970323 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-18 14:14:52.452695 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-18 14:14:56.795535 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-18 14:14:57.330666 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-18 14:14:57.843380 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-18 14:14:57.843695 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-18 14:14:59.348031 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-18 14:15:01.938538 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-18 14:15:01.939141 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 14:15:03.429720 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-18 14:15:04.925155 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 14:15:07.626716 -No vulnerabilities found. - - -zzzsochi/Flask-Gravatar -https://github.com/zzzsochi/Flask-Gravatar -Entry file: Flask-Gravatar/tests/test_core.py -Scanned: 2016-10-18 14:15:11.465294 -No vulnerabilities found. - - -dag/flask-zodb -https://github.com/dag/flask-zodb -Entry file: flask-zodb/flask_zodb.py -Scanned: 2016-10-18 14:15:11.980271 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -zen4ever/route53manager -https://github.com/zen4ever/route53manager -Entry file: route53manager/route53/__init__.py -Scanned: 2016-10-18 14:15:12.472445 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-kitchensink -https://github.com/mitsuhiko/flask-kitchensink -Entry file: flask-kitchensink/example-code/hello.py -Scanned: 2016-10-18 14:15:12.966640 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyeseast/flask-docviewer -https://github.com/eyeseast/flask-docviewer -Entry file: flask-docviewer/docviewer/app.py -Scanned: 2016-10-18 14:15:14.205580 -No vulnerabilities found. - - -dag/flask-attest -https://github.com/dag/flask-attest -Entry file: flask-attest/tests.py -Scanned: 2016-10-18 14:15:14.730899 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ekalinin/flask-noextref -https://github.com/ekalinin/flask-noextref -Entry file: flask-noextref/test_noextref.py -Scanned: 2016-10-18 14:15:17.062437 -No vulnerabilities found. - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-18 14:15:20.548183 -Vulnerability 1: -File: flitter/flitter/controllers/user.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flitter/flitter/controllers/user.py - > Line 24: session['user'] = username - File: flitter/flitter/controllers/user.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry.entries',username=username)) - File: flitter/flitter/controllers/user.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('signup.html',error=error) - File: flitter/flitter/controllers/user.py - > Line 15: ret_MAYBE_FUNCTION_NAME = redirect_to_user_page() -File: flitter/flitter/controllers/user.py - > reaches line 25, trigger word "flash(": - flash('Welcome, {0}.'.format(username)) - - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-18 14:15:20.548367 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -aaront/calcmymarks2 -https://github.com/aaront/calcmymarks2 -Entry file: calcmymarks2/main.py -Scanned: 2016-10-18 14:15:21.049435 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-feedback -https://github.com/mitsuhiko/flask-feedback -Entry file: flask-feedback/feedback.py -Scanned: 2016-10-18 14:15:22.122721 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilsaj/flask-admin-old -https://github.com/wilsaj/flask-admin-old -Entry file: flask-admin-old/test_admin.py -Scanned: 2016-10-18 14:15:42.179811 -No vulnerabilities found. - - -leandrosilva/flaskito -https://github.com/leandrosilva/flaskito -Entry file: flaskito/src/flaskito.py -Scanned: 2016-10-18 14:15:42.698788 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/Flask-API-Server -https://github.com/marchon/Flask-API-Server -Entry file: Flask-API-Server/apiserver/tests/app.py -Scanned: 2016-10-18 14:15:44.024348 -No vulnerabilities found. - - -kapilreddy/Shabda-Sangraha -https://github.com/kapilreddy/Shabda-Sangraha -Entry file: Shabda-Sangraha/dict.py -Scanned: 2016-10-18 14:15:53.039938 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tooxie/flask-syrinx -https://github.com/tooxie/flask-syrinx -Entry file: flask-syrinx/syrinx/__init__.py -Scanned: 2016-10-18 14:15:55.573531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshourisman/flask-shortly -https://github.com/joshourisman/flask-shortly -Entry file: flask-shortly/shortly/__init__.py -Scanned: 2016-10-18 14:15:59.378014 -No vulnerabilities found. - - -jamiltron/fitgen -https://github.com/jamiltron/fitgen -Entry file: fitgen/fitgen.py -Scanned: 2016-10-18 14:16:01.839794 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomviner/Flask-Name-that-actor-or-movie -https://github.com/tomviner/Flask-Name-that-actor-or-movie -Entry file: Flask-Name-that-actor-or-movie/namer.py -Scanned: 2016-10-18 14:16:03.812399 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/checkinmapper -https://github.com/marchon/checkinmapper -Entry file: checkinmapper/checkinmapper.py -Scanned: 2016-10-18 14:16:05.360565 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -comfuture/simplesite -https://github.com/comfuture/simplesite -Entry file: simplesite/simplesite/core.py -Scanned: 2016-10-18 14:16:06.873371 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/flylons -https://github.com/marchon/flylons -Entry file: flylons/application/__init__.py -Scanned: 2016-10-18 14:16:07.386548 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zachwill/flask-engine -https://github.com/zachwill/flask-engine -Entry file: flask-engine/libs/flask/sessions.py -Scanned: 2016-10-18 14:16:12.988985 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spantaleev/flask-sijax -https://github.com/spantaleev/flask-sijax -Entry file: flask-sijax/examples/comet.py -Scanned: 2016-10-18 14:16:14.573057 -No vulnerabilities found. - - -utahta/Flask-MVC-Pattern -https://github.com/utahta/Flask-MVC-Pattern -Entry file: Flask-MVC-Pattern/main.py -Scanned: 2016-10-18 14:16:15.771105 -No vulnerabilities found. - - -jzempel/flask-exceptional -https://github.com/jzempel/flask-exceptional -Entry file: flask-exceptional/flask_exceptional.py -Scanned: 2016-10-18 14:16:16.263481 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qsnake/flask -https://github.com/qsnake/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 14:16:17.809050 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -joeyespo/flask-scaffold -https://github.com/joeyespo/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-18 14:16:18.335435 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iwebhosting/collectd-flask -https://github.com/iwebhosting/collectd-flask -Entry file: collectd-flask/collectdflask.py -Scanned: 2016-10-18 14:16:19.714950 -No vulnerabilities found. - - -yxm0513/flask-ims -https://github.com/yxm0513/flask-ims -Entry file: flask-ims/flask/sessions.py -Scanned: 2016-10-18 14:16:21.241116 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fay/flask-skeleton -https://github.com/fay/flask-skeleton -Entry file: None -Scanned: 2016-10-18 14:16:22.226183 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fay/flask-skeleton. - -joshourisman/flask-beans -https://github.com/joshourisman/flask-beans -Entry file: flask-beans/beans.py -Scanned: 2016-10-18 14:16:23.452554 -No vulnerabilities found. - - -jjinux/pyteladventure -https://github.com/jjinux/pyteladventure -Entry file: pyteladventure/pyteladventure/__init__.py -Scanned: 2016-10-18 14:16:23.975994 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mchambliss/flask -https://github.com/mchambliss/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 14:16:45.514677 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -robi42/backbone-flask -https://github.com/robi42/backbone-flask -Entry file: backbone-flask/app.py -Scanned: 2016-10-18 14:17:00.014640 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-18 14:17:02.590878 -No vulnerabilities found. - - -joshfinnie/Flask-shrtn -https://github.com/joshfinnie/Flask-shrtn -Entry file: Flask-shrtn/Flask-shrtn.py -Scanned: 2016-10-18 14:17:03.123305 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomatohater/goonhilly -https://github.com/tomatohater/goonhilly -Entry file: goonhilly/goonhilly.py -Scanned: 2016-10-18 14:17:04.880933 -No vulnerabilities found. - - -jmoiron/jmoiron.net -https://github.com/jmoiron/jmoiron.net -Entry file: None -Scanned: 2016-10-18 14:17:05.404310 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fzuslide/video_new -https://github.com/fzuslide/video_new -Entry file: video_new/application.py -Scanned: 2016-10-18 14:17:07.712407 -No vulnerabilities found. - - -tomatohater/lydon -https://github.com/tomatohater/lydon -Entry file: lydon/lydon/__init__.py -Scanned: 2016-10-18 14:17:09.094706 -No vulnerabilities found. - - -williamratcliff/django-feedback -https://github.com/williamratcliff/django-feedback -Entry file: django-feedback/feedback.py -Scanned: 2016-10-18 14:17:13.624404 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joelbm24/blog -https://github.com/joelbm24/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-18 14:17:15.598809 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoprocker/mylons -https://github.com/hoprocker/mylons -Entry file: mylons/lib/python2.5/site-packages/Flask-0.6.1-py2.5.egg/flask/app.py -Scanned: 2016-10-18 14:17:17.235610 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crisisking/bsg-raffle -https://github.com/crisisking/bsg-raffle -Entry file: bsg-raffle/raffle.py -Scanned: 2016-10-18 14:17:18.653193 -Vulnerability 1: -File: bsg-raffle/raffle.py - > User input at line 39, trigger word "form[": - user_id = int(request.form['user_id']) -File: bsg-raffle/raffle.py - > reaches line 42, trigger word "execute(": - g.db.execute('INSERT INTO winners(participant_id, prize_name) - VALUES (?, ?)', (user_id, prize)) - -Vulnerability 2: -File: bsg-raffle/raffle.py - > User input at line 40, trigger word "form[": - prize = request.form['prize'] -Reassigned in: - File: bsg-raffle/raffle.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('winner_added.html',name=username[0], prize=prize) -File: bsg-raffle/raffle.py - > reaches line 42, trigger word "execute(": - g.db.execute('INSERT INTO winners(participant_id, prize_name) - VALUES (?, ?)', (user_id, prize)) - -Vulnerability 3: -File: bsg-raffle/raffle.py - > User input at line 66, trigger word "form[": - username = request.form['username'] -File: bsg-raffle/raffle.py - > reaches line 68, trigger word "execute(": - g.db.execute('INSERT INTO participants(name) - VALUES (?)', (username)) - -Vulnerability 4: -File: bsg-raffle/raffle.py - > User input at line 66, trigger word "form[": - username = request.form['username'] -File: bsg-raffle/raffle.py - > reaches line 70, trigger word "flash(": - flash('%s added successfully!' % username) - - - -crisisking/bsg-raffle -https://github.com/crisisking/bsg-raffle -Entry file: bsg-raffle/raffle.py -Scanned: 2016-10-18 14:17:18.653472 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -adamgreig/pyautopull -https://github.com/adamgreig/pyautopull -Entry file: pyautopull/pyautopull.py -Scanned: 2016-10-18 14:17:19.916480 -No vulnerabilities found. - - -sean-/flask-skeleton -https://github.com/sean-/flask-skeleton -Entry file: None -Scanned: 2016-10-18 14:17:21.116150 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sean-/flask-skeleton. - -Runscope/httpbin -https://github.com/Runscope/httpbin -Entry file: httpbin/httpbin/filters.py -Scanned: 2016-10-18 14:17:21.720077 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -hasgeek/flask-lastuser -https://github.com/hasgeek/flask-lastuser -Entry file: flask-lastuser/tests/test_mergeuser.py -Scanned: 2016-10-18 14:17:24.048029 -No vulnerabilities found. - - -BooBSD/flask-odesk -https://github.com/BooBSD/flask-odesk -Entry file: flask-odesk/tests.py -Scanned: 2016-10-18 14:17:24.547197 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cool-shark/redimon -https://github.com/cool-shark/redimon -Entry file: redimon/src/redimon/app.py -Scanned: 2016-10-18 14:17:26.043351 -No vulnerabilities found. - - -pcsanwald/flask_site -https://github.com/pcsanwald/flask_site -Entry file: flask_site/mysite.py -Scanned: 2016-10-18 14:17:44.553810 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-18 14:17:46.057840 -No vulnerabilities found. - - -dag/flask-sassy -https://github.com/dag/flask-sassy -Entry file: flask-sassy/tests/__init__.py -Scanned: 2016-10-18 14:17:54.348783 -No vulnerabilities found. - - -charlieevett/jiffy-portal -https://github.com/charlieevett/jiffy-portal -Entry file: jiffy-portal/portal/app.py -Scanned: 2016-10-18 14:17:57.786506 -No vulnerabilities found. - - -tomekwojcik/Flask-Module-Static-Files -https://github.com/tomekwojcik/Flask-Module-Static-Files -Entry file: Flask-Module-Static-Files/stest/__init__.py -Scanned: 2016-10-18 14:18:00.125611 -No vulnerabilities found. - - -justjkk/dotpath -https://github.com/justjkk/dotpath -Entry file: dotpath/run.py -Scanned: 2016-10-18 14:18:00.650538 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -almet/semantic-bookclub -https://github.com/almet/semantic-bookclub -Entry file: semantic-bookclub/app/web.py -Scanned: 2016-10-18 14:18:02.726664 -Vulnerability 1: -File: semantic-bookclub/app/web.py - > User input at line 81, trigger word ".data": - book_title = dict(self.book.choices)[self.book.data] -File: semantic-bookclub/app/web.py - > reaches line 82, trigger word "flash(": - flash('%s have successfully borrowed %s' % (self.borrower.data, book_title)) - -Vulnerability 2: -File: semantic-bookclub/app/web.py - > User input at line 101, trigger word ".data": - member = Member.get_by(foaf_givenName=self.member.data).one() -File: semantic-bookclub/app/web.py - > reaches line 105, trigger word "flash(": - flash('%s now owns %s' % (member.foaf_givenName.first, book.dcterms_title.first)) - -Vulnerability 3: -File: semantic-bookclub/app/web.py - > User input at line 102, trigger word ".data": - book = Book.get_by(dcterms_identifier=self.book.data).one() -File: semantic-bookclub/app/web.py - > reaches line 105, trigger word "flash(": - flash('%s now owns %s' % (member.foaf_givenName.first, book.dcterms_title.first)) - - - -almet/semantic-bookclub -https://github.com/almet/semantic-bookclub -Entry file: semantic-bookclub/app/web.py -Scanned: 2016-10-18 14:18:02.727432 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -t9md/snippy -https://github.com/t9md/snippy -Entry file: snippy/snippy.py -Scanned: 2016-10-18 14:18:03.740820 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stehem/Tywna -https://github.com/stehem/Tywna -Entry file: Tywna/application/__init__.py -Scanned: 2016-10-18 14:18:09.528717 -No vulnerabilities found. - - -hoprocker/mylons -https://github.com/hoprocker/mylons -Entry file: mylons/lib/python2.5/site-packages/Flask-0.6.1-py2.5.egg/flask/app.py -Scanned: 2016-10-18 14:18:10.146341 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/bitpit-https-bridge -https://github.com/maxcountryman/bitpit-https-bridge -Entry file: bitpit-https-bridge/httpstobitpit/__init__.py -Scanned: 2016-10-18 14:18:11.502975 -No vulnerabilities found. - - -maxcountryman/flask-bcrypt -https://github.com/maxcountryman/flask-bcrypt -Entry file: flask-bcrypt/flask_bcrypt.py -Scanned: 2016-10-18 14:18:14.519688 -No vulnerabilities found. - - -kennethreitz-archive/flask-rest -https://github.com/kennethreitz-archive/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-18 14:18:15.505600 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tdryer/flask-forum -https://github.com/tdryer/flask-forum -Entry file: flask-forum/app.py -Scanned: 2016-10-18 14:18:16.868260 -Vulnerability 1: -File: flask-forum/app.py - > User input at line 124, trigger word ".data": - new_topic_id = post_topic(form.subject.data, form.content.data) -Reassigned in: - File: flask-forum/app.py - > Line 127: ret_MAYBE_FUNCTION_NAME = render_template('newtopic.html',form=form) -File: flask-forum/app.py - > reaches line 126, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/topic/' + new_topic_id) - -Vulnerability 2: -File: flask-forum/app.py - > User input at line 196, trigger word ".data": - username = form.username.data -File: flask-forum/app.py - > reaches line 199, trigger word "execute(": - g.db.execute('INSERT INTO users (username, password_hash) values (?, ?)', [username, pw_hash]) - -Vulnerability 3: -File: flask-forum/app.py - > User input at line 197, trigger word ".data": - password = form.password1.data -Reassigned in: - File: flask-forum/app.py - > Line 198: pw_hash = hashpw(password, gensalt()) -File: flask-forum/app.py - > reaches line 199, trigger word "execute(": - g.db.execute('INSERT INTO users (username, password_hash) values (?, ?)', [username, pw_hash]) - - - -tdryer/flask-forum -https://github.com/tdryer/flask-forum -Entry file: flask-forum/app.py -Scanned: 2016-10-18 14:18:16.868483 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -dqminh/flask-mongoobject -https://github.com/dqminh/flask-mongoobject -Entry file: flask-mongoobject/examples_hello.py -Scanned: 2016-10-18 14:18:17.368744 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gmonnerat/flask-sandbox -https://github.com/gmonnerat/flask-sandbox -Entry file: flask-sandbox/hello/hello.py -Scanned: 2016-10-18 14:18:18.725502 -No vulnerabilities found. - - -DarkSector/wombat -https://github.com/DarkSector/wombat -Entry file: wombat/wombatdb.py -Scanned: 2016-10-18 14:18:19.258987 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lOlIl/Flask---Local-election -https://github.com/lOlIl/Flask---Local-election -Entry file: Flask---Local-election/app.py -Scanned: 2016-10-18 14:18:19.853661 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -paulftw/appengine-flask-template -https://github.com/paulftw/appengine-flask-template -Entry file: appengine-flask-template/app/app.py -Scanned: 2016-10-18 14:18:21.552148 -No vulnerabilities found. - - -flores/aquadoc -https://github.com/flores/aquadoc -Entry file: aquadoc/aquadoc.py -Scanned: 2016-10-18 14:18:23.322269 -No vulnerabilities found. - - -jorgeatorres/cotufa -https://github.com/jorgeatorres/cotufa -Entry file: cotufa/cotufa.py -Scanned: 2016-10-18 14:18:23.858971 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mbr/flask-kvsession -https://github.com/mbr/flask-kvsession -Entry file: flask-kvsession/tests/conftest.py -Scanned: 2016-10-18 14:18:27.125193 -No vulnerabilities found. - - -radekstepan/Flask-Skeleton-App -https://github.com/radekstepan/Flask-Skeleton-App -Entry file: Flask-Skeleton-App/flask_app.py -Scanned: 2016-10-18 14:18:45.084939 -No vulnerabilities found. - - -utahta/flask-on-fluxflex -https://github.com/utahta/flask-on-fluxflex -Entry file: flask-on-fluxflex/app/__init__.py -Scanned: 2016-10-18 14:18:46.977674 -No vulnerabilities found. - - -femmerling/brunch-flask-gae-skeleton -https://github.com/femmerling/brunch-flask-gae-skeleton -Entry file: brunch-flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 14:18:54.585187 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amcameron/gchartsdemo -https://github.com/amcameron/gchartsdemo -Entry file: gchartsdemo/charts.py -Scanned: 2016-10-18 14:18:57.916613 -No vulnerabilities found. - - -bagyr/flaskPage -https://github.com/bagyr/flaskPage -Entry file: flaskPage/__init__.py -Scanned: 2016-10-18 14:19:00.169809 -No vulnerabilities found. - - -sbook/flask-script -https://github.com/sbook/flask-script -Entry file: flask-script/tests.py -Scanned: 2016-10-18 14:19:03.669353 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joemarct/flask-gae-app -https://github.com/joemarct/flask-gae-app -Entry file: flask-gae-app/flask/app.py -Scanned: 2016-10-18 14:19:04.194472 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Bhagyashree-Mandora/The-Python-Task -https://github.com/Bhagyashree-Mandora/The-Python-Task -Entry file: The-Python-Task/main.py -Scanned: 2016-10-18 14:19:04.713860 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -piratesolutions/ps-website -https://github.com/piratesolutions/ps-website -Entry file: ps-website/app.py -Scanned: 2016-10-18 14:19:10.221508 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samrat/blogengine -https://github.com/samrat/blogengine -Entry file: blogengine/blogengine.py -Scanned: 2016-10-18 14:19:10.744298 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TimFletcher/cmprss -https://github.com/TimFletcher/cmprss -Entry file: cmprss/cmprss.py -Scanned: 2016-10-18 14:19:12.274622 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyvanee/mappy -https://github.com/andyvanee/mappy -Entry file: mappy/mappy.py -Scanned: 2016-10-18 14:19:12.837315 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -barnslig/foreveralonebook -https://github.com/barnslig/foreveralonebook -Entry file: foreveralonebook/foreveralonebook.py -Scanned: 2016-10-18 14:19:16.962719 -Vulnerability 1: -File: foreveralonebook/foreveralonebook.py - > User input at line 47, trigger word "form[": - entry = escape(request.form['entry']) -File: foreveralonebook/foreveralonebook.py - > reaches line 57, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_posts (u_id, content) VALUES ({0}, '{1}');'.format(session['u_id'], entry)) - -Vulnerability 2: -File: foreveralonebook/foreveralonebook.py - > User input at line 113, trigger word "form[": - password = hashlib.sha1(request.form['new_pw']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 115, trigger word "execute(": - g.db.cur.execute('UPDATE feabook_user SET password = '{0}' WHERE id = '{1}';'.format(password, session['u_id'])) - -Vulnerability 3: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 157, trigger word "execute(": - g.db.cur.execute('SELECT username FROM feabook_user WHERE username = '{0}';'.format(username)) - -Vulnerability 4: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 164, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_user (username, password) VALUES ('{0}', '{1}');'.format(username, password)) - -Vulnerability 5: -File: foreveralonebook/foreveralonebook.py - > User input at line 152, trigger word "form[": - password = hashlib.sha1(request.form['password']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 164, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_user (username, password) VALUES ('{0}', '{1}');'.format(username, password)) - -Vulnerability 6: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 169, trigger word "execute(": - g.db.cur.execute('SELECT id, username FROM feabook_user WHERE username = '{0}';'.format(username)) - -Vulnerability 7: -File: foreveralonebook/foreveralonebook.py - > User input at line 193, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 222: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 223: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 197, trigger word "execute(": - g.db.cur.execute('SELECT id, username, password FROM feabook_user WHERE username = '{0}' AND password = '{1}';'.format(username, password)) - -Vulnerability 8: -File: foreveralonebook/foreveralonebook.py - > User input at line 194, trigger word "form[": - password = hashlib.sha1(request.form['password']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 197, trigger word "execute(": - g.db.cur.execute('SELECT id, username, password FROM feabook_user WHERE username = '{0}' AND password = '{1}';'.format(username, password)) - - - -barnslig/foreveralonebook -https://github.com/barnslig/foreveralonebook -Entry file: foreveralonebook/foreveralonebook.py -Scanned: 2016-10-18 14:19:16.963160 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -geek22com/referral_dashboard_engine -https://github.com/geek22com/referral_dashboard_engine -Entry file: referral_dashboard_engine/heymoose/__init__.py -Scanned: 2016-10-18 14:19:17.512551 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dqminh/flask-lettuce -https://github.com/dqminh/flask-lettuce -Entry file: flask-lettuce/test.py -Scanned: 2016-10-18 14:19:20.181413 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -radekstepan/FlaskBudget -https://github.com/radekstepan/FlaskBudget -Entry file: FlaskBudget/budget.py -Scanned: 2016-10-18 14:19:21.172496 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -UfSoft/Flask-MenuBuilder -https://github.com/UfSoft/Flask-MenuBuilder -Entry file: Flask-MenuBuilder/tests/test_menuitem.py -Scanned: 2016-10-18 14:19:23.557485 -No vulnerabilities found. - - -gregglind/flask-tool -https://github.com/gregglind/flask-tool -Entry file: flask-tool/flasktool/console.py -Scanned: 2016-10-18 14:19:24.067929 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kblin/flask-downloader -https://github.com/kblin/flask-downloader -Entry file: flask-downloader/tests.py -Scanned: 2016-10-18 14:19:24.575335 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/flog -https://github.com/maxcountryman/flog -Entry file: flog/flog/__init__.py -Scanned: 2016-10-18 14:19:26.337679 -No vulnerabilities found. - - -sublee/Flask-Handler -https://github.com/sublee/Flask-Handler -Entry file: None -Scanned: 2016-10-18 14:19:26.855479 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sublee/Flask-Handler. - -Ramblurr/pyqdb -https://github.com/Ramblurr/pyqdb -Entry file: pyqdb/src/pyqdb.py -Scanned: 2016-10-18 14:19:44.356743 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zackster/DijScrape--flask-rewrite- -https://github.com/zackster/DijScrape--flask-rewrite- -Entry file: DijScrape--flask-rewrite-/dijscrape.py -Scanned: 2016-10-18 14:19:46.837199 -No vulnerabilities found. - - -asenchi/pomp -https://github.com/asenchi/pomp -Entry file: pomp/pomp/pomp.py -Scanned: 2016-10-18 14:19:48.070396 -No vulnerabilities found. - - -tshirtman/snakenest -https://github.com/tshirtman/snakenest -Entry file: snakenest/main.py -Scanned: 2016-10-18 14:19:55.461720 -No vulnerabilities found. - - -jvreeland/Python-Web-Service-for-Android-GMaps-AsyncTask-Demo -https://github.com/jvreeland/Python-Web-Service-for-Android-GMaps-AsyncTask-Demo -Entry file: Python-Web-Service-for-Android-GMaps-AsyncTask-Demo/gmaps.py -Scanned: 2016-10-18 14:19:58.003693 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Python-Web-Service-for-Android-GMaps-AsyncTask-Demo/env/lib/python2.7/genericpath.py - -triposo/geocodecache -https://github.com/triposo/geocodecache -Entry file: geocodecache/geocodecache.py -Scanned: 2016-10-18 14:19:59.526196 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -toastwaffle/ToDoQuick -https://github.com/toastwaffle/ToDoQuick -Entry file: ToDoQuick/todoquick.py -Scanned: 2016-10-18 14:20:01.485455 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coleifer/flask-peewee -https://github.com/coleifer/flask-peewee -Entry file: flask-peewee/example/app.py -Scanned: 2016-10-18 14:20:08.140536 -Vulnerability 1: -File: flask-peewee/example/admin.py - > User input at line 27, trigger word "get(": - next = request.form.get('next') or self.dashboard_url() -File: flask-peewee/example/admin.py - > reaches line 28, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - - - -coleifer/flask-peewee -https://github.com/coleifer/flask-peewee -Entry file: flask-peewee/example/app.py -Scanned: 2016-10-18 14:20:08.140718 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jeanphix/Flask-Dashed -https://github.com/jeanphix/Flask-Dashed -Entry file: Flask-Dashed/examples/sqlalchemy_backend.py -Scanned: 2016-10-18 14:20:12.114947 -No vulnerabilities found. - - -jarus/flask-mongokit -https://github.com/jarus/flask-mongokit -Entry file: flask-mongokit/tests/test_base.py -Scanned: 2016-10-18 14:20:12.621604 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -namlook/flask-apibee -https://github.com/namlook/flask-apibee -Entry file: flask-apibee/example/app.py -Scanned: 2016-10-18 14:20:13.608683 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -voluntas/heroku-template-flask -https://github.com/voluntas/heroku-template-flask -Entry file: heroku-template-flask/snowflake/__init__.py -Scanned: 2016-10-18 14:20:14.855039 -No vulnerabilities found. - - -Deepwalker/Flask-Bundle -https://github.com/Deepwalker/Flask-Bundle -Entry file: Flask-Bundle/samples/simple.py -Scanned: 2016-10-18 14:20:16.317176 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sunlightlabs/flask-districtoffices -https://github.com/sunlightlabs/flask-districtoffices -Entry file: flask-districtoffices/districtoffices.py -Scanned: 2016-10-18 14:20:19.413535 -No vulnerabilities found. - - -quanticle/flask_blog -https://github.com/quanticle/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-18 14:20:20.885145 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garrettr/haps -https://github.com/garrettr/haps -Entry file: haps/quickstart.py -Scanned: 2016-10-18 14:20:21.440444 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dsully/sitter -https://github.com/dsully/sitter -Entry file: sitter/sitter/__init__.py -Scanned: 2016-10-18 14:20:23.427690 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahri/nodeblog -https://github.com/ahri/nodeblog -Entry file: nodeblog/blog.py -Scanned: 2016-10-18 14:20:24.957497 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/celeb -https://github.com/maxcountryman/celeb -Entry file: celeb/celeb/__init__.py -Scanned: 2016-10-18 14:20:25.471739 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/PO -https://github.com/marchon/PO -Entry file: PO/main.py -Scanned: 2016-10-18 14:20:26.716785 -No vulnerabilities found. - - -slok/xlarrakoetxeaorg -https://github.com/slok/xlarrakoetxeaorg -Entry file: xlarrakoetxeaorg/mysite/blog/__init__.py -Scanned: 2016-10-18 14:20:29.472700 -No vulnerabilities found. - - -boboppie/pyLiftOver -https://github.com/boboppie/pyLiftOver -Entry file: pyLiftOver/flask/lift-over-app.py -Scanned: 2016-10-18 14:20:30.077745 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -no0p/homepage -https://github.com/no0p/homepage -Entry file: homepage/site.py -Scanned: 2016-10-18 14:20:36.176013 -No vulnerabilities found. - - -tjosten/python-push -https://github.com/tjosten/python-push -Entry file: python-push/push.py -Scanned: 2016-10-18 14:20:45.490385 -No vulnerabilities found. - - -Joshkunz/PyChannel -https://github.com/Joshkunz/PyChannel -Entry file: PyChannel/PyChannel/__init__.py -Scanned: 2016-10-18 14:20:46.010177 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cbess/ytlinker -https://github.com/cbess/ytlinker -Entry file: ytlinker/flask/app.py -Scanned: 2016-10-18 14:20:47.510933 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -openshift/flask-example -https://github.com/openshift/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-18 14:20:58.731763 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wasabi0522/flaskr -https://github.com/wasabi0522/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 14:21:04.666106 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amehta/Flaskly -https://github.com/amehta/Flaskly -Entry file: Flaskly/flaskly.py -Scanned: 2016-10-18 14:21:13.440493 -Vulnerability 1: -File: Flaskly/flaskly.py - > User input at line 73, trigger word "form[": - url = request.form['long_url'] -Reassigned in: - File: Flaskly/flaskly.py - > Line 74: short = pickShortUrl(url) -File: Flaskly/flaskly.py - > reaches line 75, trigger word "flash(": - flash('Short Url http:/localhost/' + short) - - - -amehta/Flaskly -https://github.com/amehta/Flaskly -Entry file: Flaskly/flaskly.py -Scanned: 2016-10-18 14:21:13.440657 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -fyears/flaskr-redis -https://github.com/fyears/flaskr-redis -Entry file: flaskr-redis/app.py -Scanned: 2016-10-18 14:21:15.140723 -No vulnerabilities found. - - -Jc2k/flask-example -https://github.com/Jc2k/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-18 14:21:15.660013 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brainTrain/flasktest -https://github.com/brainTrain/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-18 14:21:18.965771 -No vulnerabilities found. - - -proles/flaskr -https://github.com/proles/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 14:21:19.470495 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joeyespo/hello-redis-tasks -https://github.com/joeyespo/hello-redis-tasks -Entry file: hello-redis-tasks/hello_redis_tasks.py -Scanned: 2016-10-18 14:21:19.974184 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cemk/flask-expander -https://github.com/cemk/flask-expander -Entry file: flask-expander/expand.py -Scanned: 2016-10-18 14:21:21.194359 -No vulnerabilities found. - - -pygraz/old-flask-website -https://github.com/pygraz/old-flask-website -Entry file: old-flask-website/pygraz_website/__init__.py -Scanned: 2016-10-18 14:21:21.717109 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thomasballinger/Utok -https://github.com/thomasballinger/Utok -Entry file: Utok/webapp.py -Scanned: 2016-10-18 14:21:23.171682 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lcruz/Igualitos-appengine -https://github.com/lcruz/Igualitos-appengine -Entry file: Igualitos-appengine/config.py -Scanned: 2016-10-18 14:21:23.720720 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hettan/MyPortfolio -https://github.com/hettan/MyPortfolio -Entry file: MyPortfolio/web/myFlaskProject.py -Scanned: 2016-10-18 14:21:24.265297 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lcruz/igualitos -https://github.com/lcruz/igualitos -Entry file: igualitos/config.py -Scanned: 2016-10-18 14:21:26.618044 -No vulnerabilities found. - - -agonzalezro/gplus-blog -https://github.com/agonzalezro/gplus-blog -Entry file: gplus-blog/gplusblog/__init__.py -Scanned: 2016-10-18 14:21:27.963991 -No vulnerabilities found. - - -fwenzel/strassendeutsch -https://github.com/fwenzel/strassendeutsch -Entry file: strassendeutsch/woerterbuch/__init__.py -Scanned: 2016-10-18 14:21:28.969562 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lzyy/chat -https://github.com/lzyy/chat -Entry file: chat/src/app.py -Scanned: 2016-10-18 14:21:45.667251 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ferhensil/flask-example -https://github.com/ferhensil/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-18 14:21:46.152183 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jeanphix/flask-dashed-demo -https://github.com/jeanphix/flask-dashed-demo -Entry file: flask-dashed-demo/app.py -Scanned: 2016-10-18 14:21:47.666636 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kenkam/msgbrd -https://github.com/kenkam/msgbrd -Entry file: msgbrd/app.py -Scanned: 2016-10-18 14:21:59.703224 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -grigouze/flask-jenkins-radiator -https://github.com/grigouze/flask-jenkins-radiator -Entry file: flask-jenkins-radiator/radiator/radiator.py -Scanned: 2016-10-18 14:22:01.214296 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rduplain/flask-jquery-autosave-example -https://github.com/rduplain/flask-jquery-autosave-example -Entry file: flask-jquery-autosave-example/app.py -Scanned: 2016-10-18 14:22:02.870404 -No vulnerabilities found. - - -kracekumar/Gummi -https://github.com/kracekumar/Gummi -Entry file: Gummi/gummi/tests/test.py -Scanned: 2016-10-18 14:22:03.370339 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ivoscc/qchaes -https://github.com/ivoscc/qchaes -Entry file: qchaes/runserver.py -Scanned: 2016-10-18 14:22:09.369567 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fdemmer/flask-principal -https://github.com/fdemmer/flask-principal -Entry file: flask-principal/tests/test_principal.py -Scanned: 2016-10-18 14:22:12.872650 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dasevilla/evernote-oauth-example -https://github.com/dasevilla/evernote-oauth-example -Entry file: evernote-oauth-example/webapp.py -Scanned: 2016-10-18 14:22:15.125228 -No vulnerabilities found. - - -zeninthehome/flaskr -https://github.com/zeninthehome/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 14:22:16.126471 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshfinnie/Flacker-News -https://github.com/joshfinnie/Flacker-News -Entry file: Flacker-News/flacker-news/app.py -Scanned: 2016-10-18 14:22:16.636978 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -moneill/uber-flask -https://github.com/moneill/uber-flask -Entry file: uber-flask/uber.py -Scanned: 2016-10-18 14:22:20.229262 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: uber-flask/env/lib/python2.7/genericpath.py - -nubela/radar-backend -https://github.com/nubela/radar-backend -Entry file: radar-backend/src/radar.py -Scanned: 2016-10-18 14:22:20.733831 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TxSSC/the-questionator -https://github.com/TxSSC/the-questionator -Entry file: the-questionator/questionator/__init__.py -Scanned: 2016-10-18 14:22:21.229995 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -satonaoya/flask-epio-skelton -https://github.com/satonaoya/flask-epio-skelton -Entry file: flask-epio-skelton/app.py -Scanned: 2016-10-18 14:22:22.472068 -No vulnerabilities found. - - -marksteve/bookmarks -https://github.com/marksteve/bookmarks -Entry file: bookmarks/bookmarks.py -Scanned: 2016-10-18 14:22:23.787256 -No vulnerabilities found. - - -paradoxxxzero/polldance -https://github.com/paradoxxxzero/polldance -Entry file: polldance/dance.py -Scanned: 2016-10-18 14:22:25.012424 -No vulnerabilities found. - - -flebel/Egami -https://github.com/flebel/Egami -Entry file: Egami/egami.py -Scanned: 2016-10-18 14:22:26.282946 -No vulnerabilities found. - - -mitsuhiko/flask-pastebin -https://github.com/mitsuhiko/flask-pastebin -Entry file: flask-pastebin/pastebin.py -Scanned: 2016-10-18 14:22:27.481056 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -maxcountryman/flask-seasurf -https://github.com/maxcountryman/flask-seasurf -Entry file: flask-seasurf/test_seasurf.py -Scanned: 2016-10-18 14:22:31.773651 -No vulnerabilities found. - - -maxcountryman/logmon -https://github.com/maxcountryman/logmon -Entry file: logmon/logmon/__init__.py -Scanned: 2016-10-18 14:22:33.956815 -No vulnerabilities found. - - -hasgeek/coaster -https://github.com/hasgeek/coaster -Entry file: coaster/tests/test_render_with.py -Scanned: 2016-10-18 14:22:38.228282 -No vulnerabilities found. - - -craigkerstiens/flask-helloworld -https://github.com/craigkerstiens/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-18 14:22:39.590842 -No vulnerabilities found. - - -jarodl/flask-github -https://github.com/jarodl/flask-github -Entry file: flask-github/example/example.py -Scanned: 2016-10-18 14:22:40.119074 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ahri/flask-mustache -https://github.com/ahri/flask-mustache -Entry file: flask-mustache/tests/test_mustache.py -Scanned: 2016-10-18 14:22:47.589172 -No vulnerabilities found. - - -gears/flask-gears -https://github.com/gears/flask-gears -Entry file: flask-gears/example/app.py -Scanned: 2016-10-18 14:22:48.988135 -No vulnerabilities found. - - -mitsuhiko/tugraz-flask-demo -https://github.com/mitsuhiko/tugraz-flask-demo -Entry file: tugraz-flask-demo/pastebin.py -Scanned: 2016-10-18 14:22:55.988340 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mattoufoutu/flask-project-templates -https://github.com/mattoufoutu/flask-project-templates -Entry file: None -Scanned: 2016-10-18 14:23:00.533571 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mattoufoutu/flask-project-templates. - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 14:57:56.982363 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 14:57:58.281847 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 14:58:01.561669 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 14:58:02.101310 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 14:58:03.163076 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 14:58:04.164256 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 14:58:07.407624 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 14:58:07.916149 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 14:58:08.895744 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 14:58:09.958239 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-18 14:58:12.226436 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-18 14:58:13.223302 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-18 14:58:13.721616 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-18 14:58:56.778555 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 14:58:57.292315 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-18 14:58:59.550968 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 14:59:00.079058 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 14:59:00.079231 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 14:59:02.543102 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 14:59:02.543295 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-18 14:59:03.053029 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-18 14:59:06.406394 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: None -Scanned: 2016-10-18 14:59:07.582666 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-18 14:59:08.098609 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-18 14:59:09.782151 -No vulnerabilities found. - - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:02:06.967089 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 15:02:08.734711 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 15:02:12.118705 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 15:02:12.623066 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 15:02:13.723285 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 15:02:14.773749 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 15:02:18.147040 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 15:02:18.666382 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 15:02:19.663167 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 15:02:20.705699 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-18 15:02:23.161833 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-18 15:02:24.178706 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-18 15:02:24.697072 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-18 15:03:05.807928 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 15:03:06.317650 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-18 15:03:08.618248 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 15:03:09.162846 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:11:25.205710 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 15:11:26.960734 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 15:11:30.479840 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 15:11:30.997993 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 15:11:32.676827 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 15:11:34.547821 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 15:11:37.899429 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 15:11:38.435293 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 15:11:39.423052 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 15:11:40.458905 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-18 15:11:42.754118 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-18 15:11:43.840561 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-18 15:11:44.349971 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-18 15:12:24.358449 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 15:12:24.856553 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-18 15:12:27.011325 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 15:12:27.519803 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:14:40.587241 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 15:14:41.693850 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 15:14:44.953497 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 15:14:45.451604 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 15:14:46.485529 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 15:14:47.505274 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 15:14:50.708697 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 15:14:51.236793 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 15:14:52.197561 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 15:14:53.211902 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-18 15:14:55.470300 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-18 15:14:56.459622 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-18 15:14:56.953860 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-18 15:15:39.947494 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 15:15:40.446830 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-18 15:15:42.692104 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 15:15:43.204685 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 15:15:45.657685 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-18 15:15:46.168571 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-18 15:15:49.554395 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-18 15:15:51.074513 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-18 15:15:51.580125 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-18 15:15:53.331682 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-18 15:15:54.614012 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-18 15:15:55.894230 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-18 15:15:56.392706 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-18 15:15:56.885336 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-18 15:15:58.076691 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-18 15:15:58.587733 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-18 15:16:04.606027 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:16:06.658552 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-18 15:16:10.215178 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-18 15:16:17.116404 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-18 15:16:22.062671 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-18 15:16:39.445749 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-18 15:16:40.961017 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-18 15:16:42.214106 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-18 15:16:46.839792 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-18 15:16:47.387778 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 15:16:47.890278 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-18 15:16:49.096667 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-18 15:16:50.403303 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-18 15:16:51.798591 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-18 15:16:55.829660 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-18 15:16:57.606730 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-18 15:16:59.873054 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-18 15:17:02.300327 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-18 15:17:03.352684 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-18 15:17:07.349083 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-18 15:17:08.321633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-18 15:17:09.286890 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-18 15:17:10.471977 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-18 15:17:11.945547 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 15:17:19.284177 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-18 15:17:39.463451 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-18 15:17:42.990021 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-18 15:17:43.504704 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-18 15:17:44.005719 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-18 15:17:45.464518 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-18 15:17:49.017024 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 15:17:50.517593 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-18 15:17:51.026641 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:19:13.739441 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 15:19:14.943780 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 15:19:18.201779 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 15:19:18.694213 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 15:19:19.763888 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 15:19:20.771156 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 15:19:23.992700 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 15:19:26.758658 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 15:19:27.742948 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 15:19:28.775926 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-18 15:19:31.555593 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-18 15:19:32.592414 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-18 15:19:33.098703 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-18 15:20:13.149022 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 15:20:13.674535 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-18 15:20:15.903504 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 15:20:17.217916 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 15:20:22.310793 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-18 15:20:22.808479 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-18 15:20:26.082029 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-18 15:20:27.747028 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-18 15:20:28.254735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-18 15:20:29.944931 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-18 15:20:31.761587 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-18 15:20:33.178500 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-18 15:20:33.874390 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-18 15:20:34.364511 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-18 15:20:35.831844 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-18 15:20:36.326193 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-18 15:20:42.413284 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:20:44.544893 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-18 15:20:48.053035 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-18 15:20:54.936349 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-18 15:20:59.919990 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-18 15:21:12.275363 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-18 15:21:13.796236 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-18 15:21:15.101498 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-18 15:21:19.697418 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-18 15:21:20.229732 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 15:21:20.711845 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-18 15:21:21.915320 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-18 15:21:23.203542 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-18 15:21:24.657701 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-18 15:21:29.874722 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-18 15:21:32.253770 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-18 15:21:34.626982 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-18 15:21:37.095659 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-18 15:21:38.116933 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-18 15:21:42.283737 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-18 15:21:43.269599 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-18 15:21:44.267590 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-18 15:21:46.493619 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-18 15:21:49.854568 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 15:21:57.242331 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-18 15:22:12.379471 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-18 15:22:16.031507 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-18 15:22:16.553024 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-18 15:22:17.757724 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-18 15:22:19.311565 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-18 15:22:23.645271 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 15:22:24.149381 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-18 15:22:24.648768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 15:22:27.379602 -No vulnerabilities found. - - -zzzsochi/Flask-Gravatar -https://github.com/zzzsochi/Flask-Gravatar -Entry file: Flask-Gravatar/tests/test_core.py -Scanned: 2016-10-18 15:22:31.900184 -No vulnerabilities found. - - -dag/flask-zodb -https://github.com/dag/flask-zodb -Entry file: flask-zodb/flask_zodb.py -Scanned: 2016-10-18 15:22:32.521442 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -zen4ever/route53manager -https://github.com/zen4ever/route53manager -Entry file: route53manager/route53/__init__.py -Scanned: 2016-10-18 15:22:33.033827 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-kitchensink -https://github.com/mitsuhiko/flask-kitchensink -Entry file: flask-kitchensink/example-code/hello.py -Scanned: 2016-10-18 15:22:33.546876 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyeseast/flask-docviewer -https://github.com/eyeseast/flask-docviewer -Entry file: flask-docviewer/docviewer/app.py -Scanned: 2016-10-18 15:22:34.839628 -No vulnerabilities found. - - -dag/flask-attest -https://github.com/dag/flask-attest -Entry file: flask-attest/tests.py -Scanned: 2016-10-18 15:22:35.443329 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ekalinin/flask-noextref -https://github.com/ekalinin/flask-noextref -Entry file: flask-noextref/test_noextref.py -Scanned: 2016-10-18 15:22:38.804386 -No vulnerabilities found. - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-18 15:22:43.364640 -Vulnerability 1: -File: flitter/flitter/controllers/user.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flitter/flitter/controllers/user.py - > Line 24: session['user'] = username - File: flitter/flitter/controllers/user.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry.entries',username=username)) - File: flitter/flitter/controllers/user.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('signup.html',error=error) - File: flitter/flitter/controllers/user.py - > Line 15: ret_MAYBE_FUNCTION_NAME = redirect_to_user_page() -File: flitter/flitter/controllers/user.py - > reaches line 25, trigger word "flash(": - flash('Welcome, {0}.'.format(username)) - - - -aaront/calcmymarks2 -https://github.com/aaront/calcmymarks2 -Entry file: calcmymarks2/main.py -Scanned: 2016-10-18 15:22:43.930320 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-feedback -https://github.com/mitsuhiko/flask-feedback -Entry file: flask-feedback/feedback.py -Scanned: 2016-10-18 15:22:45.044093 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilsaj/flask-admin-old -https://github.com/wilsaj/flask-admin-old -Entry file: flask-admin-old/test_admin.py -Scanned: 2016-10-18 15:22:56.514269 -No vulnerabilities found. - - -leandrosilva/flaskito -https://github.com/leandrosilva/flaskito -Entry file: flaskito/src/flaskito.py -Scanned: 2016-10-18 15:22:57.030175 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/Flask-API-Server -https://github.com/marchon/Flask-API-Server -Entry file: Flask-API-Server/apiserver/tests/app.py -Scanned: 2016-10-18 15:22:58.376258 -No vulnerabilities found. - - -kapilreddy/Shabda-Sangraha -https://github.com/kapilreddy/Shabda-Sangraha -Entry file: Shabda-Sangraha/dict.py -Scanned: 2016-10-18 15:23:12.407581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tooxie/flask-syrinx -https://github.com/tooxie/flask-syrinx -Entry file: flask-syrinx/syrinx/__init__.py -Scanned: 2016-10-18 15:23:13.945701 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshourisman/flask-shortly -https://github.com/joshourisman/flask-shortly -Entry file: flask-shortly/shortly/__init__.py -Scanned: 2016-10-18 15:23:18.755664 -No vulnerabilities found. - - -jamiltron/fitgen -https://github.com/jamiltron/fitgen -Entry file: fitgen/fitgen.py -Scanned: 2016-10-18 15:23:22.197085 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomviner/Flask-Name-that-actor-or-movie -https://github.com/tomviner/Flask-Name-that-actor-or-movie -Entry file: Flask-Name-that-actor-or-movie/namer.py -Scanned: 2016-10-18 15:23:24.169072 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/checkinmapper -https://github.com/marchon/checkinmapper -Entry file: checkinmapper/checkinmapper.py -Scanned: 2016-10-18 15:23:24.741620 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -comfuture/simplesite -https://github.com/comfuture/simplesite -Entry file: simplesite/simplesite/core.py -Scanned: 2016-10-18 15:23:26.232346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/flylons -https://github.com/marchon/flylons -Entry file: flylons/application/__init__.py -Scanned: 2016-10-18 15:23:26.745784 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zachwill/flask-engine -https://github.com/zachwill/flask-engine -Entry file: flask-engine/libs/flask/sessions.py -Scanned: 2016-10-18 15:23:32.482219 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spantaleev/flask-sijax -https://github.com/spantaleev/flask-sijax -Entry file: flask-sijax/examples/comet.py -Scanned: 2016-10-18 15:23:35.199926 -No vulnerabilities found. - - -utahta/Flask-MVC-Pattern -https://github.com/utahta/Flask-MVC-Pattern -Entry file: Flask-MVC-Pattern/main.py -Scanned: 2016-10-18 15:23:36.446748 -No vulnerabilities found. - - -jzempel/flask-exceptional -https://github.com/jzempel/flask-exceptional -Entry file: flask-exceptional/flask_exceptional.py -Scanned: 2016-10-18 15:23:36.951168 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qsnake/flask -https://github.com/qsnake/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:23:39.578910 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -joeyespo/flask-scaffold -https://github.com/joeyespo/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-18 15:23:40.095664 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iwebhosting/collectd-flask -https://github.com/iwebhosting/collectd-flask -Entry file: collectd-flask/collectdflask.py -Scanned: 2016-10-18 15:23:41.445114 -No vulnerabilities found. - - -yxm0513/flask-ims -https://github.com/yxm0513/flask-ims -Entry file: flask-ims/flask/sessions.py -Scanned: 2016-10-18 15:23:43.990434 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fay/flask-skeleton -https://github.com/fay/flask-skeleton -Entry file: None -Scanned: 2016-10-18 15:23:45.034515 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fay/flask-skeleton. - -joshourisman/flask-beans -https://github.com/joshourisman/flask-beans -Entry file: flask-beans/beans.py -Scanned: 2016-10-18 15:23:46.240470 -No vulnerabilities found. - - -jjinux/pyteladventure -https://github.com/jjinux/pyteladventure -Entry file: pyteladventure/pyteladventure/__init__.py -Scanned: 2016-10-18 15:23:46.764773 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mchambliss/flask -https://github.com/mchambliss/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:24:00.109362 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -robi42/backbone-flask -https://github.com/robi42/backbone-flask -Entry file: backbone-flask/app.py -Scanned: 2016-10-18 15:24:19.605419 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-18 15:24:23.180085 -No vulnerabilities found. - - -joshfinnie/Flask-shrtn -https://github.com/joshfinnie/Flask-shrtn -Entry file: Flask-shrtn/Flask-shrtn.py -Scanned: 2016-10-18 15:24:23.687080 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomatohater/goonhilly -https://github.com/tomatohater/goonhilly -Entry file: goonhilly/goonhilly.py -Scanned: 2016-10-18 15:24:25.355757 -No vulnerabilities found. - - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:37:56.166695 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 15:37:57.381900 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 15:38:00.437023 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 15:38:00.942693 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 15:38:01.983356 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 15:38:02.986380 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 15:38:06.219566 -No vulnerabilities found. - - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 15:38:06.726676 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 15:38:07.720285 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 15:38:08.831689 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-18 15:38:11.081062 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-18 15:38:12.039909 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-18 15:38:12.542613 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-18 15:38:55.296915 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 15:38:55.907837 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-18 15:38:58.158178 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 15:38:59.370823 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 15:39:04.297545 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-18 15:39:04.805810 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-18 15:39:07.825271 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-18 15:39:09.351299 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-18 15:39:09.857948 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-18 15:39:11.633527 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-18 15:39:12.833089 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-18 15:39:14.016192 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-18 15:39:14.559337 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-18 15:39:15.057175 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-18 15:39:16.280238 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-18 15:39:16.788264 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-18 15:39:22.484108 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:39:24.506490 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-18 15:39:27.874332 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-18 15:39:34.357231 -No vulnerabilities found. - - -sublee/flask-autoindex -https://github.com/sublee/flask-autoindex -Entry file: flask-autoindex/flask_autoindex/__init__.py -Scanned: 2016-10-18 15:39:39.120603 -No vulnerabilities found. - - -ericmoritz/flaskcma -https://github.com/ericmoritz/flaskcma -Entry file: flaskcma/flaskcma/app.py -Scanned: 2016-10-18 15:39:54.383261 -No vulnerabilities found. - - -indexofire/flasky -https://github.com/indexofire/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-18 15:39:55.883403 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericmoritz/flask-auth -https://github.com/ericmoritz/flask-auth -Entry file: flask-auth/flaskext/auth/tests/workflow.py -Scanned: 2016-10-18 15:39:58.249320 -No vulnerabilities found. - - -sublee/flask-silk -https://github.com/sublee/flask-silk -Entry file: flask-silk/test.py -Scanned: 2016-10-18 15:40:02.542145 -No vulnerabilities found. - - -proudlygeek/proudlygeek-blog -https://github.com/proudlygeek/proudlygeek-blog -Entry file: proudlygeek-blog/flask/app.py -Scanned: 2016-10-18 15:40:03.071267 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunKikuchi/flask-gae -https://github.com/JunKikuchi/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 15:40:03.573851 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenbot/flask-tweetfeed -https://github.com/glenbot/flask-tweetfeed -Entry file: flask-tweetfeed/tweetfeedapp.py -Scanned: 2016-10-18 15:40:04.809985 -No vulnerabilities found. - - -fsouza/palestra-flask-2010-giran -https://github.com/fsouza/palestra-flask-2010-giran -Entry file: palestra-flask-2010-giran/projetos/projetos.py -Scanned: 2016-10-18 15:40:06.185158 -No vulnerabilities found. - - -shiloa/flask-clean -https://github.com/shiloa/flask-clean -Entry file: flask-clean/app.py -Scanned: 2016-10-18 15:40:07.583515 -No vulnerabilities found. - - -dag/flask-genshi -https://github.com/dag/flask-genshi -Entry file: flask-genshi/examples/flaskr/flaskr.py -Scanned: 2016-10-18 15:40:11.446196 -No vulnerabilities found. - - -raliste/Flaskito -https://github.com/raliste/Flaskito -Entry file: Flaskito/flaskito/__init__.py -Scanned: 2016-10-18 15:40:13.149290 -No vulnerabilities found. - - -mikewest/flask-pyplaceholder -https://github.com/mikewest/flask-pyplaceholder -Entry file: flask-pyplaceholder/generator.py -Scanned: 2016-10-18 15:40:15.570155 -No vulnerabilities found. - - -whalesalad/arbesko-files -https://github.com/whalesalad/arbesko-files -Entry file: arbesko-files/files/__init__.py -Scanned: 2016-10-18 15:40:17.844797 -No vulnerabilities found. - - -danjac/Flask-Script -https://github.com/danjac/Flask-Script -Entry file: Flask-Script/tests.py -Scanned: 2016-10-18 15:40:18.901089 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjac/Flask-WTF -https://github.com/danjac/Flask-WTF -Entry file: Flask-WTF/examples/recaptcha/app.py -Scanned: 2016-10-18 15:40:22.655509 -No vulnerabilities found. - - -danjac/Flask-Mail -https://github.com/danjac/Flask-Mail -Entry file: Flask-Mail/tests.py -Scanned: 2016-10-18 15:40:23.636583 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cropd/crashkurs-flask -https://github.com/cropd/crashkurs-flask -Entry file: crashkurs-flask/flask/app.py -Scanned: 2016-10-18 15:40:24.600983 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hasgeek/github-hook -https://github.com/hasgeek/github-hook -Entry file: github-hook/github-hook.py -Scanned: 2016-10-18 15:40:25.823536 -No vulnerabilities found. - - -pygloo/bewype-flask-controllers -https://github.com/pygloo/bewype-flask-controllers -Entry file: bewype-flask-controllers/bewype/flask/_app.py -Scanned: 2016-10-18 15:40:30.209745 -No vulnerabilities found. - - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 15:40:36.457070 -No vulnerabilities found. - - -Frozen-Flask/Frozen-Flask -https://github.com/Frozen-Flask/Frozen-Flask -Entry file: Frozen-Flask/flask_frozen/__init__.py -Scanned: 2016-10-18 15:40:54.583913 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cobrateam/flask-mongoalchemy -https://github.com/cobrateam/flask-mongoalchemy -Entry file: flask-mongoalchemy/flask_mongoalchemy/__init__.py -Scanned: 2016-10-18 15:40:58.040136 -No vulnerabilities found. - - -Flask-FlatPages/Flask-FlatPages -https://github.com/Flask-FlatPages/Flask-FlatPages -Entry file: Flask-FlatPages/tests/test_flask_flatpages.py -Scanned: 2016-10-18 15:40:58.557269 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fsouza/flask-rest-example -https://github.com/fsouza/flask-rest-example -Entry file: flask-rest-example/library.py -Scanned: 2016-10-18 15:40:59.765640 -Vulnerability 1: -File: flask-rest-example/library.py - > User input at line 63, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-rest-example/library.py - > Line 64: book = Book(id=2, name=name) -File: flask-rest-example/library.py - > reaches line 65, trigger word "flash(": - flash('Book %s sucessful saved!' % book.name) - - - -pilt/flask-versioned -https://github.com/pilt/flask-versioned -Entry file: flask-versioned/test_versioned.py -Scanned: 2016-10-18 15:41:01.203233 -No vulnerabilities found. - - -tokibito/flask-hgwebcommit -https://github.com/tokibito/flask-hgwebcommit -Entry file: flask-hgwebcommit/hgwebcommit/__init__.py -Scanned: 2016-10-18 15:41:06.375862 -Vulnerability 1: -File: flask-hgwebcommit/hgwebcommit/views.py - > User input at line 97, trigger word ".data": - message = operation_repo(repo, form.data['operation'], form.data['files'], form.data['commit_message']) -File: flask-hgwebcommit/hgwebcommit/views.py - > reaches line 98, trigger word "flash(": - flash(message) - - - -Nassty/flask-gae -https://github.com/Nassty/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 15:41:06.891418 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sgk/BulkDM -https://github.com/sgk/BulkDM -Entry file: BulkDM/application.py -Scanned: 2016-10-18 15:41:07.405780 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sontek-archive/redditor-stats -https://github.com/sontek-archive/redditor-stats -Entry file: redditor-stats/web.py -Scanned: 2016-10-18 15:41:10.266705 -No vulnerabilities found. - - -zzzsochi/Flask-Gravatar -https://github.com/zzzsochi/Flask-Gravatar -Entry file: Flask-Gravatar/tests/test_core.py -Scanned: 2016-10-18 15:41:13.379755 -No vulnerabilities found. - - -dag/flask-zodb -https://github.com/dag/flask-zodb -Entry file: flask-zodb/flask_zodb.py -Scanned: 2016-10-18 15:41:13.897902 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -zen4ever/route53manager -https://github.com/zen4ever/route53manager -Entry file: route53manager/route53/__init__.py -Scanned: 2016-10-18 15:41:14.396810 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-kitchensink -https://github.com/mitsuhiko/flask-kitchensink -Entry file: flask-kitchensink/example-code/hello.py -Scanned: 2016-10-18 15:41:14.909365 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyeseast/flask-docviewer -https://github.com/eyeseast/flask-docviewer -Entry file: flask-docviewer/docviewer/app.py -Scanned: 2016-10-18 15:41:16.114189 -No vulnerabilities found. - - -dag/flask-attest -https://github.com/dag/flask-attest -Entry file: flask-attest/tests.py -Scanned: 2016-10-18 15:41:16.630223 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ekalinin/flask-noextref -https://github.com/ekalinin/flask-noextref -Entry file: flask-noextref/test_noextref.py -Scanned: 2016-10-18 15:41:19.959087 -No vulnerabilities found. - - -teohm/flitter -https://github.com/teohm/flitter -Entry file: flitter/flitter/__init__.py -Scanned: 2016-10-18 15:41:24.454439 -Vulnerability 1: -File: flitter/flitter/controllers/user.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flitter/flitter/controllers/user.py - > Line 24: session['user'] = username - File: flitter/flitter/controllers/user.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry.entries',username=username)) - File: flitter/flitter/controllers/user.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('signup.html',error=error) - File: flitter/flitter/controllers/user.py - > Line 15: ret_MAYBE_FUNCTION_NAME = redirect_to_user_page() -File: flitter/flitter/controllers/user.py - > reaches line 25, trigger word "flash(": - flash('Welcome, {0}.'.format(username)) - - - -aaront/calcmymarks2 -https://github.com/aaront/calcmymarks2 -Entry file: calcmymarks2/main.py -Scanned: 2016-10-18 15:41:24.967834 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-feedback -https://github.com/mitsuhiko/flask-feedback -Entry file: flask-feedback/feedback.py -Scanned: 2016-10-18 15:41:26.087061 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilsaj/flask-admin-old -https://github.com/wilsaj/flask-admin-old -Entry file: flask-admin-old/test_admin.py -Scanned: 2016-10-18 15:41:37.114854 -No vulnerabilities found. - - -leandrosilva/flaskito -https://github.com/leandrosilva/flaskito -Entry file: flaskito/src/flaskito.py -Scanned: 2016-10-18 15:41:37.673149 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/Flask-API-Server -https://github.com/marchon/Flask-API-Server -Entry file: Flask-API-Server/apiserver/tests/app.py -Scanned: 2016-10-18 15:41:39.006577 -No vulnerabilities found. - - -kapilreddy/Shabda-Sangraha -https://github.com/kapilreddy/Shabda-Sangraha -Entry file: Shabda-Sangraha/dict.py -Scanned: 2016-10-18 15:41:55.018087 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tooxie/flask-syrinx -https://github.com/tooxie/flask-syrinx -Entry file: flask-syrinx/syrinx/__init__.py -Scanned: 2016-10-18 15:41:56.545755 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshourisman/flask-shortly -https://github.com/joshourisman/flask-shortly -Entry file: flask-shortly/shortly/__init__.py -Scanned: 2016-10-18 15:42:00.539804 -No vulnerabilities found. - - -jamiltron/fitgen -https://github.com/jamiltron/fitgen -Entry file: fitgen/fitgen.py -Scanned: 2016-10-18 15:42:04.989819 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomviner/Flask-Name-that-actor-or-movie -https://github.com/tomviner/Flask-Name-that-actor-or-movie -Entry file: Flask-Name-that-actor-or-movie/namer.py -Scanned: 2016-10-18 15:42:06.972649 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/checkinmapper -https://github.com/marchon/checkinmapper -Entry file: checkinmapper/checkinmapper.py -Scanned: 2016-10-18 15:42:07.588985 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -comfuture/simplesite -https://github.com/comfuture/simplesite -Entry file: simplesite/simplesite/core.py -Scanned: 2016-10-18 15:42:09.090526 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/flylons -https://github.com/marchon/flylons -Entry file: flylons/application/__init__.py -Scanned: 2016-10-18 15:42:09.596107 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zachwill/flask-engine -https://github.com/zachwill/flask-engine -Entry file: flask-engine/libs/flask/sessions.py -Scanned: 2016-10-18 15:42:14.222123 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spantaleev/flask-sijax -https://github.com/spantaleev/flask-sijax -Entry file: flask-sijax/examples/comet.py -Scanned: 2016-10-18 15:42:15.769049 -No vulnerabilities found. - - -utahta/Flask-MVC-Pattern -https://github.com/utahta/Flask-MVC-Pattern -Entry file: Flask-MVC-Pattern/main.py -Scanned: 2016-10-18 15:42:16.998754 -No vulnerabilities found. - - -jzempel/flask-exceptional -https://github.com/jzempel/flask-exceptional -Entry file: flask-exceptional/flask_exceptional.py -Scanned: 2016-10-18 15:42:17.497473 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qsnake/flask -https://github.com/qsnake/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:42:20.313929 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -joeyespo/flask-scaffold -https://github.com/joeyespo/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-18 15:42:20.832057 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iwebhosting/collectd-flask -https://github.com/iwebhosting/collectd-flask -Entry file: collectd-flask/collectdflask.py -Scanned: 2016-10-18 15:42:22.187523 -No vulnerabilities found. - - -yxm0513/flask-ims -https://github.com/yxm0513/flask-ims -Entry file: flask-ims/flask/sessions.py -Scanned: 2016-10-18 15:42:23.725263 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fay/flask-skeleton -https://github.com/fay/flask-skeleton -Entry file: None -Scanned: 2016-10-18 15:42:25.705532 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fay/flask-skeleton. - -joshourisman/flask-beans -https://github.com/joshourisman/flask-beans -Entry file: flask-beans/beans.py -Scanned: 2016-10-18 15:42:26.906962 -No vulnerabilities found. - - -jjinux/pyteladventure -https://github.com/jjinux/pyteladventure -Entry file: pyteladventure/pyteladventure/__init__.py -Scanned: 2016-10-18 15:42:27.462841 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mchambliss/flask -https://github.com/mchambliss/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:42:40.753387 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -robi42/backbone-flask -https://github.com/robi42/backbone-flask -Entry file: backbone-flask/app.py -Scanned: 2016-10-18 15:43:01.204307 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-18 15:43:05.681801 -No vulnerabilities found. - - -joshfinnie/Flask-shrtn -https://github.com/joshfinnie/Flask-shrtn -Entry file: Flask-shrtn/Flask-shrtn.py -Scanned: 2016-10-18 15:43:06.197331 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomatohater/goonhilly -https://github.com/tomatohater/goonhilly -Entry file: goonhilly/goonhilly.py -Scanned: 2016-10-18 15:43:07.887561 -No vulnerabilities found. - - -jmoiron/jmoiron.net -https://github.com/jmoiron/jmoiron.net -Entry file: None -Scanned: 2016-10-18 15:43:08.401944 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fzuslide/video_new -https://github.com/fzuslide/video_new -Entry file: video_new/application.py -Scanned: 2016-10-18 15:43:10.634143 -No vulnerabilities found. - - -tomatohater/lydon -https://github.com/tomatohater/lydon -Entry file: lydon/lydon/__init__.py -Scanned: 2016-10-18 15:43:12.010623 -No vulnerabilities found. - - -williamratcliff/django-feedback -https://github.com/williamratcliff/django-feedback -Entry file: django-feedback/feedback.py -Scanned: 2016-10-18 15:43:14.494099 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joelbm24/blog -https://github.com/joelbm24/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-18 15:43:16.459842 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoprocker/mylons -https://github.com/hoprocker/mylons -Entry file: mylons/lib/python2.5/site-packages/Flask-0.6.1-py2.5.egg/flask/app.py -Scanned: 2016-10-18 15:43:18.021335 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crisisking/bsg-raffle -https://github.com/crisisking/bsg-raffle -Entry file: bsg-raffle/raffle.py -Scanned: 2016-10-18 15:43:18.528350 -Vulnerability 1: -File: bsg-raffle/raffle.py - > User input at line 39, trigger word "form[": - user_id = int(request.form['user_id']) -File: bsg-raffle/raffle.py - > reaches line 42, trigger word "execute(": - g.db.execute('INSERT INTO winners(participant_id, prize_name) - VALUES (?, ?)', (user_id, prize)) - -Vulnerability 2: -File: bsg-raffle/raffle.py - > User input at line 40, trigger word "form[": - prize = request.form['prize'] -Reassigned in: - File: bsg-raffle/raffle.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('winner_added.html',name=username[0], prize=prize) -File: bsg-raffle/raffle.py - > reaches line 42, trigger word "execute(": - g.db.execute('INSERT INTO winners(participant_id, prize_name) - VALUES (?, ?)', (user_id, prize)) - -Vulnerability 3: -File: bsg-raffle/raffle.py - > User input at line 66, trigger word "form[": - username = request.form['username'] -File: bsg-raffle/raffle.py - > reaches line 68, trigger word "execute(": - g.db.execute('INSERT INTO participants(name) - VALUES (?)', (username)) - -Vulnerability 4: -File: bsg-raffle/raffle.py - > User input at line 66, trigger word "form[": - username = request.form['username'] -File: bsg-raffle/raffle.py - > reaches line 70, trigger word "flash(": - flash('%s added successfully!' % username) - - - -adamgreig/pyautopull -https://github.com/adamgreig/pyautopull -Entry file: pyautopull/pyautopull.py -Scanned: 2016-10-18 15:43:20.734876 -No vulnerabilities found. - - -sean-/flask-skeleton -https://github.com/sean-/flask-skeleton -Entry file: None -Scanned: 2016-10-18 15:43:21.892208 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sean-/flask-skeleton. - -Runscope/httpbin -https://github.com/Runscope/httpbin -Entry file: httpbin/httpbin/filters.py -Scanned: 2016-10-18 15:43:24.434299 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -hasgeek/flask-lastuser -https://github.com/hasgeek/flask-lastuser -Entry file: flask-lastuser/tests/test_mergeuser.py -Scanned: 2016-10-18 15:43:27.842019 -No vulnerabilities found. - - -BooBSD/flask-odesk -https://github.com/BooBSD/flask-odesk -Entry file: flask-odesk/tests.py -Scanned: 2016-10-18 15:43:28.336271 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cool-shark/redimon -https://github.com/cool-shark/redimon -Entry file: redimon/src/redimon/app.py -Scanned: 2016-10-18 15:43:29.788182 -No vulnerabilities found. - - -pcsanwald/flask_site -https://github.com/pcsanwald/flask_site -Entry file: flask_site/mysite.py -Scanned: 2016-10-18 15:43:39.263190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suzanshakya/flask-clevercss -https://github.com/suzanshakya/flask-clevercss -Entry file: flask-clevercss/example/runserver.py -Scanned: 2016-10-18 15:43:41.791552 -No vulnerabilities found. - - -dag/flask-sassy -https://github.com/dag/flask-sassy -Entry file: flask-sassy/tests/__init__.py -Scanned: 2016-10-18 15:43:56.064189 -No vulnerabilities found. - - -charlieevett/jiffy-portal -https://github.com/charlieevett/jiffy-portal -Entry file: jiffy-portal/portal/app.py -Scanned: 2016-10-18 15:43:58.415189 -No vulnerabilities found. - - -tomekwojcik/Flask-Module-Static-Files -https://github.com/tomekwojcik/Flask-Module-Static-Files -Entry file: Flask-Module-Static-Files/stest/__init__.py -Scanned: 2016-10-18 15:44:00.749764 -No vulnerabilities found. - - -justjkk/dotpath -https://github.com/justjkk/dotpath -Entry file: dotpath/run.py -Scanned: 2016-10-18 15:44:01.282346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -almet/semantic-bookclub -https://github.com/almet/semantic-bookclub -Entry file: semantic-bookclub/app/web.py -Scanned: 2016-10-18 15:44:01.813700 -Vulnerability 1: -File: semantic-bookclub/app/web.py - > User input at line 81, trigger word ".data": - book_title = dict(self.book.choices)[self.book.data] -File: semantic-bookclub/app/web.py - > reaches line 82, trigger word "flash(": - flash('%s have successfully borrowed %s' % (self.borrower.data, book_title)) - -Vulnerability 2: -File: semantic-bookclub/app/web.py - > User input at line 101, trigger word ".data": - member = Member.get_by(foaf_givenName=self.member.data).one() -File: semantic-bookclub/app/web.py - > reaches line 105, trigger word "flash(": - flash('%s now owns %s' % (member.foaf_givenName.first, book.dcterms_title.first)) - -Vulnerability 3: -File: semantic-bookclub/app/web.py - > User input at line 102, trigger word ".data": - book = Book.get_by(dcterms_identifier=self.book.data).one() -File: semantic-bookclub/app/web.py - > reaches line 105, trigger word "flash(": - flash('%s now owns %s' % (member.foaf_givenName.first, book.dcterms_title.first)) - - - -t9md/snippy -https://github.com/t9md/snippy -Entry file: snippy/snippy.py -Scanned: 2016-10-18 15:44:06.795368 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stehem/Tywna -https://github.com/stehem/Tywna -Entry file: Tywna/application/__init__.py -Scanned: 2016-10-18 15:44:12.617544 -No vulnerabilities found. - - -hoprocker/mylons -https://github.com/hoprocker/mylons -Entry file: mylons/lib/python2.5/site-packages/Flask-0.6.1-py2.5.egg/flask/app.py -Scanned: 2016-10-18 15:44:13.196979 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/bitpit-https-bridge -https://github.com/maxcountryman/bitpit-https-bridge -Entry file: bitpit-https-bridge/httpstobitpit/__init__.py -Scanned: 2016-10-18 15:44:14.517124 -No vulnerabilities found. - - -maxcountryman/flask-bcrypt -https://github.com/maxcountryman/flask-bcrypt -Entry file: flask-bcrypt/flask_bcrypt.py -Scanned: 2016-10-18 15:44:17.636972 -No vulnerabilities found. - - -kennethreitz-archive/flask-rest -https://github.com/kennethreitz-archive/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-18 15:44:18.600475 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tdryer/flask-forum -https://github.com/tdryer/flask-forum -Entry file: flask-forum/app.py -Scanned: 2016-10-18 15:44:19.119923 -Vulnerability 1: -File: flask-forum/app.py - > User input at line 124, trigger word ".data": - new_topic_id = post_topic(form.subject.data, form.content.data) -Reassigned in: - File: flask-forum/app.py - > Line 127: ret_MAYBE_FUNCTION_NAME = render_template('newtopic.html',form=form) -File: flask-forum/app.py - > reaches line 126, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/topic/' + new_topic_id) - -Vulnerability 2: -File: flask-forum/app.py - > User input at line 196, trigger word ".data": - username = form.username.data -File: flask-forum/app.py - > reaches line 199, trigger word "execute(": - g.db.execute('INSERT INTO users (username, password_hash) values (?, ?)', [username, pw_hash]) - -Vulnerability 3: -File: flask-forum/app.py - > User input at line 197, trigger word ".data": - password = form.password1.data -Reassigned in: - File: flask-forum/app.py - > Line 198: pw_hash = hashpw(password, gensalt()) -File: flask-forum/app.py - > reaches line 199, trigger word "execute(": - g.db.execute('INSERT INTO users (username, password_hash) values (?, ?)', [username, pw_hash]) - - - -dqminh/flask-mongoobject -https://github.com/dqminh/flask-mongoobject -Entry file: flask-mongoobject/examples_hello.py -Scanned: 2016-10-18 15:44:19.621129 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gmonnerat/flask-sandbox -https://github.com/gmonnerat/flask-sandbox -Entry file: flask-sandbox/hello/hello.py -Scanned: 2016-10-18 15:44:20.872409 -No vulnerabilities found. - - -DarkSector/wombat -https://github.com/DarkSector/wombat -Entry file: wombat/wombatdb.py -Scanned: 2016-10-18 15:44:21.378643 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lOlIl/Flask---Local-election -https://github.com/lOlIl/Flask---Local-election -Entry file: Flask---Local-election/app.py -Scanned: 2016-10-18 15:44:21.898239 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -paulftw/appengine-flask-template -https://github.com/paulftw/appengine-flask-template -Entry file: appengine-flask-template/app/app.py -Scanned: 2016-10-18 15:44:23.632403 -No vulnerabilities found. - - -flores/aquadoc -https://github.com/flores/aquadoc -Entry file: aquadoc/aquadoc.py -Scanned: 2016-10-18 15:44:25.313650 -No vulnerabilities found. - - -jorgeatorres/cotufa -https://github.com/jorgeatorres/cotufa -Entry file: cotufa/cotufa.py -Scanned: 2016-10-18 15:44:25.832078 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mbr/flask-kvsession -https://github.com/mbr/flask-kvsession -Entry file: flask-kvsession/tests/conftest.py -Scanned: 2016-10-18 15:44:31.135047 -No vulnerabilities found. - - -radekstepan/Flask-Skeleton-App -https://github.com/radekstepan/Flask-Skeleton-App -Entry file: Flask-Skeleton-App/flask_app.py -Scanned: 2016-10-18 15:44:40.001050 -No vulnerabilities found. - - -utahta/flask-on-fluxflex -https://github.com/utahta/flask-on-fluxflex -Entry file: flask-on-fluxflex/app/__init__.py -Scanned: 2016-10-18 15:44:41.791851 -No vulnerabilities found. - - -femmerling/brunch-flask-gae-skeleton -https://github.com/femmerling/brunch-flask-gae-skeleton -Entry file: brunch-flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 15:44:56.381126 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amcameron/gchartsdemo -https://github.com/amcameron/gchartsdemo -Entry file: gchartsdemo/charts.py -Scanned: 2016-10-18 15:44:58.736903 -No vulnerabilities found. - - -bagyr/flaskPage -https://github.com/bagyr/flaskPage -Entry file: flaskPage/__init__.py -Scanned: 2016-10-18 15:45:00.966594 -No vulnerabilities found. - - -sbook/flask-script -https://github.com/sbook/flask-script -Entry file: flask-script/tests.py -Scanned: 2016-10-18 15:45:05.421093 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joemarct/flask-gae-app -https://github.com/joemarct/flask-gae-app -Entry file: flask-gae-app/flask/app.py -Scanned: 2016-10-18 15:45:06.934463 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Bhagyashree-Mandora/The-Python-Task -https://github.com/Bhagyashree-Mandora/The-Python-Task -Entry file: The-Python-Task/main.py -Scanned: 2016-10-18 15:45:07.440958 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -piratesolutions/ps-website -https://github.com/piratesolutions/ps-website -Entry file: ps-website/app.py -Scanned: 2016-10-18 15:45:13.970879 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samrat/blogengine -https://github.com/samrat/blogengine -Entry file: blogengine/blogengine.py -Scanned: 2016-10-18 15:45:14.489950 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TimFletcher/cmprss -https://github.com/TimFletcher/cmprss -Entry file: cmprss/cmprss.py -Scanned: 2016-10-18 15:45:15.998367 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyvanee/mappy -https://github.com/andyvanee/mappy -Entry file: mappy/mappy.py -Scanned: 2016-10-18 15:45:16.542848 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -barnslig/foreveralonebook -https://github.com/barnslig/foreveralonebook -Entry file: foreveralonebook/foreveralonebook.py -Scanned: 2016-10-18 15:45:19.589347 -Vulnerability 1: -File: foreveralonebook/foreveralonebook.py - > User input at line 47, trigger word "form[": - entry = escape(request.form['entry']) -File: foreveralonebook/foreveralonebook.py - > reaches line 57, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_posts (u_id, content) VALUES ({0}, '{1}');'.format(session['u_id'], entry)) - -Vulnerability 2: -File: foreveralonebook/foreveralonebook.py - > User input at line 113, trigger word "form[": - password = hashlib.sha1(request.form['new_pw']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 115, trigger word "execute(": - g.db.cur.execute('UPDATE feabook_user SET password = '{0}' WHERE id = '{1}';'.format(password, session['u_id'])) - -Vulnerability 3: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 157, trigger word "execute(": - g.db.cur.execute('SELECT username FROM feabook_user WHERE username = '{0}';'.format(username)) - -Vulnerability 4: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 164, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_user (username, password) VALUES ('{0}', '{1}');'.format(username, password)) - -Vulnerability 5: -File: foreveralonebook/foreveralonebook.py - > User input at line 152, trigger word "form[": - password = hashlib.sha1(request.form['password']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 164, trigger word "execute(": - g.db.cur.execute('INSERT INTO feabook_user (username, password) VALUES ('{0}', '{1}');'.format(username, password)) - -Vulnerability 6: -File: foreveralonebook/foreveralonebook.py - > User input at line 151, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 171: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 172: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 169, trigger word "execute(": - g.db.cur.execute('SELECT id, username FROM feabook_user WHERE username = '{0}';'.format(username)) - -Vulnerability 7: -File: foreveralonebook/foreveralonebook.py - > User input at line 193, trigger word "form[": - username = escape(request.form['username']) -Reassigned in: - File: foreveralonebook/foreveralonebook.py - > Line 222: session['username'] = username - File: foreveralonebook/foreveralonebook.py - > Line 223: session['u_id'] = rows[0][0] -File: foreveralonebook/foreveralonebook.py - > reaches line 197, trigger word "execute(": - g.db.cur.execute('SELECT id, username, password FROM feabook_user WHERE username = '{0}' AND password = '{1}';'.format(username, password)) - -Vulnerability 8: -File: foreveralonebook/foreveralonebook.py - > User input at line 194, trigger word "form[": - password = hashlib.sha1(request.form['password']).hexdigest() -File: foreveralonebook/foreveralonebook.py - > reaches line 197, trigger word "execute(": - g.db.cur.execute('SELECT id, username, password FROM feabook_user WHERE username = '{0}' AND password = '{1}';'.format(username, password)) - - - -geek22com/referral_dashboard_engine -https://github.com/geek22com/referral_dashboard_engine -Entry file: referral_dashboard_engine/heymoose/__init__.py -Scanned: 2016-10-18 15:45:20.120197 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dqminh/flask-lettuce -https://github.com/dqminh/flask-lettuce -Entry file: flask-lettuce/test.py -Scanned: 2016-10-18 15:45:21.737767 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -radekstepan/FlaskBudget -https://github.com/radekstepan/FlaskBudget -Entry file: FlaskBudget/budget.py -Scanned: 2016-10-18 15:45:22.711272 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -UfSoft/Flask-MenuBuilder -https://github.com/UfSoft/Flask-MenuBuilder -Entry file: Flask-MenuBuilder/tests/test_menuitem.py -Scanned: 2016-10-18 15:45:25.040955 -No vulnerabilities found. - - -gregglind/flask-tool -https://github.com/gregglind/flask-tool -Entry file: flask-tool/flasktool/console.py -Scanned: 2016-10-18 15:45:25.554813 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kblin/flask-downloader -https://github.com/kblin/flask-downloader -Entry file: flask-downloader/tests.py -Scanned: 2016-10-18 15:45:26.054288 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/flog -https://github.com/maxcountryman/flog -Entry file: flog/flog/__init__.py -Scanned: 2016-10-18 15:45:28.156319 -No vulnerabilities found. - - -sublee/Flask-Handler -https://github.com/sublee/Flask-Handler -Entry file: None -Scanned: 2016-10-18 15:45:29.654621 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sublee/Flask-Handler. - -Ramblurr/pyqdb -https://github.com/Ramblurr/pyqdb -Entry file: pyqdb/src/pyqdb.py -Scanned: 2016-10-18 15:45:40.113750 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zackster/DijScrape--flask-rewrite- -https://github.com/zackster/DijScrape--flask-rewrite- -Entry file: DijScrape--flask-rewrite-/dijscrape.py -Scanned: 2016-10-18 15:45:41.567892 -No vulnerabilities found. - - -asenchi/pomp -https://github.com/asenchi/pomp -Entry file: pomp/pomp/pomp.py -Scanned: 2016-10-18 15:45:42.757188 -No vulnerabilities found. - - -tshirtman/snakenest -https://github.com/tshirtman/snakenest -Entry file: snakenest/main.py -Scanned: 2016-10-18 15:45:58.155770 -No vulnerabilities found. - - -jvreeland/Python-Web-Service-for-Android-GMaps-AsyncTask-Demo -https://github.com/jvreeland/Python-Web-Service-for-Android-GMaps-AsyncTask-Demo -Entry file: Python-Web-Service-for-Android-GMaps-AsyncTask-Demo/gmaps.py -Scanned: 2016-10-18 15:45:58.666381 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Python-Web-Service-for-Android-GMaps-AsyncTask-Demo/env/lib/python2.7/genericpath.py - -triposo/geocodecache -https://github.com/triposo/geocodecache -Entry file: geocodecache/geocodecache.py -Scanned: 2016-10-18 15:46:01.166703 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -toastwaffle/ToDoQuick -https://github.com/toastwaffle/ToDoQuick -Entry file: ToDoQuick/todoquick.py -Scanned: 2016-10-18 15:46:01.676256 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coleifer/flask-peewee -https://github.com/coleifer/flask-peewee -Entry file: flask-peewee/example/app.py -Scanned: 2016-10-18 15:46:05.871113 -Vulnerability 1: -File: flask-peewee/example/admin.py - > User input at line 27, trigger word "get(": - next = request.form.get('next') or self.dashboard_url() -File: flask-peewee/example/admin.py - > reaches line 28, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - - - -jeanphix/Flask-Dashed -https://github.com/jeanphix/Flask-Dashed -Entry file: Flask-Dashed/examples/sqlalchemy_backend.py -Scanned: 2016-10-18 15:46:11.109857 -No vulnerabilities found. - - -jarus/flask-mongokit -https://github.com/jarus/flask-mongokit -Entry file: flask-mongokit/tests/test_base.py -Scanned: 2016-10-18 15:46:11.630169 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -namlook/flask-apibee -https://github.com/namlook/flask-apibee -Entry file: flask-apibee/example/app.py -Scanned: 2016-10-18 15:46:14.606695 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -voluntas/heroku-template-flask -https://github.com/voluntas/heroku-template-flask -Entry file: heroku-template-flask/snowflake/__init__.py -Scanned: 2016-10-18 15:46:16.810154 -No vulnerabilities found. - - -Deepwalker/Flask-Bundle -https://github.com/Deepwalker/Flask-Bundle -Entry file: Flask-Bundle/samples/simple.py -Scanned: 2016-10-18 15:46:20.237340 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sunlightlabs/flask-districtoffices -https://github.com/sunlightlabs/flask-districtoffices -Entry file: flask-districtoffices/districtoffices.py -Scanned: 2016-10-18 15:46:22.361685 -No vulnerabilities found. - - -quanticle/flask_blog -https://github.com/quanticle/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-18 15:46:23.806630 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garrettr/haps -https://github.com/garrettr/haps -Entry file: haps/quickstart.py -Scanned: 2016-10-18 15:46:24.321455 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dsully/sitter -https://github.com/dsully/sitter -Entry file: sitter/sitter/__init__.py -Scanned: 2016-10-18 15:46:25.328660 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahri/nodeblog -https://github.com/ahri/nodeblog -Entry file: nodeblog/blog.py -Scanned: 2016-10-18 15:46:25.826100 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/celeb -https://github.com/maxcountryman/celeb -Entry file: celeb/celeb/__init__.py -Scanned: 2016-10-18 15:46:26.325495 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marchon/PO -https://github.com/marchon/PO -Entry file: PO/main.py -Scanned: 2016-10-18 15:46:27.539809 -No vulnerabilities found. - - -slok/xlarrakoetxeaorg -https://github.com/slok/xlarrakoetxeaorg -Entry file: xlarrakoetxeaorg/mysite/blog/__init__.py -Scanned: 2016-10-18 15:46:32.759499 -No vulnerabilities found. - - -boboppie/pyLiftOver -https://github.com/boboppie/pyLiftOver -Entry file: pyLiftOver/flask/lift-over-app.py -Scanned: 2016-10-18 15:46:33.247289 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -no0p/homepage -https://github.com/no0p/homepage -Entry file: homepage/site.py -Scanned: 2016-10-18 15:46:38.932717 -No vulnerabilities found. - - -tjosten/python-push -https://github.com/tjosten/python-push -Entry file: python-push/push.py -Scanned: 2016-10-18 15:46:41.205972 -No vulnerabilities found. - - -Joshkunz/PyChannel -https://github.com/Joshkunz/PyChannel -Entry file: PyChannel/PyChannel/__init__.py -Scanned: 2016-10-18 15:46:41.715816 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cbess/ytlinker -https://github.com/cbess/ytlinker -Entry file: ytlinker/flask/app.py -Scanned: 2016-10-18 15:46:42.206463 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -openshift/flask-example -https://github.com/openshift/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-18 15:46:59.363444 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wasabi0522/flaskr -https://github.com/wasabi0522/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 15:47:06.304974 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amehta/Flaskly -https://github.com/amehta/Flaskly -Entry file: Flaskly/flaskly.py -Scanned: 2016-10-18 15:47:12.299035 -Vulnerability 1: -File: Flaskly/flaskly.py - > User input at line 73, trigger word "form[": - url = request.form['long_url'] -Reassigned in: - File: Flaskly/flaskly.py - > Line 74: short = pickShortUrl(url) -File: Flaskly/flaskly.py - > reaches line 75, trigger word "flash(": - flash('Short Url http:/localhost/' + short) - - - -fyears/flaskr-redis -https://github.com/fyears/flaskr-redis -Entry file: flaskr-redis/app.py -Scanned: 2016-10-18 15:47:16.000785 -No vulnerabilities found. - - -Jc2k/flask-example -https://github.com/Jc2k/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-18 15:47:16.497905 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brainTrain/flasktest -https://github.com/brainTrain/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-18 15:47:20.959027 -No vulnerabilities found. - - -proles/flaskr -https://github.com/proles/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 15:47:21.463391 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joeyespo/hello-redis-tasks -https://github.com/joeyespo/hello-redis-tasks -Entry file: hello-redis-tasks/hello_redis_tasks.py -Scanned: 2016-10-18 15:47:21.964679 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cemk/flask-expander -https://github.com/cemk/flask-expander -Entry file: flask-expander/expand.py -Scanned: 2016-10-18 15:47:23.161862 -No vulnerabilities found. - - -pygraz/old-flask-website -https://github.com/pygraz/old-flask-website -Entry file: old-flask-website/pygraz_website/__init__.py -Scanned: 2016-10-18 15:47:23.675609 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thomasballinger/Utok -https://github.com/thomasballinger/Utok -Entry file: Utok/webapp.py -Scanned: 2016-10-18 15:47:25.122505 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lcruz/Igualitos-appengine -https://github.com/lcruz/Igualitos-appengine -Entry file: Igualitos-appengine/config.py -Scanned: 2016-10-18 15:47:25.657504 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hettan/MyPortfolio -https://github.com/hettan/MyPortfolio -Entry file: MyPortfolio/web/myFlaskProject.py -Scanned: 2016-10-18 15:47:26.158262 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lcruz/igualitos -https://github.com/lcruz/igualitos -Entry file: igualitos/config.py -Scanned: 2016-10-18 15:47:27.526030 -No vulnerabilities found. - - -agonzalezro/gplus-blog -https://github.com/agonzalezro/gplus-blog -Entry file: gplus-blog/gplusblog/__init__.py -Scanned: 2016-10-18 15:47:28.858158 -No vulnerabilities found. - - -fwenzel/strassendeutsch -https://github.com/fwenzel/strassendeutsch -Entry file: strassendeutsch/woerterbuch/__init__.py -Scanned: 2016-10-18 15:47:30.883389 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lzyy/chat -https://github.com/lzyy/chat -Entry file: chat/src/app.py -Scanned: 2016-10-18 15:47:40.520840 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ferhensil/flask-example -https://github.com/ferhensil/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-18 15:47:42.005048 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jeanphix/flask-dashed-demo -https://github.com/jeanphix/flask-dashed-demo -Entry file: flask-dashed-demo/app.py -Scanned: 2016-10-18 15:47:42.504876 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kenkam/msgbrd -https://github.com/kenkam/msgbrd -Entry file: msgbrd/app.py -Scanned: 2016-10-18 15:47:59.506170 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -grigouze/flask-jenkins-radiator -https://github.com/grigouze/flask-jenkins-radiator -Entry file: flask-jenkins-radiator/radiator/radiator.py -Scanned: 2016-10-18 15:48:02.008854 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rduplain/flask-jquery-autosave-example -https://github.com/rduplain/flask-jquery-autosave-example -Entry file: flask-jquery-autosave-example/app.py -Scanned: 2016-10-18 15:48:03.637621 -No vulnerabilities found. - - -kracekumar/Gummi -https://github.com/kracekumar/Gummi -Entry file: Gummi/gummi/tests/test.py -Scanned: 2016-10-18 15:48:04.138281 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ivoscc/qchaes -https://github.com/ivoscc/qchaes -Entry file: qchaes/runserver.py -Scanned: 2016-10-18 15:48:08.121919 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fdemmer/flask-principal -https://github.com/fdemmer/flask-principal -Entry file: flask-principal/tests/test_principal.py -Scanned: 2016-10-18 15:48:12.627540 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dasevilla/evernote-oauth-example -https://github.com/dasevilla/evernote-oauth-example -Entry file: evernote-oauth-example/webapp.py -Scanned: 2016-10-18 15:48:15.834044 -No vulnerabilities found. - - -zeninthehome/flaskr -https://github.com/zeninthehome/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 15:48:16.805752 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshfinnie/Flacker-News -https://github.com/joshfinnie/Flacker-News -Entry file: Flacker-News/flacker-news/app.py -Scanned: 2016-10-18 15:48:18.310939 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -moneill/uber-flask -https://github.com/moneill/uber-flask -Entry file: uber-flask/uber.py -Scanned: 2016-10-18 15:48:21.865639 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: uber-flask/env/lib/python2.7/genericpath.py - -nubela/radar-backend -https://github.com/nubela/radar-backend -Entry file: radar-backend/src/radar.py -Scanned: 2016-10-18 15:48:22.363410 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TxSSC/the-questionator -https://github.com/TxSSC/the-questionator -Entry file: the-questionator/questionator/__init__.py -Scanned: 2016-10-18 15:48:22.857516 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -satonaoya/flask-epio-skelton -https://github.com/satonaoya/flask-epio-skelton -Entry file: flask-epio-skelton/app.py -Scanned: 2016-10-18 15:48:25.079426 -No vulnerabilities found. - - -marksteve/bookmarks -https://github.com/marksteve/bookmarks -Entry file: bookmarks/bookmarks.py -Scanned: 2016-10-18 15:48:26.388927 -No vulnerabilities found. - - -paradoxxxzero/polldance -https://github.com/paradoxxxzero/polldance -Entry file: polldance/dance.py -Scanned: 2016-10-18 15:48:27.606364 -No vulnerabilities found. - - -flebel/Egami -https://github.com/flebel/Egami -Entry file: Egami/egami.py -Scanned: 2016-10-18 15:48:28.943372 -No vulnerabilities found. - - -mitsuhiko/flask-pastebin -https://github.com/mitsuhiko/flask-pastebin -Entry file: flask-pastebin/pastebin.py -Scanned: 2016-10-18 15:48:30.178493 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -maxcountryman/flask-seasurf -https://github.com/maxcountryman/flask-seasurf -Entry file: flask-seasurf/test_seasurf.py -Scanned: 2016-10-18 15:48:35.630752 -No vulnerabilities found. - - -maxcountryman/logmon -https://github.com/maxcountryman/logmon -Entry file: logmon/logmon/__init__.py -Scanned: 2016-10-18 15:48:37.651644 -No vulnerabilities found. - - -hasgeek/coaster -https://github.com/hasgeek/coaster -Entry file: coaster/tests/test_render_with.py -Scanned: 2016-10-18 15:48:41.322364 -No vulnerabilities found. - - -craigkerstiens/flask-helloworld -https://github.com/craigkerstiens/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-18 15:48:42.609968 -No vulnerabilities found. - - -jarodl/flask-github -https://github.com/jarodl/flask-github -Entry file: flask-github/example/example.py -Scanned: 2016-10-18 15:48:43.129457 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ahri/flask-mustache -https://github.com/ahri/flask-mustache -Entry file: flask-mustache/tests/test_mustache.py -Scanned: 2016-10-18 15:48:44.380547 -No vulnerabilities found. - - -gears/flask-gears -https://github.com/gears/flask-gears -Entry file: flask-gears/example/app.py -Scanned: 2016-10-18 15:48:45.690813 -No vulnerabilities found. - - -mitsuhiko/tugraz-flask-demo -https://github.com/mitsuhiko/tugraz-flask-demo -Entry file: tugraz-flask-demo/pastebin.py -Scanned: 2016-10-18 15:48:58.700098 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mattoufoutu/flask-project-templates -https://github.com/mattoufoutu/flask-project-templates -Entry file: None -Scanned: 2016-10-18 15:49:00.210635 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mattoufoutu/flask-project-templates. - -svieira/Budget-Manager -https://github.com/svieira/Budget-Manager -Entry file: None -Scanned: 2016-10-18 15:49:04.676071 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/svieira/Budget-Manager. - -solarmist/Flaskr -https://github.com/solarmist/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-18 15:49:07.176273 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cybertoast/flask-router -https://github.com/cybertoast/flask-router -Entry file: flask-router/test_router.py -Scanned: 2016-10-18 15:49:13.985072 -No vulnerabilities found. - - -srusskih/Flask-application-template -https://github.com/srusskih/Flask-application-template -Entry file: Flask-application-template/myapp/myapp.py -Scanned: 2016-10-18 15:49:17.773048 -No vulnerabilities found. - - -Rootbuzz/heroku-basic-flask-app -https://github.com/Rootbuzz/heroku-basic-flask-app -Entry file: heroku-basic-flask-app/sso.py -Scanned: 2016-10-18 15:49:18.974508 -No vulnerabilities found. - - -adgaudio/async-webapp---gevent--psycopg2--flask -https://github.com/adgaudio/async-webapp---gevent--psycopg2--flask -Entry file: async-webapp---gevent--psycopg2--flask/app.py -Scanned: 2016-10-18 15:49:19.480573 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxcountryman/chatter -https://github.com/maxcountryman/chatter -Entry file: chatter/chatter/__init__.py -Scanned: 2016-10-18 15:49:22.919984 -No vulnerabilities found. - - -zeak/pyProx -https://github.com/zeak/pyProx -Entry file: pyProx/pyProx.py -Scanned: 2016-10-18 15:49:23.423851 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -subchild/iStockUtils -https://github.com/subchild/iStockUtils -Entry file: iStockUtils/istockutils.py -Scanned: 2016-10-18 15:49:24.843649 -No vulnerabilities found. - - -tsoporan/read.list -https://github.com/tsoporan/read.list -Entry file: None -Scanned: 2016-10-18 15:49:25.349566 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dcrosta/flask-pymongo -https://github.com/dcrosta/flask-pymongo -Entry file: flask-pymongo/examples/wiki/wiki.py -Scanned: 2016-10-18 15:49:29.130027 -No vulnerabilities found. - - -jamesward/flaskbars -https://github.com/jamesward/flaskbars -Entry file: flaskbars/web.py -Scanned: 2016-10-18 15:49:30.771103 -No vulnerabilities found. - - -jarus/flask-fillin -https://github.com/jarus/flask-fillin -Entry file: flask-fillin/test_app/__init__.py -Scanned: 2016-10-18 15:49:32.757028 -No vulnerabilities found. - - -noisebridge/flask-noiselist -https://github.com/noisebridge/flask-noiselist -Entry file: flask-noiselist/src/noiselist/__init__.py -Scanned: 2016-10-18 15:49:33.264515 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -givp/Flask-MongoDB-Project -https://github.com/givp/Flask-MongoDB-Project -Entry file: Flask-MongoDB-Project/myapp.py -Scanned: 2016-10-18 15:49:34.494590 -No vulnerabilities found. - - -maxcountryman/logmon -https://github.com/maxcountryman/logmon -Entry file: logmon/logmon/__init__.py -Scanned: 2016-10-18 15:49:38.030617 -No vulnerabilities found. - - -wgkoro/flask_mongodb -https://github.com/wgkoro/flask_mongodb -Entry file: flask_mongodb/app/app.py -Scanned: 2016-10-18 15:49:38.533963 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danbruegge/flaskeleton -https://github.com/danbruegge/flaskeleton -Entry file: flaskeleton/app/__init__.py -Scanned: 2016-10-18 15:49:39.063571 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spoqa/flask-beaker -https://github.com/spoqa/flask-beaker -Entry file: flask-beaker/test_beaker.py -Scanned: 2016-10-18 15:49:45.236793 -No vulnerabilities found. - - -BenjaminMalley/FlaskUser -https://github.com/BenjaminMalley/FlaskUser -Entry file: FlaskUser/tests/user_api_tests.py -Scanned: 2016-10-18 15:49:46.602706 -No vulnerabilities found. - - -mattoufoutu/flask-project-templates -https://github.com/mattoufoutu/flask-project-templates -Entry file: None -Scanned: 2016-10-18 15:49:47.102213 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mattoufoutu/flask-project-templates. - -jparise/flask-facebook -https://github.com/jparise/flask-facebook -Entry file: flask-facebook/tests/test_facebook.py -Scanned: 2016-10-18 15:50:00.470342 -No vulnerabilities found. - - -codeb2cc/flask-examples -https://github.com/codeb2cc/flask-examples -Entry file: flask-examples/minitwit/minitwit.py -Scanned: 2016-10-18 15:50:00.986473 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -Opentaste/bombolone -https://github.com/Opentaste/bombolone -Entry file: bombolone/bombolone/app.py -Scanned: 2016-10-18 15:50:03.498884 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahamilton55/flaskr -https://github.com/ahamilton55/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 15:50:03.998996 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rbastian/flaskr -https://github.com/rbastian/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 15:50:05.488160 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -RyanMcG/Bits-Books -https://github.com/RyanMcG/Bits-Books -Entry file: Bits-Books/web.py -Scanned: 2016-10-18 15:50:07.992449 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -practo/r5d4 -https://github.com/practo/r5d4 -Entry file: r5d4/r5d4/__init__.py -Scanned: 2016-10-18 15:50:09.488813 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -youknowone/flask-skeleton -https://github.com/youknowone/flask-skeleton -Entry file: None -Scanned: 2016-10-18 15:50:13.978398 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/youknowone/flask-skeleton. - -nourlcn/flask-note -https://github.com/nourlcn/flask-note -Entry file: flask-note/note.py -Scanned: 2016-10-18 15:50:16.486055 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -w1mvy/flask_on_gae -https://github.com/w1mvy/flask_on_gae -Entry file: flask_on_gae/src/main.py -Scanned: 2016-10-18 15:50:19.895192 -No vulnerabilities found. - - -yukatou/flask-board_test -https://github.com/yukatou/flask-board_test -Entry file: flask-board_test/board/__init__.py -Scanned: 2016-10-18 15:50:20.403268 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neilmiddleton/heroku_flask_example -https://github.com/neilmiddleton/heroku_flask_example -Entry file: heroku_flask_example/web.py -Scanned: 2016-10-18 15:50:21.605512 -No vulnerabilities found. - - -dhathorn/Blaskr -https://github.com/dhathorn/Blaskr -Entry file: Blaskr/blaskr/__init__.py -Scanned: 2016-10-18 15:50:23.295735 -No vulnerabilities found. - - -drewlustro/trackcircle -https://github.com/drewlustro/trackcircle -Entry file: None -Scanned: 2016-10-18 15:50:23.804378 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nicolaiarocci/flask-mimerender -https://github.com/nicolaiarocci/flask-mimerender -Entry file: flask-mimerender/src/example.py -Scanned: 2016-10-18 15:50:29.020996 -No vulnerabilities found. - - -ducu/rq-dashboard -https://github.com/ducu/rq-dashboard -Entry file: rq-dashboard/rq_dashboard/cli.py -Scanned: 2016-10-18 15:50:33.812664 -No vulnerabilities found. - - -ryands/flasknews -https://github.com/ryands/flasknews -Entry file: flasknews/news.py -Scanned: 2016-10-18 15:50:34.322459 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rsenk330/Flask-Cake -https://github.com/rsenk330/Flask-Cake -Entry file: Flask-Cake/flask_cake/tests/test_cake.py -Scanned: 2016-10-18 15:50:37.791101 -No vulnerabilities found. - - -jasonwyatt/Flask-ErrorMail -https://github.com/jasonwyatt/Flask-ErrorMail -Entry file: Flask-ErrorMail/example/simple.py -Scanned: 2016-10-18 15:50:39.318837 -No vulnerabilities found. - - -brocaar/flask-views -https://github.com/brocaar/flask-views -Entry file: flask-views/flask_views/tests/functional/base.py -Scanned: 2016-10-18 15:50:41.887604 -No vulnerabilities found. - - -simonz05/flask-wtf -https://github.com/simonz05/flask-wtf -Entry file: flask-wtf/examples/recaptcha/app.py -Scanned: 2016-10-18 15:50:45.152056 -No vulnerabilities found. - - -nivardus/flask-sl -https://github.com/nivardus/flask-sl -Entry file: flask-sl/examples/app.py -Scanned: 2016-10-18 15:50:46.473544 -No vulnerabilities found. - - -andersoncardoso/flaskle -https://github.com/andersoncardoso/flaskle -Entry file: flaskle/flaskle.py -Scanned: 2016-10-18 15:50:47.790679 -No vulnerabilities found. - - -ferronrsmith/flask_projects -https://github.com/ferronrsmith/flask_projects -Entry file: flask_projects/flask_orm/ormapp.py -Scanned: 2016-10-18 15:50:54.031045 -No vulnerabilities found. - - -spanners/flask-blog -https://github.com/spanners/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 15:50:54.593259 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -kvesteri/flask-generic-views -https://github.com/kvesteri/flask-generic-views -Entry file: flask-generic-views/tests/__init__.py -Scanned: 2016-10-18 15:50:55.093384 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ehazlett/coiapi-flask -https://github.com/ehazlett/coiapi-flask -Entry file: coiapi-flask/coiapi/__init__.py -Scanned: 2016-10-18 15:51:01.437349 -No vulnerabilities found. - - -rmasters/progress-flask -https://github.com/rmasters/progress-flask -Entry file: progress-flask/progress.py -Scanned: 2016-10-18 15:51:05.116681 -No vulnerabilities found. - - -RDFLib/rdflib-web -https://github.com/RDFLib/rdflib-web -Entry file: rdflib-web/rdflib_web/lod.py -Scanned: 2016-10-18 15:51:07.147731 -Vulnerability 1: -File: rdflib-web/rdflib_web/lod.py - > User input at line 515, trigger word ".data": - path = 'lod.data' -Reassigned in: - File: rdflib-web/rdflib_web/lod.py - > Line 518: path = 'lod.page' - File: rdflib-web/rdflib_web/lod.py - > Line 532: ret_MAYBE_FUNCTION_NAME = redirect(url, 303) -File: rdflib-web/rdflib_web/lod.py - > reaches line 523, trigger word "url_for(": - url = url_for(path,type_=type_, label=label, format_=ext) - -Vulnerability 2: -File: rdflib-web/rdflib_web/lod.py - > User input at line 515, trigger word ".data": - path = 'lod.data' -Reassigned in: - File: rdflib-web/rdflib_web/lod.py - > Line 518: path = 'lod.page' - File: rdflib-web/rdflib_web/lod.py - > Line 532: ret_MAYBE_FUNCTION_NAME = redirect(url, 303) -File: rdflib-web/rdflib_web/lod.py - > reaches line 525, trigger word "url_for(": - url = url_for(path,type_=type_, label=label) - -Vulnerability 3: -File: rdflib-web/rdflib_web/lod.py - > User input at line 515, trigger word ".data": - path = 'lod.data' -Reassigned in: - File: rdflib-web/rdflib_web/lod.py - > Line 518: path = 'lod.page' - File: rdflib-web/rdflib_web/lod.py - > Line 532: ret_MAYBE_FUNCTION_NAME = redirect(url, 303) -File: rdflib-web/rdflib_web/lod.py - > reaches line 528, trigger word "url_for(": - url = url_for(path,label=label, format_=ext) - -Vulnerability 4: -File: rdflib-web/rdflib_web/lod.py - > User input at line 515, trigger word ".data": - path = 'lod.data' -Reassigned in: - File: rdflib-web/rdflib_web/lod.py - > Line 518: path = 'lod.page' - File: rdflib-web/rdflib_web/lod.py - > Line 532: ret_MAYBE_FUNCTION_NAME = redirect(url, 303) -File: rdflib-web/rdflib_web/lod.py - > reaches line 530, trigger word "url_for(": - url = url_for(path,label=label) - -Vulnerability 5: -File: rdflib-web/rdflib_web/lod.py - > User input at line 511, trigger word "get(": - mimetype = mimeutils.best_match([mimeutils.RDFXML_MIME, mimeutils.N3_MIME, mimeutils.NTRIPLES_MIME, mimeutils.HTML_MIME], request.headers.get('Accept')) -Reassigned in: - File: rdflib-web/rdflib_web/lod.py - > Line 516: ext = '.' + mimeutils.mime_to_format(mimetype) - File: rdflib-web/rdflib_web/lod.py - > Line 519: ext = '' - File: rdflib-web/rdflib_web/lod.py - > Line 523: url = url_for(path,type_=type_, label=label, format_=ext) - File: rdflib-web/rdflib_web/lod.py - > Line 525: url = url_for(path,type_=type_, label=label) - File: rdflib-web/rdflib_web/lod.py - > Line 528: url = url_for(path,label=label, format_=ext) - File: rdflib-web/rdflib_web/lod.py - > Line 530: url = url_for(path,label=label) -File: rdflib-web/rdflib_web/lod.py - > reaches line 532, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url, 303) - - - -zen4ever/goose-in-flask -https://github.com/zen4ever/goose-in-flask -Entry file: goose-in-flask/application.py -Scanned: 2016-10-18 15:51:19.301484 -No vulnerabilities found. - - -thinker007/flaskr -https://github.com/thinker007/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 15:51:19.813235 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -FND/Flask-RoutingManifest -https://github.com/FND/Flask-RoutingManifest -Entry file: Flask-RoutingManifest/test/test_manifest.py -Scanned: 2016-10-18 15:51:21.024460 -No vulnerabilities found. - - -Fluxx/trappist -https://github.com/Fluxx/trappist -Entry file: trappist/tests/test_app.py -Scanned: 2016-10-18 15:51:23.131622 -No vulnerabilities found. - - -babymastodon/host_flask -https://github.com/babymastodon/host_flask -Entry file: host_flask/templates/wsgi/template.py -Scanned: 2016-10-18 15:51:24.099628 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cirode/test_flask_app -https://github.com/cirode/test_flask_app -Entry file: None -Scanned: 2016-10-18 15:51:25.081133 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cirode/test_flask_app. - -Opentaste/tiramisu-homepage -https://github.com/Opentaste/tiramisu-homepage -Entry file: tiramisu-homepage/libs/flask/app.py -Scanned: 2016-10-18 15:51:26.060518 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fogleman/Boggle -https://github.com/fogleman/Boggle -Entry file: Boggle/__init__.py -Scanned: 2016-10-18 15:51:26.581864 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -drnlm/Sutekh-Web -https://github.com/drnlm/Sutekh-Web -Entry file: Sutekh-Web/sutekhweb.py -Scanned: 2016-10-18 15:51:29.059539 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hickford/footballer-or-pasta -https://github.com/hickford/footballer-or-pasta -Entry file: footballer-or-pasta/app.py -Scanned: 2016-10-18 15:51:32.095993 -No vulnerabilities found. - - -mahmoudhossam/blog -https://github.com/mahmoudhossam/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-18 15:51:34.589333 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -polera/practical_python_deployments -https://github.com/polera/practical_python_deployments -Entry file: practical_python_deployments/app.py -Scanned: 2016-10-18 15:51:35.104446 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eamonbanta/simple_calendar -https://github.com/eamonbanta/simple_calendar -Entry file: simple_calendar/index.py -Scanned: 2016-10-18 15:51:40.068987 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flask-admin/flask-admin -https://github.com/flask-admin/flask-admin -Entry file: flask-admin/flask_admin/tests/test_form_upload.py -Scanned: 2016-10-18 15:51:55.628295 -No vulnerabilities found. - - -maxcountryman/flask-login -https://github.com/maxcountryman/flask-login -Entry file: flask-login/test_login.py -Scanned: 2016-10-18 15:51:58.876724 -Vulnerability 1: -File: flask-login/flask_login/login_manager.py - > User input at line 393, trigger word "get(": - cookie_name = config.get('REMEMBER_COOKIE_NAME', COOKIE_NAME) -File: flask-login/flask_login/login_manager.py - > reaches line 412, trigger word "set_cookie(": - response.set_cookie(cookie_name,value=data, expires=expires, domain=domain, path=path, secure=secure, httponly=httponly) - - - -mattupstate/flask-security -https://github.com/mattupstate/flask-security -Entry file: flask-security/tests/conftest.py -Scanned: 2016-10-18 15:52:03.679096 -No vulnerabilities found. - - -jfinkels/flask-restless -https://github.com/jfinkels/flask-restless -Entry file: flask-restless/examples/clients/jquery/__main__.py -Scanned: 2016-10-18 15:52:10.099936 -No vulnerabilities found. - - -lepture/flask-wtf -https://github.com/lepture/flask-wtf -Entry file: flask-wtf/examples/recaptcha/app.py -Scanned: 2016-10-18 15:52:14.211776 -No vulnerabilities found. - - -smurfix/flask-script -https://github.com/smurfix/flask-script -Entry file: flask-script/tests.py -Scanned: 2016-10-18 15:52:14.702820 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattupstate/flask-mail -https://github.com/mattupstate/flask-mail -Entry file: flask-mail/tests.py -Scanned: 2016-10-18 15:52:15.239642 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jarus/flask-testing -https://github.com/jarus/flask-testing -Entry file: flask-testing/examples/twill_site/todos/__init__.py -Scanned: 2016-10-18 15:52:17.651773 -No vulnerabilities found. - - -jpvanhal/flask-split -https://github.com/jpvanhal/flask-split -Entry file: flask-split/tests/__init__.py -Scanned: 2016-10-18 15:52:18.146965 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gyllstromk/Flask-WhooshAlchemy -https://github.com/gyllstromk/Flask-WhooshAlchemy -Entry file: Flask-WhooshAlchemy/test/test_all.py -Scanned: 2016-10-18 15:52:19.892859 -No vulnerabilities found. - - -dormouse/Flask_Docs_ZhCn -https://github.com/dormouse/Flask_Docs_ZhCn -Entry file: Flask_Docs_ZhCn/flask/sessions.py -Scanned: 2016-10-18 15:52:26.967713 -No vulnerabilities found. - - -mattupstate/flask-social-example -https://github.com/mattupstate/flask-social-example -Entry file: flask-social-example/app/__init__.py -Scanned: 2016-10-18 15:52:27.468151 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dplepage/flask-raptor -https://github.com/dplepage/flask-raptor -Entry file: flask-raptor/tests.py -Scanned: 2016-10-18 15:52:30.082713 -No vulnerabilities found. - - -mdipierro/gluino -https://github.com/mdipierro/gluino -Entry file: gluino/flask_example.py -Scanned: 2016-10-18 15:52:31.582653 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lanius/flask-mitten -https://github.com/lanius/flask-mitten -Entry file: flask-mitten/example/app.py -Scanned: 2016-10-18 15:52:33.187419 -No vulnerabilities found. - - -iwanbk/flasktor -https://github.com/iwanbk/flasktor -Entry file: flasktor/flasktor.py -Scanned: 2016-10-18 15:52:33.729556 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rafaelnovello/Flaskbook -https://github.com/rafaelnovello/Flaskbook -Entry file: Flaskbook/maps.py -Scanned: 2016-10-18 15:52:34.252095 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benselme/flask-makotemplates -https://github.com/benselme/flask-makotemplates -Entry file: flask-makotemplates/tests/test_mako.py -Scanned: 2016-10-18 15:52:35.689754 -No vulnerabilities found. - - -burningion/Flask-Dotcloud -https://github.com/burningion/Flask-Dotcloud -Entry file: Flask-Dotcloud/project/webapp/app.py -Scanned: 2016-10-18 15:52:36.894854 -No vulnerabilities found. - - -jmstaley/virtualenvwrapper.flask -https://github.com/jmstaley/virtualenvwrapper.flask -Entry file: None -Scanned: 2016-10-18 15:52:37.411817 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -asciimoo/potion -https://github.com/asciimoo/potion -Entry file: potion/potion/webapp.py -Scanned: 2016-10-18 15:52:37.900754 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mgdelacroix/gist-flask -https://github.com/mgdelacroix/gist-flask -Entry file: gist-flask/gist-flask.py -Scanned: 2016-10-18 15:52:39.217709 -No vulnerabilities found. - - -radiosilence/Flask-Suave -https://github.com/radiosilence/Flask-Suave -Entry file: None -Scanned: 2016-10-18 15:52:39.722694 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/radiosilence/Flask-Suave. - -synchrone/skyms -https://github.com/synchrone/skyms -Entry file: skyms/skyms/app.py -Scanned: 2016-10-18 15:52:40.709211 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ngilbert/flask_blog -https://github.com/ngilbert/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-18 15:52:56.165504 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jason2506/flask-reqarg -https://github.com/jason2506/flask-reqarg -Entry file: flask-reqarg/tests/test_reqarg.py -Scanned: 2016-10-18 15:53:01.199461 -No vulnerabilities found. - - -maskota/flask-starter -https://github.com/maskota/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-18 15:53:04.745450 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mateo41/simpleRest -https://github.com/mateo41/simpleRest -Entry file: simpleRest/sdge_rest.py -Scanned: 2016-10-18 15:53:15.947078 -No vulnerabilities found. - - -ghallberg/stuffster -https://github.com/ghallberg/stuffster -Entry file: stuffster/stuffster.py -Scanned: 2016-10-18 15:53:16.473241 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -robin-wittler/easypeasy -https://github.com/robin-wittler/easypeasy -Entry file: easypeasy/blog.py -Scanned: 2016-10-18 15:53:18.506627 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tonyblundell/socialdump -https://github.com/tonyblundell/socialdump -Entry file: socialdump/socialdump.py -Scanned: 2016-10-18 15:53:20.517734 -No vulnerabilities found. - - -samalba/geventwebsocket-on-dotcloud -https://github.com/samalba/geventwebsocket-on-dotcloud -Entry file: geventwebsocket-on-dotcloud/app.py -Scanned: 2016-10-18 15:53:28.241133 -No vulnerabilities found. - - -FND/statusq -https://github.com/FND/statusq -Entry file: statusq/statusq/__init__.py -Scanned: 2016-10-18 15:53:29.583087 -No vulnerabilities found. - - -octaflop/mrna -https://github.com/octaflop/mrna -Entry file: mrna/mrna/app.py -Scanned: 2016-10-18 15:53:30.088181 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jasonmc/Tweets-GAE-app -https://github.com/jasonmc/Tweets-GAE-app -Entry file: Tweets-GAE-app/libs/flask/app.py -Scanned: 2016-10-18 15:53:30.603963 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gcollazo/bcapi -https://github.com/gcollazo/bcapi -Entry file: bcapi/bcapi.py -Scanned: 2016-10-18 15:53:31.127784 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EtnaTraining/todolist-python-server -https://github.com/EtnaTraining/todolist-python-server -Entry file: todolist-python-server/server.py -Scanned: 2016-10-18 15:53:32.156836 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simakazi/webcarcollection -https://github.com/simakazi/webcarcollection -Entry file: webcarcollection/webcarcollection/__init__.py -Scanned: 2016-10-18 15:53:32.765203 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -guzelgoz/hezenhotel -https://github.com/guzelgoz/hezenhotel -Entry file: hezenhotel/hezenhotel.py -Scanned: 2016-10-18 15:53:39.356134 -No vulnerabilities found. - - -hansonkd/FlaskBootstrapSecurity -https://github.com/hansonkd/FlaskBootstrapSecurity -Entry file: None -Scanned: 2016-10-18 15:53:40.901729 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hansonkd/FlaskBootstrapSecurity. - -playpauseandstop/Flask-Dropbox -https://github.com/playpauseandstop/Flask-Dropbox -Entry file: Flask-Dropbox/testapp/app.py -Scanned: 2016-10-18 15:53:43.241368 -No vulnerabilities found. - - -RobSpectre/Twilio-Hackpack-for-Heroku-and-Flask -https://github.com/RobSpectre/Twilio-Hackpack-for-Heroku-and-Flask -Entry file: None -Scanned: 2016-10-18 15:53:43.741876 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/RobSpectre/Twilio-Hackpack-for-Heroku-and-Flask. - -lmeunier/flaskup -https://github.com/lmeunier/flaskup -Entry file: flaskup/flaskup/__init__.py -Scanned: 2016-10-18 15:53:44.775086 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajford/flask-sendmail -https://github.com/ajford/flask-sendmail -Entry file: flask-sendmail/tests.py -Scanned: 2016-10-18 15:53:46.261954 -No vulnerabilities found. - - -playpauseandstop/Flask-LazyViews -https://github.com/playpauseandstop/Flask-LazyViews -Entry file: None -Scanned: 2016-10-18 15:53:46.780278 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/playpauseandstop/Flask-LazyViews. - -elmcitylabs/ECL-Facebook -https://github.com/elmcitylabs/ECL-Facebook -Entry file: ECL-Facebook/examples/flask_example/example_app.py -Scanned: 2016-10-18 15:53:49.146378 -No vulnerabilities found. - - -tokuda109/flask-docs-ja -https://github.com/tokuda109/flask-docs-ja -Entry file: flask-docs-ja/setup.py -Scanned: 2016-10-18 15:53:50.185683 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rafaelnovello/Flaskbook -https://github.com/rafaelnovello/Flaskbook -Entry file: Flaskbook/maps.py -Scanned: 2016-10-18 15:54:00.162724 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benselme/flask-makotemplates -https://github.com/benselme/flask-makotemplates -Entry file: flask-makotemplates/tests/test_mako.py -Scanned: 2016-10-18 15:54:06.608853 -No vulnerabilities found. - - -joealcorn/PyPaste -https://github.com/joealcorn/PyPaste -Entry file: PyPaste/PyPaste/__init__.py -Scanned: 2016-10-18 15:54:12.154131 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wooptoo/flask-seed -https://github.com/wooptoo/flask-seed -Entry file: flask-seed/app.py -Scanned: 2016-10-18 15:54:16.395806 -Vulnerability 1: -File: flask-seed/app.py - > User input at line 67, trigger word "form[": - user = request.form['name'] -Reassigned in: - File: flask-seed/app.py - > Line 73: d = 'name''email'useremail - File: flask-seed/app.py - > Line 75: d = 'error''user exists' -File: flask-seed/app.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(d) - -Vulnerability 2: -File: flask-seed/app.py - > User input at line 68, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: flask-seed/app.py - > Line 73: d = 'name''email'useremail - File: flask-seed/app.py - > Line 75: d = 'error''user exists' -File: flask-seed/app.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(d) - - - -fanzeyi/wobbuffet -https://github.com/fanzeyi/wobbuffet -Entry file: wobbuffet/wobbuffet.py -Scanned: 2016-10-18 15:54:19.360274 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -axil/flask-test -https://github.com/axil/flask-test -Entry file: flask-test/hello.py -Scanned: 2016-10-18 15:54:29.078850 -No vulnerabilities found. - - -higumachan/flask_twitter -https://github.com/higumachan/flask_twitter -Entry file: flask_twitter/example/app.py -Scanned: 2016-10-18 15:54:30.441289 -No vulnerabilities found. - - -dtotheb/Flask-Control -https://github.com/dtotheb/Flask-Control -Entry file: Flask-Control/FlaskControl.py -Scanned: 2016-10-18 15:54:33.028376 -Vulnerability 1: -File: Flask-Control/FlaskControl.py - > User input at line 30, trigger word "get(": - pid = request.args.get('pid') -Reassigned in: - File: Flask-Control/FlaskControl.py - > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(url_for('procs',p=pid)) -File: Flask-Control/FlaskControl.py - > reaches line 31, trigger word "subprocess.call(": - subprocess.call(['kill', pid]) - - - -djworth/flask-sessions -https://github.com/djworth/flask-sessions -Entry file: flask-sessions/web.py -Scanned: 2016-10-18 15:54:33.545798 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yoshiki256/flask_bbs -https://github.com/yoshiki256/flask_bbs -Entry file: flask_bbs/flaskr.py -Scanned: 2016-10-18 15:54:34.803193 -No vulnerabilities found. - - -robotment/flask-twitter -https://github.com/robotment/flask-twitter -Entry file: flask-twitter/twitter/__init__.py -Scanned: 2016-10-18 15:54:35.315487 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nickah/Flask-Blog -https://github.com/nickah/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-18 15:54:35.808164 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paulbarbu/flask-upload -https://github.com/paulbarbu/flask-upload -Entry file: flask-upload/index.py -Scanned: 2016-10-18 15:54:36.304308 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zwass/Heroku-Flask-Starter -https://github.com/zwass/Heroku-Flask-Starter -Entry file: Heroku-Flask-Starter/app.py -Scanned: 2016-10-18 15:54:41.983672 -No vulnerabilities found. - - -aparrish/Simple-Flask-Example -https://github.com/aparrish/Simple-Flask-Example -Entry file: Simple-Flask-Example/concord.py -Scanned: 2016-10-18 15:54:42.516231 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benbenben1010/flask-shark-experiment -https://github.com/benbenben1010/flask-shark-experiment -Entry file: flask-shark-experiment/src/rooms.py -Scanned: 2016-10-18 15:54:48.965826 -No vulnerabilities found. - - -xlevus/appengine-flask-template -https://github.com/xlevus/appengine-flask-template -Entry file: appengine-flask-template/web.py -Scanned: 2016-10-18 15:54:50.190852 -No vulnerabilities found. - - -30loops/flask-on-30loops -https://github.com/30loops/flask-on-30loops -Entry file: flask-on-30loops/hello.py -Scanned: 2016-10-18 15:54:51.387530 -No vulnerabilities found. - - -melpomene/Berlin-Books-Flask -https://github.com/melpomene/Berlin-Books-Flask -Entry file: Berlin-Books-Flask/main.py -Scanned: 2016-10-18 15:54:51.899167 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mateo41/simpleRest -https://github.com/mateo41/simpleRest -Entry file: simpleRest/sdge_rest.py -Scanned: 2016-10-18 15:54:53.572352 -No vulnerabilities found. - - -samalba/geventwebsocket-on-dotcloud -https://github.com/samalba/geventwebsocket-on-dotcloud -Entry file: geventwebsocket-on-dotcloud/app.py -Scanned: 2016-10-18 15:54:54.777585 -No vulnerabilities found. - - -yoshiki256/flaskr_on_fluxflex -https://github.com/yoshiki256/flaskr_on_fluxflex -Entry file: flaskr_on_fluxflex/flaskr.py -Scanned: 2016-10-18 15:54:56.087621 -No vulnerabilities found. - - -rmasters/mdpages -https://github.com/rmasters/mdpages -Entry file: mdpages/mdpages.py -Scanned: 2016-10-18 15:54:57.093691 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vmihailenco/ndbunq-example -https://github.com/vmihailenco/ndbunq-example -Entry file: ndbunq-example/app/app.py -Scanned: 2016-10-18 15:55:01.305588 -No vulnerabilities found. - - -gofetch/fetchweb -https://github.com/gofetch/fetchweb -Entry file: fetchweb/fetchweb/__init__.py -Scanned: 2016-10-18 15:55:07.198885 -Vulnerability 1: -File: fetchweb/fetchweb/views.py - > User input at line 144, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: fetchweb/fetchweb/views.py - > Line 147: filename = secure_filename(file.filename) -File: fetchweb/fetchweb/views.py - > reaches line 148, trigger word "flash(": - flash('uploaded file: %s' % filename) - -Vulnerability 2: -File: fetchweb/fetchweb/views.py - > User input at line 145, trigger word "form[": - url = request.form['torrent-url'] -File: fetchweb/fetchweb/views.py - > reaches line 150, trigger word "flash(": - flash('uploaded url: %s' % url) - - - -mygulamali/Geodesics -https://github.com/mygulamali/Geodesics -Entry file: Geodesics/geodesics.py -Scanned: 2016-10-18 15:55:13.573674 -No vulnerabilities found. - - -vr3v3n/TODO -https://github.com/vr3v3n/TODO -Entry file: TODO/todo.py -Scanned: 2016-10-18 15:55:17.413098 -No vulnerabilities found. - - -robertberry/rbrt-blog -https://github.com/robertberry/rbrt-blog -Entry file: rbrt-blog/blog.py -Scanned: 2016-10-18 15:55:17.931866 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yoshiki256/shingeki_mederu_python -https://github.com/yoshiki256/shingeki_mederu_python -Entry file: shingeki_mederu_python/shingeki.py -Scanned: 2016-10-18 15:55:18.416435 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cjmeyer/quincy -https://github.com/cjmeyer/quincy -Entry file: None -Scanned: 2016-10-18 15:55:19.394073 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cjmeyer/quincy. - -rdallasgray/archie-webservice -https://github.com/rdallasgray/archie-webservice -Entry file: archie-webservice/archie/__init__.py -Scanned: 2016-10-18 15:55:34.300077 -No vulnerabilities found. - - -swinton/Closest-UK-City -https://github.com/swinton/Closest-UK-City -Entry file: Closest-UK-City/webapp.py -Scanned: 2016-10-18 15:55:34.820115 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jamalzkhan/dropshare -https://github.com/jamalzkhan/dropshare -Entry file: dropshare/app.py -Scanned: 2016-10-18 15:55:35.381976 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flyingclimber/LegalTally -https://github.com/flyingclimber/LegalTally -Entry file: LegalTally/legaltally.py -Scanned: 2016-10-18 15:55:35.878538 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -playpauseandstop/Flask-Dropbox -https://github.com/playpauseandstop/Flask-Dropbox -Entry file: Flask-Dropbox/testapp/app.py -Scanned: 2016-10-18 15:55:39.993536 -No vulnerabilities found. - - -jpvanhal/flask-basicauth -https://github.com/jpvanhal/flask-basicauth -Entry file: flask-basicauth/test_basicauth.py -Scanned: 2016-10-18 15:55:41.831101 -No vulnerabilities found. - - -mattupstate/flask-negotiate -https://github.com/mattupstate/flask-negotiate -Entry file: flask-negotiate/tests.py -Scanned: 2016-10-18 15:55:43.180171 -No vulnerabilities found. - - -ajford/flask-sendmail -https://github.com/ajford/flask-sendmail -Entry file: flask-sendmail/tests.py -Scanned: 2016-10-18 15:55:44.684637 -No vulnerabilities found. - - -dileeshvar/flask -https://github.com/dileeshvar/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 15:55:53.068883 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jpvanhal/flask-xuacompatible -https://github.com/jpvanhal/flask-xuacompatible -Entry file: flask-xuacompatible/flask_xuacompatible.py -Scanned: 2016-10-18 15:55:54.354197 -No vulnerabilities found. - - -ihor/FlaskTest -https://github.com/ihor/FlaskTest -Entry file: FlaskTest/FileShare/app.py -Scanned: 2016-10-18 15:55:55.810512 -No vulnerabilities found. - - -mrigor/url-shortener -https://github.com/mrigor/url-shortener -Entry file: url-shortener/url_shortener.py -Scanned: 2016-10-18 15:55:56.323435 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gumho/minimal-flask-gae-template -https://github.com/gumho/minimal-flask-gae-template -Entry file: minimal-flask-gae-template/packages/flask/sessions.py -Scanned: 2016-10-18 15:55:56.857076 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jamesward/hello-python-flask -https://github.com/jamesward/hello-python-flask -Entry file: hello-python-flask/web.py -Scanned: 2016-10-18 15:55:58.080216 -No vulnerabilities found. - - -khanhnguyenqk/flask-example -https://github.com/khanhnguyenqk/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-18 15:56:06.087269 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fnava621/flask-blog -https://github.com/fnava621/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 15:56:16.122693 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -gkoberger/gkoberger-flask -https://github.com/gkoberger/gkoberger-flask -Entry file: gkoberger-flask/app.py -Scanned: 2016-10-18 15:56:25.698850 -No vulnerabilities found. - - -teerytko/nokiantorpedo-flask -https://github.com/teerytko/nokiantorpedo-flask -Entry file: nokiantorpedo-flask/src/userapp.py -Scanned: 2016-10-18 15:56:26.671434 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -higumachan/ladytile_flask -https://github.com/higumachan/ladytile_flask -Entry file: ladytile_flask/app.py -Scanned: 2016-10-18 15:56:27.171593 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pewpewarrows/Prometheus-Flask -https://github.com/Pewpewarrows/Prometheus-Flask -Entry file: None -Scanned: 2016-10-18 15:56:27.680256 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pewpewarrows/Prometheus-Flask. - -jrheard/task-flask -https://github.com/jrheard/task-flask -Entry file: task-flask/task-flask/app.py -Scanned: 2016-10-18 15:56:29.924936 -No vulnerabilities found. - - -alekzvik/testing-fs -https://github.com/alekzvik/testing-fs -Entry file: testing-fs/simple_app.py -Scanned: 2016-10-18 15:56:36.160861 -No vulnerabilities found. - - -yefim/TwilioPusherFlask -https://github.com/yefim/TwilioPusherFlask -Entry file: TwilioPusherFlask/app.py -Scanned: 2016-10-18 15:56:48.793429 -No vulnerabilities found. - - -rduplain/flask-svg-example -https://github.com/rduplain/flask-svg-example -Entry file: flask-svg-example/app.py -Scanned: 2016-10-18 15:56:50.048791 -No vulnerabilities found. - - -nulogy/competition-flask-bootstrap -https://github.com/nulogy/competition-flask-bootstrap -Entry file: competition-flask-bootstrap/app.py -Scanned: 2016-10-18 15:56:51.257086 -No vulnerabilities found. - - -pythonclt/cltwit -https://github.com/pythonclt/cltwit -Entry file: cltwit/minitwit.py -Scanned: 2016-10-18 15:56:52.602795 -No vulnerabilities found. - - -mikejarrett/company-time-clock -https://github.com/mikejarrett/company-time-clock -Entry file: company-time-clock/timeclock/webapp/__init__.py -Scanned: 2016-10-18 15:56:54.145566 -No vulnerabilities found. - - -lyaunzbe/Foo -https://github.com/lyaunzbe/Foo -Entry file: Foo/foo.py -Scanned: 2016-10-18 15:56:54.664916 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fnava621/heroku-flaskstyle-test -https://github.com/fnava621/heroku-flaskstyle-test -Entry file: heroku-flaskstyle-test/app.py -Scanned: 2016-10-18 15:56:55.223374 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: heroku-flaskstyle-test/.#app.py - -gofetch/fetchweb -https://github.com/gofetch/fetchweb -Entry file: fetchweb/fetchweb/__init__.py -Scanned: 2016-10-18 15:56:57.079190 -Vulnerability 1: -File: fetchweb/fetchweb/views.py - > User input at line 144, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: fetchweb/fetchweb/views.py - > Line 147: filename = secure_filename(file.filename) -File: fetchweb/fetchweb/views.py - > reaches line 148, trigger word "flash(": - flash('uploaded file: %s' % filename) - -Vulnerability 2: -File: fetchweb/fetchweb/views.py - > User input at line 145, trigger word "form[": - url = request.form['torrent-url'] -File: fetchweb/fetchweb/views.py - > reaches line 150, trigger word "flash(": - flash('uploaded url: %s' % url) - - - -rDaffa/Firstlight-Alarm -https://github.com/rDaffa/Firstlight-Alarm -Entry file: Firstlight-Alarm/app.py -Scanned: 2016-10-18 15:56:58.278519 -No vulnerabilities found. - - -metllord/stumble_score_py -https://github.com/metllord/stumble_score_py -Entry file: stumble_score_py/web.py -Scanned: 2016-10-18 15:56:58.775606 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tetsuharu/tawlkbox -https://github.com/tetsuharu/tawlkbox -Entry file: tawlkbox/__init__.py -Scanned: 2016-10-18 15:57:00.069672 -No vulnerabilities found. - - -mbr/flask-bootstrap -https://github.com/mbr/flask-bootstrap -Entry file: flask-bootstrap/sample_application/__init__.py -Scanned: 2016-10-18 15:57:06.829018 -No vulnerabilities found. - - -closeio/flask-mongorest -https://github.com/closeio/flask-mongorest -Entry file: flask-mongorest/example/app.py -Scanned: 2016-10-18 15:57:09.923748 -No vulnerabilities found. - - -mattupstate/flask-principal -https://github.com/mattupstate/flask-principal -Entry file: flask-principal/tests/test_principal.py -Scanned: 2016-10-18 15:57:10.421449 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dansimau/flask-bootstrap -https://github.com/dansimau/flask-bootstrap -Entry file: flask-bootstrap/app/__init__.py -Scanned: 2016-10-18 15:57:12.517745 -No vulnerabilities found. - - -thrisp/flask-celery-example -https://github.com/thrisp/flask-celery-example -Entry file: flask-celery-example/app.py -Scanned: 2016-10-18 15:57:13.021878 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jhezjkp/flask-principal -https://github.com/jhezjkp/flask-principal -Entry file: flask-principal/tests/test_principal.py -Scanned: 2016-10-18 15:57:13.554438 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yefim/flask-heroku-sample -https://github.com/yefim/flask-heroku-sample -Entry file: flask-heroku-sample/app.py -Scanned: 2016-10-18 15:57:14.778429 -No vulnerabilities found. - - -whichlight/flask-tweepy-oauth -https://github.com/whichlight/flask-tweepy-oauth -Entry file: flask-tweepy-oauth/server.py -Scanned: 2016-10-18 15:57:15.272600 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kofrasa/flask-apputils -https://github.com/kofrasa/flask-apputils -Entry file: flask-apputils/tests/routing/__init__.py -Scanned: 2016-10-18 15:57:16.259208 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cpdean/heroku-flask-postgresql-template -https://github.com/cpdean/heroku-flask-postgresql-template -Entry file: heroku-flask-postgresql-template/app.py -Scanned: 2016-10-18 15:57:17.482190 -No vulnerabilities found. - - -asascience-open/Flask_Social_Auth -https://github.com/asascience-open/Flask_Social_Auth -Entry file: Flask_Social_Auth/flask_social_auth/__init__.py -Scanned: 2016-10-18 15:57:18.980891 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aldryncore/webservices -https://github.com/aldryncore/webservices -Entry file: webservices/examples/flask_app/app.py -Scanned: 2016-10-18 15:57:27.331095 -No vulnerabilities found. - - -mattupstate/flask-stache -https://github.com/mattupstate/flask-stache -Entry file: flask-stache/example/__init__.py -Scanned: 2016-10-18 15:57:28.670013 -No vulnerabilities found. - - -rdegges/flask-skel -https://github.com/rdegges/flask-skel -Entry file: flask-skel/skel/__init__.py -Scanned: 2016-10-18 15:57:29.949948 -No vulnerabilities found. - - -svieira/Flask-HipPocket -https://github.com/svieira/Flask-HipPocket -Entry file: Flask-HipPocket/flask_hippocket/pocket.py -Scanned: 2016-10-18 15:57:32.611292 -Vulnerability 1: -File: Flask-HipPocket/flask_hippocket/tests/mapper.py - > User input at line 38, trigger word "get(": - rv = tc.get('/') -File: Flask-HipPocket/flask_hippocket/tests/mapper.py - > reaches line 39, trigger word "url_for(": - self.assertTrue('The url for url_for('endpoint_name') is /' in rv.data.decode('utf-8')) - - - -honza/oauth-service -https://github.com/honza/oauth-service -Entry file: oauth-service/frontend/app.py -Scanned: 2016-10-18 15:57:36.939990 -No vulnerabilities found. - - -albertmatyi/flaskgaellery -https://github.com/albertmatyi/flaskgaellery -Entry file: flaskgaellery/flask/sessions.py -Scanned: 2016-10-18 15:57:37.467865 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dougwt/ilmd-flask -https://github.com/dougwt/ilmd-flask -Entry file: ilmd-flask/app/__init__.py -Scanned: 2016-10-18 15:57:53.397218 -No vulnerabilities found. - - -dpflug/flask-barcodes -https://github.com/dpflug/flask-barcodes -Entry file: flask-barcodes/barcodes/__init__.py -Scanned: 2016-10-18 15:57:54.622386 -No vulnerabilities found. - - -feltnerm/flask-boilerplate -https://github.com/feltnerm/flask-boilerplate -Entry file: flask-boilerplate/apps/__init__.py -Scanned: 2016-10-18 15:57:56.617107 -No vulnerabilities found. - - -Dorianux/flask-yafowil -https://github.com/Dorianux/flask-yafowil -Entry file: flask-yafowil/example/srv.py -Scanned: 2016-10-18 15:57:58.353727 -No vulnerabilities found. - - -linyupark/flaskapps -https://github.com/linyupark/flaskapps -Entry file: flaskapps/example/__init__.py -Scanned: 2016-10-18 15:57:59.607751 -No vulnerabilities found. - - -tophatmonocle/lti_tool_provider_example_flask -https://github.com/tophatmonocle/lti_tool_provider_example_flask -Entry file: lti_tool_provider_example_flask/tool_provider.py -Scanned: 2016-10-18 15:58:00.995745 -No vulnerabilities found. - - -bradmontgomery/mempy-flask-tutorial -https://github.com/bradmontgomery/mempy-flask-tutorial -Entry file: mempy-flask-tutorial/hello.py -Scanned: 2016-10-18 15:58:02.371320 -No vulnerabilities found. - - -jaav/flaskbone1 -https://github.com/jaav/flaskbone1 -Entry file: flaskbone1/src/flask/sessions.py -Scanned: 2016-10-18 15:58:03.350542 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -grimpy/lxcweb -https://github.com/grimpy/lxcweb -Entry file: lxcweb/lxcweb.py -Scanned: 2016-10-18 15:58:05.352839 -No vulnerabilities found. - - -tophatmonocle/lti_tool_consumer_example_flask -https://github.com/tophatmonocle/lti_tool_consumer_example_flask -Entry file: lti_tool_consumer_example_flask/tool_consumer.py -Scanned: 2016-10-18 15:58:07.170756 -No vulnerabilities found. - - -mbowcock/flask-rest -https://github.com/mbowcock/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-18 15:58:07.700698 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -newsapps/flask-bakery -https://github.com/newsapps/flask-bakery -Entry file: flask-bakery/app.py -Scanned: 2016-10-18 15:58:12.048409 -No vulnerabilities found. - - -mnbbrown/flask-sample -https://github.com/mnbbrown/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-18 15:58:12.585657 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vmihailenco/flask-hello -https://github.com/vmihailenco/flask-hello -Entry file: flask-hello/blibb_api/hello.py -Scanned: 2016-10-18 15:58:13.791634 -No vulnerabilities found. - - -mbr/flask-obscurity -https://github.com/mbr/flask-obscurity -Entry file: flask-obscurity/tests/test_extension.py -Scanned: 2016-10-18 15:58:15.144180 -No vulnerabilities found. - - -yiwinking/flask_project -https://github.com/yiwinking/flask_project -Entry file: flask_project/flaskr.py -Scanned: 2016-10-18 15:58:16.350870 -No vulnerabilities found. - - -bdelbosc/restapp -https://github.com/bdelbosc/restapp -Entry file: restapp/restapp/__init__.py -Scanned: 2016-10-18 15:58:16.858589 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miguel250/miguelpz-core -https://github.com/miguel250/miguelpz-core -Entry file: miguelpz-core/app/config/__init__.py -Scanned: 2016-10-18 15:58:18.336587 -No vulnerabilities found. - - -rduplain/flask-svg-example -https://github.com/rduplain/flask-svg-example -Entry file: flask-svg-example/app.py -Scanned: 2016-10-18 15:58:19.535446 -No vulnerabilities found. - - -sergray/Flask-MailErrors -https://github.com/sergray/Flask-MailErrors -Entry file: Flask-MailErrors/tests.py -Scanned: 2016-10-18 15:58:21.309177 -No vulnerabilities found. - - -kalimatas/writedownme -https://github.com/kalimatas/writedownme -Entry file: writedownme/flask/sessions.py -Scanned: 2016-10-18 15:58:26.828425 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dbrgn/schlagzeilengenerator -https://github.com/dbrgn/schlagzeilengenerator -Entry file: schlagzeilengenerator/app/app.py -Scanned: 2016-10-18 15:58:30.040528 -No vulnerabilities found. - - -martyanov/minitwit -https://github.com/martyanov/minitwit -Entry file: minitwit/minitwit.py -Scanned: 2016-10-18 15:58:32.839396 -No vulnerabilities found. - - -sethtrain/buntin.org -https://github.com/sethtrain/buntin.org -Entry file: None -Scanned: 2016-10-18 15:58:33.439287 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -karanlyons/bestthing -https://github.com/karanlyons/bestthing -Entry file: bestthing/bestthing/__init__.py -Scanned: 2016-10-18 15:58:36.443181 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sneeu/board -https://github.com/sneeu/board -Entry file: board/board.py -Scanned: 2016-10-18 15:58:38.752893 -No vulnerabilities found. - - -mfa/weight-app -https://github.com/mfa/weight-app -Entry file: weight-app/weight/main.py -Scanned: 2016-10-18 15:58:52.804503 -Vulnerability 1: -File: weight-app/weight/views.py - > User input at line 43, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: weight-app/weight/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: weight-app/weight/views.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('.index')) - -Vulnerability 2: -File: weight-app/weight/views.py - > User input at line 43, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: weight-app/weight/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: weight-app/weight/views.py - > reaches line 44, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('.index')) - -Vulnerability 3: -File: weight-app/weight/views.py - > User input at line 103, trigger word "get(": - wid = request.args.get('wid') -Reassigned in: - File: weight-app/weight/views.py - > Line 107: elem = Weight.query.get(wid) - File: weight-app/weight/views.py - > Line 123: form = WeightForm(obj=elem) - File: weight-app/weight/views.py - > Line 129: form = WeightForm() - File: weight-app/weight/views.py - > Line 138: elem = Weight(weight=request.form['weight']) - File: weight-app/weight/views.py - > Line 166: form.scale_name.data = elem.scale_name - File: weight-app/weight/views.py - > Line 170: form.scale_name.data = u1.default_scale_name - File: weight-app/weight/views.py - > Line 172: ret_MAYBE_FUNCTION_NAME = render_template('weight_edit.html',form=form, wrange=range(wmin, wmax)) - File: weight-app/weight/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('weight_list.html',elements=elements.items, paginate=elements, show_comment=False) -File: weight-app/weight/views.py - > reaches line 154, trigger word "flash(": - flash('Data saved [%s with %s]' % (elem.wdate, elem.weight), 'info') - -Vulnerability 4: -File: weight-app/weight/views.py - > User input at line 107, trigger word "get(": - elem = Weight.query.get(wid) -Reassigned in: - File: weight-app/weight/views.py - > Line 123: form = WeightForm(obj=elem) - File: weight-app/weight/views.py - > Line 129: form = WeightForm() - File: weight-app/weight/views.py - > Line 138: elem = Weight(weight=request.form['weight']) - File: weight-app/weight/views.py - > Line 166: form.scale_name.data = elem.scale_name - File: weight-app/weight/views.py - > Line 170: form.scale_name.data = u1.default_scale_name - File: weight-app/weight/views.py - > Line 172: ret_MAYBE_FUNCTION_NAME = render_template('weight_edit.html',form=form, wrange=range(wmin, wmax)) - File: weight-app/weight/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('weight_list.html',elements=elements.items, paginate=elements, show_comment=False) -File: weight-app/weight/views.py - > reaches line 154, trigger word "flash(": - flash('Data saved [%s with %s]' % (elem.wdate, elem.weight), 'info') - -Vulnerability 5: -File: weight-app/weight/views.py - > User input at line 138, trigger word "form[": - elem = Weight(weight=request.form['weight']) -Reassigned in: - File: weight-app/weight/views.py - > Line 107: elem = Weight.query.get(wid) - File: weight-app/weight/views.py - > Line 123: form = WeightForm(obj=elem) - File: weight-app/weight/views.py - > Line 129: form = WeightForm() - File: weight-app/weight/views.py - > Line 166: form.scale_name.data = elem.scale_name - File: weight-app/weight/views.py - > Line 170: form.scale_name.data = u1.default_scale_name - File: weight-app/weight/views.py - > Line 172: ret_MAYBE_FUNCTION_NAME = render_template('weight_edit.html',form=form, wrange=range(wmin, wmax)) - File: weight-app/weight/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('weight_list.html',elements=elements.items, paginate=elements, show_comment=False) -File: weight-app/weight/views.py - > reaches line 154, trigger word "flash(": - flash('Data saved [%s with %s]' % (elem.wdate, elem.weight), 'info') - - - -omerk/spotify-http-control -https://github.com/omerk/spotify-http-control -Entry file: spotify-http-control/control.py -Scanned: 2016-10-18 15:58:55.055338 -No vulnerabilities found. - - -dsosby/pycanoed -https://github.com/dsosby/pycanoed -Entry file: pycanoed/app.py -Scanned: 2016-10-18 15:58:58.949512 -No vulnerabilities found. - - -Maplecroft/Ansel -https://github.com/Maplecroft/Ansel -Entry file: Ansel/app.py -Scanned: 2016-10-18 15:59:00.785235 -No vulnerabilities found. - - -zxpower/reflaskr -https://github.com/zxpower/reflaskr -Entry file: reflaskr/app.py -Scanned: 2016-10-18 15:59:02.825493 -No vulnerabilities found. - - -danlamanna/Jackhammer-Gateway -https://github.com/danlamanna/Jackhammer-Gateway -Entry file: Jackhammer-Gateway/api.py -Scanned: 2016-10-18 15:59:04.045029 -No vulnerabilities found. - - -mattupstate/flask-rq -https://github.com/mattupstate/flask-rq -Entry file: flask-rq/tests/flaskrq_tests.py -Scanned: 2016-10-18 15:59:07.205965 -No vulnerabilities found. - - -klen/Flask-Foundation -https://github.com/klen/Flask-Foundation -Entry file: Flask-Foundation/base/app.py -Scanned: 2016-10-18 15:59:07.761573 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ib-lundgren/flask-oauthprovider -https://github.com/ib-lundgren/flask-oauthprovider -Entry file: flask-oauthprovider/examples/client.py -Scanned: 2016-10-18 15:59:08.288479 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sashka/flask-googleauth -https://github.com/sashka/flask-googleauth -Entry file: flask-googleauth/flask_googleauth.py -Scanned: 2016-10-18 15:59:09.663486 -No vulnerabilities found. - - -benselme/flask-mako -https://github.com/benselme/flask-mako -Entry file: flask-mako/flask_mako.py -Scanned: 2016-10-18 15:59:13.436310 -No vulnerabilities found. - - -chriszf/flask_todolist -https://github.com/chriszf/flask_todolist -Entry file: flask_todolist/todolist/model.py -Scanned: 2016-10-18 15:59:15.618684 -No vulnerabilities found. - - -srusskih/flask-uploads -https://github.com/srusskih/flask-uploads -Entry file: flask-uploads/tests/test-uploads.py -Scanned: 2016-10-18 15:59:17.229848 -No vulnerabilities found. - - -Kozea/Flask-WeasyPrint -https://github.com/Kozea/Flask-WeasyPrint -Entry file: Flask-WeasyPrint/flask_weasyprint/tests.py -Scanned: 2016-10-18 15:59:18.700858 -No vulnerabilities found. - - -mattupstate/flask-environments -https://github.com/mattupstate/flask-environments -Entry file: flask-environments/tests/__init__.py -Scanned: 2016-10-18 15:59:19.922157 -No vulnerabilities found. - - -kofrasa/flask-apputils -https://github.com/kofrasa/flask-apputils -Entry file: flask-apputils/tests/routing/__init__.py -Scanned: 2016-10-18 15:59:20.926622 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DeaconDesperado/Flask-SQLAlchemy-Example -https://github.com/DeaconDesperado/Flask-SQLAlchemy-Example -Entry file: Flask-SQLAlchemy-Example/testapp.py -Scanned: 2016-10-18 15:59:21.421331 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -closeio/flask-common -https://github.com/closeio/flask-common -Entry file: flask-common/tests/__init__.py -Scanned: 2016-10-18 15:59:26.925259 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahri/flask-snooze -https://github.com/ahri/flask-snooze -Entry file: flask-snooze/tests/test_snooze.py -Scanned: 2016-10-18 15:59:28.432390 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jokull/flask-halalchemy -https://github.com/jokull/flask-halalchemy -Entry file: flask-halalchemy/test_example.py -Scanned: 2016-10-18 15:59:30.954234 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kofrasa/flaskapp -https://github.com/kofrasa/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-18 15:59:33.464562 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomasd/flask-emailactivation -https://github.com/tomasd/flask-emailactivation -Entry file: flask-emailactivation/tests/test_activation.py -Scanned: 2016-10-18 15:59:34.825373 -No vulnerabilities found. - - -asgoel/flask-twitter -https://github.com/asgoel/flask-twitter -Entry file: flask-twitter/twitter/__init__.py -Scanned: 2016-10-18 15:59:50.320465 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AnIrishDuck/flask-mako-legacy -https://github.com/AnIrishDuck/flask-mako-legacy -Entry file: flask-mako-legacy/test_flask_mako.py -Scanned: 2016-10-18 15:59:55.852255 -No vulnerabilities found. - - -fdb/fliki -https://github.com/fdb/fliki -Entry file: fliki/fliki.py -Scanned: 2016-10-18 15:59:57.136471 -No vulnerabilities found. - - -lazy-coders/mt_scrapper -https://github.com/lazy-coders/mt_scrapper -Entry file: mt_scrapper/mt_scrapper.py -Scanned: 2016-10-18 16:00:02.762321 -No vulnerabilities found. - - -Senso/fiasco-flask -https://github.com/Senso/fiasco-flask -Entry file: fiasco-flask/fiasco/__init__.py -Scanned: 2016-10-18 16:00:04.191107 -Vulnerability 1: -File: fiasco-flask/fiasco/views.py - > User input at line 109, trigger word ".data": - playset = models.Playset(name=form.name.data, desc=form.description.data, owner=session['uid']) -Reassigned in: - File: fiasco-flask/fiasco/views.py - > Line 119: n_table = models.Details(playset.id, 'need', need_detail) - File: fiasco-flask/fiasco/views.py - > Line 120: o_table = models.Details(playset.id, 'object', obj_detail) - File: fiasco-flask/fiasco/views.py - > Line 121: l_table = models.Details(playset.id, 'location', loc_detail) - File: fiasco-flask/fiasco/views.py - > Line 122: r_table = models.Details(playset.id, 'relationship', rel_detail) - File: fiasco-flask/fiasco/views.py - > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('new_playset.html',error=error, form=form) - File: fiasco-flask/fiasco/views.py - > Line 102: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: fiasco-flask/fiasco/views.py - > reaches line 131, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/edit_playset/' + str(playset.id)) - - - -encodes/flask-snippet -https://github.com/encodes/flask-snippet -Entry file: flask-snippet/app/__init__.py -Scanned: 2016-10-18 16:00:06.143422 -Vulnerability 1: -File: flask-snippet/app/users/views.py - > User input at line 35, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-snippet/app/users/views.py - > Line 40: session['user_id'] = user.id -File: flask-snippet/app/users/views.py - > reaches line 41, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -SmartViking/MaBlag -https://github.com/SmartViking/MaBlag -Entry file: MaBlag/blog.py -Scanned: 2016-10-18 16:00:07.167735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -keithfancher/Flaskr -https://github.com/keithfancher/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-18 16:00:07.681809 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -daviddedden/flaskr -https://github.com/daviddedden/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:00:08.185584 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tophatmonocle/lti_tool_provider_example_flask -https://github.com/tophatmonocle/lti_tool_provider_example_flask -Entry file: lti_tool_provider_example_flask/tool_provider.py -Scanned: 2016-10-18 16:00:09.451931 -No vulnerabilities found. - - -filipecifali/Flask-Ping-Site -https://github.com/filipecifali/Flask-Ping-Site -Entry file: Flask-Ping-Site/flaskSite.py -Scanned: 2016-10-18 16:00:10.771404 -No vulnerabilities found. - - -DanielKinsman/flask-pyjs-jsonrpc-test -https://github.com/DanielKinsman/flask-pyjs-jsonrpc-test -Entry file: flask-pyjs-jsonrpc-test/web.py -Scanned: 2016-10-18 16:00:12.000538 -No vulnerabilities found. - - -whichlight/flask-couchdb-binary-image-labeler -https://github.com/whichlight/flask-couchdb-binary-image-labeler -Entry file: flask-couchdb-binary-image-labeler/server.py -Scanned: 2016-10-18 16:00:12.509315 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tophatmonocle/lti_tool_consumer_example_flask -https://github.com/tophatmonocle/lti_tool_consumer_example_flask -Entry file: lti_tool_consumer_example_flask/tool_consumer.py -Scanned: 2016-10-18 16:00:15.399519 -No vulnerabilities found. - - -melignus/Appengine-Help-Desk -https://github.com/melignus/Appengine-Help-Desk -Entry file: Appengine-Help-Desk/app.py -Scanned: 2016-10-18 16:00:16.001706 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dustinmm80/flask_test -https://github.com/dustinmm80/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-18 16:00:17.427801 -No vulnerabilities found. - - -curiousleo/kardiopraxis-flask -https://github.com/curiousleo/kardiopraxis-flask -Entry file: kardiopraxis-flask/kardiopraxis.py -Scanned: 2016-10-18 16:00:20.929185 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -encodes/flask-finance -https://github.com/encodes/flask-finance -Entry file: flask-finance/app/__init__.py -Scanned: 2016-10-18 16:00:21.429428 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ramin32/Flask-Template -https://github.com/ramin32/Flask-Template -Entry file: Flask-Template/project_name/__init__.py -Scanned: 2016-10-18 16:00:28.193326 -No vulnerabilities found. - - -toastercup/flask-scormcloud -https://github.com/toastercup/flask-scormcloud -Entry file: flask-scormcloud/manage.py -Scanned: 2016-10-18 16:00:31.194148 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -weldan/flask_setup -https://github.com/weldan/flask_setup -Entry file: flask_setup/app.py -Scanned: 2016-10-18 16:00:34.540905 -No vulnerabilities found. - - -michellesun/flask_ms -https://github.com/michellesun/flask_ms -Entry file: flask_ms/flaskr.py -Scanned: 2016-10-18 16:00:36.318853 -No vulnerabilities found. - - -shea256/flask-project-template -https://github.com/shea256/flask-project-template -Entry file: flask-project-template/app.py -Scanned: 2016-10-18 16:00:37.877477 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-project-template/venv/lib/python2.7/genericpath.py - -Kinghack/flask-oauth-china -https://github.com/Kinghack/flask-oauth-china -Entry file: flask-oauth-china/example/facebook.py -Scanned: 2016-10-18 16:00:39.409750 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -StefanWallin/python-Flask-lab -https://github.com/StefanWallin/python-Flask-lab -Entry file: python-Flask-lab/app.py -Scanned: 2016-10-18 16:00:51.642408 -No vulnerabilities found. - - -rvause/project-base-flask -https://github.com/rvause/project-base-flask -Entry file: None -Scanned: 2016-10-18 16:00:56.625855 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rvause/project-base-flask. - -emilianox/opener -https://github.com/emilianox/opener -Entry file: opener/opener.py -Scanned: 2016-10-18 16:01:00.905335 -No vulnerabilities found. - - -oksana-slu/sqlfla -https://github.com/oksana-slu/sqlfla -Entry file: sqlfla/eventor/__init__.py -Scanned: 2016-10-18 16:01:03.413581 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -johngriffin/ldpy-api -https://github.com/johngriffin/ldpy-api -Entry file: ldpy-api/app.py -Scanned: 2016-10-18 16:01:04.907766 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nryoung/Array-Size -https://github.com/nryoung/Array-Size -Entry file: Array-Size/raid.py -Scanned: 2016-10-18 16:01:08.174207 -No vulnerabilities found. - - -ciaron/pandaflask_old -https://github.com/ciaron/pandaflask_old -Entry file: pandaflask_old/pandachrome.py -Scanned: 2016-10-18 16:01:13.098843 -Vulnerability 1: -File: pandaflask_old/pandachrome.py - > User input at line 208, trigger word "get(": - title = request.form.get('title') -Reassigned in: - File: pandaflask_old/pandachrome.py - > Line 217: category = Category(title=title, description=description, owner_id=owner.id) -File: pandaflask_old/pandachrome.py - > reaches line 218, trigger word "flash(": - flash('successfully created new category ' + title) - -Vulnerability 2: -File: pandaflask_old/pandachrome.py - > User input at line 230, trigger word "get(": - title = request.form.get('title') -Reassigned in: - File: pandaflask_old/pandachrome.py - > Line 240: project = Project(title=title, description=description, category_id=category_id, owner_id=owner.id) -File: pandaflask_old/pandachrome.py - > reaches line 241, trigger word "flash(": - flash('successfully created new project ' + title + ', category ' + category_id) - -Vulnerability 3: -File: pandaflask_old/pandachrome.py - > User input at line 232, trigger word "get(": - category_id = request.form.get('category_id') -Reassigned in: - File: pandaflask_old/pandachrome.py - > Line 240: project = Project(title=title, description=description, category_id=category_id, owner_id=owner.id) -File: pandaflask_old/pandachrome.py - > reaches line 241, trigger word "flash(": - flash('successfully created new project ' + title + ', category ' + category_id) - - - -dlitvakb/MOVEapp -https://github.com/dlitvakb/MOVEapp -Entry file: MOVEapp/appserver.py -Scanned: 2016-10-18 16:01:14.094528 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hvnsweeting/mtaskflask -https://github.com/hvnsweeting/mtaskflask -Entry file: mtaskflask/mtask.py -Scanned: 2016-10-18 16:01:15.348340 -No vulnerabilities found. - - -keithfancher/Stories -https://github.com/keithfancher/Stories -Entry file: Stories/stories.py -Scanned: 2016-10-18 16:01:16.559681 -No vulnerabilities found. - - -clee/boilerplate -https://github.com/clee/boilerplate -Entry file: boilerplate/boilerplate.py -Scanned: 2016-10-18 16:01:17.852833 -No vulnerabilities found. - - -t20/henhealth -https://github.com/t20/henhealth -Entry file: henhealth/hen.py -Scanned: 2016-10-18 16:01:19.643544 -No vulnerabilities found. - - -klinkin/vksunshine -https://github.com/klinkin/vksunshine -Entry file: vksunshine/vksunshine/application.py -Scanned: 2016-10-18 16:01:20.871133 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ChrisAnn/FRog -https://github.com/ChrisAnn/FRog -Entry file: FRog/FRog.py -Scanned: 2016-10-18 16:01:22.101503 -No vulnerabilities found. - - -hirish/DinnerDesignr -https://github.com/hirish/DinnerDesignr -Entry file: DinnerDesignr/dinnerDesignr.py -Scanned: 2016-10-18 16:01:22.622470 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jakecoffman/flask-tutorial -https://github.com/jakecoffman/flask-tutorial -Entry file: flask-tutorial/part 6 - databases/flaskr.py -Scanned: 2016-10-18 16:01:25.315784 -No vulnerabilities found. - - -syrusakbary/Flask-SuperAdmin -https://github.com/syrusakbary/Flask-SuperAdmin -Entry file: Flask-SuperAdmin/flask_superadmin/tests/test_model.py -Scanned: 2016-10-18 16:01:25.897576 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -guotie/flaskbbs -https://github.com/guotie/flaskbbs -Entry file: flaskbbs/flaskcommon/auth/views.py -Scanned: 2016-10-18 16:01:26.394565 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rdegges/flask-dynamo -https://github.com/rdegges/flask-dynamo -Entry file: flask-dynamo/tests/test_manager.py -Scanned: 2016-10-18 16:01:28.719189 -No vulnerabilities found. - - -maxcountryman/flask-themes -https://github.com/maxcountryman/flask-themes -Entry file: flask-themes/tests/test-themes.py -Scanned: 2016-10-18 16:01:30.324411 -No vulnerabilities found. - - -klen/Flask-Collect -https://github.com/klen/Flask-Collect -Entry file: Flask-Collect/flask_collect/collect.py -Scanned: 2016-10-18 16:01:32.943962 -No vulnerabilities found. - - -kvesteri/flask-storage -https://github.com/kvesteri/flask-storage -Entry file: flask-storage/tests/__init__.py -Scanned: 2016-10-18 16:01:33.922668 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thesteve0/openshift-mongo-flask-example -https://github.com/thesteve0/openshift-mongo-flask-example -Entry file: openshift-mongo-flask-example/wsgi/myflaskapp.py -Scanned: 2016-10-18 16:01:35.261656 -No vulnerabilities found. - - -zeraholladay/Flask-Oauth2-Example -https://github.com/zeraholladay/Flask-Oauth2-Example -Entry file: Flask-Oauth2-Example/app.py -Scanned: 2016-10-18 16:01:38.276550 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mtth/kit -https://github.com/mtth/kit -Entry file: kit/examples/poller/poller/app/views.py -Scanned: 2016-10-18 16:01:45.760932 -No vulnerabilities found. - - -codecool/flask-app-structure -https://github.com/codecool/flask-app-structure -Entry file: flask-app-structure/myapp/__init__.py -Scanned: 2016-10-18 16:01:52.206490 -No vulnerabilities found. - - -DeaconDesperado/Flask-SQLAlchemy-Example -https://github.com/DeaconDesperado/Flask-SQLAlchemy-Example -Entry file: Flask-SQLAlchemy-Example/testapp.py -Scanned: 2016-10-18 16:01:55.713739 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kvesteri/flask-test -https://github.com/kvesteri/flask-test -Entry file: flask-test/tests/__init__.py -Scanned: 2016-10-18 16:01:58.189543 -No vulnerabilities found. - - -ipconfiger/pyImageServer -https://github.com/ipconfiger/pyImageServer -Entry file: pyImageServer/serv.py -Scanned: 2016-10-18 16:02:05.737746 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Khan/flask-wtf -https://github.com/Khan/flask-wtf -Entry file: flask-wtf/examples/recaptcha/app.py -Scanned: 2016-10-18 16:02:09.557970 -No vulnerabilities found. - - -ravenac95/flask-command -https://github.com/ravenac95/flask-command -Entry file: flask-command/tests/fixtures/factory_app.py -Scanned: 2016-10-18 16:02:10.816518 -No vulnerabilities found. - - -encodes/flask-snippet -https://github.com/encodes/flask-snippet -Entry file: flask-snippet/app/__init__.py -Scanned: 2016-10-18 16:02:16.347319 -Vulnerability 1: -File: flask-snippet/app/users/views.py - > User input at line 35, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-snippet/app/users/views.py - > Line 40: session['user_id'] = user.id -File: flask-snippet/app/users/views.py - > reaches line 41, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -vaus/Flaskyll -https://github.com/vaus/Flaskyll -Entry file: Flaskyll/scripts/flaskyll.py -Scanned: 2016-10-18 16:02:16.841351 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -christianpbrink/flaskdemo -https://github.com/christianpbrink/flaskdemo -Entry file: flaskdemo/src/flaskdemo/__init__.py -Scanned: 2016-10-18 16:02:18.058860 -No vulnerabilities found. - - -vsergeyev/flasklutskio -https://github.com/vsergeyev/flasklutskio -Entry file: flasklutskio/app.py -Scanned: 2016-10-18 16:02:19.284420 -No vulnerabilities found. - - -lb1a/flaskplay -https://github.com/lb1a/flaskplay -Entry file: flaskplay/flaskr.py -Scanned: 2016-10-18 16:02:21.671965 -No vulnerabilities found. - - -fdb/helloflask -https://github.com/fdb/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-18 16:02:22.191382 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -gparuthi/FlaskServer -https://github.com/gparuthi/FlaskServer -Entry file: FlaskServer/server.py -Scanned: 2016-10-18 16:02:25.355025 -No vulnerabilities found. - - -iambibhas/flask-blog -https://github.com/iambibhas/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:02:27.373326 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -akaptur/Flask-tutorial -https://github.com/akaptur/Flask-tutorial -Entry file: Flask-tutorial/flask_app.py -Scanned: 2016-10-18 16:02:27.864958 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ihptru/Ubot-flask -https://github.com/ihptru/Ubot-flask -Entry file: Ubot-flask/ubotflask.py -Scanned: 2016-10-18 16:02:30.113137 -No vulnerabilities found. - - -alexisbellido/flask-basics -https://github.com/alexisbellido/flask-basics -Entry file: flask-basics/hello.py -Scanned: 2016-10-18 16:02:31.698771 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Dipsomaniac/Flask-Mixer -https://github.com/Dipsomaniac/Flask-Mixer -Entry file: Flask-Mixer/tests/__init__.py -Scanned: 2016-10-18 16:02:35.158824 -No vulnerabilities found. - - -bx2/handbag-flask -https://github.com/bx2/handbag-flask -Entry file: handbag-flask/flaskapp-template/app.py -Scanned: 2016-10-18 16:02:36.391916 -No vulnerabilities found. - - -whoeverest/NSND-Upvoting -https://github.com/whoeverest/NSND-Upvoting -Entry file: NSND-Upvoting/upvote-list.py -Scanned: 2016-10-18 16:02:39.612453 -No vulnerabilities found. - - -naudo/flask-hello-world -https://github.com/naudo/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-18 16:02:40.169971 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -Smil3y/MyFlaskr -https://github.com/Smil3y/MyFlaskr -Entry file: MyFlaskr/flaskr.py -Scanned: 2016-10-18 16:02:58.401027 -No vulnerabilities found. - - -jonathancone/helloflask -https://github.com/jonathancone/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-18 16:03:00.911171 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -vicould/simple_blog -https://github.com/vicould/simple_blog -Entry file: simple_blog/blog.py -Scanned: 2016-10-18 16:03:04.450378 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -rafax/flush -https://github.com/rafax/flush -Entry file: flush/flush.py -Scanned: 2016-10-18 16:03:05.949203 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fenbox/chord -https://github.com/fenbox/chord -Entry file: chord/chord.py -Scanned: 2016-10-18 16:03:09.335487 -No vulnerabilities found. - - -R2Drink2/r2drink2-server -https://github.com/R2Drink2/r2drink2-server -Entry file: None -Scanned: 2016-10-18 16:03:10.842636 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/R2Drink2/r2drink2-server. - -mafrosis/youtube-dl -https://github.com/mafrosis/youtube-dl -Entry file: youtube-dl/youtube_dl/__init__.py -Scanned: 2016-10-18 16:03:14.337181 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrwilson/git-serve -https://github.com/mrwilson/git-serve -Entry file: git-serve/git_serve/app.py -Scanned: 2016-10-18 16:03:15.305176 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -allaud/Sufx -https://github.com/allaud/Sufx -Entry file: Sufx/app.py -Scanned: 2016-10-18 16:03:17.820762 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miniatureape/etsy-api-demo -https://github.com/miniatureape/etsy-api-demo -Entry file: etsy-api-demo/app.py -Scanned: 2016-10-18 16:03:18.326549 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -troythewolfe/nNest -https://github.com/troythewolfe/nNest -Entry file: None -Scanned: 2016-10-18 16:03:18.839384 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/troythewolfe/nNest. - -andor44/lohere- -https://github.com/andor44/lohere- -Entry file: lohere-/lohereminusz.py -Scanned: 2016-10-18 16:03:21.374196 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ashutoshrishi/adventuresontheweb -https://github.com/ashutoshrishi/adventuresontheweb -Entry file: adventuresontheweb/flask/sessions.py -Scanned: 2016-10-18 16:03:22.915704 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -clee/boilerplate -https://github.com/clee/boilerplate -Entry file: boilerplate/boilerplate.py -Scanned: 2016-10-18 16:03:24.148170 -No vulnerabilities found. - - -pyloque/doumail_machine -https://github.com/pyloque/doumail_machine -Entry file: doumail_machine/main.py -Scanned: 2016-10-18 16:03:24.648628 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -richard-to/dashgourd-web-api -https://github.com/richard-to/dashgourd-web-api -Entry file: dashgourd-web-api/example/app.py -Scanned: 2016-10-18 16:03:25.857546 -No vulnerabilities found. - - -trenta3dev/wafwfy -https://github.com/trenta3dev/wafwfy -Entry file: wafwfy/wafwfy/__init__.py -Scanned: 2016-10-18 16:03:26.364533 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bendavis78/irclog -https://github.com/bendavis78/irclog -Entry file: irclog/app.py -Scanned: 2016-10-18 16:03:28.594084 -No vulnerabilities found. - - -sijinjoseph/multunus-puzzle -https://github.com/sijinjoseph/multunus-puzzle -Entry file: multunus-puzzle/src/app.py -Scanned: 2016-10-18 16:03:30.302282 -Vulnerability 1: -File: multunus-puzzle/src/app.py - > User input at line 21, trigger word "form[": - redirect_to = url_for('tagcloud',twitterhandle=request.form['handle']) -Reassigned in: - File: multunus-puzzle/src/app.py - > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: multunus-puzzle/src/app.py - > reaches line 22, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(redirect_to) - - - -practo/MyCQ -https://github.com/practo/MyCQ -Entry file: MyCQ/mycq/__init__.py -Scanned: 2016-10-18 16:03:32.949732 -No vulnerabilities found. - - -gaker/slides -https://github.com/gaker/slides -Entry file: slides/slides.py -Scanned: 2016-10-18 16:03:34.490862 -No vulnerabilities found. - - -addumb/toyapp -https://github.com/addumb/toyapp -Entry file: toyapp/toy/__init__.py -Scanned: 2016-10-18 16:03:38.603928 -Vulnerability 1: -File: toyapp/toy/views.py - > User input at line 77, trigger word "form[": - val = float(request.form['value']) -Reassigned in: - File: toyapp/toy/views.py - > Line 86: ret_MAYBE_FUNCTION_NAME = 'Setting %s to %s at %s' % (key, val, str(ts)) -File: toyapp/toy/views.py - > reaches line 83, trigger word "execute(": - g.db.execute('insert into events (key, value, ts) values (?, ?, ?)', (key, val, ts)) - -Vulnerability 2: -File: toyapp/toy/views.py - > User input at line 79, trigger word "form[": - ts = float(request.form['ts']) -Reassigned in: - File: toyapp/toy/views.py - > Line 81: ts = time.time() - File: toyapp/toy/views.py - > Line 86: ret_MAYBE_FUNCTION_NAME = 'Setting %s to %s at %s' % (key, val, str(ts)) -File: toyapp/toy/views.py - > reaches line 83, trigger word "execute(": - g.db.execute('insert into events (key, value, ts) values (?, ?, ?)', (key, val, ts)) - - - -petezhut/BigDay -https://github.com/petezhut/BigDay -Entry file: BigDay/app.py -Scanned: 2016-10-18 16:03:39.183245 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -akabaker/remote_rgb -https://github.com/akabaker/remote_rgb -Entry file: remote_rgb/app.py -Scanned: 2016-10-18 16:03:40.373904 -No vulnerabilities found. - - -kyubuns/favme -https://github.com/kyubuns/favme -Entry file: favme/hello.py -Scanned: 2016-10-18 16:03:40.939292 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joelverhagen/flask-rauth -https://github.com/joelverhagen/flask-rauth -Entry file: flask-rauth/example/facebook.py -Scanned: 2016-10-18 16:03:56.808701 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mattupstate/flask-security-example -https://github.com/mattupstate/flask-security-example -Entry file: flask-security-example/app.py -Scanned: 2016-10-18 16:03:59.214946 -No vulnerabilities found. - - -MichaelDiBernardo/ddd-flask-example -https://github.com/MichaelDiBernardo/ddd-flask-example -Entry file: ddd-flask-example/blogex/blogex_app.py -Scanned: 2016-10-18 16:04:02.566454 -No vulnerabilities found. - - -FelixLoether/flask-image-upload-thing -https://github.com/FelixLoether/flask-image-upload-thing -Entry file: flask-image-upload-thing/example.py -Scanned: 2016-10-18 16:04:05.200243 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jjjjeeffff/flask-skeleton -https://github.com/jjjjeeffff/flask-skeleton -Entry file: None -Scanned: 2016-10-18 16:04:06.828429 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jjjjeeffff/flask-skeleton. - -mgood/flask-failsafe -https://github.com/mgood/flask-failsafe -Entry file: flask-failsafe/test/test_app.py -Scanned: 2016-10-18 16:04:10.213661 -No vulnerabilities found. - - -arvindkhadri/flask-social -https://github.com/arvindkhadri/flask-social -Entry file: flask-social/tests/test_app/__init__.py -Scanned: 2016-10-18 16:04:12.983708 -No vulnerabilities found. - - -dantezhu/flask_util_js -https://github.com/dantezhu/flask_util_js -Entry file: flask_util_js/examples/main.py -Scanned: 2016-10-18 16:04:14.977410 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kielpedia/flask-sqlalchemy-postgres-heroku-example -https://github.com/kielpedia/flask-sqlalchemy-postgres-heroku-example -Entry file: flask-sqlalchemy-postgres-heroku-example/Flasktest/__init__.py -Scanned: 2016-10-18 16:04:18.088495 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yamatt/flask-blog -https://github.com/yamatt/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:04:18.751505 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -marconi/flask-chat -https://github.com/marconi/flask-chat -Entry file: flask-chat/chat.py -Scanned: 2016-10-18 16:04:19.259498 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rjurney/enron-python-flask-cassandra-pig -https://github.com/rjurney/enron-python-flask-cassandra-pig -Entry file: enron-python-flask-cassandra-pig/index.py -Scanned: 2016-10-18 16:04:22.018667 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KaviCorp/flask_pysaml2 -https://github.com/KaviCorp/flask_pysaml2 -Entry file: flask_pysaml2/tests/test_saml.py -Scanned: 2016-10-18 16:04:23.524725 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paulchakravarti/flask-skeleton -https://github.com/paulchakravarti/flask-skeleton -Entry file: None -Scanned: 2016-10-18 16:04:25.974113 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/paulchakravarti/flask-skeleton. - -tomekwojcik/flask-htauth -https://github.com/tomekwojcik/flask-htauth -Entry file: flask-htauth/example.py -Scanned: 2016-10-18 16:04:27.562492 -No vulnerabilities found. - - -skual/backend-flask -https://github.com/skual/backend-flask -Entry file: None -Scanned: 2016-10-18 16:04:28.193535 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/skual/backend-flask. - -memeticlabs/flask-mongokit -https://github.com/memeticlabs/flask-mongokit -Entry file: flask-mongokit/tests/test_base.py -Scanned: 2016-10-18 16:04:31.196645 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mokshaproject/moksha-flask-hello_world -https://github.com/mokshaproject/moksha-flask-hello_world -Entry file: moksha-flask-hello_world/tutorial.py -Scanned: 2016-10-18 16:04:37.447824 -No vulnerabilities found. - - -geekforbrains/squid -https://github.com/geekforbrains/squid -Entry file: squid/run.py -Scanned: 2016-10-18 16:04:38.932318 -No vulnerabilities found. - - -fallingfree/flask-principal-simple-example -https://github.com/fallingfree/flask-principal-simple-example -Entry file: flask-principal-simple-example/auth.py -Scanned: 2016-10-18 16:04:40.152732 -Vulnerability 1: -File: flask-principal-simple-example/auth.py - > User input at line 136, trigger word ".data": - user = User.query.filter(User.username == form.username.data).first() -File: flask-principal-simple-example/auth.py - > reaches line 143, trigger word "flash(": - flash('欢迎你, %s' % user.username) - - - -trilan/stencil-flask -https://github.com/trilan/stencil-flask -Entry file: stencil-flask/stencil_flask/template/{app_name}/__init__.py -Scanned: 2016-10-18 16:04:42.010785 -No vulnerabilities found. - - -yangjiandong/flaskr -https://github.com/yangjiandong/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:04:52.557117 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NEETFUTURE/flaskr -https://github.com/NEETFUTURE/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:04:57.102733 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -narendranag/Flaskr -https://github.com/narendranag/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-18 16:05:02.106017 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luanfonceca/flaskbook -https://github.com/luanfonceca/flaskbook -Entry file: flaskbook/mange.py -Scanned: 2016-10-18 16:05:06.461306 -No vulnerabilities found. - - -johnschimmel/ITP-DWD-Fall2012-Week3-First-Server -https://github.com/johnschimmel/ITP-DWD-Fall2012-Week3-First-Server -Entry file: ITP-DWD-Fall2012-Week3-First-Server/app.py -Scanned: 2016-10-18 16:05:07.670121 -No vulnerabilities found. - - -saltycrane/flask-principal-example -https://github.com/saltycrane/flask-principal-example -Entry file: flask-principal-example/main.py -Scanned: 2016-10-18 16:05:10.206607 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KrzysztofWilczek/FlaskMaschines -https://github.com/KrzysztofWilczek/FlaskMaschines -Entry file: FlaskMaschines/app.py -Scanned: 2016-10-18 16:05:12.715610 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -trenta3dev/ziga -https://github.com/trenta3dev/ziga -Entry file: ziga/ziga/__init__.py -Scanned: 2016-10-18 16:05:16.116045 -No vulnerabilities found. - - -DeaconDesperado/flask_skel -https://github.com/DeaconDesperado/flask_skel -Entry file: flask_skel/listener.py -Scanned: 2016-10-18 16:05:17.100852 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -calebmadrigal/flask-adventures -https://github.com/calebmadrigal/flask-adventures -Entry file: flask-adventures/annuity_calculator.py -Scanned: 2016-10-18 16:05:19.079913 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iambibhas/flask-blog -https://github.com/iambibhas/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:05:22.063111 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -marchibbins/simple-flask -https://github.com/marchibbins/simple-flask -Entry file: simple-flask/simple-flask.py -Scanned: 2016-10-18 16:05:24.767584 -No vulnerabilities found. - - -imiric/flask-scaffold -https://github.com/imiric/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-18 16:05:26.747848 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arvs/CURC-flask -https://github.com/arvs/CURC-flask -Entry file: CURC-flask/app.py -Scanned: 2016-10-18 16:05:30.798355 -No vulnerabilities found. - - -suneel0101/flask-adventure -https://github.com/suneel0101/flask-adventure -Entry file: flask-adventure/app.py -Scanned: 2016-10-18 16:05:32.583061 -No vulnerabilities found. - - -memeticlabs/Redis-Flask -https://github.com/memeticlabs/Redis-Flask -Entry file: Redis-Flask/flask_redis.py -Scanned: 2016-10-18 16:05:33.098259 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DartmouthHackerClub/flask_template -https://github.com/DartmouthHackerClub/flask_template -Entry file: flask_template/app.py -Scanned: 2016-10-18 16:05:35.427197 -Vulnerability 1: -File: flask_template/flask_cas.py - > User input at line 19, trigger word "get(": - r = requests.get(validate_url) -Reassigned in: - File: flask_template/flask_cas.py - > Line 20: doc = etree.fromstring(r.text) -File: flask_template/flask_cas.py - > reaches line 22, trigger word "replace(": - ret_MAYBE_FUNCTION_NAME = dict(((key.replace('{http://www.yale.edu/tp/cas}', ''), value) for (key, value) in recursive_dict(doc[0])[1].items())) - - - -bozoid/testblog -https://github.com/bozoid/testblog -Entry file: testblog/index.py -Scanned: 2016-10-18 16:05:36.050428 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: testblog/venv/lib/python2.7/genericpath.py - -alfredhq/alfred-listener -https://github.com/alfredhq/alfred-listener -Entry file: alfred-listener/alfred_listener/__init__.py -Scanned: 2016-10-18 16:05:38.380591 -No vulnerabilities found. - - -dhruvbaldawa/cj_calc -https://github.com/dhruvbaldawa/cj_calc -Entry file: cj_calc/app.py -Scanned: 2016-10-18 16:05:39.583353 -No vulnerabilities found. - - -openplans/shareabouts-flask-client -https://github.com/openplans/shareabouts-flask-client -Entry file: None -Scanned: 2016-10-18 16:05:41.547233 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/openplans/shareabouts-flask-client. - -hagino3000/flask-project-template -https://github.com/hagino3000/flask-project-template -Entry file: flask-project-template/app.py -Scanned: 2016-10-18 16:05:42.101578 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-project-template/venv/lib/python2.7/genericpath.py - -jhorman/sample-flask-project -https://github.com/jhorman/sample-flask-project -Entry file: sample-flask-project/app.py -Scanned: 2016-10-18 16:05:57.890820 -No vulnerabilities found. - - -imaimiami/heroku_flask_template -https://github.com/imaimiami/heroku_flask_template -Entry file: heroku_flask_template/app/__init__.py -Scanned: 2016-10-18 16:06:00.258283 -No vulnerabilities found. - - -amaudy/flaskr-tutorial -https://github.com/amaudy/flaskr-tutorial -Entry file: flaskr-tutorial/flaskr.py -Scanned: 2016-10-18 16:06:07.083656 -No vulnerabilities found. - - -infinitylx/test-task -https://github.com/infinitylx/test-task -Entry file: test-task/application.py -Scanned: 2016-10-18 16:06:07.636232 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gavinb/flaskr-eb -https://github.com/gavinb/flaskr-eb -Entry file: flaskr-eb/flaskr.py -Scanned: 2016-10-18 16:06:11.874520 -No vulnerabilities found. - - -vkukushkin88/test_books -https://github.com/vkukushkin88/test_books -Entry file: test_books/db/db_models.py -Scanned: 2016-10-18 16:06:16.596107 -No vulnerabilities found. - - -nicolashery/safire -https://github.com/nicolashery/safire -Entry file: safire/app.py -Scanned: 2016-10-18 16:06:17.822451 -No vulnerabilities found. - - -fjarri/publicfields-backend -https://github.com/fjarri/publicfields-backend -Entry file: publicfields-backend/backend/__init__.py -Scanned: 2016-10-18 16:06:18.341681 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -sdornan/imgination -https://github.com/sdornan/imgination -Entry file: imgination/application.py -Scanned: 2016-10-18 16:06:19.748835 -No vulnerabilities found. - - -Citizen01/Kozea-project1 -https://github.com/Citizen01/Kozea-project1 -Entry file: Kozea-project1/index.py -Scanned: 2016-10-18 16:06:21.547755 -Vulnerability 1: -File: Kozea-project1/index.py - > User input at line 110, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: Kozea-project1/index.py - > Line 122: session['username'] = username - File: Kozea-project1/index.py - > Line 123: session['id'] = User.query.filter_by(username=username).first().id - File: Kozea-project1/index.py - > Line 121: session['logged_in'] = True -File: Kozea-project1/index.py - > reaches line 124, trigger word "flash(": - flash('Welcome on Kozupload, %s !' % username, 'success') - - - -noise/fortune-redis -https://github.com/noise/fortune-redis -Entry file: fortune-redis/fortune_server.py -Scanned: 2016-10-18 16:06:22.051694 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dash1291/grabset -https://github.com/dash1291/grabset -Entry file: grabset/grabset.py -Scanned: 2016-10-18 16:06:23.374708 -No vulnerabilities found. - - -ipedrazas/surl -https://github.com/ipedrazas/surl -Entry file: surl/shortener.py -Scanned: 2016-10-18 16:06:24.607877 -Vulnerability 1: -File: surl/shortener.py - > User input at line 88, trigger word "form[": - link = request.form['link'] -Reassigned in: - File: surl/shortener.py - > Line 92: url = objects.find_one('link'link) -File: surl/shortener.py - > reaches line 95, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('url'URL + url['url_id']) - -Vulnerability 2: -File: surl/shortener.py - > User input at line 88, trigger word "form[": - link = request.form['link'] -Reassigned in: - File: surl/shortener.py - > Line 92: url = objects.find_one('link'link) -File: surl/shortener.py - > reaches line 97, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('url'URL + short_id(link)) - - - -alexmic/trippin -https://github.com/alexmic/trippin -Entry file: trippin/server.py -Scanned: 2016-10-18 16:06:25.117146 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aquaya/sawyer -https://github.com/aquaya/sawyer -Entry file: sawyer/application/__init__.py -Scanned: 2016-10-18 16:06:27.590942 -No vulnerabilities found. - - -metermaid/thirstybot -https://github.com/metermaid/thirstybot -Entry file: thirstybot/app.py -Scanned: 2016-10-18 16:06:28.103350 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -timney/meblog -https://github.com/timney/meblog -Entry file: meblog/app.py -Scanned: 2016-10-18 16:06:28.675998 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -oxtopus/barkeeper -https://github.com/oxtopus/barkeeper -Entry file: barkeeper/barkeeper/app.py -Scanned: 2016-10-18 16:06:32.884408 -No vulnerabilities found. - - -ngopal/quote_generator -https://github.com/ngopal/quote_generator -Entry file: quote_generator/main.py -Scanned: 2016-10-18 16:06:33.396371 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wesleyk/WhoPaid -https://github.com/wesleyk/WhoPaid -Entry file: WhoPaid/WhoPaid.py -Scanned: 2016-10-18 16:06:34.889993 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smanek/challenge -https://github.com/smanek/challenge -Entry file: challenge/challenge.py -Scanned: 2016-10-18 16:06:37.426118 -No vulnerabilities found. - - -neocxi/coursemonitor -https://github.com/neocxi/coursemonitor -Entry file: coursemonitor/flask/sessions.py -Scanned: 2016-10-18 16:06:37.935802 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alfg/inviteme -https://github.com/alfg/inviteme -Entry file: inviteme/inviteme.py -Scanned: 2016-10-18 16:06:39.475221 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kfigaj/FizzBuzzPro -https://github.com/kfigaj/FizzBuzzPro -Entry file: FizzBuzzPro/FizzBuzzPro/fizzbuzz.py -Scanned: 2016-10-18 16:06:41.789788 -No vulnerabilities found. - - -richardneish/lists -https://github.com/richardneish/lists -Entry file: lists/lists/__init__.py -Scanned: 2016-10-18 16:06:43.029489 -No vulnerabilities found. - - -MalphasWats/pyDimension -https://github.com/MalphasWats/pyDimension -Entry file: pyDimension/pyDimension/__init__.py -Scanned: 2016-10-18 16:06:44.363162 -Vulnerability 1: -File: pyDimension/pyDimension/views.py - > User input at line 43, trigger word "form[": - filename = request.form['filename'] -Reassigned in: - File: pyDimension/pyDimension/views.py - > Line 45: filename = '%s.txt' % safe_title - File: pyDimension/pyDimension/views.py - > Line 48: articleFile = codecs.open('%s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),encoding='utf-8', mode='w') - File: pyDimension/pyDimension/views.py - > Line 59: filename = '%s_%s' % (date, get_safe_filename(request.form['filename'])) - File: pyDimension/pyDimension/views.py - > Line 61: filename = get_safe_filename(request.form['filename']) - File: pyDimension/pyDimension/views.py - > Line 64: filename = '%s_%s.txt' % (date, safe_title) -File: pyDimension/pyDimension/views.py - > reaches line 50, trigger word "flash(": - flash('There was a problem accessing the file %s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),category='error') - -Vulnerability 2: -File: pyDimension/pyDimension/views.py - > User input at line 59, trigger word "form[": - filename = '%s_%s' % (date, get_safe_filename(request.form['filename'])) -Reassigned in: - File: pyDimension/pyDimension/views.py - > Line 43: filename = request.form['filename'] - File: pyDimension/pyDimension/views.py - > Line 45: filename = '%s.txt' % safe_title - File: pyDimension/pyDimension/views.py - > Line 48: articleFile = codecs.open('%s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),encoding='utf-8', mode='w') - File: pyDimension/pyDimension/views.py - > Line 61: filename = get_safe_filename(request.form['filename']) - File: pyDimension/pyDimension/views.py - > Line 64: filename = '%s_%s.txt' % (date, safe_title) -File: pyDimension/pyDimension/views.py - > reaches line 50, trigger word "flash(": - flash('There was a problem accessing the file %s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),category='error') - -Vulnerability 3: -File: pyDimension/pyDimension/views.py - > User input at line 61, trigger word "form[": - filename = get_safe_filename(request.form['filename']) -Reassigned in: - File: pyDimension/pyDimension/views.py - > Line 43: filename = request.form['filename'] - File: pyDimension/pyDimension/views.py - > Line 45: filename = '%s.txt' % safe_title - File: pyDimension/pyDimension/views.py - > Line 48: articleFile = codecs.open('%s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),encoding='utf-8', mode='w') - File: pyDimension/pyDimension/views.py - > Line 59: filename = '%s_%s' % (date, get_safe_filename(request.form['filename'])) - File: pyDimension/pyDimension/views.py - > Line 64: filename = '%s_%s.txt' % (date, safe_title) -File: pyDimension/pyDimension/views.py - > reaches line 50, trigger word "flash(": - flash('There was a problem accessing the file %s/%s' % (app.config['DRAFTS_ROOT_DIR'], filename),category='error') - -Vulnerability 4: -File: pyDimension/pyDimension/access_control.py - > User input at line 20, trigger word "form[": - next = request.form['next'] -Reassigned in: - File: pyDimension/pyDimension/access_control.py - > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(url_for('control_panel')) - File: pyDimension/pyDimension/access_control.py - > Line 31: ret_MAYBE_FUNCTION_NAME = render_template('login.html',next=request.args.get('next')) -File: pyDimension/pyDimension/access_control.py - > reaches line 25, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - - - -DanielleSucher/Text-Donation -https://github.com/DanielleSucher/Text-Donation -Entry file: Text-Donation/app.py -Scanned: 2016-10-18 16:06:53.767447 -No vulnerabilities found. - - -flask-restful/flask-restful -https://github.com/flask-restful/flask-restful -Entry file: flask-restful/flask_restful/__init__.py -Scanned: 2016-10-18 16:06:59.788861 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -rozza/flask-tumblelog -https://github.com/rozza/flask-tumblelog -Entry file: flask-tumblelog/tumblelog/__init__.py -Scanned: 2016-10-18 16:07:04.157872 -No vulnerabilities found. - - -lixxu/flask-paginate -https://github.com/lixxu/flask-paginate -Entry file: flask-paginate/example/app.py -Scanned: 2016-10-18 16:07:07.778984 -No vulnerabilities found. - - -e-dard/flask-s3 -https://github.com/e-dard/flask-s3 -Entry file: flask-s3/test_flask_static.py -Scanned: 2016-10-18 16:07:12.946826 -No vulnerabilities found. - - -singingwolfboy/flask-misaka -https://github.com/singingwolfboy/flask-misaka -Entry file: flask-misaka/tests.py -Scanned: 2016-10-18 16:07:18.538572 -No vulnerabilities found. - - -rangermeier/flaskberry -https://github.com/rangermeier/flaskberry -Entry file: flaskberry/flaskberry/__init__.py -Scanned: 2016-10-18 16:07:19.522217 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -magaman384/flask-autocomplete -https://github.com/magaman384/flask-autocomplete -Entry file: flask-autocomplete/tests/test.py -Scanned: 2016-10-18 16:07:23.810657 -No vulnerabilities found. - - -GrexIt/flask-login-oauth2 -https://github.com/GrexIt/flask-login-oauth2 -Entry file: None -Scanned: 2016-10-18 16:07:25.813091 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/GrexIt/flask-login-oauth2. - -kielpedia/flask-sqlalchemy-postgres-heroku-example -https://github.com/kielpedia/flask-sqlalchemy-postgres-heroku-example -Entry file: flask-sqlalchemy-postgres-heroku-example/Flasktest/__init__.py -Scanned: 2016-10-18 16:07:27.314178 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -renstrom/passbook_flask_example -https://github.com/renstrom/passbook_flask_example -Entry file: passbook_flask_example/app.py -Scanned: 2016-10-18 16:07:29.564226 -No vulnerabilities found. - - -teozkr/Flask-Pushrod -https://github.com/teozkr/Flask-Pushrod -Entry file: Flask-Pushrod/examples/pushrodr/step3.py -Scanned: 2016-10-18 16:07:32.194668 -No vulnerabilities found. - - -KaviCorp/flask_pysaml2 -https://github.com/KaviCorp/flask_pysaml2 -Entry file: flask_pysaml2/tests/test_saml.py -Scanned: 2016-10-18 16:07:32.713982 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MostAwesomeDude/flask-holster -https://github.com/MostAwesomeDude/flask-holster -Entry file: flask-holster/test.py -Scanned: 2016-10-18 16:07:35.178236 -No vulnerabilities found. - - -stevenewey/ssedemo -https://github.com/stevenewey/ssedemo -Entry file: ssedemo/sse_server.py -Scanned: 2016-10-18 16:07:41.631887 -No vulnerabilities found. - - -LarryEitel/gsapi -https://github.com/LarryEitel/gsapi -Entry file: gsapi/gsapi/run.py -Scanned: 2016-10-18 16:07:42.190231 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pokom/flasking -https://github.com/Pokom/flasking -Entry file: flasking/flaskr.py -Scanned: 2016-10-18 16:07:43.208392 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasking/venv/lib/python2.7/genericpath.py - -car34/flasktut -https://github.com/car34/flasktut -Entry file: flasktut/app/__init__.py -Scanned: 2016-10-18 16:07:44.558255 -No vulnerabilities found. - - -gracedme/flaskblog -https://github.com/gracedme/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-18 16:07:45.111886 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -nirix-old/flaskapp -https://github.com/nirix-old/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-18 16:07:45.596203 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jasonamyers/flaskr -https://github.com/jasonamyers/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:07:53.139190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -femmerling/EmeraldBox -https://github.com/femmerling/EmeraldBox -Entry file: EmeraldBox/app/__init__.py -Scanned: 2016-10-18 16:08:00.877294 -No vulnerabilities found. - - -corysandahl/FlaskAPI -https://github.com/corysandahl/FlaskAPI -Entry file: FlaskAPI/ProdAPI.py -Scanned: 2016-10-18 16:08:02.145582 -No vulnerabilities found. - - -pearkes/invite -https://github.com/pearkes/invite -Entry file: invite/app.py -Scanned: 2016-10-18 16:08:03.657258 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MalphasWats/flask-blueprint-loader -https://github.com/MalphasWats/flask-blueprint-loader -Entry file: flask-blueprint-loader/dashboard/dashboard.py -Scanned: 2016-10-18 16:08:07.901451 -No vulnerabilities found. - - -tswast/cryptogram-flask -https://github.com/tswast/cryptogram-flask -Entry file: cryptogram-flask/cryptogram.py -Scanned: 2016-10-18 16:08:09.109632 -No vulnerabilities found. - - -Fibio/flask-mongoset -https://github.com/Fibio/flask-mongoset -Entry file: flask-mongoset/flask_mongoset.py -Scanned: 2016-10-18 16:08:14.165220 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -suneel0101/flask-hn -https://github.com/suneel0101/flask-hn -Entry file: flask-hn/app.py -Scanned: 2016-10-18 16:08:17.420258 -No vulnerabilities found. - - -mstriemer/todo-flask -https://github.com/mstriemer/todo-flask -Entry file: todo-flask/todo.py -Scanned: 2016-10-18 16:08:18.649853 -No vulnerabilities found. - - -tribbettz/flask-microblog -https://github.com/tribbettz/flask-microblog -Entry file: flask-microblog/app/__init__.py -Scanned: 2016-10-18 16:08:19.990176 -No vulnerabilities found. - - -codecool/flask-uploads -https://github.com/codecool/flask-uploads -Entry file: flask-uploads/test-uploads.py -Scanned: 2016-10-18 16:08:23.052271 -No vulnerabilities found. - - -nirix-old/mantid_flask -https://github.com/nirix-old/mantid_flask -Entry file: None -Scanned: 2016-10-18 16:08:23.567995 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nirix-old/mantid_flask. - -DartmouthHackerClub/blitzlistr-flask -https://github.com/DartmouthHackerClub/blitzlistr-flask -Entry file: blitzlistr-flask/app.py -Scanned: 2016-10-18 16:08:24.102250 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -otsuarez/flask-blog -https://github.com/otsuarez/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:08:24.663341 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -philwade/flask-presentation -https://github.com/philwade/flask-presentation -Entry file: flask-presentation/code/loop.py -Scanned: 2016-10-18 16:08:27.211473 -No vulnerabilities found. - - -mattdeboard/flask-cloudfront -https://github.com/mattdeboard/flask-cloudfront -Entry file: flask-cloudfront/flask_cloudfront/tests/base.py -Scanned: 2016-10-18 16:08:28.610452 -No vulnerabilities found. - - -apjd/flask-gae -https://github.com/apjd/flask-gae -Entry file: flask-gae/lib/flask/app.py -Scanned: 2016-10-18 16:08:29.139746 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -demitri/DMFlaskTemplate -https://github.com/demitri/DMFlaskTemplate -Entry file: DMFlaskTemplate/myapplication/myapplication/__init__.py -Scanned: 2016-10-18 16:08:33.396733 -No vulnerabilities found. - - -Zanfa/Twilio-SMS-Voting -https://github.com/Zanfa/Twilio-SMS-Voting -Entry file: Twilio-SMS-Voting/server.py -Scanned: 2016-10-18 16:08:35.306643 -No vulnerabilities found. - - -jvoisin/pyste -https://github.com/jvoisin/pyste -Entry file: pyste/flaskr.py -Scanned: 2016-10-18 16:08:36.641010 -Vulnerability 1: -File: pyste/flaskr.py - > User input at line 57, trigger word "form[": - delta = datetime.timedelta(seconds=int(request.form['expiration'])) -Reassigned in: - File: pyste/flaskr.py - > Line 58: expiration = datetime.datetime.now() + delta - File: pyste/flaskr.py - > Line 60: expiration = datetime.datetime(1, 1, 1) -File: pyste/flaskr.py - > reaches line 69, trigger word "execute(": - g.db.execute('INSERT INTO PASTE (id, title, expiration, content) VALUES (?, ?, ?, ?)', (identifier, request.form['title'], expiration, paste)) - -Vulnerability 2: -File: pyste/flaskr.py - > User input at line 62, trigger word "form[": - identifier = hashlib.sha1(request.form['input'] + time.ctime()).hexdigest()[8] -Reassigned in: - File: pyste/flaskr.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('index.html',identifier=identifier, url=request.url) - File: pyste/flaskr.py - > Line 79: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: pyste/flaskr.py - > Line 55: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: pyste/flaskr.py - > reaches line 69, trigger word "execute(": - g.db.execute('INSERT INTO PASTE (id, title, expiration, content) VALUES (?, ?, ?, ?)', (identifier, request.form['title'], expiration, paste)) - -Vulnerability 3: -File: pyste/flaskr.py - > User input at line 63, trigger word "form[": - paste = highlight(request.form['input'], guess_lexer(request.form['input']), HtmlFormatter(linenos='table')) -File: pyste/flaskr.py - > reaches line 69, trigger word "execute(": - g.db.execute('INSERT INTO PASTE (id, title, expiration, content) VALUES (?, ?, ?, ?)', (identifier, request.form['title'], expiration, paste)) - - - -codeanu/flask-login-oauth2 -https://github.com/codeanu/flask-login-oauth2 -Entry file: None -Scanned: 2016-10-18 16:08:37.285821 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codeanu/flask-login-oauth2. - -sclabs/flask.gilgi.org -https://github.com/sclabs/flask.gilgi.org -Entry file: None -Scanned: 2016-10-18 16:08:44.402567 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MalphasWats/instruments -https://github.com/MalphasWats/instruments -Entry file: instruments/instruments/__init__.py -Scanned: 2016-10-18 16:08:45.944157 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -msapoz/toothsometreats -https://github.com/msapoz/toothsometreats -Entry file: toothsometreats/toothsome.py -Scanned: 2016-10-18 16:08:46.459773 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -george25c/helloflask -https://github.com/george25c/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-18 16:08:53.981137 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -nirix/alchemyflask -https://github.com/nirix/alchemyflask -Entry file: alchemyflask/app.py -Scanned: 2016-10-18 16:08:59.218123 -No vulnerabilities found. - - -pwyf/IATI-Implementation-Schedules -https://github.com/pwyf/IATI-Implementation-Schedules -Entry file: IATI-Implementation-Schedules/impschedules/__init__.py -Scanned: 2016-10-18 16:09:01.724475 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sigmavirus24/subscribed -https://github.com/sigmavirus24/subscribed -Entry file: subscribed/subscribed/app.py -Scanned: 2016-10-18 16:09:05.062880 -No vulnerabilities found. - - -gbaldera/todo -https://github.com/gbaldera/todo -Entry file: todo/todo/__init__.py -Scanned: 2016-10-18 16:09:08.567593 -No vulnerabilities found. - - -mgill25/Blog -https://github.com/mgill25/Blog -Entry file: Blog/Blog/__init__.py -Scanned: 2016-10-18 16:09:14.465595 -No vulnerabilities found. - - -hernamesbarbara/NAICS -https://github.com/hernamesbarbara/NAICS -Entry file: NAICS/app.py -Scanned: 2016-10-18 16:09:17.928284 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scwu/Evernote-Blog-Engine -https://github.com/scwu/Evernote-Blog-Engine -Entry file: Evernote-Blog-Engine/blog.py -Scanned: 2016-10-18 16:09:19.421879 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ybz/yaniv_bz -https://github.com/ybz/yaniv_bz -Entry file: yaniv_bz/app.py -Scanned: 2016-10-18 16:09:22.420403 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -bezfeng/skinmd-frontend -https://github.com/bezfeng/skinmd-frontend -Entry file: skinmd-frontend/script_server.py -Scanned: 2016-10-18 16:09:23.959905 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jul/wsgi_social_experminet -https://github.com/jul/wsgi_social_experminet -Entry file: wsgi_social_experminet/www/socialize.py -Scanned: 2016-10-18 16:09:25.282212 -No vulnerabilities found. - - -barosl/photox -https://github.com/barosl/photox -Entry file: photox/photox.py -Scanned: 2016-10-18 16:09:25.811098 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thomasboyt/txtRPG -https://github.com/thomasboyt/txtRPG -Entry file: txtRPG/rpg_app/__init__.py -Scanned: 2016-10-18 16:09:26.354248 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hacksu/ksu-flash-info -https://github.com/hacksu/ksu-flash-info -Entry file: ksu-flash-info/app.py -Scanned: 2016-10-18 16:09:30.158329 -No vulnerabilities found. - - -smanek/challenge -https://github.com/smanek/challenge -Entry file: challenge/challenge.py -Scanned: 2016-10-18 16:09:32.299754 -No vulnerabilities found. - - -qnub/cavy -https://github.com/qnub/cavy -Entry file: cavy/project/flask/sessions.py -Scanned: 2016-10-18 16:09:32.861343 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adamcharnock/docsite -https://github.com/adamcharnock/docsite -Entry file: docsite/server.py -Scanned: 2016-10-18 16:09:36.597249 -No vulnerabilities found. - - -DazWorrall/flask-sse -https://github.com/DazWorrall/flask-sse -Entry file: flask-sse/example/example.py -Scanned: 2016-10-18 16:09:44.938878 -No vulnerabilities found. - - -hobbeswalsh/flask-sillywalk -https://github.com/hobbeswalsh/flask-sillywalk -Entry file: flask-sillywalk/flask_sillywalk/sillywalk.py -Scanned: 2016-10-18 16:09:46.426695 -No vulnerabilities found. - - -twip/flask_twip -https://github.com/twip/flask_twip -Entry file: flask_twip/examples/heroku/app.py -Scanned: 2016-10-18 16:09:48.071214 -No vulnerabilities found. - - -doobeh/Flask-S3-Uploader -https://github.com/doobeh/Flask-S3-Uploader -Entry file: Flask-S3-Uploader/app.py -Scanned: 2016-10-18 16:09:49.964470 -No vulnerabilities found. - - -tzulberti/Flask-PyPi-Proxy -https://github.com/tzulberti/Flask-PyPi-Proxy -Entry file: Flask-PyPi-Proxy/flask_pypi_proxy/app.py -Scanned: 2016-10-18 16:09:59.976814 -No vulnerabilities found. - - -rehandalal/flask-funnel -https://github.com/rehandalal/flask-funnel -Entry file: flask-funnel/flask_funnel/tests/test_funnel.py -Scanned: 2016-10-18 16:10:06.397775 -No vulnerabilities found. - - -rbin/OctoFlask -https://github.com/rbin/OctoFlask -Entry file: OctoFlask/__init__.py -Scanned: 2016-10-18 16:10:09.087000 -No vulnerabilities found. - - -mimming/python-flask-google-api-starter -https://github.com/mimming/python-flask-google-api-starter -Entry file: python-flask-google-api-starter/cal.py -Scanned: 2016-10-18 16:10:09.622830 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MichelleGlauser/Flask -https://github.com/MichelleGlauser/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-18 16:10:15.638562 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tzangms/python-websocket-example -https://github.com/tzangms/python-websocket-example -Entry file: python-websocket-example/app/__init__.py -Scanned: 2016-10-18 16:10:19.363167 -No vulnerabilities found. - - -jakecoffman/flask-bootstrap -https://github.com/jakecoffman/flask-bootstrap -Entry file: flask-bootstrap/flaskr.py -Scanned: 2016-10-18 16:10:20.918456 -No vulnerabilities found. - - -lomatus/flask2sae -https://github.com/lomatus/flask2sae -Entry file: flask2sae/1/app/__init__.py -Scanned: 2016-10-18 16:10:22.360134 -No vulnerabilities found. - - -Roasbeef/FlaskrNews -https://github.com/Roasbeef/FlaskrNews -Entry file: FlaskrNews/libs/flask/sessions.py -Scanned: 2016-10-18 16:10:22.887416 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marksteve/flask-stathat -https://github.com/marksteve/flask-stathat -Entry file: flask-stathat/example.py -Scanned: 2016-10-18 16:10:25.226117 -No vulnerabilities found. - - -byslee3/Flask_Tutorial -https://github.com/byslee3/Flask_Tutorial -Entry file: Flask_Tutorial/flaskr.py -Scanned: 2016-10-18 16:10:26.562351 -No vulnerabilities found. - - -gzb1985/flask-boilerplate -https://github.com/gzb1985/flask-boilerplate -Entry file: flask-boilerplate/flask_boilerplate/__init__.py -Scanned: 2016-10-18 16:10:28.099991 -No vulnerabilities found. - - -scolex/flask-forum -https://github.com/scolex/flask-forum -Entry file: flask-forum/app/__init__.py -Scanned: 2016-10-18 16:10:29.427912 -No vulnerabilities found. - - -bwghughes/flasksse -https://github.com/bwghughes/flasksse -Entry file: flasksse/app.py -Scanned: 2016-10-18 16:10:31.150484 -No vulnerabilities found. - - -kvesteri/flask-jinjahelpers -https://github.com/kvesteri/flask-jinjahelpers -Entry file: flask-jinjahelpers/tests/__init__.py -Scanned: 2016-10-18 16:10:33.336592 -No vulnerabilities found. - - -soccermetrics/flask-skeleton -https://github.com/soccermetrics/flask-skeleton -Entry file: None -Scanned: 2016-10-18 16:10:33.853104 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/soccermetrics/flask-skeleton. - -jmhobbs/redboard -https://github.com/jmhobbs/redboard -Entry file: redboard/src/redboard_server.py -Scanned: 2016-10-18 16:10:35.366031 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kates/flask-mold -https://github.com/kates/flask-mold -Entry file: flask-mold/app.py -Scanned: 2016-10-18 16:10:35.901997 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -landakram/microblog -https://github.com/landakram/microblog -Entry file: None -Scanned: 2016-10-18 16:10:38.432890 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -JanStevens/ArduinoPi-Python -https://github.com/JanStevens/ArduinoPi-Python -Entry file: ArduinoPi-Python/main.py -Scanned: 2016-10-18 16:10:44.816969 -No vulnerabilities found. - - -mies/wercker-flask-api -https://github.com/mies/wercker-flask-api -Entry file: wercker-flask-api/app.py -Scanned: 2016-10-18 16:10:46.172143 -No vulnerabilities found. - - -dengmin/base_framework_flask -https://github.com/dengmin/base_framework_flask -Entry file: None -Scanned: 2016-10-18 16:10:46.688105 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dengmin/base_framework_flask. - -tquach/talent-curator -https://github.com/tquach/talent-curator -Entry file: talent-curator/talent_curator/__init__.py -Scanned: 2016-10-18 16:10:49.249906 -No vulnerabilities found. - - -vitalk/flask-mailer -https://github.com/vitalk/flask-mailer -Entry file: flask-mailer/tests/conftest.py -Scanned: 2016-10-18 16:10:50.713878 -No vulnerabilities found. - - -drdaeman/flask-toybox -https://github.com/drdaeman/flask-toybox -Entry file: flask-toybox/tests/test_negotiation.py -Scanned: 2016-10-18 16:10:52.093136 -No vulnerabilities found. - - -Khady/flaskdotahorrible -https://github.com/Khady/flaskdotahorrible -Entry file: flaskdotahorrible/dota2.py -Scanned: 2016-10-18 16:10:54.604692 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -daneoshiga/flaskr -https://github.com/daneoshiga/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:10:59.154998 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lorden/flaskeleton -https://github.com/lorden/flaskeleton -Entry file: flaskeleton/app/__init__.py -Scanned: 2016-10-18 16:11:02.680004 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Ruke89/FlaskSite -https://github.com/Ruke89/FlaskSite -Entry file: FlaskSite/runServer.py -Scanned: 2016-10-18 16:11:06.302409 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tribbettz/flask-mongo-tumblelog -https://github.com/tribbettz/flask-mongo-tumblelog -Entry file: flask-mongo-tumblelog/app/__init__.py -Scanned: 2016-10-18 16:11:11.191269 -No vulnerabilities found. - - -standyro/flask-testbed -https://github.com/standyro/flask-testbed -Entry file: flask-testbed/test.py -Scanned: 2016-10-18 16:11:14.734650 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kracekumar/flask-apache -https://github.com/kracekumar/flask-apache -Entry file: flask-apache/app.py -Scanned: 2016-10-18 16:11:18.752332 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bcho-archive/flask-bootstrap -https://github.com/bcho-archive/flask-bootstrap -Entry file: flask-bootstrap/origin/app.py -Scanned: 2016-10-18 16:11:20.000098 -No vulnerabilities found. - - -tobiasandtobias/flask-assetslite -https://github.com/tobiasandtobias/flask-assetslite -Entry file: flask-assetslite/tests/tests.py -Scanned: 2016-10-18 16:11:21.329432 -No vulnerabilities found. - - -zhangcheng/Flask-Sandbox -https://github.com/zhangcheng/Flask-Sandbox -Entry file: Flask-Sandbox/src/app.py -Scanned: 2016-10-18 16:11:21.832004 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sfermigier/flask-linktester -https://github.com/sfermigier/flask-linktester -Entry file: flask-linktester/tests/dummy_app.py -Scanned: 2016-10-18 16:11:24.279479 -No vulnerabilities found. - - -mstriemer/todo-flask -https://github.com/mstriemer/todo-flask -Entry file: todo-flask/todo.py -Scanned: 2016-10-18 16:11:28.529263 -No vulnerabilities found. - - -kageurufu/flask-couchdb -https://github.com/kageurufu/flask-couchdb -Entry file: flask-couchdb/example/guestbook.py -Scanned: 2016-10-18 16:11:29.994688 -No vulnerabilities found. - - -jharkins/restful-flask -https://github.com/jharkins/restful-flask -Entry file: restful-flask/rest_ideas.py -Scanned: 2016-10-18 16:11:31.595455 -No vulnerabilities found. - - -yeradis/flask-nanoblog -https://github.com/yeradis/flask-nanoblog -Entry file: flask-nanoblog/nanoblog/__init__.py -Scanned: 2016-10-18 16:11:33.413020 -No vulnerabilities found. - - -lubiana/flask-quotedb -https://github.com/lubiana/flask-quotedb -Entry file: flask-quotedb/app/__init__.py -Scanned: 2016-10-18 16:11:34.750635 -No vulnerabilities found. - - -mercul3s/flask_tutorial -https://github.com/mercul3s/flask_tutorial -Entry file: flask_tutorial/flaskr.py -Scanned: 2016-10-18 16:11:35.962412 -No vulnerabilities found. - - -SAFeSEA/pyEssayAnalyser -https://github.com/SAFeSEA/pyEssayAnalyser -Entry file: pyEssayAnalyser/src/pyEssayAnalyser.py -Scanned: 2016-10-18 16:11:36.970718 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-js-hostname-example -https://github.com/mitsuhiko/flask-js-hostname-example -Entry file: flask-js-hostname-example/testapp.py -Scanned: 2016-10-18 16:11:44.756960 -No vulnerabilities found. - - -proto/flask-simple-blog -https://github.com/proto/flask-simple-blog -Entry file: flask-simple-blog/app.py -Scanned: 2016-10-18 16:11:47.076150 -No vulnerabilities found. - - -colinkahn/flask-redis-browserid -https://github.com/colinkahn/flask-redis-browserid -Entry file: flask-redis-browserid/run.py -Scanned: 2016-10-18 16:11:48.403946 -No vulnerabilities found. - - -pleomax00/flask-mongo-skel -https://github.com/pleomax00/flask-mongo-skel -Entry file: flask-mongo-skel/src/thirdparty/flask/sessions.py -Scanned: 2016-10-18 16:11:51.917374 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iolab12/python_flask_demo -https://github.com/iolab12/python_flask_demo -Entry file: python_flask_demo/todo.py -Scanned: 2016-10-18 16:12:00.628825 -No vulnerabilities found. - - -eneldoserrata/flask-python-dominicana-apps -https://github.com/eneldoserrata/flask-python-dominicana-apps -Entry file: flask-python-dominicana-apps/app/__init__.py -Scanned: 2016-10-18 16:12:03.879295 -No vulnerabilities found. - - -shinderuman/python_flask_helloworld -https://github.com/shinderuman/python_flask_helloworld -Entry file: python_flask_helloworld/app.py -Scanned: 2016-10-18 16:12:05.443349 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python_flask_helloworld/lib/python2.7/genericpath.py - -ilyapuchka/PyObjC-FlaskAdmin -https://github.com/ilyapuchka/PyObjC-FlaskAdmin -Entry file: PyObjC-FlaskAdmin/myadmin/__init__.py -Scanned: 2016-10-18 16:12:08.978464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tnebel/minitwit -https://github.com/tnebel/minitwit -Entry file: minitwit/minitwit.py -Scanned: 2016-10-18 16:12:19.840926 -No vulnerabilities found. - - -renn999/PyBlogtle -https://github.com/renn999/PyBlogtle -Entry file: None -Scanned: 2016-10-18 16:12:20.334039 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/renn999/PyBlogtle. - -orangejulius/jlink -https://github.com/orangejulius/jlink -Entry file: jlink/jlink.py -Scanned: 2016-10-18 16:12:23.839526 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sramana/meetup-photos -https://github.com/sramana/meetup-photos -Entry file: meetup-photos/main.py -Scanned: 2016-10-18 16:12:26.349048 -No vulnerabilities found. - - -bezfeng/skinmd-frontend -https://github.com/bezfeng/skinmd-frontend -Entry file: skinmd-frontend/script_server.py -Scanned: 2016-10-18 16:12:26.844829 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DartmouthHackerClub/dnd_search -https://github.com/DartmouthHackerClub/dnd_search -Entry file: dnd_search/app.py -Scanned: 2016-10-18 16:12:30.849026 -No vulnerabilities found. - - -bigsnarfdude/netflix_examples -https://github.com/bigsnarfdude/netflix_examples -Entry file: netflix_examples/flask_hello_world.py -Scanned: 2016-10-18 16:12:31.411531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ekaputra07/poredit -https://github.com/ekaputra07/poredit -Entry file: poredit/poredit/poredit.py -Scanned: 2016-10-18 16:12:34.036226 -No vulnerabilities found. - - -jualvarez/worktracker -https://github.com/jualvarez/worktracker -Entry file: worktracker/worktracker.py -Scanned: 2016-10-18 16:12:35.443665 -Vulnerability 1: -File: worktracker/worktracker.py - > User input at line 146, trigger word "get(": - project = g.db.query(Project).get(id) -Reassigned in: - File: worktracker/worktracker.py - > Line 142: project = None - File: worktracker/worktracker.py - > Line 154: project = Project(request.form['name']) - File: worktracker/worktracker.py - > Line 159: ret_MAYBE_FUNCTION_NAME = render_template('project_show.html',project=project, projects=projects) -File: worktracker/worktracker.py - > reaches line 158, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('%s%d' % (url_for('project_show'), project.id)) - -Vulnerability 2: -File: worktracker/worktracker.py - > User input at line 154, trigger word "form[": - project = Project(request.form['name']) -Reassigned in: - File: worktracker/worktracker.py - > Line 142: project = None - File: worktracker/worktracker.py - > Line 146: project = g.db.query(Project).get(id) - File: worktracker/worktracker.py - > Line 159: ret_MAYBE_FUNCTION_NAME = render_template('project_show.html',project=project, projects=projects) -File: worktracker/worktracker.py - > reaches line 158, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('%s%d' % (url_for('project_show'), project.id)) - -Vulnerability 3: -File: worktracker/worktracker.py - > User input at line 146, trigger word "get(": - project = g.db.query(Project).get(id) -Reassigned in: - File: worktracker/worktracker.py - > Line 142: project = None - File: worktracker/worktracker.py - > Line 154: project = Project(request.form['name']) - File: worktracker/worktracker.py - > Line 159: ret_MAYBE_FUNCTION_NAME = render_template('project_show.html',project=project, projects=projects) -File: worktracker/worktracker.py - > reaches line 158, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect('%s%d' % (url_for('project_show'), project.id)) - -Vulnerability 4: -File: worktracker/worktracker.py - > User input at line 154, trigger word "form[": - project = Project(request.form['name']) -Reassigned in: - File: worktracker/worktracker.py - > Line 142: project = None - File: worktracker/worktracker.py - > Line 146: project = g.db.query(Project).get(id) - File: worktracker/worktracker.py - > Line 159: ret_MAYBE_FUNCTION_NAME = render_template('project_show.html',project=project, projects=projects) -File: worktracker/worktracker.py - > reaches line 158, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect('%s%d' % (url_for('project_show'), project.id)) - - - -kierandarcy/qrimage -https://github.com/kierandarcy/qrimage -Entry file: qrimage/app.py -Scanned: 2016-10-18 16:12:36.786485 -No vulnerabilities found. - - -rochacon/simple-gapps-group-signup -https://github.com/rochacon/simple-gapps-group-signup -Entry file: simple-gapps-group-signup/app.py -Scanned: 2016-10-18 16:12:37.999828 -No vulnerabilities found. - - -Timothee/Passeplat -https://github.com/Timothee/Passeplat -Entry file: Passeplat/passeplat.py -Scanned: 2016-10-18 16:12:39.379104 -No vulnerabilities found. - - -blazarus/Link-Shortener -https://github.com/blazarus/Link-Shortener -Entry file: Link-Shortener/linkshort/__init__.py -Scanned: 2016-10-18 16:12:39.899653 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cenobites/flask-jsonrpc -https://github.com/cenobites/flask-jsonrpc -Entry file: flask-jsonrpc/run.py -Scanned: 2016-10-18 16:12:47.098459 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -insynchq/flask-googlelogin -https://github.com/insynchq/flask-googlelogin -Entry file: flask-googlelogin/example_offline.py -Scanned: 2016-10-18 16:12:50.102423 -No vulnerabilities found. - - -shea256/flask-app-generator -https://github.com/shea256/flask-app-generator -Entry file: flask-app-generator/resources/basic_app/app.py -Scanned: 2016-10-18 16:12:51.547245 -No vulnerabilities found. - - -albertogg/flask-bootstrap-skel -https://github.com/albertogg/flask-bootstrap-skel -Entry file: flask-bootstrap-skel/application/__init__.py -Scanned: 2016-10-18 16:12:53.112621 -No vulnerabilities found. - - -alecthomas/flask_injector -https://github.com/alecthomas/flask_injector -Entry file: flask_injector/flask_injector_tests.py -Scanned: 2016-10-18 16:12:56.602607 -No vulnerabilities found. - - -ema/flask-moresql -https://github.com/ema/flask-moresql -Entry file: flask-moresql/flask_moresql.py -Scanned: 2016-10-18 16:13:00.961224 -No vulnerabilities found. - - -gregorynicholas/flask-gae_blobstore -https://github.com/gregorynicholas/flask-gae_blobstore -Entry file: flask-gae_blobstore/flask_gae_blobstore_tests.py -Scanned: 2016-10-18 16:13:07.035315 -No vulnerabilities found. - - -icecreammatt/flask-empty -https://github.com/icecreammatt/flask-empty -Entry file: flask-empty/app/__init__.py -Scanned: 2016-10-18 16:13:12.113684 -No vulnerabilities found. - - -david-torres/flask-quickstart -https://github.com/david-torres/flask-quickstart -Entry file: flask-quickstart/application/__init__.py -Scanned: 2016-10-18 16:13:16.726491 -No vulnerabilities found. - - -rahulbot/GV-GetToKnow-flask -https://github.com/rahulbot/GV-GetToKnow-flask -Entry file: GV-GetToKnow-flask/gettoknow.py -Scanned: 2016-10-18 16:13:20.651453 -No vulnerabilities found. - - -oturing/flask-br -https://github.com/oturing/flask-br -Entry file: flask-br/examples/flaskr/flaskr.py -Scanned: 2016-10-18 16:13:22.337201 -No vulnerabilities found. - - -ismaild/flaskr-bdd -https://github.com/ismaild/flaskr-bdd -Entry file: flaskr-bdd/flaskr.py -Scanned: 2016-10-18 16:13:23.657899 -No vulnerabilities found. - - -regadas/flask-tornado-websocket -https://github.com/regadas/flask-tornado-websocket -Entry file: flask-tornado-websocket/app/__init__.py -Scanned: 2016-10-18 16:13:24.159602 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lomatus/flask2sae -https://github.com/lomatus/flask2sae -Entry file: flask2sae/1/app/__init__.py -Scanned: 2016-10-18 16:13:25.575572 -No vulnerabilities found. - - -yaniv-aknin/aknin-flask-skeleton -https://github.com/yaniv-aknin/aknin-flask-skeleton -Entry file: aknin-flask-skeleton/application/app.py -Scanned: 2016-10-18 16:13:32.409430 -No vulnerabilities found. - - -marksteve/flask-stathat -https://github.com/marksteve/flask-stathat -Entry file: flask-stathat/example.py -Scanned: 2016-10-18 16:13:33.997645 -No vulnerabilities found. - - -pengfei-xue/openshift-flask-mongdb -https://github.com/pengfei-xue/openshift-flask-mongdb -Entry file: openshift-flask-mongdb/blog/main.py -Scanned: 2016-10-18 16:13:35.700294 -Vulnerability 1: -File: openshift-flask-mongdb/blog/blueprints/apis/views.py - > User input at line 27, trigger word "get(": - term = request.args.get('term', None) -File: openshift-flask-mongdb/blog/blueprints/apis/views.py - > reaches line 33, trigger word "filter(": - result = list(filter(term.lower() in tag.lower(), set(result))) - - - -ncweinhold/flask-knockout-example -https://github.com/ncweinhold/flask-knockout-example -Entry file: flask-knockout-example/app.py -Scanned: 2016-10-18 16:13:36.945401 -No vulnerabilities found. - - -gkoberger/flask-heroku -https://github.com/gkoberger/flask-heroku -Entry file: flask-heroku/app.py -Scanned: 2016-10-18 16:13:38.532169 -No vulnerabilities found. - - -theho/flask-riak-skeleton -https://github.com/theho/flask-riak-skeleton -Entry file: None -Scanned: 2016-10-18 16:13:39.050850 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/theho/flask-riak-skeleton. - -davirtavares/flask-complexform -https://github.com/davirtavares/flask-complexform -Entry file: flask-complexform/testeflask.py -Scanned: 2016-10-18 16:13:44.589000 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lmeunier/flasktodo -https://github.com/lmeunier/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 16:13:48.713633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brab/flaskr -https://github.com/brab/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:13:49.199990 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lqwinters/Flaskr -https://github.com/lqwinters/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-18 16:13:52.176015 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thermosilla/flaskapp -https://github.com/thermosilla/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-18 16:13:55.657697 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marcus-darden/flask1 -https://github.com/marcus-darden/flask1 -Entry file: flask1/app.py -Scanned: 2016-10-18 16:14:04.387501 -No vulnerabilities found. - - -Alir3z4/flask-microblog-sqlalchemy -https://github.com/Alir3z4/flask-microblog-sqlalchemy -Entry file: flask-microblog-sqlalchemy/app/__init__.py -Scanned: 2016-10-18 16:14:07.846647 -No vulnerabilities found. - - -seansawyer/foh -https://github.com/seansawyer/foh -Entry file: foh/foh/__init__.py -Scanned: 2016-10-18 16:14:11.212221 -No vulnerabilities found. - - -feik/flask-blog -https://github.com/feik/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:14:16.251004 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -randallm/whatsthehomework_flask -https://github.com/randallm/whatsthehomework_flask -Entry file: whatsthehomework_flask/wth/__init__.py -Scanned: 2016-10-18 16:14:18.631160 -No vulnerabilities found. - - -robottaway/flask_websocket -https://github.com/robottaway/flask_websocket -Entry file: flask_websocket/app/__init__.py -Scanned: 2016-10-18 16:14:22.366753 -No vulnerabilities found. - - -vladke/flask-blog -https://github.com/vladke/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:14:22.877417 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -protunt/flask-blog -https://github.com/protunt/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:14:24.872266 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -makotoworld/flask-example -https://github.com/makotoworld/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-18 16:14:26.379709 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikepea/flask_playing -https://github.com/mikepea/flask_playing -Entry file: None -Scanned: 2016-10-18 16:14:27.899572 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mikepea/flask_playing. - -feigner/flask-testbed -https://github.com/feigner/flask-testbed -Entry file: flask-testbed/test.py -Scanned: 2016-10-18 16:14:29.394935 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smileyteresa/flask-blog -https://github.com/smileyteresa/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:14:30.949665 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -naot-said/test-flask -https://github.com/naot-said/test-flask -Entry file: test-flask/hello.py -Scanned: 2016-10-18 16:14:34.307819 -No vulnerabilities found. - - -shabda/learning_flask -https://github.com/shabda/learning_flask -Entry file: learning_flask/flaskr/flaskr.py -Scanned: 2016-10-18 16:14:35.522765 -No vulnerabilities found. - - -RainCT/flask-template-with-social -https://github.com/RainCT/flask-template-with-social -Entry file: flask-template-with-social/webapp/__init__.py -Scanned: 2016-10-18 16:14:40.037302 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rdmurphy/flask-reservoir-jsonp-wrapper -https://github.com/rdmurphy/flask-reservoir-jsonp-wrapper -Entry file: flask-reservoir-jsonp-wrapper/grabber.py -Scanned: 2016-10-18 16:14:48.728493 -No vulnerabilities found. - - -gagansaini/example-python-flask -https://github.com/gagansaini/example-python-flask -Entry file: example-python-flask/app.py -Scanned: 2016-10-18 16:14:50.058772 -No vulnerabilities found. - - -ncweinhold/flask-code-sharing -https://github.com/ncweinhold/flask-code-sharing -Entry file: flask-code-sharing/pasteapp/__init__.py -Scanned: 2016-10-18 16:14:51.524674 -No vulnerabilities found. - - -iolab12/flask_demo_2 -https://github.com/iolab12/flask_demo_2 -Entry file: flask_demo_2/polls.py -Scanned: 2016-10-18 16:14:53.438066 -No vulnerabilities found. - - -plaes/wirexfers-flask-demo -https://github.com/plaes/wirexfers-flask-demo -Entry file: wirexfers-flask-demo/wirexfers_flask_demo/__init__.py -Scanned: 2016-10-18 16:14:55.988570 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -yeojz/skeleton-bottle-flask -https://github.com/yeojz/skeleton-bottle-flask -Entry file: skeleton-bottle-flask/thirdparty/flask/sessions.py -Scanned: 2016-10-18 16:15:00.517926 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -drawcode/flask-template-basic -https://github.com/drawcode/flask-template-basic -Entry file: flask-template-basic/app/__init__.py -Scanned: 2016-10-18 16:15:04.771466 -Vulnerability 1: -File: flask-template-basic/app/users/views.py - > User input at line 33, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-template-basic/app/users/views.py - > Line 38: session['user_id'] = user.id -File: flask-template-basic/app/users/views.py - > reaches line 39, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -ardinor/yamazumi -https://github.com/ardinor/yamazumi -Entry file: yamazumi/yamazumi/__init__.py -Scanned: 2016-10-18 16:15:08.062712 -No vulnerabilities found. - - -nanorepublica/secret-santa -https://github.com/nanorepublica/secret-santa -Entry file: secret-santa/secret_santa.py -Scanned: 2016-10-18 16:15:10.604940 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seme0021/flaskr-reader -https://github.com/seme0021/flaskr-reader -Entry file: flaskr-reader/app.py -Scanned: 2016-10-18 16:15:12.194341 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vijaym123/FaceDetection-SimpleCVandFlask -https://github.com/vijaym123/FaceDetection-SimpleCVandFlask -Entry file: FaceDetection-SimpleCVandFlask/upload.py -Scanned: 2016-10-18 16:15:18.971395 -No vulnerabilities found. - - -ryanc/mmmpaste -https://github.com/ryanc/mmmpaste -Entry file: mmmpaste/mmmpaste/__init__.py -Scanned: 2016-10-18 16:15:20.478046 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rowandh/pytorrent -https://github.com/rowandh/pytorrent -Entry file: pytorrent/bt/Tracker.py -Scanned: 2016-10-18 16:15:24.208517 -No vulnerabilities found. - - -gatesphere/ptah -https://github.com/gatesphere/ptah -Entry file: ptah/sitebuilder.py -Scanned: 2016-10-18 16:15:26.035716 -No vulnerabilities found. - - -ericevenchick/site -https://github.com/ericevenchick/site -Entry file: site/site.py -Scanned: 2016-10-18 16:15:29.338951 -No vulnerabilities found. - - -wantsomechocolate/PythonWebsite -https://github.com/wantsomechocolate/PythonWebsite -Entry file: PythonWebsite/app.py -Scanned: 2016-10-18 16:15:29.851809 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jineshpaloor/Mysite -https://github.com/jineshpaloor/Mysite -Entry file: Mysite/home.py -Scanned: 2016-10-18 16:15:32.870079 -No vulnerabilities found. - - -schinken/py-powerctrl -https://github.com/schinken/py-powerctrl -Entry file: py-powerctrl/main.py -Scanned: 2016-10-18 16:15:35.606210 -No vulnerabilities found. - - -rudolpho/kazapp -https://github.com/rudolpho/kazapp -Entry file: kazapp/kazapp.py -Scanned: 2016-10-18 16:15:37.941838 -No vulnerabilities found. - - -daleobrien/bootflask -https://github.com/daleobrien/bootflask -Entry file: bootflask/main.py -Scanned: 2016-10-18 16:15:39.497908 -No vulnerabilities found. - - -nerdguy/httpfirmata -https://github.com/nerdguy/httpfirmata -Entry file: httpfirmata/httpfirmata/server.py -Scanned: 2016-10-18 16:15:40.006031 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -anusharanganathan/diskMonitor -https://github.com/anusharanganathan/diskMonitor -Entry file: diskMonitor/webui.py -Scanned: 2016-10-18 16:15:41.561343 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leibatt/forms -https://github.com/leibatt/forms -Entry file: forms/form_serv.py -Scanned: 2016-10-18 16:15:42.071423 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tjstum/isawyou-too -https://github.com/tjstum/isawyou-too -Entry file: isawyou-too/isy/__init__.py -Scanned: 2016-10-18 16:15:48.059661 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Foxboron/FoxBlog -https://github.com/Foxboron/FoxBlog -Entry file: FoxBlog/app/__init__.py -Scanned: 2016-10-18 16:15:49.559788 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jmhobbs/batsdboard -https://github.com/jmhobbs/batsdboard -Entry file: batsdboard/src/batsdboard_server.py -Scanned: 2016-10-18 16:15:51.799598 -No vulnerabilities found. - - -LarryEitel/pyfem -https://github.com/LarryEitel/pyfem -Entry file: pyfem/pyfem/app.py -Scanned: 2016-10-18 16:15:52.311964 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hciudad/webhook_listener -https://github.com/hciudad/webhook_listener -Entry file: webhook_listener/app.py -Scanned: 2016-10-18 16:15:52.825429 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbit/uwsgicc -https://github.com/unbit/uwsgicc -Entry file: uwsgicc/uwsgicc.py -Scanned: 2016-10-18 16:15:57.378662 -No vulnerabilities found. - - -sagnew/secret_santa -https://github.com/sagnew/secret_santa -Entry file: secret_santa/app.py -Scanned: 2016-10-18 16:16:04.374101 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vc4a/vc4a-python-example -https://github.com/vc4a/vc4a-python-example -Entry file: vc4a-python-example/app.py -Scanned: 2016-10-18 16:16:11.354004 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lpolepeddi/intro-to-flask -https://github.com/lpolepeddi/intro-to-flask -Entry file: intro-to-flask/intro_to_flask/__init__.py -Scanned: 2016-10-18 16:16:18.168933 -No vulnerabilities found. - - -miguelgrinberg/microblog -https://github.com/miguelgrinberg/microblog -Entry file: None -Scanned: 2016-10-18 16:16:18.704269 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -saltycrane/flask-jquery-ajax-example -https://github.com/saltycrane/flask-jquery-ajax-example -Entry file: None -Scanned: 2016-10-18 16:16:21.197337 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example. - -jdiez17/flask-paypal -https://github.com/jdiez17/flask-paypal -Entry file: flask-paypal/app.py -Scanned: 2016-10-18 16:16:22.702293 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-18 16:16:25.076816 -No vulnerabilities found. - - -tarbell-project/tarbell -https://github.com/tarbell-project/tarbell -Entry file: tarbell/tarbell/app.py -Scanned: 2016-10-18 16:16:25.582091 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -trtg/flask_assets_tutorial -https://github.com/trtg/flask_assets_tutorial -Entry file: flask_assets_tutorial/example/__init__.py -Scanned: 2016-10-18 16:16:27.120574 -No vulnerabilities found. - - -allanlei/flask-email -https://github.com/allanlei/flask-email -Entry file: flask-email/tests/__init__.py -Scanned: 2016-10-18 16:16:28.662498 -No vulnerabilities found. - - -maxcnunes/flaskgaedemo -https://github.com/maxcnunes/flaskgaedemo -Entry file: flaskgaedemo/main.py -Scanned: 2016-10-18 16:16:35.172319 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -domenicosolazzo/flask_examples -https://github.com/domenicosolazzo/flask_examples -Entry file: flask_examples/logger_example.py -Scanned: 2016-10-18 16:16:38.490560 -No vulnerabilities found. - - -akostyuk/flask-dbmigrate -https://github.com/akostyuk/flask-dbmigrate -Entry file: flask-dbmigrate/tests.py -Scanned: 2016-10-18 16:16:40.460816 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -50onRed/phillypug-flask -https://github.com/50onRed/phillypug-flask -Entry file: phillypug-flask/phillypug/app.py -Scanned: 2016-10-18 16:16:42.808134 -No vulnerabilities found. - - -booo/flask-gtfs -https://github.com/booo/flask-gtfs -Entry file: None -Scanned: 2016-10-18 16:16:45.817896 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/booo/flask-gtfs. - -Blender3D/Flask-LESS -https://github.com/Blender3D/Flask-LESS -Entry file: Flask-LESS/flask_less.py -Scanned: 2016-10-18 16:16:49.107126 -No vulnerabilities found. - - -sagarrakshe/flaskr -https://github.com/sagarrakshe/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:16:49.626747 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hex/flaskr -https://github.com/hex/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:16:51.164610 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -faruken/flask-web.py-jvm -https://github.com/faruken/flask-web.py-jvm -Entry file: None -Scanned: 2016-10-18 16:16:53.208001 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-18 16:16:56.727803 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eddawong/FlaskStudy -https://github.com/eddawong/FlaskStudy -Entry file: FlaskStudy/main.py -Scanned: 2016-10-18 16:17:01.992949 -No vulnerabilities found. - - -nerevu/prometheus -https://github.com/nerevu/prometheus -Entry file: prometheus/app/__init__.py -Scanned: 2016-10-18 16:17:04.494769 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -floweb/liensdujour -https://github.com/floweb/liensdujour -Entry file: liensdujour/liensdujour/liensdujour.py -Scanned: 2016-10-18 16:17:07.983351 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -becdot/adventures-in-text -https://github.com/becdot/adventures-in-text -Entry file: adventures-in-text/db_methods.py -Scanned: 2016-10-18 16:17:11.480645 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dirn/Flask-Simon -https://github.com/dirn/Flask-Simon -Entry file: Flask-Simon/examples/flaskr/flaskr.py -Scanned: 2016-10-18 16:17:14.016338 -No vulnerabilities found. - - -parryjacob/flask-boilerplate -https://github.com/parryjacob/flask-boilerplate -Entry file: flask-boilerplate/project/__init__.py -Scanned: 2016-10-18 16:17:18.414256 -No vulnerabilities found. - - -scottdnz/flask_skeleton -https://github.com/scottdnz/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-18 16:17:18.911960 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -protunt/flask-blog -https://github.com/protunt/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:17:21.429317 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -jpercent/flask-control -https://github.com/jpercent/flask-control -Entry file: flask-control/example.py -Scanned: 2016-10-18 16:17:22.943682 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -caub/flask-geo -https://github.com/caub/flask-geo -Entry file: flask-geo/myMap.py -Scanned: 2016-10-18 16:17:24.474027 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Ceasar/pocket_flask -https://github.com/Ceasar/pocket_flask -Entry file: pocket_flask/app/__init__.py -Scanned: 2016-10-18 16:17:26.995735 -No vulnerabilities found. - - -rhyselsmore/flask-modus -https://github.com/rhyselsmore/flask-modus -Entry file: flask-modus/test_flask_modus.py -Scanned: 2016-10-18 16:17:28.319273 -No vulnerabilities found. - - -pavlenko-volodymyr/flask-study -https://github.com/pavlenko-volodymyr/flask-study -Entry file: flask-study/src/app/__init__.py -Scanned: 2016-10-18 16:17:29.557643 -No vulnerabilities found. - - -masayang/flask_dev -https://github.com/masayang/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-18 16:17:30.158921 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -slizadel/flask-gitrcv -https://github.com/slizadel/flask-gitrcv -Entry file: flask-gitrcv/flask-gitrcv/gitrcv.py -Scanned: 2016-10-18 16:17:32.098070 -No vulnerabilities found. - - -apjd/flask-heroku -https://github.com/apjd/flask-heroku -Entry file: flask-heroku/flasky.py -Scanned: 2016-10-18 16:17:33.485635 -No vulnerabilities found. - - -scardine/flask-locale -https://github.com/scardine/flask-locale -Entry file: flask-locale/tests/__init__.py -Scanned: 2016-10-18 16:17:35.843681 -No vulnerabilities found. - - -CMGS/poll -https://github.com/CMGS/poll -Entry file: poll/app.py -Scanned: 2016-10-18 16:17:39.617916 -No vulnerabilities found. - - -hoh/perfume -https://github.com/hoh/perfume -Entry file: perfume/perfume/__init__.py -Scanned: 2016-10-18 16:17:41.319841 -No vulnerabilities found. - - -alph486/SimpleFlaskAPI -https://github.com/alph486/SimpleFlaskAPI -Entry file: SimpleFlaskAPI/app.py -Scanned: 2016-10-18 16:17:41.842604 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunilJacob/Paint-app-using-Flask -https://github.com/JunilJacob/Paint-app-using-Flask -Entry file: Paint-app-using-Flask/hello.py -Scanned: 2016-10-18 16:17:43.053696 -Vulnerability 1: -File: Paint-app-using-Flask/hello.py - > User input at line 12, trigger word "form[": - name = request.form['pname'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 16: iname = (name) -File: Paint-app-using-Flask/hello.py - > reaches line 18, trigger word "execute(": - c.execute('DELETE FROM Image WHERE file=?', iname) - -Vulnerability 2: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 19, trigger word "execute(": - c.execute('INSERT INTO Image VALUES (?,?)', image) - -Vulnerability 3: -File: Paint-app-using-Flask/hello.py - > User input at line 12, trigger word "form[": - name = request.form['pname'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 16: iname = (name) -File: Paint-app-using-Flask/hello.py - > reaches line 19, trigger word "execute(": - c.execute('INSERT INTO Image VALUES (?,?)', image) - -Vulnerability 4: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 36, trigger word "render_template(": - resp = Response('' + render_template('paint.html'),status=200, mimetype='html') - - - -dimfox/flask-mega-tutorial -https://github.com/dimfox/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-18 16:17:43.582619 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liuxuecheng/python_flask_guestbook -https://github.com/liuxuecheng/python_flask_guestbook -Entry file: python_flask_guestbook/main.py -Scanned: 2016-10-18 16:17:46.855391 -No vulnerabilities found. - - -callahad/temp-flask-persona-demo -https://github.com/callahad/temp-flask-persona-demo -Entry file: temp-flask-persona-demo/example.py -Scanned: 2016-10-18 16:17:49.847244 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshsee/GAE-flask-cms -https://github.com/joshsee/GAE-flask-cms -Entry file: GAE-flask-cms/flask/sessions.py -Scanned: 2016-10-18 16:17:51.371502 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshkurz/exi -https://github.com/joshkurz/exi -Entry file: exi/exi/tests/security/test_app/__init__.py -Scanned: 2016-10-18 16:17:54.062552 -No vulnerabilities found. - - -marsella/andrea -https://github.com/marsella/andrea -Entry file: andrea/init.py -Scanned: 2016-10-18 16:17:57.112825 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py - -ffiiccuuss/torouterui -https://github.com/ffiiccuuss/torouterui -Entry file: torouterui/torouterui/__init__.py -Scanned: 2016-10-18 16:18:01.611390 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dogrdon/txtr -https://github.com/dogrdon/txtr -Entry file: txtr/txtr.py -Scanned: 2016-10-18 16:18:05.112849 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -booo/baedproject -https://github.com/booo/baedproject -Entry file: baedproject/app.py -Scanned: 2016-10-18 16:18:09.395135 -No vulnerabilities found. - - -embr/multithon -https://github.com/embr/multithon -Entry file: multithon/multithon.py -Scanned: 2016-10-18 16:18:12.956431 -No vulnerabilities found. - - -thoughtnirvana/redux -https://github.com/thoughtnirvana/redux -Entry file: redux/main.py -Scanned: 2016-10-18 16:18:13.486816 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -skinofstars/monkey -https://github.com/skinofstars/monkey -Entry file: monkey/app.py -Scanned: 2016-10-18 16:18:18.762334 -No vulnerabilities found. - - -zhoutuo/dota2bbq -https://github.com/zhoutuo/dota2bbq -Entry file: dota2bbq/wsgi.py -Scanned: 2016-10-18 16:18:19.358972 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattoufoutu/TrendnetStalker -https://github.com/mattoufoutu/TrendnetStalker -Entry file: TrendnetStalker/TrendnetStalker/__init__.py -Scanned: 2016-10-18 16:18:21.860933 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kalimatas/herokuflask -https://github.com/kalimatas/herokuflask -Entry file: herokuflask/app.py -Scanned: 2016-10-18 16:18:24.105817 -No vulnerabilities found. - - -norbert/helloflask -https://github.com/norbert/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-18 16:18:24.614504 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -perjo927/Portfolio -https://github.com/perjo927/Portfolio -Entry file: Portfolio/server.py -Scanned: 2016-10-18 16:18:28.182368 -No vulnerabilities found. - - -cyrilaub/myMap_python -https://github.com/cyrilaub/myMap_python -Entry file: myMap_python/myMap.py -Scanned: 2016-10-18 16:18:28.691035 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sburns/switchboard -https://github.com/sburns/switchboard -Entry file: switchboard/sample_app.py -Scanned: 2016-10-18 16:18:29.242948 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pusungwi/lobotomizer -https://github.com/Pusungwi/lobotomizer -Entry file: None -Scanned: 2016-10-18 16:18:30.758208 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pusungwi/lobotomizer. - -ahawker/jpool -https://github.com/ahawker/jpool -Entry file: None -Scanned: 2016-10-18 16:18:31.339446 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool. - -takosuke/pizzasuicideclub -https://github.com/takosuke/pizzasuicideclub -Entry file: pizzasuicideclub/psc_app/__init__.py -Scanned: 2016-10-18 16:18:33.048389 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -MaxPresman/tempymail -https://github.com/MaxPresman/tempymail -Entry file: tempymail/flask_frontend.py -Scanned: 2016-10-18 16:18:35.565681 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bogdan-kulynych/cloudlectures -https://github.com/bogdan-kulynych/cloudlectures -Entry file: cloudlectures/flask/sessions.py -Scanned: 2016-10-18 16:18:37.112243 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neilduncan/FlickrPlaceholders -https://github.com/neilduncan/FlickrPlaceholders -Entry file: FlickrPlaceholders/main.py -Scanned: 2016-10-18 16:18:41.965360 -No vulnerabilities found. - - -sysr-q/phi -https://github.com/sysr-q/phi -Entry file: phi/phi/phi.py -Scanned: 2016-10-18 16:18:43.913562 -No vulnerabilities found. - - -msergdeez/vwcontrol -https://github.com/msergdeez/vwcontrol -Entry file: vwcontrol/vwcontrol.py -Scanned: 2016-10-18 16:18:44.503004 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DanielleSucher/BookQueue -https://github.com/DanielleSucher/BookQueue -Entry file: BookQueue/app.py -Scanned: 2016-10-18 16:18:45.898213 -Vulnerability 1: -File: BookQueue/app.py - > User input at line 145, trigger word "form[": - from_email = request.form['sender'].lower() -File: BookQueue/app.py - > reaches line 146, trigger word "filter(": - query = User.query.filter(User.email == from_email) - - - -amaterasu-/placeholder -https://github.com/amaterasu-/placeholder -Entry file: placeholder/image.py -Scanned: 2016-10-18 16:18:47.110824 -No vulnerabilities found. - - -mjhea0/flask-intro -https://github.com/mjhea0/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-18 16:18:51.672900 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikeboers/Flask-Images -https://github.com/mikeboers/Flask-Images -Entry file: Flask-Images/tests/__init__.py -Scanned: 2016-10-18 16:18:54.391275 -No vulnerabilities found. - - -bkabrda/flask-whooshee -https://github.com/bkabrda/flask-whooshee -Entry file: flask-whooshee/test.py -Scanned: 2016-10-18 16:18:55.926937 -No vulnerabilities found. - - -koon-kai/kiblog -https://github.com/koon-kai/kiblog -Entry file: kiblog/app.py -Scanned: 2016-10-18 16:19:01.929685 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -deepgully/me -https://github.com/deepgully/me -Entry file: me/settings.py -Scanned: 2016-10-18 16:19:05.520993 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -berlotto/flask-app-template -https://github.com/berlotto/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-18 16:19:09.023723 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -corydolphin/flask-jsonpify -https://github.com/corydolphin/flask-jsonpify -Entry file: flask-jsonpify/test.py -Scanned: 2016-10-18 16:19:13.417065 -No vulnerabilities found. - - -mickey06/Flask-principal-example -https://github.com/mickey06/Flask-principal-example -Entry file: Flask-principal-example/FPrincipals.py -Scanned: 2016-10-18 16:19:14.767079 -No vulnerabilities found. - - -crazygit/flask -https://github.com/crazygit/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 16:19:20.446700 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -joelrojo/flask -https://github.com/joelrojo/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 16:19:21.747331 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -wingu/flask_filters -https://github.com/wingu/flask_filters -Entry file: flask_filters/test_flask_filters.py -Scanned: 2016-10-18 16:19:26.144836 -No vulnerabilities found. - - -seanrose/box-arcade -https://github.com/seanrose/box-arcade -Entry file: box-arcade/app/__init__.py -Scanned: 2016-10-18 16:19:26.651875 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -techniq/flask-wdb -https://github.com/techniq/flask-wdb -Entry file: flask-wdb/example.py -Scanned: 2016-10-18 16:19:29.880874 -No vulnerabilities found. - - -eadmundo/flask-static-blog -https://github.com/eadmundo/flask-static-blog -Entry file: flask-static-blog/app/__init__.py -Scanned: 2016-10-18 16:19:32.369309 -No vulnerabilities found. - - -BuongiornoMIP/Reding -https://github.com/BuongiornoMIP/Reding -Entry file: Reding/reding/app.py -Scanned: 2016-10-18 16:19:34.361361 -No vulnerabilities found. - - -mphuie/flask_base -https://github.com/mphuie/flask_base -Entry file: flask_base/myapp/__init__.py -Scanned: 2016-10-18 16:19:36.246673 -No vulnerabilities found. - - -colwilson/flask-lazyapi -https://github.com/colwilson/flask-lazyapi -Entry file: flask-lazyapi/demo_server.py -Scanned: 2016-10-18 16:19:36.754794 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asgoel/Merge-flask -https://github.com/asgoel/Merge-flask -Entry file: Merge-flask/app.py -Scanned: 2016-10-18 16:19:37.266357 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xiechao06/Flask-DataBrowser -https://github.com/xiechao06/Flask-DataBrowser -Entry file: Flask-DataBrowser/flask_databrowser/test/basetest.py -Scanned: 2016-10-18 16:19:40.798881 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajuna/car-registration -https://github.com/ajuna/car-registration -Entry file: None -Scanned: 2016-10-18 16:19:41.300718 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ajuna/car-registration. - -gregimba/Vodka -https://github.com/gregimba/Vodka -Entry file: Vodka/app.py -Scanned: 2016-10-18 16:19:44.018506 -No vulnerabilities found. - - -corydolphin/flask-olinauth -https://github.com/corydolphin/flask-olinauth -Entry file: flask-olinauth/example.py -Scanned: 2016-10-18 16:19:46.864468 -No vulnerabilities found. - - -theho/flask-wsgi -https://github.com/theho/flask-wsgi -Entry file: flask-wsgi/wsgi.py -Scanned: 2016-10-18 16:19:48.107877 -No vulnerabilities found. - - -0atman/flask-basic -https://github.com/0atman/flask-basic -Entry file: flask-basic/flask-basic.py -Scanned: 2016-10-18 16:19:50.853916 -No vulnerabilities found. - - -adityaathalye/flaskr -https://github.com/adityaathalye/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:19:57.773940 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danielestevez/flasktutorial -https://github.com/danielestevez/flasktutorial -Entry file: None -Scanned: 2016-10-18 16:20:05.754106 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -knowshan/flaskey -https://github.com/knowshan/flaskey -Entry file: flaskey/app/__init__.py -Scanned: 2016-10-18 16:20:09.247213 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pityonline/flaskr -https://github.com/pityonline/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:20:12.756137 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyr/flaskapp -https://github.com/andyr/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-18 16:20:14.263223 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -clmns/flasktest -https://github.com/clmns/flasktest -Entry file: flasktest/nachh/app.py -Scanned: 2016-10-18 16:20:19.637466 -No vulnerabilities found. - - -zfdang/memcached-in-openshift -https://github.com/zfdang/memcached-in-openshift -Entry file: memcached-in-openshift/wsgi/main.py -Scanned: 2016-10-18 16:20:22.640972 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Masagin/FlaskCelery -https://github.com/Masagin/FlaskCelery -Entry file: FlaskCelery/flask.py -Scanned: 2016-10-18 16:20:24.144084 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ConceptPending/flaskTemplate -https://github.com/ConceptPending/flaskTemplate -Entry file: flaskTemplate/server.py -Scanned: 2016-10-18 16:20:27.629488 -No vulnerabilities found. - - -garethpaul/flask-sample -https://github.com/garethpaul/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-18 16:20:28.135740 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabeesh/Studentapp-Flask -https://github.com/prabeesh/Studentapp-Flask -Entry file: Studentapp-Flask/test.py -Scanned: 2016-10-18 16:20:29.666027 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AlexMost/Flask-starter -https://github.com/AlexMost/Flask-starter -Entry file: Flask-starter/app.py -Scanned: 2016-10-18 16:20:33.926150 -No vulnerabilities found. - - -denz/flask_introspect -https://github.com/denz/flask_introspect -Entry file: flask_introspect/test/test_blueprint.py -Scanned: 2016-10-18 16:20:36.334986 -No vulnerabilities found. - - -EvilDmitri/flask-mikroblog -https://github.com/EvilDmitri/flask-mikroblog -Entry file: flask-mikroblog/app/__init__.py -Scanned: 2016-10-18 16:20:37.855028 -No vulnerabilities found. - - -ekfriis/flask-mbtiles -https://github.com/ekfriis/flask-mbtiles -Entry file: flask-mbtiles/mbtileserver.py -Scanned: 2016-10-18 16:20:39.095395 -No vulnerabilities found. - - -hyaticua/flask-blog -https://github.com/hyaticua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:20:41.621182 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -maxcnunes/flask_bravi -https://github.com/maxcnunes/flask_bravi -Entry file: flask_bravi/braviapp/__init__.py -Scanned: 2016-10-18 16:20:43.138048 -No vulnerabilities found. - - -naveenpremchand02/flask_url -https://github.com/naveenpremchand02/flask_url -Entry file: flask_url/url.py -Scanned: 2016-10-18 16:20:46.601808 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhemao/flask_demo -https://github.com/zhemao/flask_demo -Entry file: flask_demo/application.py -Scanned: 2016-10-18 16:20:51.359881 -No vulnerabilities found. - - -dproni/flask_test -https://github.com/dproni/flask_test -Entry file: flask_test/flask_test.py -Scanned: 2016-10-18 16:20:52.579234 -No vulnerabilities found. - - -thearchduke/flask-boiler -https://github.com/thearchduke/flask-boiler -Entry file: None -Scanned: 2016-10-18 16:20:53.092852 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -StefanKjartansson/bower-flask -https://github.com/StefanKjartansson/bower-flask -Entry file: bower-flask/server.py -Scanned: 2016-10-18 16:20:55.328285 -No vulnerabilities found. - - -scardine/flask-locale -https://github.com/scardine/flask-locale -Entry file: flask-locale/tests/__init__.py -Scanned: 2016-10-18 16:20:56.640601 -No vulnerabilities found. - - -tanayseven/Voix -https://github.com/tanayseven/Voix -Entry file: None -Scanned: 2016-10-18 16:20:58.175215 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gatesphere/flaskr-flask-tutorial -https://github.com/gatesphere/flaskr-flask-tutorial -Entry file: flaskr-flask-tutorial/flaskr/flaskr.py -Scanned: 2016-10-18 16:21:03.413798 -No vulnerabilities found. - - -cpdean/flask-oauth-tutorial -https://github.com/cpdean/flask-oauth-tutorial -Entry file: flask-oauth-tutorial/flaskr.py -Scanned: 2016-10-18 16:21:06.685233 -No vulnerabilities found. - - -xiechao06/Flask-NavBar -https://github.com/xiechao06/Flask-NavBar -Entry file: Flask-NavBar/flask_nav_bar.py -Scanned: 2016-10-18 16:21:10.222414 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SalemHarrache-Archive/flask_chat_eventsource -https://github.com/SalemHarrache-Archive/flask_chat_eventsource -Entry file: flask_chat_eventsource/server.py -Scanned: 2016-10-18 16:21:13.729875 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nsfyn55/flask-mega-tutorial -https://github.com/nsfyn55/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-18 16:21:15.261546 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -callahad/temp-flask-persona-demo -https://github.com/callahad/temp-flask-persona-demo -Entry file: temp-flask-persona-demo/example.py -Scanned: 2016-10-18 16:21:19.787562 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kishorekdty/paint_using_flask -https://github.com/kishorekdty/paint_using_flask -Entry file: None -Scanned: 2016-10-18 16:21:21.307052 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kishorekdty/paint_using_flask. - -bazerk/baz-flask-base -https://github.com/bazerk/baz-flask-base -Entry file: baz-flask-base/app/app.py -Scanned: 2016-10-18 16:21:23.975325 -Vulnerability 1: -File: baz-flask-base/app/frontend/views.py - > User input at line 48, trigger word "get(": - form = LoginForm(login=request.args.get('login', None), next=request.args.get('next', None)) -Reassigned in: - File: baz-flask-base/app/frontend/views.py - > Line 52: user = User.authenticate(form.login.data, form.password.data, bcrypt.check_password_hash) - File: baz-flask-base/app/frontend/views.py - > Line 57: session['user_id'] = user.id - File: baz-flask-base/app/frontend/views.py - > Line 65: ret_MAYBE_FUNCTION_NAME = render_template('frontend/login.html',form=form) -File: baz-flask-base/app/frontend/views.py - > reaches line 61, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('') - -Vulnerability 2: -File: baz-flask-base/app/frontend/views.py - > User input at line 52, trigger word ".data": - user = User.authenticate(form.login.data, form.password.data, bcrypt.check_password_hash) -Reassigned in: - File: baz-flask-base/app/frontend/views.py - > Line 57: session['user_id'] = user.id -File: baz-flask-base/app/frontend/views.py - > reaches line 61, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('') - - - -ryanolson/flask-couchdb-schematics -https://github.com/ryanolson/flask-couchdb-schematics -Entry file: flask-couchdb-schematics/example/guestbook.py -Scanned: 2016-10-18 16:21:25.436122 -No vulnerabilities found. - - -pouyan-ghasemi/flask-sql-cms -https://github.com/pouyan-ghasemi/flask-sql-cms -Entry file: flask-sql-cms/app.py -Scanned: 2016-10-18 16:21:25.965032 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshsee/GAE-flask-cms -https://github.com/joshsee/GAE-flask-cms -Entry file: GAE-flask-cms/flask/sessions.py -Scanned: 2016-10-18 16:21:28.485031 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rasheedh/Heroku-Paint-Using-Flask -https://github.com/rasheedh/Heroku-Paint-Using-Flask -Entry file: None -Scanned: 2016-10-18 16:21:30.025124 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Heroku-Paint-Using-Flask. - -Andrey-Khobnya/flask-sessions-mongo -https://github.com/Andrey-Khobnya/flask-sessions-mongo -Entry file: flask-sessions-mongo/flask-sessions-mongo/examples/loginsession.py -Scanned: 2016-10-18 16:21:32.881739 -No vulnerabilities found. - - -rodreegez/flask-twitter-auth -https://github.com/rodreegez/flask-twitter-auth -Entry file: None -Scanned: 2016-10-18 16:21:33.887102 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rodreegez/flask-twitter-auth. - -texuf/myflaskproject -https://github.com/texuf/myflaskproject -Entry file: myflaskproject/hello.py -Scanned: 2016-10-18 16:21:37.141513 -No vulnerabilities found. - - -kshitizrimal/flaskr-modified -https://github.com/kshitizrimal/flaskr-modified -Entry file: flaskr-modified/flaskr.py -Scanned: 2016-10-18 16:21:37.711198 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sreekanthkaralmanna/heroku-paint-app-using-flask -https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask -Entry file: None -Scanned: 2016-10-18 16:21:42.220576 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask. - -prasanthkumara/Heroku-Paint-App-Using--Flask -https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask -Entry file: None -Scanned: 2016-10-18 16:21:43.725449 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask. - -pyxze/PyxzeCorpus -https://github.com/pyxze/PyxzeCorpus -Entry file: PyxzeCorpus/corpus.py -Scanned: 2016-10-18 16:21:46.077219 -No vulnerabilities found. - - -mikewallace1979/milk -https://github.com/mikewallace1979/milk -Entry file: milk/milk.py -Scanned: 2016-10-18 16:21:48.417179 -No vulnerabilities found. - - -ariamoraine/kitten-generator -https://github.com/ariamoraine/kitten-generator -Entry file: kitten-generator/flaskhello.py -Scanned: 2016-10-18 16:21:49.659960 -No vulnerabilities found. - - -goonpug/goonpug-stats -https://github.com/goonpug/goonpug-stats -Entry file: goonpug-stats/goonpug/__init__.py -Scanned: 2016-10-18 16:21:52.457329 -No vulnerabilities found. - - -csesoc/bark-core -https://github.com/csesoc/bark-core -Entry file: bark-core/bark/__init__.py -Scanned: 2016-10-18 16:21:52.954977 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crcsmnky/thehotspot -https://github.com/crcsmnky/thehotspot -Entry file: thehotspot/v2/app.py -Scanned: 2016-10-18 16:21:54.543313 -No vulnerabilities found. - - -etscrivner/sovereign-states -https://github.com/etscrivner/sovereign-states -Entry file: sovereign-states/sovereign_states/api.py -Scanned: 2016-10-18 16:21:55.908443 -No vulnerabilities found. - - -croach/cheap-and-scalable-webistes-with-flask-code -https://github.com/croach/cheap-and-scalable-webistes-with-flask-code -Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py -Scanned: 2016-10-18 16:21:57.253828 -No vulnerabilities found. - - -sreedathns/paint-app-using-heroku-and-flask -https://github.com/sreedathns/paint-app-using-heroku-and-flask -Entry file: None -Scanned: 2016-10-18 16:21:58.757540 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreedathns/paint-app-using-heroku-and-flask. - -nesv/cask -https://github.com/nesv/cask -Entry file: None -Scanned: 2016-10-18 16:22:03.262043 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask. - -igrishaev/youtube-python-api-sample -https://github.com/igrishaev/youtube-python-api-sample -Entry file: youtube-python-api-sample/app.py -Scanned: 2016-10-18 16:22:06.819574 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chadgh/chessy -https://github.com/chadgh/chessy -Entry file: None -Scanned: 2016-10-18 16:22:10.328845 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lee212/fg-ws -https://github.com/lee212/fg-ws -Entry file: fg-ws/fgws/ws/FGWSApps.py -Scanned: 2016-10-18 16:22:13.837056 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simplyluke/dothis -https://github.com/simplyluke/dothis -Entry file: dothis/dothis.py -Scanned: 2016-10-18 16:22:20.714449 -No vulnerabilities found. - - -fusic-com/flask-todo -https://github.com/fusic-com/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-18 16:22:23.825412 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kljensen/async-flask-sqlalchemy-example -https://github.com/kljensen/async-flask-sqlalchemy-example -Entry file: async-flask-sqlalchemy-example/server.py -Scanned: 2016-10-18 16:22:25.333376 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fusic-com/flask-webcache -https://github.com/fusic-com/flask-webcache -Entry file: flask-webcache/contrib/sleepycalc/app.py -Scanned: 2016-10-18 16:22:27.703977 -No vulnerabilities found. - - -rehandalal/flask-mobility -https://github.com/rehandalal/flask-mobility -Entry file: flask-mobility/flask_mobility/tests/test_decorators.py -Scanned: 2016-10-18 16:22:30.202871 -Vulnerability 1: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 46, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 48, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 2: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 46, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 51, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'off') - -Vulnerability 3: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 67, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 69, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 4: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 67, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 72, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'off') - -Vulnerability 5: -File: flask-mobility/flask_mobility/tests/test_mobility.py - > User input at line 33, trigger word "get(": - MOBILE_COOKIE = self.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_mobility.py - > reaches line 36, trigger word "set_cookie(": - self.app.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 6: -File: flask-mobility/flask_mobility/tests/test_mobility.py - > User input at line 33, trigger word "get(": - MOBILE_COOKIE = self.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_mobility.py - > reaches line 40, trigger word "set_cookie(": - self.app.set_cookie('localhost', MOBILE_COOKIE, 'off') - - - -kelp404/Flask-GAE -https://github.com/kelp404/Flask-GAE -Entry file: None -Scanned: 2016-10-18 16:22:30.723357 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wbolster/flask-uuid -https://github.com/wbolster/flask-uuid -Entry file: flask-uuid/test_flask_uuid.py -Scanned: 2016-10-18 16:22:34.636804 -No vulnerabilities found. - - -pyr/url-shortener -https://github.com/pyr/url-shortener -Entry file: url-shortener/url_shortener.py -Scanned: 2016-10-18 16:22:36.643893 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danielholmstrom/flask-alchemyview -https://github.com/danielholmstrom/flask-alchemyview -Entry file: flask-alchemyview/tests/test_with_flask_sqlalchemy.py -Scanned: 2016-10-18 16:22:39.629317 -No vulnerabilities found. - - -kommmy/Flask -https://github.com/kommmy/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-18 16:22:40.162491 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DavidWittman/csrgenerator.com -https://github.com/DavidWittman/csrgenerator.com -Entry file: None -Scanned: 2016-10-18 16:22:42.683823 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vovantics/flask-bluebone -https://github.com/vovantics/flask-bluebone -Entry file: flask-bluebone/app/app.py -Scanned: 2016-10-18 16:22:43.234226 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -vmi356/filemanager -https://github.com/vmi356/filemanager -Entry file: filemanager/manager.py -Scanned: 2016-10-18 16:22:43.740932 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaysonsantos/jinja-assets-compressor -https://github.com/jaysonsantos/jinja-assets-compressor -Entry file: jinja-assets-compressor/jac/contrib/flask.py -Scanned: 2016-10-18 16:22:50.357403 -No vulnerabilities found. - - -1000ch/flask-handson -https://github.com/1000ch/flask-handson -Entry file: flask-handson/flaskr/__init__.py -Scanned: 2016-10-18 16:22:51.900996 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajuna/car-registration -https://github.com/ajuna/car-registration -Entry file: None -Scanned: 2016-10-18 16:22:53.399377 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ajuna/car-registration. - -cratejoy/flask-experiment -https://github.com/cratejoy/flask-experiment -Entry file: flask-experiment/test/test.py -Scanned: 2016-10-18 16:22:56.875593 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jishnujagajeeve/Flaskr -https://github.com/jishnujagajeeve/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-18 16:22:59.366994 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rbika/flaskm -https://github.com/rbika/flaskm -Entry file: flaskm/flaskm.py -Scanned: 2016-10-18 16:23:04.820936 -No vulnerabilities found. - - -openfree/flaskr -https://github.com/openfree/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:23:07.322990 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -catfive/flaskr -https://github.com/catfive/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:23:10.818288 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Basher51/Flaskr -https://github.com/Basher51/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-18 16:23:14.320690 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nabetama/flaskr -https://github.com/nabetama/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:23:15.825474 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikedll/flasksqlitedemo -https://github.com/mikedll/flasksqlitedemo -Entry file: flasksqlitedemo/app.py -Scanned: 2016-10-18 16:23:20.334907 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sagnew/Prank-Roulette -https://github.com/sagnew/Prank-Roulette -Entry file: Prank-Roulette/app.py -Scanned: 2016-10-18 16:23:22.851592 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kaste/FlaskDeferredHandler -https://github.com/kaste/FlaskDeferredHandler -Entry file: FlaskDeferredHandler/flask_handler_test.py -Scanned: 2016-10-18 16:23:25.100279 -No vulnerabilities found. - - -adityaathalye/flaskr2 -https://github.com/adityaathalye/flaskr2 -Entry file: flaskr2/app.py -Scanned: 2016-10-18 16:23:26.316286 -No vulnerabilities found. - - -jpscaletti/authcode -https://github.com/jpscaletti/authcode -Entry file: authcode/examples/default/app.py -Scanned: 2016-10-18 16:23:29.762374 -No vulnerabilities found. - - -abulte/flask-arduino-websocket-sqlite -https://github.com/abulte/flask-arduino-websocket-sqlite -Entry file: flask-arduino-websocket-sqlite/app.py -Scanned: 2016-10-18 16:23:32.172421 -No vulnerabilities found. - - -edouardswiac/linkstash-flask -https://github.com/edouardswiac/linkstash-flask -Entry file: linkstash-flask/app.py -Scanned: 2016-10-18 16:23:35.195479 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samgclarke/flask-microblog -https://github.com/samgclarke/flask-microblog -Entry file: flask-microblog/app/__init__.py -Scanned: 2016-10-18 16:23:39.041349 -No vulnerabilities found. - - -GerardoGR/flask-boilerplate -https://github.com/GerardoGR/flask-boilerplate -Entry file: flask-boilerplate/appname/appname/__init__.py -Scanned: 2016-10-18 16:23:41.330761 -No vulnerabilities found. - - -futuregrid/flask_cm -https://github.com/futuregrid/flask_cm -Entry file: flask_cm/examples/forms/app.py -Scanned: 2016-10-18 16:23:44.856228 -No vulnerabilities found. - - -shunyata/flask-helloworld -https://github.com/shunyata/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-18 16:23:46.339245 -No vulnerabilities found. - - -stephen-allison/basic-flask -https://github.com/stephen-allison/basic-flask -Entry file: None -Scanned: 2016-10-18 16:23:46.909875 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/stephen-allison/basic-flask. - -bollwyvl/flask-reloaded -https://github.com/bollwyvl/flask-reloaded -Entry file: None -Scanned: 2016-10-18 16:23:48.487434 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bollwyvl/flask-reloaded. - -mies/flask-heroku -https://github.com/mies/flask-heroku -Entry file: flask-heroku/main.py -Scanned: 2016-10-18 16:23:50.861117 -No vulnerabilities found. - - -mattolsen1/flask_tumblelog -https://github.com/mattolsen1/flask_tumblelog -Entry file: flask_tumblelog/tumblelog/__init__.py -Scanned: 2016-10-18 16:23:53.253534 -No vulnerabilities found. - - -jonomillin/learning-flask -https://github.com/jonomillin/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-18 16:23:53.869964 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kitanata/flask-demo -https://github.com/kitanata/flask-demo -Entry file: None -Scanned: 2016-10-18 16:23:54.432697 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kitanata/flask-demo. - -mozillazg/flask-demo -https://github.com/mozillazg/flask-demo -Entry file: None -Scanned: 2016-10-18 16:23:55.941539 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mozillazg/flask-demo. - -rahulthrissur/Flask_app -https://github.com/rahulthrissur/Flask_app -Entry file: Flask_app/test.py -Scanned: 2016-10-18 16:23:57.460173 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -toastercup/flask-social -https://github.com/toastercup/flask-social -Entry file: flask-social/social/__init__.py -Scanned: 2016-10-18 16:24:00.994204 -No vulnerabilities found. - - -hoest/flask-bardienst -https://github.com/hoest/flask-bardienst -Entry file: flask-bardienst/bardienst/__init__.py -Scanned: 2016-10-18 16:24:08.781385 -No vulnerabilities found. - - -berlotto/hero-flask -https://github.com/berlotto/hero-flask -Entry file: hero-flask/hero/__init__.py -Scanned: 2016-10-18 16:24:12.468339 -No vulnerabilities found. - - -flyingsparx/MongoFlask -https://github.com/flyingsparx/MongoFlask -Entry file: MongoFlask/application.py -Scanned: 2016-10-18 16:24:15.726098 -No vulnerabilities found. - - -DanAlbert/flask-guestbook -https://github.com/DanAlbert/flask-guestbook -Entry file: flask-guestbook/guestbook.py -Scanned: 2016-10-18 16:24:16.948625 -No vulnerabilities found. - - -nthfloor/Flask_learn -https://github.com/nthfloor/Flask_learn -Entry file: Flask_learn/login_system/flskr.py -Scanned: 2016-10-18 16:24:25.709031 -No vulnerabilities found. - - -kirkeby/empty-flask -https://github.com/kirkeby/empty-flask -Entry file: empty-flask/app/app.py -Scanned: 2016-10-18 16:24:26.290078 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rehandalal/buchner -https://github.com/rehandalal/buchner -Entry file: buchner/buchner/project-template/PROJECTMODULE/main.py -Scanned: 2016-10-18 16:24:29.350271 -No vulnerabilities found. - - -vitalk/flask-staticutils -https://github.com/vitalk/flask-staticutils -Entry file: flask-staticutils/tests/test_app/__init__.py -Scanned: 2016-10-18 16:24:30.903327 -No vulnerabilities found. - - -danillosouza/flask-boilerplate -https://github.com/danillosouza/flask-boilerplate -Entry file: flask-boilerplate/app/__init__.py -Scanned: 2016-10-18 16:24:32.972492 -Vulnerability 1: -File: flask-boilerplate/app/users/views.py - > User input at line 36, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-boilerplate/app/users/views.py - > Line 41: session['user_id'] = user.id -File: flask-boilerplate/app/users/views.py - > reaches line 42, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -dogrdon/flask-map -https://github.com/dogrdon/flask-map -Entry file: None -Scanned: 2016-10-18 16:24:33.518581 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chiwong/flask_quickstart -https://github.com/chiwong/flask_quickstart -Entry file: flask_quickstart/hello.py -Scanned: 2016-10-18 16:24:34.186934 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_quickstart/venv_hello/lib/python2.6/genericpath.py - -archieyang/flask_app -https://github.com/archieyang/flask_app -Entry file: None -Scanned: 2016-10-18 16:24:34.707122 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/archieyang/flask_app. - -sapid/Flask-Community -https://github.com/sapid/Flask-Community -Entry file: None -Scanned: 2016-10-18 16:24:35.230333 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sapid/Flask-Community. - -eudaimonious/HangmanWebsite -https://github.com/eudaimonious/HangmanWebsite -Entry file: HangmanWebsite/application_hangman.py -Scanned: 2016-10-18 16:24:38.448729 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -grimkeke/miniblog -https://github.com/grimkeke/miniblog -Entry file: miniblog/app/__init__.py -Scanned: 2016-10-18 16:24:42.149368 -No vulnerabilities found. - - -bracken1983/flaskBlogDemo -https://github.com/bracken1983/flaskBlogDemo -Entry file: flaskBlogDemo/flask-sqlalchemy-test.py -Scanned: 2016-10-18 16:24:43.821765 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mmcgahan/flask-labs-bb -https://github.com/mmcgahan/flask-labs-bb -Entry file: flask-labs-bb/flask_labs/__init__.py -Scanned: 2016-10-18 16:24:44.418960 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jaseemkp/flask-students-app -https://github.com/jaseemkp/flask-students-app -Entry file: flask-students-app/students.py -Scanned: 2016-10-18 16:24:47.428337 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -daisuzu/flask-app-sample -https://github.com/daisuzu/flask-app-sample -Entry file: flask-app-sample/db.py -Scanned: 2016-10-18 16:24:49.688674 -No vulnerabilities found. - - -ipfans/openshift-flask-template -https://github.com/ipfans/openshift-flask-template -Entry file: openshift-flask-template/wsgi/mainapp.py -Scanned: 2016-10-18 16:24:50.954518 -No vulnerabilities found. - - -minhtuev/flask-google-map-example -https://github.com/minhtuev/flask-google-map-example -Entry file: flask-google-map-example/server.py -Scanned: 2016-10-18 16:24:53.273716 -No vulnerabilities found. - - -rasheedh/Paint-Using-Flask---Mongodb- -https://github.com/rasheedh/Paint-Using-Flask---Mongodb- -Entry file: None -Scanned: 2016-10-18 16:24:55.267026 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Paint-Using-Flask---Mongodb-. - -garbados/flask-the-gauntlet -https://github.com/garbados/flask-the-gauntlet -Entry file: flask-the-gauntlet/app.py -Scanned: 2016-10-18 16:24:57.607645 -No vulnerabilities found. - - -penpyt/flask-couchdb-auth -https://github.com/penpyt/flask-couchdb-auth -Entry file: flask-couchdb-auth/example/guestbook.py -Scanned: 2016-10-18 16:24:59.049410 -No vulnerabilities found. - - -rodreegez/flask-twitter-auth -https://github.com/rodreegez/flask-twitter-auth -Entry file: None -Scanned: 2016-10-18 16:25:00.544307 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rodreegez/flask-twitter-auth. - -DamnedFacts/flask-hello-world -https://github.com/DamnedFacts/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-18 16:25:05.087251 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -pinchsoft/flask-newrelic-dotcloud -https://github.com/pinchsoft/flask-newrelic-dotcloud -Entry file: flask-newrelic-dotcloud/app.py -Scanned: 2016-10-18 16:25:09.350234 -No vulnerabilities found. - - -NoxDineen/microblog -https://github.com/NoxDineen/microblog -Entry file: None -Scanned: 2016-10-18 16:25:15.347397 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -PurplePilot/zanzeeba -https://github.com/PurplePilot/zanzeeba -Entry file: zanzeeba/appstd.py -Scanned: 2016-10-18 16:25:16.905747 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pitxon/sivir -https://github.com/Pitxon/sivir -Entry file: sivir/app.py -Scanned: 2016-10-18 16:25:22.199426 -No vulnerabilities found. - - -philangist/url-shorten -https://github.com/philangist/url-shorten -Entry file: url-shorten/shorten.py -Scanned: 2016-10-18 16:25:23.717581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fabionatali/DigiWebStats -https://github.com/fabionatali/DigiWebStats -Entry file: DigiWebStats/app.py -Scanned: 2016-10-18 16:25:28.200488 -No vulnerabilities found. - - -ariamoraine/kitten-generator -https://github.com/ariamoraine/kitten-generator -Entry file: kitten-generator/flaskhello.py -Scanned: 2016-10-18 16:25:29.426309 -No vulnerabilities found. - - -confessin/addressbook -https://github.com/confessin/addressbook -Entry file: addressbook/addressbook.py -Scanned: 2016-10-18 16:25:30.955102 -No vulnerabilities found. - - -nafur/flmpc -https://github.com/nafur/flmpc -Entry file: flmpc/main.py -Scanned: 2016-10-18 16:25:32.758082 -No vulnerabilities found. - - -hit9/flask-sign-in-with-github.py -https://github.com/hit9/flask-sign-in-with-github.py -Entry file: None -Scanned: 2016-10-18 16:25:34.283817 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kaibin/Condom_Data_Server -https://github.com/Kaibin/Condom_Data_Server -Entry file: Condom_Data_Server/app.py -Scanned: 2016-10-18 16:25:34.798060 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -honestappalachia/honest_site -https://github.com/honestappalachia/honest_site -Entry file: honest_site/run.py -Scanned: 2016-10-18 16:25:36.213740 -Vulnerability 1: -File: honest_site/run.py - > User input at line 36, trigger word "get(": - template = page.meta.get('template', 'default.html') -File: honest_site/run.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,page=page) - - - -daikeshi/one-dollar-metasearch-engine -https://github.com/daikeshi/one-dollar-metasearch-engine -Entry file: one-dollar-metasearch-engine/app/__init__.py -Scanned: 2016-10-18 16:25:36.727930 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -msalahi/art-party -https://github.com/msalahi/art-party -Entry file: art-party/app.py -Scanned: 2016-10-18 16:25:40.733160 -No vulnerabilities found. - - -mattupstate/flask-social -https://github.com/mattupstate/flask-social -Entry file: flask-social/tests/test_app/__init__.py -Scanned: 2016-10-18 16:25:45.323098 -No vulnerabilities found. - - -xiyoulaoyuanjia/flaskapp -https://github.com/xiyoulaoyuanjia/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-18 16:25:45.873914 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattupstate/flask-jsonschema -https://github.com/mattupstate/flask-jsonschema -Entry file: flask-jsonschema/tests.py -Scanned: 2016-10-18 16:25:47.138069 -No vulnerabilities found. - - -jawr/flask-contact -https://github.com/jawr/flask-contact -Entry file: flask-contact/main.py -Scanned: 2016-10-18 16:25:47.635901 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -trustrachel/Flask-FeatureFlags -https://github.com/trustrachel/Flask-FeatureFlags -Entry file: Flask-FeatureFlags/tests/fixtures.py -Scanned: 2016-10-18 16:25:49.159706 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -rahulkmr/flask-bigapp-template -https://github.com/rahulkmr/flask-bigapp-template -Entry file: flask-bigapp-template/main.py -Scanned: 2016-10-18 16:25:50.670145 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -whtsky/Flask-WeRoBot -https://github.com/whtsky/Flask-WeRoBot -Entry file: Flask-WeRoBot/flask_werobot.py -Scanned: 2016-10-18 16:25:54.118578 -No vulnerabilities found. - - -kienpham2000/airbrake-flask -https://github.com/kienpham2000/airbrake-flask -Entry file: airbrake-flask/setup.py -Scanned: 2016-10-18 16:25:54.666676 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stef/flask-tlsauth -https://github.com/stef/flask-tlsauth -Entry file: flask-tlsauth/demo/webapp.py -Scanned: 2016-10-18 16:25:56.981900 -No vulnerabilities found. - - -OpenTechSchool/python-flask-code -https://github.com/OpenTechSchool/python-flask-code -Entry file: python-flask-code/core/files-templates/catseverywhere.py -Scanned: 2016-10-18 16:25:58.246869 -No vulnerabilities found. - - -aahluwal/flask -https://github.com/aahluwal/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 16:26:01.612856 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -kennethreitz/elephant -https://github.com/kennethreitz/elephant -Entry file: elephant/elephant.py -Scanned: 2016-10-18 16:26:05.107362 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rollbar/rollbar-flask-example -https://github.com/rollbar/rollbar-flask-example -Entry file: rollbar-flask-example/hello.py -Scanned: 2016-10-18 16:26:08.600735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lqez/flasky -https://github.com/lqez/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-18 16:26:12.108029 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -florapdx/My-Blog -https://github.com/florapdx/My-Blog -Entry file: My-Blog/sitebuilder.py -Scanned: 2016-10-18 16:26:20.259698 -No vulnerabilities found. - - -clef/sample-flask -https://github.com/clef/sample-flask -Entry file: sample-flask/app.py -Scanned: 2016-10-18 16:26:22.642680 -No vulnerabilities found. - - -Jd007/flask-rest -https://github.com/Jd007/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-18 16:26:27.644075 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simonvc/rover-wasd-server -https://github.com/simonvc/rover-wasd-server -Entry file: rover-wasd-server/wasd_server.py -Scanned: 2016-10-18 16:26:30.677715 -No vulnerabilities found. - - -zeuxisoo/python-flask-social-oauth-facebook -https://github.com/zeuxisoo/python-flask-social-oauth-facebook -Entry file: None -Scanned: 2016-10-18 16:26:31.211495 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeuxisoo/python-flask-social-oauth-facebook. - -lpolepeddi/sightings -https://github.com/lpolepeddi/sightings -Entry file: sightings/routes.py -Scanned: 2016-10-18 16:26:41.390932 -No vulnerabilities found. - - -sholsapp/flask-skeleton -https://github.com/sholsapp/flask-skeleton -Entry file: None -Scanned: 2016-10-18 16:26:42.380840 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sholsapp/flask-skeleton. - -adatlabor/soa-demo -https://github.com/adatlabor/soa-demo -Entry file: soa-demo/service.py -Scanned: 2016-10-18 16:26:43.362651 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -stef/tlsauth -https://github.com/stef/tlsauth -Entry file: tlsauth/flask-demo/webapp.py -Scanned: 2016-10-18 16:26:44.769712 -No vulnerabilities found. - - -speakingcode/pres-soa-flask-backbone -https://github.com/speakingcode/pres-soa-flask-backbone -Entry file: pres-soa-flask-backbone/notes.py -Scanned: 2016-10-18 16:26:46.632811 -No vulnerabilities found. - - -kirang89/flask-boiler -https://github.com/kirang89/flask-boiler -Entry file: None -Scanned: 2016-10-18 16:26:49.531358 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jonascj/flaskr -https://github.com/jonascj/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:26:50.528635 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -microamp/flaskel -https://github.com/microamp/flaskel -Entry file: flaskel/flaskel/__init__.py -Scanned: 2016-10-18 16:26:51.889056 -No vulnerabilities found. - - -a2lin/flaskapp -https://github.com/a2lin/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-18 16:26:52.424687 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -topherjaynes/flasktut -https://github.com/topherjaynes/flasktut -Entry file: flasktut/app/__init__.py -Scanned: 2016-10-18 16:26:54.106335 -No vulnerabilities found. - - -aerialdomo/flaskblog -https://github.com/aerialdomo/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-18 16:26:54.630301 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -pinoytech/flaskapp -https://github.com/pinoytech/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-18 16:26:55.124355 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thinboy92/flasktuts -https://github.com/thinboy92/flasktuts -Entry file: flasktuts/app/__init__.py -Scanned: 2016-10-18 16:26:56.589566 -No vulnerabilities found. - - -aahluwal/flaskagain -https://github.com/aahluwal/flaskagain -Entry file: flaskagain/judgement.py -Scanned: 2016-10-18 16:26:57.166981 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskagain/renv/lib/python2.7/genericpath.py - -elboby/flask-config-override -https://github.com/elboby/flask-config-override -Entry file: flask-config-override/flask_config_override/test/test_cookie.py -Scanned: 2016-10-18 16:26:59.171250 -No vulnerabilities found. - - -MrFichter/flask1 -https://github.com/MrFichter/flask1 -Entry file: flask1/flask1.py -Scanned: 2016-10-18 16:27:00.397874 -No vulnerabilities found. - - -guilhermecomum/FlaskTutorial -https://github.com/guilhermecomum/FlaskTutorial -Entry file: FlaskTutorial/flaskr/flaskr.py -Scanned: 2016-10-18 16:27:02.993024 -No vulnerabilities found. - - -sherzberg/flask-native-package -https://github.com/sherzberg/flask-native-package -Entry file: flask-native-package/application.py -Scanned: 2016-10-18 16:27:09.725775 -No vulnerabilities found. - - -landakram/squeak -https://github.com/landakram/squeak -Entry file: squeak/app.py -Scanned: 2016-10-18 16:27:13.186109 -No vulnerabilities found. - - -xrefor/flask_tut -https://github.com/xrefor/flask_tut -Entry file: flask_tut/flaskr.py -Scanned: 2016-10-18 16:27:16.426408 -No vulnerabilities found. - - -y2bishop2y/vagrant.flask -https://github.com/y2bishop2y/vagrant.flask -Entry file: None -Scanned: 2016-10-18 16:27:17.952708 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -markchadwick/flask-empty -https://github.com/markchadwick/flask-empty -Entry file: flask-empty/main.py -Scanned: 2016-10-18 16:27:23.214324 -No vulnerabilities found. - - -McrCoderDojo/Flask-Webapps -https://github.com/McrCoderDojo/Flask-Webapps -Entry file: Flask-Webapps/flask1.py -Scanned: 2016-10-18 16:27:28.264208 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -xjdrew/flask-demo -https://github.com/xjdrew/flask-demo -Entry file: None -Scanned: 2016-10-18 16:27:29.779667 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xjdrew/flask-demo. - -aerialdomo/flask_microblog -https://github.com/aerialdomo/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-18 16:27:33.805209 -No vulnerabilities found. - - -xrefor/flask_stuff -https://github.com/xrefor/flask_stuff -Entry file: flask_stuff/main.py -Scanned: 2016-10-18 16:27:43.560513 -No vulnerabilities found. - - -akbarovs/flask-sandbox -https://github.com/akbarovs/flask-sandbox -Entry file: flask-sandbox/app.py -Scanned: 2016-10-18 16:27:44.833751 -No vulnerabilities found. - - -jcerise/flask-photos -https://github.com/jcerise/flask-photos -Entry file: flask-photos/app.py -Scanned: 2016-10-18 16:27:46.082302 -No vulnerabilities found. - - -adesst/flask-blog -https://github.com/adesst/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:27:46.620361 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Hardtack/Flask-Router -https://github.com/Hardtack/Flask-Router -Entry file: Flask-Router/flask_router/tests.py -Scanned: 2016-10-18 16:27:48.317288 -No vulnerabilities found. - - -smdmustaffa/PythonFlask -https://github.com/smdmustaffa/PythonFlask -Entry file: PythonFlask/app/routes.py -Scanned: 2016-10-18 16:27:49.524781 -No vulnerabilities found. - - -jinzhangg/flask-helloworld -https://github.com/jinzhangg/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-18 16:27:51.906485 -No vulnerabilities found. - - -bogavante/mitsuhiko-flask -https://github.com/bogavante/mitsuhiko-flask -Entry file: mitsuhiko-flask/setup.py -Scanned: 2016-10-18 16:27:52.464417 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hardez/Flask-Skeleton -https://github.com/hardez/Flask-Skeleton -Entry file: Flask-Skeleton/app/__init__.py -Scanned: 2016-10-18 16:27:54.676848 -No vulnerabilities found. - - -stfy86/pruebitasFlask -https://github.com/stfy86/pruebitasFlask -Entry file: pruebitasFlask/practica4/src/app/__init__.py -Scanned: 2016-10-18 16:27:56.634794 -No vulnerabilities found. - - -kracekumar/test-flask -https://github.com/kracekumar/test-flask -Entry file: test-flask/app.py -Scanned: 2016-10-18 16:27:58.188575 -No vulnerabilities found. - - -charliecrissman/microblog -https://github.com/charliecrissman/microblog -Entry file: None -Scanned: 2016-10-18 16:27:59.229699 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gourneau/anode -https://github.com/gourneau/anode -Entry file: anode/app.py -Scanned: 2016-10-18 16:28:02.206628 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mmahnken/Flask_to_do_list -https://github.com/mmahnken/Flask_to_do_list -Entry file: Flask_to_do_list/tipsy.py -Scanned: 2016-10-18 16:28:09.187479 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -abulte/Flask-Bootstrap-Fanstatic -https://github.com/abulte/Flask-Bootstrap-Fanstatic -Entry file: Flask-Bootstrap-Fanstatic/application/__init__.py -Scanned: 2016-10-18 16:28:16.925342 -No vulnerabilities found. - - -jennyferpinto/Flask_Part_1 -https://github.com/jennyferpinto/Flask_Part_1 -Entry file: Flask_Part_1/tipsy.py -Scanned: 2016-10-18 16:28:18.444312 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stephanienkram/Flask-Log-Tracker -https://github.com/stephanienkram/Flask-Log-Tracker -Entry file: Flask-Log-Tracker/main.py -Scanned: 2016-10-18 16:28:25.609847 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mwmeyer/minimal-flask-socketserver -https://github.com/mwmeyer/minimal-flask-socketserver -Entry file: minimal-flask-socketserver/flash_socket.py -Scanned: 2016-10-18 16:28:29.144102 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rasheedh/Paint-Using-Flask---Mongodb- -https://github.com/rasheedh/Paint-Using-Flask---Mongodb- -Entry file: None -Scanned: 2016-10-18 16:28:30.645500 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Paint-Using-Flask---Mongodb-. - -isms/flask-phonebank-dashboard -https://github.com/isms/flask-phonebank-dashboard -Entry file: flask-phonebank-dashboard/app.py -Scanned: 2016-10-18 16:28:32.242849 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -elboby/flask-test-template -https://github.com/elboby/flask-test-template -Entry file: None -Scanned: 2016-10-18 16:28:34.786496 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/elboby/flask-test-template. - -ndrwdn/flat_flask_layout -https://github.com/ndrwdn/flat_flask_layout -Entry file: flat_flask_layout/sitebuilder.py -Scanned: 2016-10-18 16:28:44.102938 -No vulnerabilities found. - - -jpanganiban/flask-heroku-kickstart -https://github.com/jpanganiban/flask-heroku-kickstart -Entry file: None -Scanned: 2016-10-18 16:28:44.627382 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jpanganiban/flask-heroku-kickstart. - -justinxreese/ajax-calculator-flask -https://github.com/justinxreese/ajax-calculator-flask -Entry file: None -Scanned: 2016-10-18 16:28:46.142357 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -prabeesh/Paintapp-Javascript-Canvas-Flask -https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask -Entry file: Paintapp-Javascript-Canvas-Flask/test.py -Scanned: 2016-10-18 16:28:47.377751 -Vulnerability 1: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 34, trigger word "form[": - imgname = request.form['imagename'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 16: imgname = (imagename) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 23: imgname = row[0] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 19, trigger word "execute(": - cur.execute('SELECT * FROM Image WHERE imgname=?', imgname) - -Vulnerability 2: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 34, trigger word "form[": - imgname = request.form['imagename'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 16: imgname = (imagename) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 23: imgname = row[0] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 42, trigger word "execute(": - cur.execute('INSERT INTO Image VALUES(?, ?)', data) - -Vulnerability 3: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 35, trigger word "form[": - imgdata = request.form['string'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 24: imgdata = row[1] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 25: ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 28: ret_MAYBE_FUNCTION_NAME = resp - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 46: ret_MAYBE_FUNCTION_NAME = resp -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 42, trigger word "execute(": - cur.execute('INSERT INTO Image VALUES(?, ?)', data) - - - -godber/flask-mobile-switch -https://github.com/godber/flask-mobile-switch -Entry file: flask-mobile-switch/missionops/missionops/__init__.py -Scanned: 2016-10-18 16:28:48.839688 -No vulnerabilities found. - - -naveenpremchand02/paintapp-using-Flask -https://github.com/naveenpremchand02/paintapp-using-Flask -Entry file: None -Scanned: 2016-10-18 16:28:49.356603 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/naveenpremchand02/paintapp-using-Flask. - -orkunozbek/deploy_test -https://github.com/orkunozbek/deploy_test -Entry file: deploy_test/app_pack/__init__.py -Scanned: 2016-10-18 16:28:50.576030 -No vulnerabilities found. - - -emi1337/movie_rater -https://github.com/emi1337/movie_rater -Entry file: movie_rater/judgement.py -Scanned: 2016-10-18 16:28:51.268316 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chrismeono1022/movie-ratings -https://github.com/chrismeono1022/movie-ratings -Entry file: movie-ratings/judgement.py -Scanned: 2016-10-18 16:28:52.790380 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akshar-raaj/flaks -https://github.com/akshar-raaj/flaks -Entry file: flaks/hello.py -Scanned: 2016-10-18 16:28:54.055963 -No vulnerabilities found. - - -y2bishop2y/microengine -https://github.com/y2bishop2y/microengine -Entry file: microengine/lib/flask_sqlalchemy.py -Scanned: 2016-10-18 16:28:54.688981 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajith-herga/searchflask -https://github.com/ajith-herga/searchflask -Entry file: searchflask/new_world.py -Scanned: 2016-10-18 16:28:55.197635 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -soniacs/cabinet -https://github.com/soniacs/cabinet -Entry file: cabinet/app/__init__.py -Scanned: 2016-10-18 16:28:56.712336 -Vulnerability 1: -File: cabinet/app/views/clients.py - > User input at line 33, trigger word "form[": - client = Client(name=request.form['name'], company=request.form['company'], website=request.form['website'], twitter=request.form['twitter'], email=request.form['email'], telephone=request.form['telephone'], skype=request.form['skype'], street=request.form['street'], street_2=request.form['street_2'], city=request.form['city'], state=request.form['state'], postcode=request.form['postcode'], country=request.form['country'], notes=request.form['notes']) -File: cabinet/app/views/clients.py - > reaches line 50, trigger word "flash(": - flash('Client '%s' was added.' % client.name) - -Vulnerability 2: -File: cabinet/app/views/clients.py - > User input at line 60, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 80: ret_MAYBE_FUNCTION_NAME = render_template('clients/edit.html',title='Edit %s' % client.name, client=client) - File: cabinet/app/views/clients.py - > Line 84: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 78, trigger word "flash(": - flash('Client '%s' has been updated.' % client.name) - -Vulnerability 3: -File: cabinet/app/views/clients.py - > User input at line 89, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 95: ret_MAYBE_FUNCTION_NAME = render_template('clients/delete.html',title='Delete %s' % client.name, client=client) - File: cabinet/app/views/clients.py - > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 93, trigger word "flash(": - flash('Client '%s' has been deleted.' % client.name) - -Vulnerability 4: -File: cabinet/app/views/invoices.py - > User input at line 31, trigger word "get(": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 5: -File: cabinet/app/views/invoices.py - > User input at line 31, trigger word "form[": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 6: -File: cabinet/app/views/invoices.py - > User input at line 32, trigger word "get(": - project = Project.query.get(request.form['project']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 7: -File: cabinet/app/views/invoices.py - > User input at line 32, trigger word "form[": - project = Project.query.get(request.form['project']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 8: -File: cabinet/app/views/invoices.py - > User input at line 33, trigger word "form[": - invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 9: -File: cabinet/app/views/invoices.py - > User input at line 59, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 80: ret_MAYBE_FUNCTION_NAME = render_template('invoices/edit.html',title='Edit Invoice %s' % invoice.name, invoice=invoice, clients=clients, projects=projects) - File: cabinet/app/views/invoices.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 78, trigger word "flash(": - flash('Invoice '%s' has been updated.' % invoice.name) - -Vulnerability 10: -File: cabinet/app/views/invoices.py - > User input at line 91, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 97: ret_MAYBE_FUNCTION_NAME = render_template('invoices/delete.html',title='Delete Invoice %s' % invoice.name, invoice=invoice) - File: cabinet/app/views/invoices.py - > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 95, trigger word "flash(": - flash('Invoice '%s' has been deleted.' % invoice.name) - -Vulnerability 11: -File: cabinet/app/views/projects.py - > User input at line 30, trigger word "get(": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 12: -File: cabinet/app/views/projects.py - > User input at line 30, trigger word "form[": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 13: -File: cabinet/app/views/projects.py - > User input at line 31, trigger word "form[": - project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 14: -File: cabinet/app/views/projects.py - > User input at line 54, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 71: ret_MAYBE_FUNCTION_NAME = render_template('projects/edit.html',title='Edit %s' % project.name, project=project, clients=clients) - File: cabinet/app/views/projects.py - > Line 76: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 69, trigger word "flash(": - flash('Project '%s' has been updated.' % project.name) - -Vulnerability 15: -File: cabinet/app/views/projects.py - > User input at line 81, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('projects/delete.html',title='Delete %s' % project.name, project=project) - File: cabinet/app/views/projects.py - > Line 91: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 85, trigger word "flash(": - flash('Project '%s' has been deleted.' % project.name) - - - -MattStockton/manpage -https://github.com/MattStockton/manpage -Entry file: manpage/app.py -Scanned: 2016-10-18 16:28:57.258423 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qzio/tododis -https://github.com/qzio/tododis -Entry file: tododis/app.py -Scanned: 2016-10-18 16:28:57.761252 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ternup/caddisfly-heroku -https://github.com/ternup/caddisfly-heroku -Entry file: caddisfly-heroku/app.py -Scanned: 2016-10-18 16:28:59.275316 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aromanovich/flask-webtest -https://github.com/aromanovich/flask-webtest -Entry file: flask-webtest/tests/core.py -Scanned: 2016-10-18 16:29:10.329495 -No vulnerabilities found. - - -ashcrow/flask-track-usage -https://github.com/ashcrow/flask-track-usage -Entry file: flask-track-usage/test/__init__.py -Scanned: 2016-10-18 16:29:12.830069 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lepture/flask-shorturl -https://github.com/lepture/flask-shorturl -Entry file: flask-shorturl/test_shorturl.py -Scanned: 2016-10-18 16:29:17.194162 -No vulnerabilities found. - - -mharrys/flask-blog -https://github.com/mharrys/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:29:18.732127 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -kienpham2000/airbrake-flask -https://github.com/kienpham2000/airbrake-flask -Entry file: airbrake-flask/setup.py -Scanned: 2016-10-18 16:29:23.257897 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sintezcs/flask -https://github.com/sintezcs/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 16:29:32.174227 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -wangzexin/flask -https://github.com/wangzexin/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 16:29:33.123476 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -samsolariusleo/Flask -https://github.com/samsolariusleo/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-18 16:29:35.644988 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tornado-utils/tornado-restless -https://github.com/tornado-utils/tornado-restless -Entry file: tornado-restless/tests/base.py -Scanned: 2016-10-18 16:29:45.382453 -No vulnerabilities found. - - -adamgreenhall/flask-haml-sass-coffee-template -https://github.com/adamgreenhall/flask-haml-sass-coffee-template -Entry file: flask-haml-sass-coffee-template/app.py -Scanned: 2016-10-18 16:29:47.069944 -No vulnerabilities found. - - -prakhar1989/flask-tuts -https://github.com/prakhar1989/flask-tuts -Entry file: flask-tuts/lesson-2/blogs/__init__.py -Scanned: 2016-10-18 16:29:50.379781 -No vulnerabilities found. - - -Treeki/bitBoard -https://github.com/Treeki/bitBoard -Entry file: bitBoard/bitBoard/__init__.py -Scanned: 2016-10-18 16:29:52.065990 -Vulnerability 1: -File: bitBoard/bitBoard/views/board.py - > User input at line 696, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 703: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 704: url = thread.move_url - File: bitBoard/bitBoard/views/board.py - > Line 730: form = MoveThreadForm(destforum=thread.forum_id) - File: bitBoard/bitBoard/views/board.py - > Line 734: new_forum_id = form.destforum.data - File: bitBoard/bitBoard/views/board.py - > Line 741: old_forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 743: old_forum.post_count -= thread.post_count - File: bitBoard/bitBoard/views/board.py - > Line 745: thread.forum_id = new_forum_id - File: bitBoard/bitBoard/views/board.py - > Line 749: new_forum.post_count += thread.post_count - File: bitBoard/bitBoard/views/board.py - > Line 757: ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=303) - File: bitBoard/bitBoard/views/board.py - > Line 760: ret_MAYBE_FUNCTION_NAME = render_template('move_thread.html',form=form, forum=forum, thread=thread, url=url) -File: bitBoard/bitBoard/views/board.py - > reaches line 710, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url,code=301) - -Vulnerability 2: -File: bitBoard/bitBoard/views/board.py - > User input at line 775, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 782: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 785: url = thread.sticky_url - File: bitBoard/bitBoard/views/board.py - > Line 787: url = thread.lock_url - File: bitBoard/bitBoard/views/board.py - > Line 791: url = thread.follow_url - File: bitBoard/bitBoard/views/board.py - > Line 808: old_value = thread.is_stickied - File: bitBoard/bitBoard/views/board.py - > Line 822: old_value = thread.is_locked - File: bitBoard/bitBoard/views/board.py - > Line 836: old_value = thread.is_followed_by(g.user) - File: bitBoard/bitBoard/views/board.py - > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title) - File: bitBoard/bitBoard/views/board.py - > Line 869: ret_MAYBE_FUNCTION_NAME = form.redirect(url=thread.url) - File: bitBoard/bitBoard/views/board.py - > Line 871: ret_MAYBE_FUNCTION_NAME = render_template('confirm.html',form=form, crumbs_type='thread', forum=forum, thread=thread, final_crumb='%s Thread' % cap_verb, message=message, url=url) -File: bitBoard/bitBoard/views/board.py - > reaches line 802, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url,code=301) - -Vulnerability 3: -File: bitBoard/bitBoard/views/base.py - > User input at line 49, trigger word "get(": - target = get_redirect_target() or url -Reassigned in: - File: bitBoard/bitBoard/views/base.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data) -File: bitBoard/bitBoard/views/base.py - > reaches line 50, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303) - -Vulnerability 4: -File: bitBoard/bitBoard/views/base.py - > User input at line 49, trigger word "get(": - target = get_redirect_target() or url -Reassigned in: - File: bitBoard/bitBoard/views/base.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data) -File: bitBoard/bitBoard/views/base.py - > reaches line 50, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303) - - - -byu-osl/familytree-sample-app -https://github.com/byu-osl/familytree-sample-app -Entry file: familytree-sample-app/app.py -Scanned: 2016-10-18 16:29:52.567520 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kmiasko/flask-barcode -https://github.com/kmiasko/flask-barcode -Entry file: flask-barcode/wsgi.py -Scanned: 2016-10-18 16:29:53.899217 -No vulnerabilities found. - - -jayzcode/helloflask -https://github.com/jayzcode/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-18 16:29:54.452551 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -btomashvili/flasb -https://github.com/btomashvili/flasb -Entry file: None -Scanned: 2016-10-18 16:29:55.969994 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/btomashvili/flasb. - -maxcountryman/flask-simpleoauth -https://github.com/maxcountryman/flask-simpleoauth -Entry file: flask-simpleoauth/flask_simpleoauth/app.py -Scanned: 2016-10-18 16:29:58.357453 -Vulnerability 1: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 30, trigger word "get(": - next_url = request.args.get('next_url', url_for('.index')) -Reassigned in: - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 30, trigger word "url_for(": - next_url = request.args.get('next_url', url_for('.index')) - -Vulnerability 2: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 30, trigger word "get(": - next_url = request.args.get('next_url', url_for('.index')) -Reassigned in: - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 36, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 3: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 42, trigger word "get(": - next_url = request.args.get('next_url', url_for('.login')) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 42, trigger word "url_for(": - next_url = request.args.get('next_url', url_for('.login')) - -Vulnerability 4: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 42, trigger word "get(": - next_url = request.args.get('next_url', url_for('.login')) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - - - -bayazee/flask-mosession -https://github.com/bayazee/flask-mosession -Entry file: flask-mosession/example/example.py -Scanned: 2016-10-18 16:29:59.739074 -No vulnerabilities found. - - -speakingcode/pres-soa-flask-backbone -https://github.com/speakingcode/pres-soa-flask-backbone -Entry file: pres-soa-flask-backbone/notes.py -Scanned: 2016-10-18 16:30:01.579815 -No vulnerabilities found. - - -krushton/flask-api-example -https://github.com/krushton/flask-api-example -Entry file: flask-api-example/app.py -Scanned: 2016-10-18 16:30:02.837922 -No vulnerabilities found. - - -bootandy/flask-sample -https://github.com/bootandy/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-18 16:30:03.342874 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jph98/flaskdmg -https://github.com/jph98/flaskdmg -Entry file: flaskdmg/flaskexample.py -Scanned: 2016-10-18 16:30:04.560464 -No vulnerabilities found. - - -roshow/flasktutorial -https://github.com/roshow/flasktutorial -Entry file: None -Scanned: 2016-10-18 16:30:06.103847 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -damour/flaskr -https://github.com/damour/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:30:09.646326 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fabin/Flaskr -https://github.com/fabin/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-18 16:30:13.151235 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akshar-raaj/flaskr -https://github.com/akshar-raaj/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:30:16.638906 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lee814/flaskr -https://github.com/lee814/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:30:19.167502 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -codergirl/flaskbabar -https://github.com/codergirl/flaskbabar -Entry file: flaskbabar/hello.py -Scanned: 2016-10-18 16:30:24.457236 -Vulnerability 1: -File: flaskbabar/hello.py - > User input at line 44, trigger word "get(": - new_user = BabarUser(request.args.get('username'), request.args.get('email')) -Reassigned in: - File: flaskbabar/hello.py - > Line 47: json = new_user.id'username''email'new_user.namenew_user.email -File: flaskbabar/hello.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 2: -File: flaskbabar/hello.py - > User input at line 61, trigger word "get(": - the_user = db.session.query(BabarUser).filter_by(id=request.args.get('user_id')).first() -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 3: -File: flaskbabar/hello.py - > User input at line 62, trigger word "get(": - task_name = request.args.get('name') -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 4: -File: flaskbabar/hello.py - > User input at line 63, trigger word "get(": - task_description = request.args.get('description') -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 5: -File: flaskbabar/hello.py - > User input at line 64, trigger word "get(": - dismissable = request.args.get('dismissable') -Reassigned in: - File: flaskbabar/hello.py - > Line 66: dismissable = True - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 6: -File: flaskbabar/hello.py - > User input at line 67, trigger word "get(": - due_date = request.args.get('due_date') -Reassigned in: - File: flaskbabar/hello.py - > Line 69: due_date = datetime.datetime.fromtimestamp(float(due_date)) - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - - - -rajendrakrp/GAE-Flask-OpenID -https://github.com/rajendrakrp/GAE-Flask-OpenID -Entry file: GAE-Flask-OpenID/flask/sessions.py -Scanned: 2016-10-18 16:30:25.992363 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JLtheking/FlaskExample -https://github.com/JLtheking/FlaskExample -Entry file: FlaskExample/routes.py -Scanned: 2016-10-18 16:30:29.546578 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Aussiroth/FlaskPractical -https://github.com/Aussiroth/FlaskPractical -Entry file: FlaskPractical/flask/routes.py -Scanned: 2016-10-18 16:30:31.124384 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -dorajistyle/proposal_center_python_flask_sqlalchemy_jade -https://github.com/dorajistyle/proposal_center_python_flask_sqlalchemy_jade -Entry file: proposal_center_python_flask_sqlalchemy_jade/application/__init__.py -Scanned: 2016-10-18 16:30:34.785277 -No vulnerabilities found. - - -Bob-Thomas/webshopFlask -https://github.com/Bob-Thomas/webshopFlask -Entry file: webshopFlask/webshop.py -Scanned: 2016-10-18 16:30:44.927305 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -haburibe/flask-myapps -https://github.com/haburibe/flask-myapps -Entry file: flask-myapps/todos/todos.py -Scanned: 2016-10-18 16:30:47.184695 -No vulnerabilities found. - - -mykolasmith/flask-leaderboard -https://github.com/mykolasmith/flask-leaderboard -Entry file: flask-leaderboard/leaderboard/__init__.py -Scanned: 2016-10-18 16:30:48.534311 -No vulnerabilities found. - - -betobaz/app_flask -https://github.com/betobaz/app_flask -Entry file: app_flask/app/routes.py -Scanned: 2016-10-18 16:30:49.868926 -No vulnerabilities found. - - -redfive/python-flask -https://github.com/redfive/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-18 16:30:50.400565 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -atbaker/flask-tutorial -https://github.com/atbaker/flask-tutorial -Entry file: flask-tutorial/app/__init__.py -Scanned: 2016-10-18 16:30:52.238575 -No vulnerabilities found. - - -fabin/Flask-Upload -https://github.com/fabin/Flask-Upload -Entry file: Flask-Upload/upload/__init__.py -Scanned: 2016-10-18 16:30:53.483041 -Vulnerability 1: -File: Flask-Upload/upload/__init__.py - > User input at line 24, trigger word "files[": - uploadedFile = request.files['file'] -Reassigned in: - File: Flask-Upload/upload/__init__.py - > Line 26: filename = uploadedFile.filename - File: Flask-Upload/upload/__init__.py - > Line 36: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File (in package)

-
-

- -

- ' -File: Flask-Upload/upload/__init__.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(s.put(DOMAIN_NAME, filename, ob)) - - - -gabrielengel/learn-flask -https://github.com/gabrielengel/learn-flask -Entry file: learn-flask/01-minimal/minimal.py -Scanned: 2016-10-18 16:30:54.716335 -No vulnerabilities found. - - -mutaku/alfred_flask -https://github.com/mutaku/alfred_flask -Entry file: alfred_flask/alfred.py -Scanned: 2016-10-18 16:30:55.721682 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bradmerlin/porty_flask -https://github.com/bradmerlin/porty_flask -Entry file: porty_flask/app.py -Scanned: 2016-10-18 16:30:56.228522 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marcilioleite/flask-saude -https://github.com/marcilioleite/flask-saude -Entry file: flask-saude/app/__init__.py -Scanned: 2016-10-18 16:30:59.492735 -No vulnerabilities found. - - -elimgoodman/Personnel-Flask -https://github.com/elimgoodman/Personnel-Flask -Entry file: Personnel-Flask/app/__init__.py -Scanned: 2016-10-18 16:31:01.581960 -No vulnerabilities found. - - -erikgrueter/flask_app -https://github.com/erikgrueter/flask_app -Entry file: None -Scanned: 2016-10-18 16:31:03.553265 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/erikgrueter/flask_app. - -asap/watchman.flask -https://github.com/asap/watchman.flask -Entry file: None -Scanned: 2016-10-18 16:31:04.067407 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -marksteve/flask-nsq -https://github.com/marksteve/flask-nsq -Entry file: flask-nsq/test.py -Scanned: 2016-10-18 16:31:06.581191 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Duelist/ianb-flask -https://github.com/Duelist/ianb-flask -Entry file: ianb-flask/ianb/__init__.py -Scanned: 2016-10-18 16:31:14.450431 -No vulnerabilities found. - - -Joinhack/agent -https://github.com/Joinhack/agent -Entry file: agent/flask_sqlalchemy.py -Scanned: 2016-10-18 16:31:18.073924 -Vulnerability 1: -File: agent/agent/views/user.py - > User input at line 44, trigger word "form[": - area = request.form['area'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 2: -File: agent/agent/views/user.py - > User input at line 45, trigger word "form[": - name = request.form['section'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 3: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 4: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 5: -File: agent/agent/views/house.py - > User input at line 34, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 36: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 38: data = cmgmt.queryCommunitiesByUserId(user, q) - File: agent/agent/views/house.py - > Line 33: ret_MAYBE_FUNCTION_NAME = jsonify('code''msg'-1'unkown query') -File: agent/agent/views/house.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0toselect(data)) - -Vulnerability 6: -File: agent/agent/views/house.py - > User input at line 45, trigger word "form[": - community_name = request.form['community'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - -Vulnerability 7: -File: agent/agent/views/house.py - > User input at line 46, trigger word "form[": - location = request.form['location'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - - - -lachezar/tada_backend -https://github.com/lachezar/tada_backend -Entry file: tada_backend/todo.py -Scanned: 2016-10-18 16:31:20.544138 -No vulnerabilities found. - - -luxuia/gene_designer -https://github.com/luxuia/gene_designer -Entry file: gene_designer/geneDesigne.py -Scanned: 2016-10-18 16:31:26.550036 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rubinovitz/flask-gevent-boiler -https://github.com/rubinovitz/flask-gevent-boiler -Entry file: flask-gevent-boiler/app.py -Scanned: 2016-10-18 16:31:30.137204 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bradmerlin/mxit-spock_flask -https://github.com/bradmerlin/mxit-spock_flask -Entry file: mxit-spock_flask/app.py -Scanned: 2016-10-18 16:31:31.630186 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jonascj/flask_logger_test -https://github.com/jonascj/flask_logger_test -Entry file: flask_logger_test/flask_logger_test.py -Scanned: 2016-10-18 16:31:34.905959 -No vulnerabilities found. - - -rartavia/flask-babel-example -https://github.com/rartavia/flask-babel-example -Entry file: flask-babel-example/flask-babel-example.py -Scanned: 2016-10-18 16:31:37.471638 -No vulnerabilities found. - - -elidickinson/flask-proxy-demo -https://github.com/elidickinson/flask-proxy-demo -Entry file: flask-proxy-demo/hello.py -Scanned: 2016-10-18 16:31:45.711393 -No vulnerabilities found. - - -stephanienkram/Flask-Money-Tracker -https://github.com/stephanienkram/Flask-Money-Tracker -Entry file: Flask-Money-Tracker/main.py -Scanned: 2016-10-18 16:31:47.309305 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cismet/sqlparse-flask-webservice -https://github.com/cismet/sqlparse-flask-webservice -Entry file: sqlparse-flask-webservice/sqlparse_webservice.py -Scanned: 2016-10-18 16:31:47.820357 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luckypool/flask-blueprints-template -https://github.com/luckypool/flask-blueprints-template -Entry file: flask-blueprints-template/hello/__init__.py -Scanned: 2016-10-18 16:31:51.805003 -No vulnerabilities found. - - -dylanvee/flask-hello-world -https://github.com/dylanvee/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-18 16:31:52.342482 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -krushton/flask-location-example -https://github.com/krushton/flask-location-example -Entry file: flask-location-example/app.py -Scanned: 2016-10-18 16:31:54.087282 -No vulnerabilities found. - - -adamjmarkham/flask-micro-blog -https://github.com/adamjmarkham/flask-micro-blog -Entry file: flask-micro-blog/micro_blog_flask.py -Scanned: 2016-10-18 16:31:55.456634 -No vulnerabilities found. - - -chrismeono1022/microblog_flask_tutorial -https://github.com/chrismeono1022/microblog_flask_tutorial -Entry file: microblog_flask_tutorial/app/__init__.py -Scanned: 2016-10-18 16:31:56.691771 -No vulnerabilities found. - - -david-torres/flask-rest-quickstart -https://github.com/david-torres/flask-rest-quickstart -Entry file: flask-rest-quickstart/application/__init__.py -Scanned: 2016-10-18 16:31:58.596164 -No vulnerabilities found. - - -bradmerlin/mxit-blackjack_flask -https://github.com/bradmerlin/mxit-blackjack_flask -Entry file: mxit-blackjack_flask/app.py -Scanned: 2016-10-18 16:31:59.240422 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyhmltn/stripe-flask-test -https://github.com/andyhmltn/stripe-flask-test -Entry file: stripe-flask-test/main.py -Scanned: 2016-10-18 16:31:59.758961 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jsutterfield/flaskr-buildout -https://github.com/jsutterfield/flaskr-buildout -Entry file: flaskr-buildout/src/flaskr/flaskr.py -Scanned: 2016-10-18 16:32:05.215597 -No vulnerabilities found. - - -manuclementz/shrt -https://github.com/manuclementz/shrt -Entry file: shrt/app.py -Scanned: 2016-10-18 16:32:07.510596 -No vulnerabilities found. - - -geunieve/ratemyfirefart -https://github.com/geunieve/ratemyfirefart -Entry file: ratemyfirefart/views.py -Scanned: 2016-10-18 16:32:09.200332 -No vulnerabilities found. - - -wangxiaoxiao88/python-bookmanager -https://github.com/wangxiaoxiao88/python-bookmanager -Entry file: python-bookmanager/app.py -Scanned: 2016-10-18 16:32:11.453429 -No vulnerabilities found. - - -Syerram/maintenance-server -https://github.com/Syerram/maintenance-server -Entry file: maintenance-server/run.py -Scanned: 2016-10-18 16:32:11.961333 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -corydolphin/boilerflask-facebook -https://github.com/corydolphin/boilerflask-facebook -Entry file: boilerflask-facebook/boilerflask/__init__.py -Scanned: 2016-10-18 16:32:12.460274 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajith-herga/searchflask -https://github.com/ajith-herga/searchflask -Entry file: searchflask/new_world.py -Scanned: 2016-10-18 16:32:13.968606 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -subdesign/temp_Flaskblog -https://github.com/subdesign/temp_Flaskblog -Entry file: temp_Flaskblog/app.py -Scanned: 2016-10-18 16:32:18.430258 -No vulnerabilities found. - - -bettertest-org/flask_app_skeleton_on_gae -https://github.com/bettertest-org/flask_app_skeleton_on_gae -Entry file: flask_app_skeleton_on_gae/lib/flask/sessions.py -Scanned: 2016-10-18 16:32:19.989857 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liontree/lemonbook -https://github.com/liontree/lemonbook -Entry file: lemonbook/__init__.py -Scanned: 2016-10-18 16:32:26.227217 -Vulnerability 1: -File: lemonbook/common/flask_login.py - > User input at line 227, trigger word "get(": - cookie_name = config.get('REMEMBER_COOKIE_NAME', COOKIE_NAME) -File: lemonbook/common/flask_login.py - > reaches line 237, trigger word "set_cookie(": - response.set_cookie(cookie_name, data,expires=expires, domain=domain) - -Vulnerability 2: -File: lemonbook/views/notes.py - > User input at line 50, trigger word "form[": - date = request.form['date'].strip() -Reassigned in: - File: lemonbook/views/notes.py - > Line 55: date = date.replace('/', '') - File: lemonbook/views/notes.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents) - File: lemonbook/views/notes.py - > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest')) -File: lemonbook/views/notes.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('date',id=user_id, date=date)) - -Vulnerability 3: -File: lemonbook/views/notes.py - > User input at line 50, trigger word "form[": - date = request.form['date'].strip() -Reassigned in: - File: lemonbook/views/notes.py - > Line 55: date = date.replace('/', '') - File: lemonbook/views/notes.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents) - File: lemonbook/views/notes.py - > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest')) -File: lemonbook/views/notes.py - > reaches line 56, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('date',id=user_id, date=date)) - - - -abhiomkar/contacts-rest -https://github.com/abhiomkar/contacts-rest -Entry file: contacts-rest/contacts.py -Scanned: 2016-10-18 16:32:26.750269 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Giorgix/thor -https://github.com/Giorgix/thor -Entry file: thor/thor.py -Scanned: 2016-10-18 16:32:31.896161 -No vulnerabilities found. - - -lhr530124/nozomiServer -https://github.com/lhr530124/nozomiServer -Entry file: nozomiServer/app.py -Scanned: 2016-10-18 16:32:34.347183 -No vulnerabilities found. - - -lepture/flask-oauthlib -https://github.com/lepture/flask-oauthlib -Entry file: flask-oauthlib/flask_oauthlib/provider/oauth1.py -Scanned: 2016-10-18 16:32:38.050710 -Vulnerability 1: -File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > User input at line 87, trigger word "get(": - error_endpoint = self.app.config.get('OAUTH1_PROVIDER_ERROR_ENDPOINT') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > Line 90: ret_MAYBE_FUNCTION_NAME = '/oauth/errors' - File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > Line 86: ret_MAYBE_FUNCTION_NAME = error_uri -File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > reaches line 89, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint) - -Vulnerability 2: -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > User input at line 104, trigger word "get(": - error_endpoint = self.app.config.get('OAUTH2_PROVIDER_ERROR_ENDPOINT') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 107: ret_MAYBE_FUNCTION_NAME = '/oauth/errors' - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 103: ret_MAYBE_FUNCTION_NAME = error_uri -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > reaches line 106, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint) - -Vulnerability 3: -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > User input at line 447, trigger word "get(": - redirect_uri = credentials.get('redirect_uri') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 464: ret_MAYBE_FUNCTION_NAME = redirect(add_params_to_uri(self.error_uri, 'error'str(e))) - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 455: ret_MAYBE_FUNCTION_NAME = create_response(ret) - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 458: ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(self.error_uri)) -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > reaches line 461, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(redirect_uri or self.error_uri)) - - - -miguelgrinberg/Flask-HTTPAuth -https://github.com/miguelgrinberg/Flask-HTTPAuth -Entry file: Flask-HTTPAuth/examples/basic_auth.py -Scanned: 2016-10-18 16:32:46.594702 -No vulnerabilities found. - - -cburmeister/flask-bones -https://github.com/cburmeister/flask-bones -Entry file: flask-bones/app/__init__.py -Scanned: 2016-10-18 16:32:49.293878 -No vulnerabilities found. - - -sysr-q/flask-nsa -https://github.com/sysr-q/flask-nsa -Entry file: flask-nsa/example_app.py -Scanned: 2016-10-18 16:32:51.765635 -No vulnerabilities found. - - -lepture/flask-storage -https://github.com/lepture/flask-storage -Entry file: flask-storage/tests/__init__.py -Scanned: 2016-10-18 16:32:52.271522 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -plastboks/Flaskmarks -https://github.com/plastboks/Flaskmarks -Entry file: Flaskmarks/flaskmarks/__init__.py -Scanned: 2016-10-18 16:32:55.875466 -Vulnerability 1: -File: Flaskmarks/flaskmarks/views/auth.py - > User input at line 33, trigger word ".data": - u = User.by_uname_or_email(form.username.data) -File: Flaskmarks/flaskmarks/views/auth.py - > reaches line 38, trigger word "flash(": - flash('Welcome %s.' % u.username,category='success') - - - -martinp/jarvis2 -https://github.com/martinp/jarvis2 -Entry file: jarvis2/app/main.py -Scanned: 2016-10-18 16:32:58.071025 -No vulnerabilities found. - - -akhilchandran/flask -https://github.com/akhilchandran/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 16:32:59.022397 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -JamesHoover/Flask -https://github.com/JamesHoover/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-18 16:32:59.538990 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dhanababu-nyros/flask-sqlalchemy -https://github.com/dhanababu-nyros/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 16:33:00.053478 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -klen/mixer -https://github.com/klen/mixer -Entry file: mixer/tests/test_flask.py -Scanned: 2016-10-18 16:33:02.141657 -No vulnerabilities found. - - -wrobstory/mcflyin -https://github.com/wrobstory/mcflyin -Entry file: mcflyin/mcflyin/application.py -Scanned: 2016-10-18 16:33:04.198447 -No vulnerabilities found. - - -Hardtack/Flask-Negotiation -https://github.com/Hardtack/Flask-Negotiation -Entry file: Flask-Negotiation/tests/test_negotiation.py -Scanned: 2016-10-18 16:33:05.645162 -No vulnerabilities found. - - -marksteve/flask-redisconfig -https://github.com/marksteve/flask-redisconfig -Entry file: flask-redisconfig/example.py -Scanned: 2016-10-18 16:33:08.158867 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benhosmer/flask-zurb -https://github.com/benhosmer/flask-zurb -Entry file: flask-zurb/app.py -Scanned: 2016-10-18 16:33:10.697271 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mies/getting-started-flask-redis -https://github.com/mies/getting-started-flask-redis -Entry file: getting-started-flask-redis/app.py -Scanned: 2016-10-18 16:33:12.946513 -No vulnerabilities found. - - -eriktaubeneck/flask-twitter-oembedder -https://github.com/eriktaubeneck/flask-twitter-oembedder -Entry file: flask-twitter-oembedder/tests/test_flask_twitter_oembedder.py -Scanned: 2016-10-18 16:33:15.802294 -No vulnerabilities found. - - -DasIch/Flask-MakeStatic -https://github.com/DasIch/Flask-MakeStatic -Entry file: Flask-MakeStatic/flask_makestatic/__init__.py -Scanned: 2016-10-18 16:33:19.352864 -No vulnerabilities found. - - -insynchq/flask-captain -https://github.com/insynchq/flask-captain -Entry file: flask-captain/example.py -Scanned: 2016-10-18 16:33:20.897938 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fedenusy/flaskr -https://github.com/fedenusy/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:33:25.417186 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottmiao/Flaskr -https://github.com/scottmiao/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-18 16:33:26.910989 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rubensayshi/flaskbp -https://github.com/rubensayshi/flaskbp -Entry file: flaskbp/flaskbp/application.py -Scanned: 2016-10-18 16:33:30.476282 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ovet/flaskboard -https://github.com/ovet/flaskboard -Entry file: flaskboard/flaskboard.py -Scanned: 2016-10-18 16:33:33.993515 -No vulnerabilities found. - - -iaserrat/flaskify -https://github.com/iaserrat/flaskify -Entry file: flaskify/flaskify.py -Scanned: 2016-10-18 16:33:35.535839 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EventMobi/thorium -https://github.com/EventMobi/thorium -Entry file: thorium/thorium/testsuite/test_thoriumflask.py -Scanned: 2016-10-18 16:33:41.006891 -No vulnerabilities found. - - -paraboul/FlaskPress -https://github.com/paraboul/FlaskPress -Entry file: None -Scanned: 2016-10-18 16:33:46.540429 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/paraboul/FlaskPress. - -dl33/FlaskBlog -https://github.com/dl33/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-18 16:33:49.306284 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/flask-ip-hostname-resolvers -https://github.com/flebel/flask-ip-hostname-resolvers -Entry file: flask-ip-hostname-resolvers/ip.py -Scanned: 2016-10-18 16:33:50.593494 -No vulnerabilities found. - - -newbiemasih/Flask-Course -https://github.com/newbiemasih/Flask-Course -Entry file: None -Scanned: 2016-10-18 16:33:53.137136 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -port-/flask-skeleton -https://github.com/port-/flask-skeleton -Entry file: None -Scanned: 2016-10-18 16:33:53.634235 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/port-/flask-skeleton. - -AlexeyMK/gglto_flask -https://github.com/AlexeyMK/gglto_flask -Entry file: gglto_flask/gglto.py -Scanned: 2016-10-18 16:33:55.341908 -No vulnerabilities found. - - -xor-xor/webapp_flask -https://github.com/xor-xor/webapp_flask -Entry file: webapp_flask/app.py -Scanned: 2016-10-18 16:33:57.600452 -No vulnerabilities found. - - -suneel0101/flask-buddy -https://github.com/suneel0101/flask-buddy -Entry file: flask-buddy/server.py -Scanned: 2016-10-18 16:33:59.821823 -No vulnerabilities found. - - -sanoju/GaeFlask -https://github.com/sanoju/GaeFlask -Entry file: GaeFlask/flask/sessions.py -Scanned: 2016-10-18 16:34:00.342179 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kfk/flask-blog -https://github.com/kfk/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:34:00.906062 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -irakasleibiltaria/flask-tutorial -https://github.com/irakasleibiltaria/flask-tutorial -Entry file: flask-tutorial/hello.py -Scanned: 2016-10-18 16:34:02.154246 -No vulnerabilities found. - - -wodim/flask-test -https://github.com/wodim/flask-test -Entry file: flask-test/hello.py -Scanned: 2016-10-18 16:34:03.408966 -No vulnerabilities found. - - -sammyrulez/flask-grolla -https://github.com/sammyrulez/flask-grolla -Entry file: flask-grolla/tests.py -Scanned: 2016-10-18 16:34:05.441090 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -maxbucknell/vanilla_flask -https://github.com/maxbucknell/vanilla_flask -Entry file: vanilla_flask/vanilla/__init__.py -Scanned: 2016-10-18 16:34:08.018407 -No vulnerabilities found. - - -DamnedFacts/flask-contact -https://github.com/DamnedFacts/flask-contact -Entry file: flask-contact/main.py -Scanned: 2016-10-18 16:34:08.536272 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marcilioleite/flask-websocket -https://github.com/marcilioleite/flask-websocket -Entry file: flask-websocket/server.py -Scanned: 2016-10-18 16:34:09.761750 -No vulnerabilities found. - - -duffy25/sample_flask -https://github.com/duffy25/sample_flask -Entry file: sample_flask/sample_flask.py -Scanned: 2016-10-18 16:34:12.832700 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elijahc/hello_flask -https://github.com/elijahc/hello_flask -Entry file: hello_flask/hello.py -Scanned: 2016-10-18 16:34:15.091203 -No vulnerabilities found. - - -tmadsen/flask-scaffold -https://github.com/tmadsen/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-18 16:34:19.160739 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomashley/flask-template -https://github.com/tomashley/flask-template -Entry file: flask-template/app/urls.py -Scanned: 2016-10-18 16:34:22.429171 -No vulnerabilities found. - - -PromooD/flask-aselect -https://github.com/PromooD/flask-aselect -Entry file: flask-aselect/flask_aselect/core.py -Scanned: 2016-10-18 16:34:28.547511 -No vulnerabilities found. - - -danthemanvsqz/Flask-Demo -https://github.com/danthemanvsqz/Flask-Demo -Entry file: Flask-Demo/contacts.py -Scanned: 2016-10-18 16:34:29.902825 -No vulnerabilities found. - - -nisiotis/flask_app -https://github.com/nisiotis/flask_app -Entry file: None -Scanned: 2016-10-18 16:34:31.619541 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nisiotis/flask_app. - -Joinhack/agent -https://github.com/Joinhack/agent -Entry file: agent/flask_sqlalchemy.py -Scanned: 2016-10-18 16:34:34.345704 -Vulnerability 1: -File: agent/agent/views/user.py - > User input at line 44, trigger word "form[": - area = request.form['area'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 2: -File: agent/agent/views/user.py - > User input at line 45, trigger word "form[": - name = request.form['section'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 3: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 4: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 5: -File: agent/agent/views/house.py - > User input at line 34, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 36: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 38: data = cmgmt.queryCommunitiesByUserId(user, q) - File: agent/agent/views/house.py - > Line 33: ret_MAYBE_FUNCTION_NAME = jsonify('code''msg'-1'unkown query') -File: agent/agent/views/house.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0toselect(data)) - -Vulnerability 6: -File: agent/agent/views/house.py - > User input at line 45, trigger word "form[": - community_name = request.form['community'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - -Vulnerability 7: -File: agent/agent/views/house.py - > User input at line 46, trigger word "form[": - location = request.form['location'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - - - -brianly/flask-mega-tutorial -https://github.com/brianly/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-18 16:34:35.892630 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ivosevicmikica/testiranje -https://github.com/ivosevicmikica/testiranje -Entry file: testiranje/index.py -Scanned: 2016-10-18 16:34:38.207101 -No vulnerabilities found. - - -myevan/microblog -https://github.com/myevan/microblog -Entry file: None -Scanned: 2016-10-18 16:34:46.739737 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Eleonore9/StreetMap_ChallengePy -https://github.com/Eleonore9/StreetMap_ChallengePy -Entry file: StreetMap_ChallengePy/StreetMap.py -Scanned: 2016-10-18 16:34:50.134801 -No vulnerabilities found. - - -eriktaubeneck/flask-s3-assets-example -https://github.com/eriktaubeneck/flask-s3-assets-example -Entry file: flask-s3-assets-example/app/__init__.py -Scanned: 2016-10-18 16:34:54.161687 -No vulnerabilities found. - - -vasnake/mapfeatureserver -https://github.com/vasnake/mapfeatureserver -Entry file: None -Scanned: 2016-10-18 16:34:54.669596 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vasnake/mapfeatureserver. - -EvilDmitri/FlaskProject_FuncExe -https://github.com/EvilDmitri/FlaskProject_FuncExe -Entry file: None -Scanned: 2016-10-18 16:34:55.656995 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -epelz/flask-fb-demo -https://github.com/epelz/flask-fb-demo -Entry file: flask-fb-demo/main.py -Scanned: 2016-10-18 16:34:57.157340 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tonilxm/1stFlask -https://github.com/tonilxm/1stFlask -Entry file: 1stFlask/src/lib/flask/sessions.py -Scanned: 2016-10-18 16:34:59.686172 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cldershem/WebFlask-CleanTemplate -https://github.com/cldershem/WebFlask-CleanTemplate -Entry file: None -Scanned: 2016-10-18 16:35:01.212910 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -brooks/python-flask-sample -https://github.com/brooks/python-flask-sample -Entry file: python-flask-sample/hello.py -Scanned: 2016-10-18 16:35:01.798249 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py - -palei/Just-Another-Flask-App -https://github.com/palei/Just-Another-Flask-App -Entry file: Just-Another-Flask-App/app/__init__.py -Scanned: 2016-10-18 16:35:02.330489 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -noisufnoc/HowToFlask -https://github.com/noisufnoc/HowToFlask -Entry file: HowToFlask/app.py -Scanned: 2016-10-18 16:35:03.612500 -No vulnerabilities found. - - -FriendCode/python-flask-sample -https://github.com/FriendCode/python-flask-sample -Entry file: python-flask-sample/hello.py -Scanned: 2016-10-18 16:35:05.620801 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py - -wavrin/flask-mongo-site -https://github.com/wavrin/flask-mongo-site -Entry file: flask-mongo-site/blog/__init__.py -Scanned: 2016-10-18 16:35:08.644171 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marulkan/nagios-status-flask -https://github.com/marulkan/nagios-status-flask -Entry file: nagios-status-flask/hello.py -Scanned: 2016-10-18 16:35:09.174310 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thrisp/flarf -https://github.com/thrisp/flarf -Entry file: flarf/examples/example.py -Scanned: 2016-10-18 16:35:12.667483 -No vulnerabilities found. - - -NSkelsey/trance_piano -https://github.com/NSkelsey/trance_piano -Entry file: trance_piano/app.py -Scanned: 2016-10-18 16:35:14.671020 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lhr530124/nozomiServer -https://github.com/lhr530124/nozomiServer -Entry file: nozomiServer/app.py -Scanned: 2016-10-18 16:35:17.965226 -No vulnerabilities found. - - -skrieder/microblog -https://github.com/skrieder/microblog -Entry file: None -Scanned: 2016-10-18 16:35:19.520881 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -carlosvin/cmsflask -https://github.com/carlosvin/cmsflask -Entry file: cmsflask/cmsflask/__init__.py -Scanned: 2016-10-18 16:35:22.912512 -No vulnerabilities found. - - -Sadhanandh/Fb-page-manager -https://github.com/Sadhanandh/Fb-page-manager -Entry file: Fb-page-manager/flask_app.py -Scanned: 2016-10-18 16:35:26.462679 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thomas-/pyshorturls -https://github.com/thomas-/pyshorturls -Entry file: pyshorturls/short.py -Scanned: 2016-10-18 16:35:29.968992 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sangallimarco/arduino_raspberry_garden_ui -https://github.com/sangallimarco/arduino_raspberry_garden_ui -Entry file: arduino_raspberry_garden_ui/main.py -Scanned: 2016-10-18 16:35:31.519555 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sigilioso/long_polling_example -https://github.com/sigilioso/long_polling_example -Entry file: long_polling_example/server.py -Scanned: 2016-10-18 16:35:37.304540 -No vulnerabilities found. - - -zxt/quotl -https://github.com/zxt/quotl -Entry file: quotl/quotl/__init__.py -Scanned: 2016-10-18 16:35:38.690142 -No vulnerabilities found. - - -bdeeney/crudite -https://github.com/bdeeney/crudite -Entry file: crudite/examples/hello_flask.py -Scanned: 2016-10-18 16:35:47.193657 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luhn/address-book -https://github.com/luhn/address-book -Entry file: address-book/app.py -Scanned: 2016-10-18 16:35:50.493394 -No vulnerabilities found. - - -cameronbracken/pitchforksearch -https://github.com/cameronbracken/pitchforksearch -Entry file: pitchforksearch/pitchforksearch/__init__.py -Scanned: 2016-10-18 16:35:51.016662 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chromy/pithy -https://github.com/chromy/pithy -Entry file: None -Scanned: 2016-10-18 16:35:53.512081 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chromy/pithy. - -adedot/countries_project -https://github.com/adedot/countries_project -Entry file: countries_project/flaskr.py -Scanned: 2016-10-18 16:35:55.770474 -No vulnerabilities found. - - -titainium/PRPHOTO -https://github.com/titainium/PRPHOTO -Entry file: PRPHOTO/prphoto.py -Scanned: 2016-10-18 16:35:59.505810 -No vulnerabilities found. - - -keybits/stripe-experiments -https://github.com/keybits/stripe-experiments -Entry file: stripe-experiments/app.py -Scanned: 2016-10-18 16:36:02.451440 -No vulnerabilities found. - - -izaac/twitty -https://github.com/izaac/twitty -Entry file: twitty/twitty.py -Scanned: 2016-10-18 16:36:02.982622 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fc-thrisp-hurrata-dlm-graveyard/flack -https://github.com/fc-thrisp-hurrata-dlm-graveyard/flack -Entry file: flack/tests/test_app/__init__.py -Scanned: 2016-10-18 16:36:04.423866 -No vulnerabilities found. - - -cenkalti/github-flask -https://github.com/cenkalti/github-flask -Entry file: github-flask/test_flask_github.py -Scanned: 2016-10-18 16:36:06.988188 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -davidism/basic_flask -https://github.com/davidism/basic_flask -Entry file: basic_flask/basic_app/__init__.py -Scanned: 2016-10-18 16:36:08.718349 -No vulnerabilities found. - - -quokkaproject/quokka -https://github.com/quokkaproject/quokka -Entry file: quokka/quokka/tests/flask_csrf_test_client.py -Scanned: 2016-10-18 16:36:12.226201 -No vulnerabilities found. - - -akprasad/flask-forum -https://github.com/akprasad/flask-forum -Entry file: flask-forum/application/__init__.py -Scanned: 2016-10-18 16:36:14.131976 -No vulnerabilities found. - - -miguelgrinberg/Flask-Runner -https://github.com/miguelgrinberg/Flask-Runner -Entry file: Flask-Runner/examples/runner.py -Scanned: 2016-10-18 16:36:15.505090 -No vulnerabilities found. - - -lepture/flask-turbolinks -https://github.com/lepture/flask-turbolinks -Entry file: flask-turbolinks/flask_turbolinks.py -Scanned: 2016-10-18 16:36:17.393247 -No vulnerabilities found. - - -mkomitee/flask-kerberos -https://github.com/mkomitee/flask-kerberos -Entry file: flask-kerberos/example/example.py -Scanned: 2016-10-18 16:36:18.750826 -No vulnerabilities found. - - -vkolev/flask-template -https://github.com/vkolev/flask-template -Entry file: flask-template/app/__init__.py -Scanned: 2016-10-18 16:36:20.427878 -No vulnerabilities found. - - -ricardorego/FlaskTaskr -https://github.com/ricardorego/FlaskTaskr -Entry file: FlaskTaskr/flasktaskr.py -Scanned: 2016-10-18 16:36:23.576551 -Vulnerability 1: -File: FlaskTaskr/flasktaskr.py - > User input at line 59, trigger word "form[": - name = request.form['name'] -File: FlaskTaskr/flasktaskr.py - > reaches line 69, trigger word "execute(": - g.db.execute('insert into ftasks (name, due_date, priority, status) values (?, ?, ?, 1)', [name, due_date, priority]) - -Vulnerability 2: -File: FlaskTaskr/flasktaskr.py - > User input at line 60, trigger word "form[": - due_date = request.form['due_date'] -File: FlaskTaskr/flasktaskr.py - > reaches line 69, trigger word "execute(": - g.db.execute('insert into ftasks (name, due_date, priority, status) values (?, ?, ?, 1)', [name, due_date, priority]) - -Vulnerability 3: -File: FlaskTaskr/flasktaskr.py - > User input at line 61, trigger word "form[": - priority = request.form['priority'] -File: FlaskTaskr/flasktaskr.py - > reaches line 69, trigger word "execute(": - g.db.execute('insert into ftasks (name, due_date, priority, status) values (?, ?, ?, 1)', [name, due_date, priority]) - -Vulnerability 4: -File: FlaskTaskr/flasktaskr.py - > User input at line 62, trigger word "form[": - task_id = request.form['task_idEdit'] -File: FlaskTaskr/flasktaskr.py - > reaches line 76, trigger word "execute(": - cur.execute('select count(*) from ftasks where task_id=' + str(task_id)) - -Vulnerability 5: -File: FlaskTaskr/flasktaskr.py - > User input at line 59, trigger word "form[": - name = request.form['name'] -File: FlaskTaskr/flasktaskr.py - > reaches line 79, trigger word "execute(": - g.db.execute('insert into ftasks (name, due_date, priority, status) values (?, ?, ?, 1)', [name, due_date, priority]) - -Vulnerability 6: -File: FlaskTaskr/flasktaskr.py - > User input at line 60, trigger word "form[": - due_date = request.form['due_date'] -File: FlaskTaskr/flasktaskr.py - > reaches line 79, trigger word "execute(": - g.db.execute('insert into ftasks (name, due_date, priority, status) values (?, ?, ?, 1)', [name, due_date, priority]) - -Vulnerability 7: -File: FlaskTaskr/flasktaskr.py - > User input at line 61, trigger word "form[": - priority = request.form['priority'] -File: FlaskTaskr/flasktaskr.py - > reaches line 79, trigger word "execute(": - g.db.execute('insert into ftasks (name, due_date, priority, status) values (?, ?, ?, 1)', [name, due_date, priority]) - -Vulnerability 8: -File: FlaskTaskr/flasktaskr.py - > User input at line 59, trigger word "form[": - name = request.form['name'] -File: FlaskTaskr/flasktaskr.py - > reaches line 85, trigger word "execute(": - g.db.execute('update ftasks set name=?, due_date=?, priority=? where task_id=' + str(task_id), [name, due_date, priority]) - -Vulnerability 9: -File: FlaskTaskr/flasktaskr.py - > User input at line 60, trigger word "form[": - due_date = request.form['due_date'] -File: FlaskTaskr/flasktaskr.py - > reaches line 85, trigger word "execute(": - g.db.execute('update ftasks set name=?, due_date=?, priority=? where task_id=' + str(task_id), [name, due_date, priority]) - -Vulnerability 10: -File: FlaskTaskr/flasktaskr.py - > User input at line 61, trigger word "form[": - priority = request.form['priority'] -File: FlaskTaskr/flasktaskr.py - > reaches line 85, trigger word "execute(": - g.db.execute('update ftasks set name=?, due_date=?, priority=? where task_id=' + str(task_id), [name, due_date, priority]) - -Vulnerability 11: -File: FlaskTaskr/flasktaskr.py - > User input at line 62, trigger word "form[": - task_id = request.form['task_idEdit'] -File: FlaskTaskr/flasktaskr.py - > reaches line 85, trigger word "execute(": - g.db.execute('update ftasks set name=?, due_date=?, priority=? where task_id=' + str(task_id), [name, due_date, priority]) - - - -shivamthapar/OpenTok-Flask-Demo -https://github.com/shivamthapar/OpenTok-Flask-Demo -Entry file: OpenTok-Flask-Demo/main.py -Scanned: 2016-10-18 16:36:27.847833 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marksteve/flask-beanstalk -https://github.com/marksteve/flask-beanstalk -Entry file: flask-beanstalk/example.py -Scanned: 2016-10-18 16:36:31.803209 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thisgirlangie/Flask -https://github.com/thisgirlangie/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-18 16:36:32.326732 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ziozzang/flask-as-http-proxy-server -https://github.com/ziozzang/flask-as-http-proxy-server -Entry file: flask-as-http-proxy-server/proxy.py -Scanned: 2016-10-18 16:36:38.091225 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Impactstory/flask-template -https://github.com/Impactstory/flask-template -Entry file: flask-template/impactstoryanalytics/__init__.py -Scanned: 2016-10-18 16:36:39.316094 -No vulnerabilities found. - - -ubergarm/flask-mongo-app -https://github.com/ubergarm/flask-mongo-app -Entry file: flask-mongo-app/app/app.py -Scanned: 2016-10-18 16:36:48.899314 -No vulnerabilities found. - - -akprasad/flask-starter -https://github.com/akprasad/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-18 16:36:50.416762 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wywin/Rubustat -https://github.com/wywin/Rubustat -Entry file: Rubustat/rubustat_web_interface.py -Scanned: 2016-10-18 16:36:53.058133 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sant0sh/Flask-Task-Website -https://github.com/sant0sh/Flask-Task-Website -Entry file: Flask-Task-Website/routes.py -Scanned: 2016-10-18 16:36:54.630679 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kingink/bitly-oauth-flask -https://github.com/kingink/bitly-oauth-flask -Entry file: bitly-oauth-flask/bitly_oauth.py -Scanned: 2016-10-18 16:36:57.345920 -No vulnerabilities found. - - -b1r3k/flask-seed -https://github.com/b1r3k/flask-seed -Entry file: None -Scanned: 2016-10-18 16:37:01.685177 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/b1r3k/flask-seed. - -eriktaubeneck/hacky_risk_flask_ai -https://github.com/eriktaubeneck/hacky_risk_flask_ai -Entry file: hacky_risk_flask_ai/app.py -Scanned: 2016-10-18 16:37:04.553347 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -robbles/humanapi-sample-app -https://github.com/robbles/humanapi-sample-app -Entry file: humanapi-sample-app/app.py -Scanned: 2016-10-18 16:37:08.745996 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yjroot/flask-base-frame -https://github.com/yjroot/flask-base-frame -Entry file: flask-base-frame/application/__init__.py -Scanned: 2016-10-18 16:37:10.070189 -No vulnerabilities found. - - -KevinJones/flask-guestbook-example -https://github.com/KevinJones/flask-guestbook-example -Entry file: flask-guestbook-example/main.py -Scanned: 2016-10-18 16:37:11.789966 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jpanganiban/flask-gevent-streaming -https://github.com/jpanganiban/flask-gevent-streaming -Entry file: flask-gevent-streaming/server.py -Scanned: 2016-10-18 16:37:14.004881 -No vulnerabilities found. - - -nocoffe/flaskenv -https://github.com/nocoffe/flaskenv -Entry file: flaskenv/Lib/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-18 16:37:17.984650 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -agsdot/flaskr -https://github.com/agsdot/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:37:18.500825 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fisheuler/flaskdemo -https://github.com/fisheuler/flaskdemo -Entry file: flaskdemo/tumblelog/__init__.py -Scanned: 2016-10-18 16:37:19.875575 -No vulnerabilities found. - - -papaeye/pytest-flaskit -https://github.com/papaeye/pytest-flaskit -Entry file: pytest-flaskit/examples/myapp.py -Scanned: 2016-10-18 16:37:21.573313 -No vulnerabilities found. - - -benosment/flaskr -https://github.com/benosment/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:37:22.070863 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bvnp/flaskr -https://github.com/bvnp/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:37:22.595572 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pspeter3/flaskr -https://github.com/pspeter3/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:37:23.088835 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aisondhs/flask-demo-peewee-mysql -https://github.com/aisondhs/flask-demo-peewee-mysql -Entry file: flask-demo-peewee-mysql/minitwit/minitwit.py -Scanned: 2016-10-18 16:37:28.475801 -No vulnerabilities found. - - -chenyukang/FlaskStudy -https://github.com/chenyukang/FlaskStudy -Entry file: FlaskStudy/flaskr.py -Scanned: 2016-10-18 16:37:33.395992 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luc-at-jr/janrain-flask-tutorial -https://github.com/luc-at-jr/janrain-flask-tutorial -Entry file: janrain-flask-tutorial/tutorial1/server.py -Scanned: 2016-10-18 16:37:38.151946 -No vulnerabilities found. - - -bfauble/flask-skeleton -https://github.com/bfauble/flask-skeleton -Entry file: None -Scanned: 2016-10-18 16:37:38.692659 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bfauble/flask-skeleton. - -mross462/flask_env -https://github.com/mross462/flask_env -Entry file: flask_env/myapp.py -Scanned: 2016-10-18 16:37:49.060622 -No vulnerabilities found. - - -k4y3ff/flask-lesson -https://github.com/k4y3ff/flask-lesson -Entry file: flask-lesson/webapp.py -Scanned: 2016-10-18 16:37:51.415999 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -astyfx/microblog_flask -https://github.com/astyfx/microblog_flask -Entry file: microblog_flask/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-18 16:37:58.802317 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chhantyal/flask_app -https://github.com/chhantyal/flask_app -Entry file: None -Scanned: 2016-10-18 16:37:59.343620 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chhantyal/flask_app. - -robotrab/outfit-flask -https://github.com/robotrab/outfit-flask -Entry file: outfit-flask/outfit/__init__.py -Scanned: 2016-10-18 16:38:01.038627 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -erfanian/flask-marklet -https://github.com/erfanian/flask-marklet -Entry file: flask-marklet/main.py -Scanned: 2016-10-18 16:38:04.868789 -No vulnerabilities found. - - -insynchq/flask-upstatic -https://github.com/insynchq/flask-upstatic -Entry file: flask-upstatic/example/example.py -Scanned: 2016-10-18 16:38:06.461549 -No vulnerabilities found. - - -Blender3D/flask-loader -https://github.com/Blender3D/flask-loader -Entry file: flask-loader/example/app.py -Scanned: 2016-10-18 16:38:07.695563 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -masom/flask-trois -https://github.com/masom/flask-trois -Entry file: flask-trois/flask_trois/__init__.py -Scanned: 2016-10-18 16:38:09.049239 -No vulnerabilities found. - - -pace-noge/flask-base -https://github.com/pace-noge/flask-base -Entry file: flask-base/app/__init__.py -Scanned: 2016-10-18 16:38:10.408434 -No vulnerabilities found. - - -csutherl/flask-practice -https://github.com/csutherl/flask-practice -Entry file: None -Scanned: 2016-10-18 16:38:12.311462 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/csutherl/flask-practice. - -rafaelnovello/flask-dynamodb -https://github.com/rafaelnovello/flask-dynamodb -Entry file: flask-dynamodb/dynamodb.py -Scanned: 2016-10-18 16:38:13.556401 -No vulnerabilities found. - - -linkerlin/flask-blog -https://github.com/linkerlin/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:38:14.582244 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -dtonys/flask_gallery -https://github.com/dtonys/flask_gallery -Entry file: flask_gallery/app.py -Scanned: 2016-10-18 16:38:17.474077 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apisgirl/flask-tutorial -https://github.com/apisgirl/flask-tutorial -Entry file: flask-tutorial/app/__init__.py -Scanned: 2016-10-18 16:38:19.838934 -No vulnerabilities found. - - -yannlambret/flstats -https://github.com/yannlambret/flstats -Entry file: flstats/flstats/flstats_tests.py -Scanned: 2016-10-18 16:38:21.166000 -No vulnerabilities found. - - -cos-labs/git-smart-http-flask -https://github.com/cos-labs/git-smart-http-flask -Entry file: git-smart-http-flask/main.py -Scanned: 2016-10-18 16:38:22.383434 -No vulnerabilities found. - - -mvo5/chpasswd-ldap-flask -https://github.com/mvo5/chpasswd-ldap-flask -Entry file: chpasswd-ldap-flask/chpasswd_flask.py -Scanned: 2016-10-18 16:38:23.707408 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ykrkn/above-the-flask -https://github.com/ykrkn/above-the-flask -Entry file: above-the-flask/main.py -Scanned: 2016-10-18 16:38:24.962866 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -CalumJEadie/basic-flask-heroku-app -https://github.com/CalumJEadie/basic-flask-heroku-app -Entry file: basic-flask-heroku-app/app.py -Scanned: 2016-10-18 16:38:26.178196 -No vulnerabilities found. - - -thezange/starter_flask_struct -https://github.com/thezange/starter_flask_struct -Entry file: starter_flask_struct/app/__init__.py -Scanned: 2016-10-18 16:38:33.882088 -No vulnerabilities found. - - -RealHacker/ly-flask-server -https://github.com/RealHacker/ly-flask-server -Entry file: ly-flask-server/tqtServer.py -Scanned: 2016-10-18 16:38:35.161528 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregarious/lilypad-server-flask -https://github.com/gregarious/lilypad-server-flask -Entry file: lilypad-server-flask/serverapp/__init__.py -Scanned: 2016-10-18 16:38:36.436276 -No vulnerabilities found. - - -cessor/flask-mvc-skeleton -https://github.com/cessor/flask-mvc-skeleton -Entry file: flask-mvc-skeleton/app.py -Scanned: 2016-10-18 16:38:38.688664 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tgross/flask-riak-sessions -https://github.com/tgross/flask-riak-sessions -Entry file: flask-riak-sessions/flask_riaksessions.py -Scanned: 2016-10-18 16:38:40.050335 -No vulnerabilities found. - - -saqib-nadeem/flask-app-halfmoon -https://github.com/saqib-nadeem/flask-app-halfmoon -Entry file: flask-app-halfmoon/halfmoon.py -Scanned: 2016-10-18 16:38:49.736745 -No vulnerabilities found. - - -beckastar/Web-SQL- -https://github.com/beckastar/Web-SQL- -Entry file: Web-SQL-/webapp.py -Scanned: 2016-10-18 16:38:52.099632 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benosment/rPi-cookbook -https://github.com/benosment/rPi-cookbook -Entry file: rPi-cookbook/cookbook.py -Scanned: 2016-10-18 16:38:58.101397 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DrayChou/Nginx-uWSGI-Flask-twip -https://github.com/DrayChou/Nginx-uWSGI-Flask-twip -Entry file: Nginx-uWSGI-Flask-twip/twip.py -Scanned: 2016-10-18 16:39:00.377684 -No vulnerabilities found. - - -mikaylathompson/fishnet -https://github.com/mikaylathompson/fishnet -Entry file: fishnet/app/__init__.py -Scanned: 2016-10-18 16:39:03.588130 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bzyx/pi-dht22 -https://github.com/bzyx/pi-dht22 -Entry file: pi-dht22/py/flask_rest_dht/main.py -Scanned: 2016-10-18 16:39:05.063589 -No vulnerabilities found. - - -buntwo/scramble-solver-webapp -https://github.com/buntwo/scramble-solver-webapp -Entry file: scramble-solver-webapp/flask/sessions.py -Scanned: 2016-10-18 16:39:07.510882 -No vulnerabilities found. - - -bessiec/Hackbright-Gradebook-Exercise-7.10.13 -https://github.com/bessiec/Hackbright-Gradebook-Exercise-7.10.13 -Entry file: None -Scanned: 2016-10-18 16:39:12.926315 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bessiec/Hackbright-Gradebook-Exercise-7.10.13. - -nicholasareed/sql_webapp -https://github.com/nicholasareed/sql_webapp -Entry file: sql_webapp/webapp.py -Scanned: 2016-10-18 16:39:14.623980 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -col42dev/todoAPIServer -https://github.com/col42dev/todoAPIServer -Entry file: todoAPIServer/todo.py -Scanned: 2016-10-18 16:39:16.317014 -Vulnerability 1: -File: todoAPIServer/todo.py - > User input at line 35, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: todoAPIServer/todo.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - -Vulnerability 2: -File: todoAPIServer/rest-server.py - > User input at line 69, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: todoAPIServer/rest-server.py - > reaches line 76, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201) - - - -a-r-d/ssms -https://github.com/a-r-d/ssms -Entry file: ssms/ssms/__init__.py -Scanned: 2016-10-18 16:39:34.721575 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -octaflop/specktrum -https://github.com/octaflop/specktrum -Entry file: specktrum/specktrum/app.py -Scanned: 2016-10-18 16:39:36.809672 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neofyte/live_chart_demo -https://github.com/neofyte/live_chart_demo -Entry file: None -Scanned: 2016-10-18 16:39:39.528643 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/neofyte/live_chart_demo. - -Kondou-ger/mrtg.py -https://github.com/Kondou-ger/mrtg.py -Entry file: None -Scanned: 2016-10-18 16:39:41.259521 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Kondou-ger/mrtg.py. - -quelloquialism/tcstats -https://github.com/quelloquialism/tcstats -Entry file: tcstats/src/app_provider.py -Scanned: 2016-10-18 16:39:42.731732 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iandexter/ansible_get -https://github.com/iandexter/ansible_get -Entry file: ansible_get/ansible_get/__init__.py -Scanned: 2016-10-18 16:39:44.555975 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shea256/angular-flask -https://github.com/shea256/angular-flask -Entry file: angular-flask/angular_flask/__init__.py -Scanned: 2016-10-18 16:39:47.859343 -No vulnerabilities found. - - -corydolphin/flask-cors -https://github.com/corydolphin/flask-cors -Entry file: flask-cors/tests/extension/test_app_extension.py -Scanned: 2016-10-18 16:39:49.702641 -No vulnerabilities found. - - -allisson/flask-example -https://github.com/allisson/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-18 16:39:50.746598 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sloria/flask-ghpages-example -https://github.com/sloria/flask-ghpages-example -Entry file: flask-ghpages-example/project/app.py -Scanned: 2016-10-18 16:39:52.096286 -No vulnerabilities found. - - -mjhea0/flask-basic-registration -https://github.com/mjhea0/flask-basic-registration -Entry file: flask-basic-registration/project/__init__.py -Scanned: 2016-10-18 16:39:53.463629 -No vulnerabilities found. - - -lashex/flask-neo4j -https://github.com/lashex/flask-neo4j -Entry file: flask-neo4j/flask_neo4j.py -Scanned: 2016-10-18 16:39:55.034009 -No vulnerabilities found. - - -vkolev/flask-template -https://github.com/vkolev/flask-template -Entry file: flask-template/app/__init__.py -Scanned: 2016-10-18 16:39:56.763435 -No vulnerabilities found. - - -vollov/angular-flask-login -https://github.com/vollov/angular-flask-login -Entry file: angular-flask-login/src/server.py -Scanned: 2016-10-18 16:39:58.342096 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -muneeb-ali/stripe-flask -https://github.com/muneeb-ali/stripe-flask -Entry file: stripe-flask/stripe_flask.py -Scanned: 2016-10-18 16:39:59.931774 -No vulnerabilities found. - - -99co/flask-heroku -https://github.com/99co/flask-heroku -Entry file: flask-heroku/acme/__init__.py -Scanned: 2016-10-18 16:40:01.808134 -No vulnerabilities found. - - -buraktekin/Flask -https://github.com/buraktekin/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-18 16:40:02.794684 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maigfrga/flask-user-api -https://github.com/maigfrga/flask-user-api -Entry file: flask-user-api/users/views.py -Scanned: 2016-10-18 16:40:04.118752 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -baxter13/flask -https://github.com/baxter13/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 16:40:05.057895 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -catsky/rebang -https://github.com/catsky/rebang -Entry file: rebang/1/chartnet/__init__.py -Scanned: 2016-10-18 16:40:15.200381 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miguelgrinberg/Flask-Intro -https://github.com/miguelgrinberg/Flask-Intro -Entry file: Flask-Intro/06-RedirectsAndSessions/hello.py -Scanned: 2016-10-18 16:40:16.488864 -No vulnerabilities found. - - -Eforcers/gae-flask-todo -https://github.com/Eforcers/gae-flask-todo -Entry file: gae-flask-todo/main.py -Scanned: 2016-10-18 16:40:20.215801 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pegase745/sqlalchemy-datatables -https://github.com/Pegase745/sqlalchemy-datatables -Entry file: sqlalchemy-datatables/examples/flask_tut/flask_tut/__init__.py -Scanned: 2016-10-18 16:40:21.839294 -No vulnerabilities found. - - -mjhea0/flask-stripe -https://github.com/mjhea0/flask-stripe -Entry file: flask-stripe/app/__init__.py -Scanned: 2016-10-18 16:40:23.139887 -No vulnerabilities found. - - -nathancahill/flask-oauth-example -https://github.com/nathancahill/flask-oauth-example -Entry file: flask-oauth-example/app/__init__.py -Scanned: 2016-10-18 16:40:24.382480 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -miguelgrinberg/Flask-MarrowMailer -https://github.com/miguelgrinberg/Flask-MarrowMailer -Entry file: Flask-MarrowMailer/examples/gmail.py -Scanned: 2016-10-18 16:40:37.314191 -No vulnerabilities found. - - -eigenn/flaskengine -https://github.com/eigenn/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 16:40:41.173120 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marksteve/flask-otpauth -https://github.com/marksteve/flask-otpauth -Entry file: flask-otpauth/example/example.py -Scanned: 2016-10-18 16:40:44.377033 -No vulnerabilities found. - - -aybuke/Flask- -https://github.com/aybuke/Flask- -Entry file: Flask-/flaskr.py -Scanned: 2016-10-18 16:40:48.091673 -No vulnerabilities found. - - -kageurufu/flask-sandbox -https://github.com/kageurufu/flask-sandbox -Entry file: flask-sandbox/test_sandbox.py -Scanned: 2016-10-18 16:40:49.466795 -No vulnerabilities found. - - -Modulus/Flask-RestfulDemo -https://github.com/Modulus/Flask-RestfulDemo -Entry file: Flask-RestfulDemo/webapp.py -Scanned: 2016-10-18 16:40:52.220693 -No vulnerabilities found. - - -hominlinx/flaskr -https://github.com/hominlinx/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:40:53.706473 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hansent/flaskr -https://github.com/hansent/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:40:54.201146 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stvnwlsn/flaskr -https://github.com/stvnwlsn/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:40:55.746693 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrecachinas/Flaskr -https://github.com/mrecachinas/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-18 16:40:58.345440 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -erikmingo/flaskrr -https://github.com/erikmingo/flaskrr -Entry file: flaskrr/flaskr.py -Scanned: 2016-10-18 16:40:59.587086 -No vulnerabilities found. - - -olsososo/flaskr -https://github.com/olsososo/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-18 16:41:01.090773 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -keyz182/flask-login-template -https://github.com/keyz182/flask-login-template -Entry file: flask-login-template/app/__init__.py -Scanned: 2016-10-18 16:41:03.752098 -No vulnerabilities found. - - -peterhudec/liveandletdie -https://github.com/peterhudec/liveandletdie -Entry file: liveandletdie/sample_apps/flask/main.py -Scanned: 2016-10-18 16:41:06.403220 -No vulnerabilities found. - - -Kaibin/FlaskDemo -https://github.com/Kaibin/FlaskDemo -Entry file: FlaskDemo/app.py -Scanned: 2016-10-18 16:41:07.779553 -No vulnerabilities found. - - -sandeep-sidhu/flask_demo -https://github.com/sandeep-sidhu/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-18 16:41:19.263540 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pnelson/flask-passport -https://github.com/pnelson/flask-passport -Entry file: flask-passport/flask_passport.py -Scanned: 2016-10-18 16:41:21.630078 -Vulnerability 1: -File: flask-passport/flask_passport.py - > User input at line 209, trigger word "get(": - data = self.dumps([session[self.user_id_key], request.headers.get('User-Agent')]) -File: flask-passport/flask_passport.py - > reaches line 211, trigger word "set_cookie(": - rv.set_cookie(self.persistent_cookie_name, data,max_age=self.duration, path=self.path, domain=self.domain, secure=self.secure, httponly=self.httponly) - - - -skscharr/Flask-Tutorial -https://github.com/skscharr/Flask-Tutorial -Entry file: Flask-Tutorial/flask_test.py -Scanned: 2016-10-18 16:41:23.855353 -No vulnerabilities found. - - -spo587/set_flask -https://github.com/spo587/set_flask -Entry file: set_flask/set_app.py -Scanned: 2016-10-18 16:41:25.432556 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mross462/flask_env -https://github.com/mross462/flask_env -Entry file: flask_env/myapp.py -Scanned: 2016-10-18 16:41:36.717040 -No vulnerabilities found. - - -sileht/flask-userbrowser -https://github.com/sileht/flask-userbrowser -Entry file: flask-userbrowser/userbrowser/__init__.py -Scanned: 2016-10-18 16:41:38.102768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samwwwblack/flask-wellknown -https://github.com/samwwwblack/flask-wellknown -Entry file: flask-wellknown/wellknown_demo.py -Scanned: 2016-10-18 16:41:39.497904 -No vulnerabilities found. - - -sacanix/Flask-Nytro -https://github.com/sacanix/Flask-Nytro -Entry file: Flask-Nytro/sample/sample_app/__init__.py -Scanned: 2016-10-18 16:41:41.865727 -No vulnerabilities found. - - -qifly/flask-blog -https://github.com/qifly/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:41:42.400471 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -tlingf/flask-site -https://github.com/tlingf/flask-site -Entry file: flask-site/routes.py -Scanned: 2016-10-18 16:41:43.750428 -No vulnerabilities found. - - -h3idan/flask-bbs -https://github.com/h3idan/flask-bbs -Entry file: flask-bbs/runserver.py -Scanned: 2016-10-18 16:41:45.242235 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pnelson/flask-informal -https://github.com/pnelson/flask-informal -Entry file: flask-informal/tests.py -Scanned: 2016-10-18 16:41:47.559606 -No vulnerabilities found. - - -amerature/flask-blog -https://github.com/amerature/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-18 16:41:48.077724 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -abhinavn/helloworld-flask -https://github.com/abhinavn/helloworld-flask -Entry file: helloworld-flask/routes.py -Scanned: 2016-10-18 16:41:50.398896 -No vulnerabilities found. - - -recfab/learn-flask -https://github.com/recfab/learn-flask -Entry file: learn-flask/microblog/app/__init__.py -Scanned: 2016-10-18 16:41:52.849118 -No vulnerabilities found. - - -renansz/flask-bible -https://github.com/renansz/flask-bible -Entry file: flask-bible/bible.py -Scanned: 2016-10-18 16:41:56.102669 -No vulnerabilities found. - - -sampathweb/pyweb_flask -https://github.com/sampathweb/pyweb_flask -Entry file: pyweb_flask/microblog.py -Scanned: 2016-10-18 16:41:57.829221 -No vulnerabilities found. - - -SegFaultAX/sampleapp-flask -https://github.com/SegFaultAX/sampleapp-flask -Entry file: sampleapp-flask/app.py -Scanned: 2016-10-18 16:41:59.165356 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miguelgrinberg/Flask-Bouncer -https://github.com/miguelgrinberg/Flask-Bouncer -Entry file: Flask-Bouncer/tests/test_local.py -Scanned: 2016-10-18 16:42:00.635510 -No vulnerabilities found. - - -wanghao524151/flask-magic -https://github.com/wanghao524151/flask-magic -Entry file: flask-magic/demo_erp/manage.py -Scanned: 2016-10-18 16:42:02.435067 -No vulnerabilities found. - - -turnkey-commerce/flask-notes -https://github.com/turnkey-commerce/flask-notes -Entry file: flask-notes/app.py -Scanned: 2016-10-18 16:42:04.090440 -Vulnerability 1: -File: flask-notes/views/accounts.py - > User input at line 20, trigger word ".data": - error_message = dbutil.create_user(db, form.email.data, form.first_name.data, form.last_name.data, form.password.data) -File: flask-notes/views/accounts.py - > reaches line 26, trigger word "flash(": - flash('Error registering: %s' % error_message, 'error-message') - -Vulnerability 2: -File: flask-notes/views/accounts.py - > User input at line 40, trigger word ".data": - user = dbutil.validate_password(db, form.email.data, form.password.data) -File: flask-notes/views/accounts.py - > reaches line 45, trigger word "flash(": - flash('Welcome %s!' % user.first_name) - -Vulnerability 3: -File: flask-notes/views/accounts.py - > User input at line 66, trigger word ".data": - error_message = dbutil.update_user(db, current_user.email, form.first_name.data, form.last_name.data,password=form.password.data) -File: flask-notes/views/accounts.py - > reaches line 71, trigger word "flash(": - flash('Error updating profile: %s' % error_message, 'error-message') - -Vulnerability 4: -File: flask-notes/views/projects.py - > User input at line 30, trigger word ".data": - error_message = dbutil.create_project(db, current_user, form.project_name.data) -File: flask-notes/views/projects.py - > reaches line 35, trigger word "flash(": - flash('Error creating project: %s' % error_message, 'error-message') - -Vulnerability 5: -File: flask-notes/views/projects.py - > User input at line 51, trigger word ".data": - error_message = dbutil.update_project(db, project_id, current_user, form.project_name.data) -File: flask-notes/views/projects.py - > reaches line 56, trigger word "flash(": - flash('Error editing project: %s' % error_message, 'error-message') - -Vulnerability 6: -File: flask-notes/views/projects.py - > User input at line 61, trigger word ".data": - project_id = form.project_id.data -Reassigned in: - File: flask-notes/views/projects.py - > Line 51: edited = dbutil.update_project(db, project_id, current_user, form.project_name.data) - File: flask-notes/views/projects.py - > Line 51: error_message = dbutil.update_project(db, project_id, current_user, form.project_name.data) -File: flask-notes/views/projects.py - > reaches line 56, trigger word "flash(": - flash('Error editing project: %s' % error_message, 'error-message') - -Vulnerability 7: -File: flask-notes/views/projects.py - > User input at line 88, trigger word ".data": - project_id = form.project_id.data -Reassigned in: - File: flask-notes/views/projects.py - > Line 78: edited = dbutil.delete_project(db, project_id, current_user) - File: flask-notes/views/projects.py - > Line 78: error_message = dbutil.delete_project(db, project_id, current_user) - File: flask-notes/views/projects.py - > Line 90: project = dbutil.get_project(db, project_id, current_user._id) - File: flask-notes/views/projects.py - > Line 91: ret_MAYBE_FUNCTION_NAME = render_template('projects/delete_project.html',form=form, project_name=project.project_name) - File: flask-notes/views/projects.py - > Line 81: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects.projects_list')) -File: flask-notes/views/projects.py - > reaches line 83, trigger word "flash(": - flash('Error deleting project: %s' % error_message, 'error-message') - -Vulnerability 8: -File: flask-notes/views/projects.py - > User input at line 114, trigger word ".data": - error_message = dbutil.create_topic(db, current_user, project_id, form.topic_name.data) -File: flask-notes/views/projects.py - > reaches line 119, trigger word "flash(": - flash('Error creating topic: %s' % error_message, 'error-message') - -Vulnerability 9: -File: flask-notes/views/projects.py - > User input at line 154, trigger word ".data": - topic_id = form.topic_id.data -Reassigned in: - File: flask-notes/views/projects.py - > Line 144: edited = dbutil.update_topic(db, topic_id, current_user, form) - File: flask-notes/views/projects.py - > Line 144: error_message = dbutil.update_topic(db, topic_id, current_user, form) -File: flask-notes/views/projects.py - > reaches line 149, trigger word "flash(": - flash('Error editing topic: %s' % error_message, 'error-message') - -Vulnerability 10: -File: flask-notes/views/projects.py - > User input at line 181, trigger word ".data": - topic_id = form.topic_id.data -Reassigned in: - File: flask-notes/views/projects.py - > Line 171: edited = dbutil.add_topic_note(db, topic_id, current_user, form) - File: flask-notes/views/projects.py - > Line 171: error_message = dbutil.add_topic_note(db, topic_id, current_user, form) - File: flask-notes/views/projects.py - > Line 174: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects.topic_details',project_id=project_id, topic_id=topic_id)) - File: flask-notes/views/projects.py - > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('projects/add_topic_note.html',form=form) -File: flask-notes/views/projects.py - > reaches line 176, trigger word "flash(": - flash('Error adding note: %s' % error_message, 'error-message') - -Vulnerability 11: -File: flask-notes/views/projects.py - > User input at line 208, trigger word ".data": - topic_id = form.topic_id.data -Reassigned in: - File: flask-notes/views/projects.py - > Line 198: deleted = dbutil.delete_topic_note(db, topic_id, note_id, current_user) - File: flask-notes/views/projects.py - > Line 198: error_message = dbutil.delete_topic_note(db, topic_id, note_id, current_user) - File: flask-notes/views/projects.py - > Line 201: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects.topic_details',project_id=project_id, topic_id=topic_id)) - File: flask-notes/views/projects.py - > Line 213: topic = dbutil.get_topic(db, topic_id, current_user._id) - File: flask-notes/views/projects.py - > Line 218: ret_MAYBE_FUNCTION_NAME = render_template('projects/delete_note.html',form=form, note_title=note_title, project_id=project_id, topic_id=topic_id, note_id=note_id) -File: flask-notes/views/projects.py - > reaches line 203, trigger word "flash(": - flash('Error deleting note: %s' % error_message, 'error-message') - -Vulnerability 12: -File: flask-notes/views/projects.py - > User input at line 241, trigger word ".data": - topic_id = form.topic_id.data -Reassigned in: - File: flask-notes/views/projects.py - > Line 231: edited = dbutil.edit_topic_note(db, topic_id, note_id, current_user, form) - File: flask-notes/views/projects.py - > Line 231: error_message = dbutil.edit_topic_note(db, topic_id, note_id, current_user, form) - File: flask-notes/views/projects.py - > Line 234: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects.topic_details',project_id=project_id, topic_id=topic_id)) - File: flask-notes/views/projects.py - > Line 266: ret_MAYBE_FUNCTION_NAME = render_template('projects/edit_topic_note.html',form=form) -File: flask-notes/views/projects.py - > reaches line 236, trigger word "flash(": - flash('Error editing note: %s' % error_message, 'error-message') - -Vulnerability 13: -File: flask-notes/views/projects.py - > User input at line 289, trigger word ".data": - topic_id = form.topic_id.data -Reassigned in: - File: flask-notes/views/projects.py - > Line 279: deleted = dbutil.delete_topic(db, topic_id, current_user) - File: flask-notes/views/projects.py - > Line 279: error_message = dbutil.delete_topic(db, topic_id, current_user) - File: flask-notes/views/projects.py - > Line 291: topic = dbutil.get_topic(db, topic_id, current_user._id) - File: flask-notes/views/projects.py - > Line 292: ret_MAYBE_FUNCTION_NAME = render_template('projects/delete_topic.html',form=form, topic_name=topic.topic_name, project_id=project_id, topic_id=topic_id) - File: flask-notes/views/projects.py - > Line 282: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects.topics_list',project_id=project_id)) -File: flask-notes/views/projects.py - > reaches line 284, trigger word "flash(": - flash('Error deleting topic: %s' % error_message, 'error-message') - -Vulnerability 14: -File: flask-notes/views/admin.py - > User input at line 40, trigger word ".data": - error_message = dbutil.update_user(db, form.email.data, form.first_name.data, form.last_name.data,active=form.active.data, password=form.password.data) -File: flask-notes/views/admin.py - > reaches line 45, trigger word "flash(": - flash('Error updating user: %s' % error_message, 'error-message') - - - -spble/flask-boilerplate -https://github.com/spble/flask-boilerplate -Entry file: flask-boilerplate/app/__init__.py -Scanned: 2016-10-18 16:42:05.664082 -No vulnerabilities found. - - -pnelson/flask-pymongo -https://github.com/pnelson/flask-pymongo -Entry file: flask-pymongo/flask_pymongo.py -Scanned: 2016-10-18 16:42:07.023803 -No vulnerabilities found. - - -JanxSpirit/flask_blog -https://github.com/JanxSpirit/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-18 16:42:08.059371 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -obfusk/napp-hello-flask -https://github.com/obfusk/napp-hello-flask -Entry file: napp-hello-flask/app.py -Scanned: 2016-10-18 16:42:09.307742 -No vulnerabilities found. - - -NathanKleekamp/social-login -https://github.com/NathanKleekamp/social-login -Entry file: social-login/app/__init__.py -Scanned: 2016-10-18 16:42:17.681733 -Vulnerability 1: -File: social-login/app/views.py - > User input at line 52, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: social-login/app/views.py - > Line 71: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: social-login/app/views.py - > Line 50: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: social-login/app/views.py - > Line 65: ret_MAYBE_FUNCTION_NAME = 'Your account has been deactivated. Contact the admin for it to be reinstated.' -File: social-login/app/views.py - > reaches line 69, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - - - -shekhargulati/flaskr-openshift-quickstart -https://github.com/shekhargulati/flaskr-openshift-quickstart -Entry file: flaskr-openshift-quickstart/wsgi/flaskr.py -Scanned: 2016-10-18 16:42:19.017025 -No vulnerabilities found. - - -duncanmurray/Python-Flask-Training -https://github.com/duncanmurray/Python-Flask-Training -Entry file: Python-Flask-Training/app1.py -Scanned: 2016-10-18 16:42:20.284774 -Vulnerability 1: -File: Python-Flask-Training/app1.py - > User input at line 40, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: Python-Flask-Training/app1.py - > reaches line 52, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -philangist/flask-restful-api -https://github.com/philangist/flask-restful-api -Entry file: flask-restful-api/restful_api.py -Scanned: 2016-10-18 16:42:23.997013 -No vulnerabilities found. - - -simplyvikram/official-flask-tutorial -https://github.com/simplyvikram/official-flask-tutorial -Entry file: official-flask-tutorial/flaskr/flaskr.py -Scanned: 2016-10-18 16:42:25.324244 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gwongz/flask_mega_tutorial -https://github.com/gwongz/flask_mega_tutorial -Entry file: flask_mega_tutorial/app/__init__.py -Scanned: 2016-10-18 16:42:37.709812 -No vulnerabilities found. - - -hunterowens/flask_api_demo -https://github.com/hunterowens/flask_api_demo -Entry file: flask_api_demo/app.py -Scanned: 2016-10-18 16:42:38.978058 -No vulnerabilities found. - - -Shaunwei/Python_Flask_blog -https://github.com/Shaunwei/Python_Flask_blog -Entry file: Python_Flask_blog/blog/blog.py -Scanned: 2016-10-18 16:42:40.223914 -No vulnerabilities found. - - -phriscage/sample_flask_app -https://github.com/phriscage/sample_flask_app -Entry file: sample_flask_app/app/__init__.py -Scanned: 2016-10-18 16:42:43.234603 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chriszf/flask_login_example -https://github.com/chriszf/flask_login_example -Entry file: flask_login_example/app.py -Scanned: 2016-10-18 16:42:44.458125 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laureli/mini-webl-flask -https://github.com/laureli/mini-webl-flask -Entry file: mini-webl-flask/webl.py -Scanned: 2016-10-18 16:42:45.687725 -No vulnerabilities found. - - -lowrey/simple_flask_proxy -https://github.com/lowrey/simple_flask_proxy -Entry file: simple_flask_proxy/simple_flask_proxy.py -Scanned: 2016-10-18 16:42:46.937488 -No vulnerabilities found. - - -andrewbeng89/mitb-python-flask -https://github.com/andrewbeng89/mitb-python-flask -Entry file: None -Scanned: 2016-10-18 16:42:48.207793 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/andrewbeng89/mitb-python-flask. - -t00f/Flask-server-test -https://github.com/t00f/Flask-server-test -Entry file: Flask-server-test/__init__.py -Scanned: 2016-10-18 16:42:49.540914 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NathanKleekamp/flask-principal-example -https://github.com/NathanKleekamp/flask-principal-example -Entry file: flask-principal-example/main.py -Scanned: 2016-10-18 16:42:50.047845 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Red82/Blog-by-Flask -https://github.com/Red82/Blog-by-Flask -Entry file: Blog-by-Flask/FlaskProjects/hello.py -Scanned: 2016-10-18 16:42:57.052091 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -avidas/DevsNearMe_Flask -https://github.com/avidas/DevsNearMe_Flask -Entry file: DevsNearMe_Flask/venues_server.py -Scanned: 2016-10-18 16:42:58.382199 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yograterol/flask-bundle-system -https://github.com/yograterol/flask-bundle-system -Entry file: flask-bundle-system/tests/test1.py -Scanned: 2016-10-18 16:42:59.746740 -No vulnerabilities found. - - -raghulj/hack_flask_app -https://github.com/raghulj/hack_flask_app -Entry file: hack_flask_app/smart_ad.py -Scanned: 2016-10-18 16:43:01.787282 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fspot/flask-peewee-example -https://github.com/fspot/flask-peewee-example -Entry file: flask-peewee-example/app.py -Scanned: 2016-10-18 16:43:03.635148 -No vulnerabilities found. - - -sh4r3m4n/flask-session-cracker -https://github.com/sh4r3m4n/flask-session-cracker -Entry file: flask-session-cracker/demo_app/main.py -Scanned: 2016-10-18 16:43:04.965817 -No vulnerabilities found. - - -miguelgrinberg/Flask-Migrate -https://github.com/miguelgrinberg/Flask-Migrate -Entry file: Flask-Migrate/tests/app.py -Scanned: 2016-10-18 16:43:08.523228 -No vulnerabilities found. - - -mjhea0/flask-tracking -https://github.com/mjhea0/flask-tracking -Entry file: flask-tracking/app/__init__.py -Scanned: 2016-10-18 16:43:10.088819 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -raddevon/flask-permissions -https://github.com/raddevon/flask-permissions -Entry file: flask-permissions/flask_permissions/tests.py -Scanned: 2016-10-18 16:43:11.808798 -No vulnerabilities found. - - -mjhea0/Flask-Landing -https://github.com/mjhea0/Flask-Landing -Entry file: None -Scanned: 2016-10-18 16:43:13.172072 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mjhea0/Flask-Landing. - -Widdershin/flask-desktop -https://github.com/Widdershin/flask-desktop -Entry file: flask-desktop/examples/test_app.py -Scanned: 2016-10-18 16:43:18.516534 -No vulnerabilities found. - - -matrixise/flask-openerp -https://github.com/matrixise/flask-openerp -Entry file: flask-openerp/examples/demo_wkf.py -Scanned: 2016-10-18 16:43:19.866436 -No vulnerabilities found. - - -jaapz/flask-boilerplate -https://github.com/jaapz/flask-boilerplate -Entry file: flask-boilerplate/app/__init__.py -Scanned: 2016-10-18 16:43:21.584314 -No vulnerabilities found. - - -Alesh/Flask-Fragment -https://github.com/Alesh/Flask-Fragment -Entry file: Flask-Fragment/demo/ssiblog.py -Scanned: 2016-10-18 16:43:24.976997 -No vulnerabilities found. - - -mikeywaites/flask-skeleton -https://github.com/mikeywaites/flask-skeleton -Entry file: None -Scanned: 2016-10-18 16:43:25.487257 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mikeywaites/flask-skeleton. - -shuhaowu/flask-appcache -https://github.com/shuhaowu/flask-appcache -Entry file: flask-appcache/appcache_test.py -Scanned: 2016-10-18 16:43:39.437776 -No vulnerabilities found. - - -marksteve/flaskinit -https://github.com/marksteve/flaskinit -Entry file: flaskinit/flaskinit/templates/app.py -Scanned: 2016-10-18 16:43:40.739346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shekhargulati/flask-login-example -https://github.com/shekhargulati/flask-login-example -Entry file: flask-login-example/flasklogin.py -Scanned: 2016-10-18 16:43:42.995265 -No vulnerabilities found. - - -lightningwolf/Flask-LwAdmin -https://github.com/lightningwolf/Flask-LwAdmin -Entry file: Flask-LwAdmin/SAMPLE_PROJECT/myapp2.py -Scanned: 2016-10-18 16:43:45.772757 -No vulnerabilities found. - - -diogeneshamilton/venmo-flask -https://github.com/diogeneshamilton/venmo-flask -Entry file: venmo-flask/main.py -Scanned: 2016-10-18 16:43:52.166867 -No vulnerabilities found. - - -pallets/flask -https://github.com/pallets/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 17:14:10.226872 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gigq/flasktodo -https://github.com/gigq/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-18 17:14:11.375870 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flosch/simpleapi -https://github.com/flosch/simpleapi -Entry file: simpleapi/example_project/server/flask1/app.py -Scanned: 2016-10-18 17:14:13.084940 -No vulnerabilities found. - - -codebykat/robotkitten -https://github.com/codebykat/robotkitten -Entry file: None -Scanned: 2016-10-18 17:14:13.588600 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codebykat/robotkitten. - -mitsuhiko/flask-oauth -https://github.com/mitsuhiko/flask-oauth -Entry file: flask-oauth/example/facebook.py -Scanned: 2016-10-18 17:14:14.645840 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-openid -https://github.com/mitsuhiko/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-18 17:14:15.702920 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -artisonian/flaskengine -https://github.com/artisonian/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-18 17:14:18.117294 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -toomoresuch/template-gae-with-flask -https://github.com/toomoresuch/template-gae-with-flask -Entry file: template-gae-with-flask/application.py -Scanned: 2016-10-18 17:14:18.650231 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: template-gae-with-flask/flask.py - -aljoscha/shot-o-matic -https://github.com/aljoscha/shot-o-matic -Entry file: shot-o-matic/shotomatic.py -Scanned: 2016-10-18 17:14:19.666584 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-sqlalchemy -https://github.com/mitsuhiko/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-18 17:14:20.695017 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/flask-fungiform -https://github.com/mitsuhiko/flask-fungiform -Entry file: flask-fungiform/examples/example.py -Scanned: 2016-10-18 17:14:23.020165 -No vulnerabilities found. - - -fsouza/talks -https://github.com/fsouza/talks -Entry file: talks/flask/app.py -Scanned: 2016-10-18 17:14:24.021108 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unbracketed/flapp -https://github.com/unbracketed/flapp -Entry file: flapp/flapp/project_template/application.py -Scanned: 2016-10-18 17:14:24.553549 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolish/flask-markdown -https://github.com/dcolish/flask-markdown -Entry file: flask-markdown/tests/test_markdown.py -Scanned: 2016-10-18 17:15:10.117412 -No vulnerabilities found. - - -blossom/flask-gae-skeleton -https://github.com/blossom/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-18 17:15:10.646213 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kijun/flask-methodhack -https://github.com/kijun/flask-methodhack -Entry file: flask-methodhack/flaskext/methodhack.py -Scanned: 2016-10-18 17:15:12.895392 -No vulnerabilities found. - - -viniciusfs/pasted-flask -https://github.com/viniciusfs/pasted-flask -Entry file: pasted-flask/pasted.py -Scanned: 2016-10-18 17:15:14.160098 -Vulnerability 1: -File: pasted-flask/pasted.py - > User input at line 219, trigger word "form[": - hexdigest = calc_md5(request.form['code']) -Reassigned in: - File: pasted-flask/pasted.py - > Line 221: paste = query_db('select * from pasted where md5 = ?', [hexdigest],one=True) - File: pasted-flask/pasted.py - > Line 225: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 231: paste_id = cur.lastrowid - File: pasted-flask/pasted.py - > Line 232: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 234: ret_MAYBE_FUNCTION_NAME = render_template('view.html',paste=paste) - File: pasted-flask/pasted.py - > Line 203: paste = query_db('select * from pasted where id = ?', [paste_id],one=True) - File: pasted-flask/pasted.py - > Line 207: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 209: ret_MAYBE_FUNCTION_NAME = render_template('form.html',original=paste) - File: pasted-flask/pasted.py - > Line 213: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: pasted-flask/pasted.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: pasted-flask/pasted.py - > reaches line 229, trigger word "execute(": - cur = g.db.execute('insert into pasted (code, md5, viewed_at, parent) values (?, ?, ?, ?)', [request.form['code'], hexdigest, viewed_at, request.form['parent']]) - - - -Cornu/Brain -https://github.com/Cornu/Brain -Entry file: Brain/brain/__init__.py -Scanned: 2016-10-18 17:15:17.083182 -Vulnerability 1: -File: Brain/brain/controllers/text.py - > User input at line 43, trigger word "get(": - key = request.form.get('search') -File: Brain/brain/controllers/text.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/' + key) - - - -jbochi/scrum-you -https://github.com/jbochi/scrum-you -Entry file: scrum-you/application.py -Scanned: 2016-10-18 17:15:17.621655 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miracle2k/flask-assets -https://github.com/miracle2k/flask-assets -Entry file: flask-assets/tests/test_config.py -Scanned: 2016-10-18 17:15:19.869248 -No vulnerabilities found. - - -jgumbley/flask-payment -https://github.com/jgumbley/flask-payment -Entry file: flask-payment/tests.py -Scanned: 2016-10-18 17:15:21.418211 -No vulnerabilities found. - - -eugenkiss/Simblin -https://github.com/eugenkiss/Simblin -Entry file: Simblin/simblin/__init__.py -Scanned: 2016-10-18 17:15:21.981508 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jugyo/flask-gae-template -https://github.com/jugyo/flask-gae-template -Entry file: flask-gae-template/app.py -Scanned: 2016-10-18 17:15:23.787490 -No vulnerabilities found. - - -swanson/flask-embedly -https://github.com/swanson/flask-embedly -Entry file: flask-embedly/example/app.py -Scanned: 2016-10-18 17:15:25.193796 -No vulnerabilities found. - - -LightStyle/Python-Board -https://github.com/LightStyle/Python-Board -Entry file: Python-Board/src/index.py -Scanned: 2016-10-18 17:15:26.637420 -No vulnerabilities found. - - -miku/flask-gae-stub -https://github.com/miku/flask-gae-stub -Entry file: flask-gae-stub/flask/app.py -Scanned: 2016-10-18 17:15:27.226981 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -derwiki/wordisms_flask -https://github.com/derwiki/wordisms_flask -Entry file: wordisms_flask/www/main.py -Scanned: 2016-10-18 17:15:27.753541 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flebel/cisco79xx_phone_directory -https://github.com/flebel/cisco79xx_phone_directory -Entry file: cisco79xx_phone_directory/cisco79xx_phone_directory.py -Scanned: 2016-10-18 17:15:29.049748 -No vulnerabilities found. - - -jkossen/imposter -https://github.com/jkossen/imposter -Entry file: None -Scanned: 2016-10-18 17:15:29.611204 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jkossen/imposter. - -sublee/subleekr -https://github.com/sublee/subleekr -Entry file: subleekr/subleekr/app.py -Scanned: 2016-10-18 17:15:32.908067 -No vulnerabilities found. - - -akhodakivskiy/flask -https://github.com/akhodakivskiy/flask -Entry file: flask/setup.py -Scanned: 2016-10-18 17:15:35.030767 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thadeusb/flask-cache -https://github.com/thadeusb/flask-cache -Entry file: flask-cache/examples/hello.py -Scanned: 2016-10-18 17:15:36.918712 -No vulnerabilities found. - - -kamalgill/flask-appengine-template -https://github.com/kamalgill/flask-appengine-template -Entry file: flask-appengine-template/src/lib/flask/sessions.py -Scanned: 2016-10-18 17:15:40.100880 -No vulnerabilities found. - - -miguelgrinberg/flask-celery-example -https://github.com/miguelgrinberg/flask-celery-example -Entry file: flask-celery-example/app.py -Scanned: 2016-10-19 08:39:10.518361 -No vulnerabilities found. - - -realpython/flask-registration -https://github.com/realpython/flask-registration -Entry file: flask-registration/project/__init__.py -Scanned: 2016-10-19 08:39:11.925940 -No vulnerabilities found. - - -sholsapp/flask-rrd -https://github.com/sholsapp/flask-rrd -Entry file: flask-rrd/flaskrrd/__init__.py -Scanned: 2016-10-19 08:39:13.988990 -No vulnerabilities found. - - -Zokormazo/flaskllery -https://github.com/Zokormazo/flaskllery -Entry file: flaskllery/app/__init__.py -Scanned: 2016-10-19 08:39:16.127113 -No vulnerabilities found. - - -msosvi/flask-pyco -https://github.com/msosvi/flask-pyco -Entry file: flask-pyco/examples/enlosdetalles-blog/blog.py -Scanned: 2016-10-19 08:39:17.719694 -No vulnerabilities found. - - -esthom/flasktaskr -https://github.com/esthom/flasktaskr -Entry file: None -Scanned: 2016-10-19 08:39:21.524876 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hpincket/flaskr -https://github.com/hpincket/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:39:22.036748 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -radiumweilei/flaskr -https://github.com/radiumweilei/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:39:22.540841 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -technoto/flaskr -https://github.com/technoto/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:39:23.046348 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vbirds/flasker -https://github.com/vbirds/flasker -Entry file: flasker/flasker.py -Scanned: 2016-10-19 08:39:24.329555 -No vulnerabilities found. - - -LastOne817/calender -https://github.com/LastOne817/calender -Entry file: calender/scheduler.py -Scanned: 2016-10-19 08:39:25.716863 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ryannorton/Flask-Practice -https://github.com/ryannorton/Flask-Practice -Entry file: Flask-Practice/flaskr.py -Scanned: 2016-10-19 08:39:26.968071 -No vulnerabilities found. - - -esthom/flask-blog -https://github.com/esthom/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:39:28.023642 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -harmon25/flask_base -https://github.com/harmon25/flask_base -Entry file: flask_base/base_flask/__init__.py -Scanned: 2016-10-19 08:39:29.362855 -Vulnerability 1: -File: flask_base/base_flask/views.py - > User input at line 24, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flask_base/base_flask/views.py - > Line 30: user = User(username=username) -File: flask_base/base_flask/views.py - > reaches line 34, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 2: -File: flask_base/base_flask/views.py - > User input at line 24, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flask_base/base_flask/views.py - > Line 30: user = User(username=username) -File: flask_base/base_flask/views.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: flask_base/base_flask/views.py - > User input at line 39, trigger word "get(": - user = User.query.get(id) -File: flask_base/base_flask/views.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username) - - - -semyenov/flask-jquery -https://github.com/semyenov/flask-jquery -Entry file: flask-jquery/hello.py -Scanned: 2016-10-19 08:39:34.246445 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jafffy/flask-test -https://github.com/jafffy/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 08:39:37.080547 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -murdrae/flask-blog -https://github.com/murdrae/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:39:37.653444 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -chyka-dev/flask-skeleton -https://github.com/chyka-dev/flask-skeleton -Entry file: None -Scanned: 2016-10-19 08:39:38.198376 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chyka-dev/flask-skeleton. - -nmsbane/flask-application -https://github.com/nmsbane/flask-application -Entry file: flask-application/app/__init__.py -Scanned: 2016-10-19 08:39:39.704648 -No vulnerabilities found. - - -mfwarren/flask-practice -https://github.com/mfwarren/flask-practice -Entry file: None -Scanned: 2016-10-19 08:39:40.233081 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mfwarren/flask-practice. - -ljb-2000/flask-ops -https://github.com/ljb-2000/flask-ops -Entry file: None -Scanned: 2016-10-19 08:39:41.455353 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ljb-2000/flask-ops. - -emteajay/flask_test -https://github.com/emteajay/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 08:39:44.443996 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -boring2/flask_code -https://github.com/boring2/flask_code -Entry file: flask_code/flaskr/flaskr.py -Scanned: 2016-10-19 08:39:45.698689 -No vulnerabilities found. - - -rainulf/flask-init -https://github.com/rainulf/flask-init -Entry file: flask-init/app/__init__.py -Scanned: 2016-10-19 08:39:47.045238 -Vulnerability 1: -File: flask-init/app/modules/auth/controllers.py - > User input at line 27, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-init/app/modules/auth/controllers.py - > Line 30: session['user_id'] = user.id -File: flask-init/app/modules/auth/controllers.py - > reaches line 31, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -stephane/freezer -https://github.com/stephane/freezer -Entry file: freezer/freezer/app.py -Scanned: 2016-10-19 08:39:48.683562 -No vulnerabilities found. - - -Laukess/FlaskTaskr_Part_2 -https://github.com/Laukess/FlaskTaskr_Part_2 -Entry file: FlaskTaskr_Part_2/app/views.py -Scanned: 2016-10-19 08:39:50.049814 -No vulnerabilities found. - - -Laukess/FlaskTaskr_Part_3 -https://github.com/Laukess/FlaskTaskr_Part_3 -Entry file: FlaskTaskr_Part_3/app/views.py -Scanned: 2016-10-19 08:39:51.413885 -No vulnerabilities found. - - -Laukess/FlaskTaskr_Part_1 -https://github.com/Laukess/FlaskTaskr_Part_1 -Entry file: FlaskTaskr_Part_1/app/views.py -Scanned: 2016-10-19 08:40:11.745864 -No vulnerabilities found. - - -GlieseRay/FlaskAppTemplate -https://github.com/GlieseRay/FlaskAppTemplate -Entry file: None -Scanned: 2016-10-19 08:40:13.093172 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/GlieseRay/FlaskAppTemplate. - -iceraj/flask_facebook_login -https://github.com/iceraj/flask_facebook_login -Entry file: flask_facebook_login/app.py -Scanned: 2016-10-19 08:40:14.347108 -No vulnerabilities found. - - -mithfindel/genevajug-contest-flask -https://github.com/mithfindel/genevajug-contest-flask -Entry file: genevajug-contest-flask/src/main.py -Scanned: 2016-10-19 08:40:15.585927 -No vulnerabilities found. - - -citizen-stig/my-flask-rest-sample -https://github.com/citizen-stig/my-flask-rest-sample -Entry file: my-flask-rest-sample/flaskrestsample.py -Scanned: 2016-10-19 08:40:16.878913 -No vulnerabilities found. - - -garfik/flask-api-app-skeleton -https://github.com/garfik/flask-api-app-skeleton -Entry file: None -Scanned: 2016-10-19 08:40:18.111715 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/garfik/flask-api-app-skeleton. - -thundercat1/Flask-Mega-Tutorial -https://github.com/thundercat1/Flask-Mega-Tutorial -Entry file: Flask-Mega-Tutorial/app/__init__.py -Scanned: 2016-10-19 08:40:19.556361 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Zapix/flask-jenkins-sample -https://github.com/Zapix/flask-jenkins-sample -Entry file: flask-jenkins-sample/src/app/__init__.py -Scanned: 2016-10-19 08:40:20.899742 -No vulnerabilities found. - - -mperham2/flask-hello-world -https://github.com/mperham2/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 08:40:21.490066 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -emmasteimann/flask-rest-service -https://github.com/emmasteimann/flask-rest-service -Entry file: flask-rest-service/app.py -Scanned: 2016-10-19 08:40:25.389158 -No vulnerabilities found. - - -bweave/flask-hello-world -https://github.com/bweave/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 08:40:25.992094 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -Ottermad/Python-Flask-Site -https://github.com/Ottermad/Python-Flask-Site -Entry file: Python-Flask-Site/app.py -Scanned: 2016-10-19 08:40:27.527803 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -myevan/creating-in-flask-jsonnpc -https://github.com/myevan/creating-in-flask-jsonnpc -Entry file: creating-in-flask-jsonnpc/official_tutorial/06_builtin_auth/builtin_auth_main.py -Scanned: 2016-10-19 08:40:28.863736 -No vulnerabilities found. - - -nakulpathak3/complete-microblog-flask -https://github.com/nakulpathak3/complete-microblog-flask -Entry file: complete-microblog-flask/app/__init__.py -Scanned: 2016-10-19 08:40:30.435761 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -Ottermad/Python-Flask-Odot -https://github.com/Ottermad/Python-Flask-Odot -Entry file: Python-Flask-Odot/app.py -Scanned: 2016-10-19 08:40:32.863141 -Vulnerability 1: -File: Python-Flask-Odot/app.py - > User input at line 79, trigger word "form[": - my_todo_list = 'id''title''description'idrequest.form['title'].rstrip()request.form['description'].rstrip() -Reassigned in: - File: Python-Flask-Odot/app.py - > Line 84: result = update_todo_list(my_todo_list) - File: Python-Flask-Odot/app.py - > Line 88: my_todo_list = get_todo_list(id) - File: Python-Flask-Odot/app.py - > Line 89: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',my_todo_list) - File: Python-Flask-Odot/app.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('show')) -File: Python-Flask-Odot/app.py - > reaches line 85, trigger word "flash(": - flash(result) - -Vulnerability 2: -File: Python-Flask-Odot/app.py - > User input at line 103, trigger word "form[": - result = create_todo_list(request.form['title'].rstrip(), request.form['description'].rstrip()) -File: Python-Flask-Odot/app.py - > reaches line 107, trigger word "flash(": - flash(result) - - - -rchampa/openshift-template-python-flask -https://github.com/rchampa/openshift-template-python-flask -Entry file: openshift-template-python-flask/flaskapp.py -Scanned: 2016-10-19 08:40:34.217661 -No vulnerabilities found. - - -myevan/creating-in-flask -https://github.com/myevan/creating-in-flask -Entry file: creating-in-flask/official_tutorial/05_the_view_functions/flaskr/flaskr_the_view_functions_main.py -Scanned: 2016-10-19 08:40:35.665160 -Vulnerability 1: -File: creating-in-flask/official_tutorial/05_the_view_functions/flaskr/flaskr_the_view_functions_main.py - > User input at line 57, trigger word "form[": - title = request.form['title'] -File: creating-in-flask/official_tutorial/05_the_view_functions/flaskr/flaskr_the_view_functions_main.py - > reaches line 59, trigger word "execute(": - g.db.execute('INSERT INTO entries (title, text) values (?, ?)', [title, text]) - -Vulnerability 2: -File: creating-in-flask/official_tutorial/05_the_view_functions/flaskr/flaskr_the_view_functions_main.py - > User input at line 58, trigger word "form[": - text = request.form['text'] -File: creating-in-flask/official_tutorial/05_the_view_functions/flaskr/flaskr_the_view_functions_main.py - > reaches line 59, trigger word "execute(": - g.db.execute('INSERT INTO entries (title, text) values (?, ?)', [title, text]) - - - -gusibi/pager -https://github.com/gusibi/pager -Entry file: pager/example/app.py -Scanned: 2016-10-19 08:40:36.967381 -No vulnerabilities found. - - -mnickey/blog -https://github.com/mnickey/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 08:40:39.950394 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wahhid/flask_rdm_web_service_ec -https://github.com/wahhid/flask_rdm_web_service_ec -Entry file: flask_rdm_web_service_ec/run.py -Scanned: 2016-10-19 08:40:41.324168 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Devical/Python3-Flask-Min-Setup -https://github.com/Devical/Python3-Flask-Min-Setup -Entry file: Python3-Flask-Min-Setup/yourprojectname/app/__init__.py -Scanned: 2016-10-19 08:40:42.586049 -No vulnerabilities found. - - -jobiaj/Student-record-app-using-Flask -https://github.com/jobiaj/Student-record-app-using-Flask -Entry file: Student-record-app-using-Flask/app.py -Scanned: 2016-10-19 08:40:53.809092 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rchampa/openshift-template-python-flask-mysql -https://github.com/rchampa/openshift-template-python-flask-mysql -Entry file: openshift-template-python-flask-mysql/flaskapp.py -Scanned: 2016-10-19 08:40:55.172624 -No vulnerabilities found. - - -HardBite/flibr -https://github.com/HardBite/flibr -Entry file: None -Scanned: 2016-10-19 08:40:56.879068 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/HardBite/flibr. - -bdiegel/pysnitch -https://github.com/bdiegel/pysnitch -Entry file: pysnitch/snitch.py -Scanned: 2016-10-19 08:40:58.248431 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChristianWitts/Restless-Skeleton -https://github.com/ChristianWitts/Restless-Skeleton -Entry file: Restless-Skeleton/RestlessSkeleton.py -Scanned: 2016-10-19 08:40:59.652565 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -buzz1274/tasks -https://github.com/buzz1274/tasks -Entry file: tasks/tasks.py -Scanned: 2016-10-19 08:41:13.467062 -No vulnerabilities found. - - -mnickey/helloflask -https://github.com/mnickey/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 08:41:14.001416 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -OpenHumans/open-humans-oauth2-example -https://github.com/OpenHumans/open-humans-oauth2-example -Entry file: open-humans-oauth2-example/server.py -Scanned: 2016-10-19 08:41:16.220571 -No vulnerabilities found. - - -cwilkes/turbo-wookie -https://github.com/cwilkes/turbo-wookie -Entry file: turbo-wookie/api/app.py -Scanned: 2016-10-19 08:41:17.948352 -Vulnerability 1: -File: turbo-wookie/api/app.py - > User input at line 18, trigger word "form[": - user_name = request.form['name'] -File: turbo-wookie/api/app.py - > reaches line 19, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('yo'user_name) - - - -charlonyx/Music-Player -https://github.com/charlonyx/Music-Player -Entry file: Music-Player/music.py -Scanned: 2016-10-19 08:41:23.678672 -No vulnerabilities found. - - -jiamh2005/transdb -https://github.com/jiamh2005/transdb -Entry file: None -Scanned: 2016-10-19 08:41:25.286687 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -unite128/scorpius -https://github.com/unite128/scorpius -Entry file: scorpius/__init__.py -Scanned: 2016-10-19 08:41:26.693193 -Vulnerability 1: -File: scorpius/views/patient.py - > User input at line 17, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: scorpius/views/patient.py - > Line 11: ret_MAYBE_FUNCTION_NAME = error('action_requires_token') - File: scorpius/views/patient.py - > Line 13: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/patient.py - > Line 15: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/patient.py - > Line 21: ret_MAYBE_FUNCTION_NAME = error('user_not_found') - File: scorpius/views/patient.py - > Line 26: ret_MAYBE_FUNCTION_NAME = error('user_already_added') -File: scorpius/views/patient.py - > reaches line 33, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('success''user_added'Trueusername), 200) - -Vulnerability 2: -File: scorpius/views/patient.py - > User input at line 46, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: scorpius/views/patient.py - > Line 40: ret_MAYBE_FUNCTION_NAME = error('action_requires_token') - File: scorpius/views/patient.py - > Line 42: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/patient.py - > Line 44: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/patient.py - > Line 50: ret_MAYBE_FUNCTION_NAME = error('user_not_in_access_list') -File: scorpius/views/patient.py - > reaches line 61, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('success''user_removed'Trueusername), 200) - -Vulnerability 3: -File: scorpius/views/patient.py - > User input at line 75, trigger word "get(": - lat = float(request.json.get('lat')) -Reassigned in: - File: scorpius/views/patient.py - > Line 83: g.user.current_lat = lat - File: scorpius/views/patient.py - > Line 68: ret_MAYBE_FUNCTION_NAME = error('action_requires_token') - File: scorpius/views/patient.py - > Line 70: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/patient.py - > Line 72: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/patient.py - > Line 78: ret_MAYBE_FUNCTION_NAME = error('invalid_coordinates') - File: scorpius/views/patient.py - > Line 81: ret_MAYBE_FUNCTION_NAME = error('invalid_coordinates') -File: scorpius/views/patient.py - > reaches line 100, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('success''lat''long'Truelatlong), 200) - -Vulnerability 4: -File: scorpius/views/patient.py - > User input at line 76, trigger word "get(": - long = float(request.json.get('long')) -Reassigned in: - File: scorpius/views/patient.py - > Line 84: g.user.current_long = long - File: scorpius/views/patient.py - > Line 68: ret_MAYBE_FUNCTION_NAME = error('action_requires_token') - File: scorpius/views/patient.py - > Line 70: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/patient.py - > Line 72: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/patient.py - > Line 78: ret_MAYBE_FUNCTION_NAME = error('invalid_coordinates') - File: scorpius/views/patient.py - > Line 81: ret_MAYBE_FUNCTION_NAME = error('invalid_coordinates') -File: scorpius/views/patient.py - > reaches line 100, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('success''lat''long'Truelatlong), 200) - -Vulnerability 5: -File: scorpius/views/debug.py - > User input at line 8, trigger word "get(": - secret = request.json.get('secret') -Reassigned in: - File: scorpius/views/debug.py - > Line 10: user.secret = secret -File: scorpius/views/debug.py - > reaches line 12, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('success''secret'Truesecret) - -Vulnerability 6: -File: scorpius/views/common.py - > User input at line 23, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: scorpius/views/common.py - > Line 37: user = User(username=username, email=email, user_type=user_type, registered=current_time(), last_seen=current_time(), last_ip=request.remote_addr, allowed_access_list='[]', position_history='[]') - File: scorpius/views/common.py - > Line 21: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/common.py - > Line 29: ret_MAYBE_FUNCTION_NAME = error('username_already_exist') - File: scorpius/views/common.py - > Line 31: ret_MAYBE_FUNCTION_NAME = error('invalid_email') - File: scorpius/views/common.py - > Line 33: ret_MAYBE_FUNCTION_NAME = error('email_in_use') - File: scorpius/views/common.py - > Line 35: ret_MAYBE_FUNCTION_NAME = error('invalid_request') -File: scorpius/views/common.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('success''username''email'Trueusernameemail), 200) - -Vulnerability 7: -File: scorpius/views/common.py - > User input at line 25, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: scorpius/views/common.py - > Line 37: user = User(username=username, email=email, user_type=user_type, registered=current_time(), last_seen=current_time(), last_ip=request.remote_addr, allowed_access_list='[]', position_history='[]') - File: scorpius/views/common.py - > Line 21: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/common.py - > Line 29: ret_MAYBE_FUNCTION_NAME = error('username_already_exist') - File: scorpius/views/common.py - > Line 31: ret_MAYBE_FUNCTION_NAME = error('invalid_email') - File: scorpius/views/common.py - > Line 33: ret_MAYBE_FUNCTION_NAME = error('email_in_use') - File: scorpius/views/common.py - > Line 35: ret_MAYBE_FUNCTION_NAME = error('invalid_request') -File: scorpius/views/common.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('success''username''email'Trueusernameemail), 200) - -Vulnerability 8: -File: scorpius/views/common.py - > User input at line 68, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: scorpius/views/common.py - > Line 66: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/common.py - > Line 75: ret_MAYBE_FUNCTION_NAME = error('user_not_found') - File: scorpius/views/common.py - > Line 77: ret_MAYBE_FUNCTION_NAME = error('invalid_request') - File: scorpius/views/common.py - > Line 79: ret_MAYBE_FUNCTION_NAME = error('invalid_secret') -File: scorpius/views/common.py - > reaches line 85, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('success''username''password_changed'TrueusernameTrue), 200) - - - -mengdilin/simple_html_form -https://github.com/mengdilin/simple_html_form -Entry file: None -Scanned: 2016-10-19 08:41:28.474849 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mengdilin/simple_html_form. - -tsaltas/posts-api -https://github.com/tsaltas/posts-api -Entry file: posts-api/posts/__init__.py -Scanned: 2016-10-19 08:41:29.996410 -Vulnerability 1: -File: posts-api/posts/api.py - > User input at line 25, trigger word "get(": - title_like = request.args.get('title_like') -Reassigned in: - File: posts-api/posts/api.py - > Line 33: posts = posts.filter(models.Post.body.contains(body_like)) - File: posts-api/posts/api.py - > Line 34: posts = posts.all() - File: posts-api/posts/api.py - > Line 37: data = json.dumps([post.as_dictionary() for post in posts]) - File: posts-api/posts/api.py - > Line 38: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: posts-api/posts/api.py - > Line 29: posts = session.query(models.Post) -File: posts-api/posts/api.py - > reaches line 31, trigger word "filter(": - posts = posts.filter(models.Post.title.contains(title_like)) - -Vulnerability 2: -File: posts-api/posts/api.py - > User input at line 26, trigger word "get(": - body_like = request.args.get('body_like') -Reassigned in: - File: posts-api/posts/api.py - > Line 34: posts = posts.all() - File: posts-api/posts/api.py - > Line 37: data = json.dumps([post.as_dictionary() for post in posts]) - File: posts-api/posts/api.py - > Line 38: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: posts-api/posts/api.py - > Line 29: posts = session.query(models.Post) - File: posts-api/posts/api.py - > Line 31: posts = posts.filter(models.Post.title.contains(title_like)) -File: posts-api/posts/api.py - > reaches line 33, trigger word "filter(": - posts = posts.filter(models.Post.body.contains(body_like)) - - - -jolahde/monkey-app -https://github.com/jolahde/monkey-app -Entry file: monkey-app/app/__init__.py -Scanned: 2016-10-19 08:41:33.195376 -No vulnerabilities found. - - -buddha314/pathfinder-game-manager -https://github.com/buddha314/pathfinder-game-manager -Entry file: None -Scanned: 2016-10-19 08:41:34.658835 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/buddha314/pathfinder-game-manager. - -nicolewhite/neo4j-flask -https://github.com/nicolewhite/neo4j-flask -Entry file: neo4j-flask/blog/views.py -Scanned: 2016-10-19 08:41:37.440349 -No vulnerabilities found. - - -jay3dec/PythonFlaskMySQLApp---Part-1 -https://github.com/jay3dec/PythonFlaskMySQLApp---Part-1 -Entry file: PythonFlaskMySQLApp---Part-1/app.py -Scanned: 2016-10-19 08:41:38.974983 -No vulnerabilities found. - - -stewartpark/Flask-JSGlue -https://github.com/stewartpark/Flask-JSGlue -Entry file: Flask-JSGlue/test.py -Scanned: 2016-10-19 08:41:41.516310 -No vulnerabilities found. - - -polyfunc/flask-todolist -https://github.com/polyfunc/flask-todolist -Entry file: flask-todolist/app/__init__.py -Scanned: 2016-10-19 08:41:43.349547 -No vulnerabilities found. - - -AniaWujek/flask -https://github.com/AniaWujek/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 08:41:44.377863 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -fromzeroedu/flask-intro -https://github.com/fromzeroedu/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 08:41:44.884490 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bear/python-indieweb -https://github.com/bear/python-indieweb -Entry file: python-indieweb/indieweb.py -Scanned: 2016-10-19 08:41:46.302362 -Vulnerability 1: -File: python-indieweb/indieweb.py - > User input at line 151, trigger word ".data": - url = ParseResult(authURL.scheme, authURL.netloc, authURL.path, authURL.params, urllib.urlencode('me''redirect_uri''client_id''scope''response_type'meform.redirect_uri.dataform.client_id.data'post''id'), authURL.fragment).geturl() -Reassigned in: - File: python-indieweb/indieweb.py - > Line 147: authURL = url - File: python-indieweb/indieweb.py - > Line 175: ret_MAYBE_FUNCTION_NAME = ('insert fancy no auth endpoint found error message here', 403) - File: python-indieweb/indieweb.py - > Line 179: ret_MAYBE_FUNCTION_NAME = render_template('login.jinja',templateData) - File: python-indieweb/indieweb.py - > Line 145: authURL = None -File: python-indieweb/indieweb.py - > reaches line 173, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - -Vulnerability 2: -File: python-indieweb/indieweb.py - > User input at line 184, trigger word "get(": - me = request.args.get('me') -Reassigned in: - File: python-indieweb/indieweb.py - > Line 190: key = 'login-%s' % me - File: python-indieweb/indieweb.py - > Line 191: data = db.hgetall(key) - File: python-indieweb/indieweb.py - > Line 193: r = ninka.indieauth.validateAuthCode(code=code, client_id=me, redirect_uri=data['redirect_uri']) - File: python-indieweb/indieweb.py - > Line 198: scope = r['response']['scope'] - File: python-indieweb/indieweb.py - > Line 199: from_uri = data['from_uri'] - File: python-indieweb/indieweb.py - > Line 209: session['indieauth_scope'] = scope - File: python-indieweb/indieweb.py - > Line 210: session['indieauth_id'] = me - File: python-indieweb/indieweb.py - > Line 221: ret_MAYBE_FUNCTION_NAME = redirect('/') - File: python-indieweb/indieweb.py - > Line 223: ret_MAYBE_FUNCTION_NAME = ('authentication failed', 403) - File: python-indieweb/indieweb.py - > Line 208: session['indieauth_token'] = token -File: python-indieweb/indieweb.py - > reaches line 219, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(from_uri) - -Vulnerability 3: -File: python-indieweb/indieweb.py - > User input at line 471, trigger word "get(": - target = request.form.get('target') -Reassigned in: - File: python-indieweb/indieweb.py - > Line 475: valid = validURL(target) - File: python-indieweb/indieweb.py - > Line 484: ret_MAYBE_FUNCTION_NAME = ('Vouch required for webmention', 449) - File: python-indieweb/indieweb.py - > Line 486: ret_MAYBE_FUNCTION_NAME = ('Webmention is invalid', 400) - File: python-indieweb/indieweb.py - > Line 488: ret_MAYBE_FUNCTION_NAME = ('invalid post', 404) - File: python-indieweb/indieweb.py - > Line 469: valid = False -File: python-indieweb/indieweb.py - > reaches line 481, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(target) - - - -realpython/flask-download -https://github.com/realpython/flask-download -Entry file: None -Scanned: 2016-10-19 08:41:47.654591 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/realpython/flask-download. - -stefoo411/flask-boilerplate-master-git -https://github.com/stefoo411/flask-boilerplate-master-git -Entry file: flask-boilerplate-master-git/app.py -Scanned: 2016-10-19 08:42:00.488587 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EricSchles/flask_heroku_template -https://github.com/EricSchles/flask_heroku_template -Entry file: flask_heroku_template/app.py -Scanned: 2016-10-19 08:42:01.706533 -No vulnerabilities found. - - -vividvilla/olaf -https://github.com/vividvilla/olaf -Entry file: None -Scanned: 2016-10-19 08:42:03.619987 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vividvilla/olaf. - -xdbaqiao/flaskr -https://github.com/xdbaqiao/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:42:04.113127 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hziling/flasky -https://github.com/hziling/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 08:42:14.656994 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -itstriz/flaskr -https://github.com/itstriz/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:42:15.172105 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gooopy/flaskflask -https://github.com/gooopy/flaskflask -Entry file: flaskflask/flaskr.py -Scanned: 2016-10-19 08:42:17.524824 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mperham2/flasktaskr -https://github.com/mperham2/flasktaskr -Entry file: None -Scanned: 2016-10-19 08:42:18.048603 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -qmaximum/flaskr -https://github.com/qmaximum/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:42:18.541004 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -radiumweilei/flaskr -https://github.com/radiumweilei/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:42:20.034131 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jayzeng/flaskapi -https://github.com/jayzeng/flaskapi -Entry file: flaskapi/app/__init__.py -Scanned: 2016-10-19 08:42:22.316373 -No vulnerabilities found. - - -LastOne817/calender -https://github.com/LastOne817/calender -Entry file: calender/scheduler.py -Scanned: 2016-10-19 08:42:25.849125 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -wright8191/flask-echo-server -https://github.com/wright8191/flask-echo-server -Entry file: flask-echo-server/echo.py -Scanned: 2016-10-19 08:42:28.280377 -Vulnerability 1: -File: flask-echo-server/echo.py - > User input at line 58, trigger word "get(": - status_code = request.args.get('status') or 200 -Reassigned in: - File: flask-echo-server/echo.py - > Line 59: status_code = int(status_code) - File: flask-echo-server/echo.py - > Line 61: status_code = 200 - File: flask-echo-server/echo.py - > Line 63: data = 'success''status''time''path''script_root''url''base_url''url_root''method''headers''data''host''args''form''json''cookies'Truestatus_codetime.time()request.pathrequest.script_rootrequest.urlrequest.base_urlrequest.url_rootrequest.methodextract(request.headers)request.data.decode(encoding='UTF-8')request.hostextract(request.args)extract(request.form)request.jsonextract(request.cookies) - File: flask-echo-server/echo.py - > Line 86: response.status_code = status_code - File: flask-echo-server/echo.py - > Line 87: ret_MAYBE_FUNCTION_NAME = response -File: flask-echo-server/echo.py - > reaches line 85, trigger word "jsonify(": - response = jsonify(data) - -Vulnerability 2: -File: flask-echo-server/echo.py - > User input at line 63, trigger word ".data": - data = 'success''status''time''path''script_root''url''base_url''url_root''method''headers''data''host''args''form''json''cookies'Truestatus_codetime.time()request.pathrequest.script_rootrequest.urlrequest.base_urlrequest.url_rootrequest.methodextract(request.headers)request.data.decode(encoding='UTF-8')request.hostextract(request.args)extract(request.form)request.jsonextract(request.cookies) -Reassigned in: - File: flask-echo-server/echo.py - > Line 87: ret_MAYBE_FUNCTION_NAME = response -File: flask-echo-server/echo.py - > reaches line 85, trigger word "jsonify(": - response = jsonify(data) - - - -ElvisTheKing/flask_showtime -https://github.com/ElvisTheKing/flask_showtime -Entry file: flask_showtime/showtime/__init__.py -Scanned: 2016-10-19 08:42:29.800505 -No vulnerabilities found. - - -drakeeee/flask-microblog -https://github.com/drakeeee/flask-microblog -Entry file: None -Scanned: 2016-10-19 08:42:35.639296 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -antoviaque/flask-tutorial -https://github.com/antoviaque/flask-tutorial -Entry file: flask-tutorial/app/__init__.py -Scanned: 2016-10-19 08:42:36.904944 -No vulnerabilities found. - - -mczwier/flask_tests -https://github.com/mczwier/flask_tests -Entry file: flask_tests/src/test1.py -Scanned: 2016-10-19 08:42:38.113147 -No vulnerabilities found. - - -sportnak/hellworld-flask -https://github.com/sportnak/hellworld-flask -Entry file: hellworld-flask/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-19 08:42:44.599027 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -commadelimited/flask-demo -https://github.com/commadelimited/flask-demo -Entry file: None -Scanned: 2016-10-19 08:42:45.120692 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/commadelimited/flask-demo. - -th4tirishguy/flask-default -https://github.com/th4tirishguy/flask-default -Entry file: flask-default/app/__init__.py -Scanned: 2016-10-19 08:42:46.351735 -No vulnerabilities found. - - -makao007/HelloFlask -https://github.com/makao007/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-19 08:42:48.088910 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -machbio/userauth_flask -https://github.com/machbio/userauth_flask -Entry file: userauth_flask/blueprint_api_example.py -Scanned: 2016-10-19 08:42:49.367612 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jbayer/flask-example -https://github.com/jbayer/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-19 08:42:49.871102 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mperham2/flask-blog -https://github.com/mperham2/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:42:50.423919 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -emteajay/flask_testing -https://github.com/emteajay/flask_testing -Entry file: flask_testing/blog.py -Scanned: 2016-10-19 08:42:53.778028 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_testing/env/lib/python2.7/genericpath.py - -minghuam/flask-website -https://github.com/minghuam/flask-website -Entry file: flask-website/app/__init__.py -Scanned: 2016-10-19 08:42:55.543945 -No vulnerabilities found. - - -syntactical/gregslist-flask -https://github.com/syntactical/gregslist-flask -Entry file: gregslist-flask/app/__init__.py -Scanned: 2016-10-19 08:42:56.796915 -No vulnerabilities found. - - -jstacoder/flask-macros -https://github.com/jstacoder/flask-macros -Entry file: flask-macros/flask_macros/__init__.py -Scanned: 2016-10-19 08:42:58.028982 -No vulnerabilities found. - - -beatobongco/Flask-Materia -https://github.com/beatobongco/Flask-Materia -Entry file: Flask-Materia/web/app.py -Scanned: 2016-10-19 08:42:59.789832 -No vulnerabilities found. - - -kidd-tian/kiss-flask -https://github.com/kidd-tian/kiss-flask -Entry file: kiss-flask/app/__init__.py -Scanned: 2016-10-19 08:43:01.304473 -No vulnerabilities found. - - -tjabaut/LearnFlask -https://github.com/tjabaut/LearnFlask -Entry file: LearnFlask/testflask.py -Scanned: 2016-10-19 08:43:02.511743 -No vulnerabilities found. - - -jeffreyling/flask_test -https://github.com/jeffreyling/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 08:43:03.060685 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aregsar/flask_samples -https://github.com/aregsar/flask_samples -Entry file: flask_samples/four/app.py -Scanned: 2016-10-19 08:43:06.168664 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ljb-2000/flask-ops -https://github.com/ljb-2000/flask-ops -Entry file: None -Scanned: 2016-10-19 08:43:06.671856 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ljb-2000/flask-ops. - -jhuleatt/helloFlask -https://github.com/jhuleatt/helloFlask -Entry file: helloFlask/hello-template.py -Scanned: 2016-10-19 08:43:16.949597 -No vulnerabilities found. - - -boring2/flask_code -https://github.com/boring2/flask_code -Entry file: flask_code/flaskr/flaskr.py -Scanned: 2016-10-19 08:43:18.184559 -No vulnerabilities found. - - -teachMeCode/mysite-flask -https://github.com/teachMeCode/mysite-flask -Entry file: mysite-flask/app.py -Scanned: 2016-10-19 08:43:23.816068 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: mysite-flask/venv/lib/python3.4/struct.py - -sapardi2014/helloflask -https://github.com/sapardi2014/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 08:43:24.799534 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -stephane/freezer -https://github.com/stephane/freezer -Entry file: freezer/freezer/app.py -Scanned: 2016-10-19 08:43:26.340928 -No vulnerabilities found. - - -Laukess/FlaskTaskr_Part_3 -https://github.com/Laukess/FlaskTaskr_Part_3 -Entry file: FlaskTaskr_Part_3/app/views.py -Scanned: 2016-10-19 08:43:27.571930 -No vulnerabilities found. - - -scshepard/FlaskPlan7 -https://github.com/scshepard/FlaskPlan7 -Entry file: FlaskPlan7/app/__init__.py -Scanned: 2016-10-19 08:43:28.975349 -No vulnerabilities found. - - -scshepard/FlaskPlan8 -https://github.com/scshepard/FlaskPlan8 -Entry file: FlaskPlan8/app/__init__.py -Scanned: 2016-10-19 08:43:30.581812 -No vulnerabilities found. - - -Zapix/flask-jenkins-sample -https://github.com/Zapix/flask-jenkins-sample -Entry file: flask-jenkins-sample/src/app/__init__.py -Scanned: 2016-10-19 08:43:32.940137 -No vulnerabilities found. - - -marti1125/flask_simple_site -https://github.com/marti1125/flask_simple_site -Entry file: flask_simple_site/hello.py -Scanned: 2016-10-19 08:43:34.428852 -No vulnerabilities found. - - -nakulpathak3/flask-rest-api -https://github.com/nakulpathak3/flask-rest-api -Entry file: flask-rest-api/app.py -Scanned: 2016-10-19 08:43:38.694871 -Vulnerability 1: -File: flask-rest-api/app.py - > User input at line 52, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flask-rest-api/app.py - > reaches line 59, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -scshepard/MegaFlask9 -https://github.com/scshepard/MegaFlask9 -Entry file: MegaFlask9/app/__init__.py -Scanned: 2016-10-19 08:43:40.218333 -No vulnerabilities found. - - -skyjland/codrugFlaskExam -https://github.com/skyjland/codrugFlaskExam -Entry file: codrugFlaskExam/codrugFlaskExam.py -Scanned: 2016-10-19 08:43:41.453976 -No vulnerabilities found. - - -jobiaj/Url-shortner-using-Flask -https://github.com/jobiaj/Url-shortner-using-Flask -Entry file: None -Scanned: 2016-10-19 08:43:48.612907 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jobiaj/Url-shortner-using-Flask. - -shibinp/student_app_using_flask -https://github.com/shibinp/student_app_using_flask -Entry file: student_app_using_flask/app/__init__.py -Scanned: 2016-10-19 08:43:49.858209 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andrej2704/flask_porfolio_azure -https://github.com/andrej2704/flask_porfolio_azure -Entry file: None -Scanned: 2016-10-19 08:43:52.569275 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -WolkoDav/flask-admin-utils -https://github.com/WolkoDav/flask-admin-utils -Entry file: flask-admin-utils/examples/sqla_utils/app.py -Scanned: 2016-10-19 08:43:53.948899 -No vulnerabilities found. - - -Ottermad/Python-Flask-Site -https://github.com/Ottermad/Python-Flask-Site -Entry file: Python-Flask-Site/app.py -Scanned: 2016-10-19 08:43:54.440997 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -myevan/creating-in-flask-sqlalchemy -https://github.com/myevan/creating-in-flask-sqlalchemy -Entry file: creating-in-flask-sqlalchemy/official_tutorial/02_simple_relationships/simple_relationships_main.py -Scanned: 2016-10-19 08:43:55.777551 -No vulnerabilities found. - - -eyaylali/first-flask-app -https://github.com/eyaylali/first-flask-app -Entry file: None -Scanned: 2016-10-19 08:43:58.545426 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jobiaj/Blog-app-using-Flask -https://github.com/jobiaj/Blog-app-using-Flask -Entry file: Blog-app-using-Flask/app.py -Scanned: 2016-10-19 08:43:59.876288 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -levy5674/hello_world -https://github.com/levy5674/hello_world -Entry file: hello_world/hello.py -Scanned: 2016-10-19 08:44:01.113108 -No vulnerabilities found. - - -wahhid/flask_rdm_web_service_ec -https://github.com/wahhid/flask_rdm_web_service_ec -Entry file: flask_rdm_web_service_ec/run.py -Scanned: 2016-10-19 08:44:01.621177 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jobiaj/Student-record-app-using-Flask -https://github.com/jobiaj/Student-record-app-using-Flask -Entry file: Student-record-app-using-Flask/app.py -Scanned: 2016-10-19 08:44:02.110911 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -schybo/flackish -https://github.com/schybo/flackish -Entry file: flackish/hello.py -Scanned: 2016-10-19 08:44:06.329173 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nifemim/flaskr_coding_challenge -https://github.com/nifemim/flaskr_coding_challenge -Entry file: flaskr_coding_challenge/flaskr/flaskr.py -Scanned: 2016-10-19 08:44:08.190682 -No vulnerabilities found. - - -stensoootla/spotpix_api -https://github.com/stensoootla/spotpix_api -Entry file: spotpix_api/api/__init__.py -Scanned: 2016-10-19 08:44:09.575419 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ChristianWitts/Restless-Skeleton -https://github.com/ChristianWitts/Restless-Skeleton -Entry file: Restless-Skeleton/RestlessSkeleton.py -Scanned: 2016-10-19 08:44:18.101588 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DChen7/TennisPredictor -https://github.com/DChen7/TennisPredictor -Entry file: TennisPredictor/tennis_classifier.py -Scanned: 2016-10-19 08:44:19.919468 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sxtech/SX-CarRecgServer -https://github.com/sxtech/SX-CarRecgServer -Entry file: SX-CarRecgServer/car_recg/app.py -Scanned: 2016-10-19 08:44:21.487377 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -z3ugma/rethink-recipes -https://github.com/z3ugma/rethink-recipes -Entry file: rethink-recipes/colorpicker.py -Scanned: 2016-10-19 08:44:27.295244 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -houxiaohou/juzi-blog -https://github.com/houxiaohou/juzi-blog -Entry file: juzi-blog/__init__.py -Scanned: 2016-10-19 08:44:28.542134 -No vulnerabilities found. - - -Depado/we-rate -https://github.com/Depado/we-rate -Entry file: we-rate/app/__init__.py -Scanned: 2016-10-19 08:44:30.502792 -No vulnerabilities found. - - -CorrosiveKid/raspberrypi-gpio-api -https://github.com/CorrosiveKid/raspberrypi-gpio-api -Entry file: raspberrypi-gpio-api/flask-api.py -Scanned: 2016-10-19 08:44:33.003646 -No vulnerabilities found. - - -micahh2/marvin -https://github.com/micahh2/marvin -Entry file: marvin/marvin.py -Scanned: 2016-10-19 08:44:34.507916 -No vulnerabilities found. - - -RichardJTorres/minecraft-manager -https://github.com/RichardJTorres/minecraft-manager -Entry file: minecraft-manager/app/__init__.py -Scanned: 2016-10-19 08:44:36.098184 -No vulnerabilities found. - - -jeuvreyl/Viewer -https://github.com/jeuvreyl/Viewer -Entry file: Viewer/__init__.py -Scanned: 2016-10-19 08:44:37.791761 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wuyazi/microblog-learning -https://github.com/wuyazi/microblog-learning -Entry file: microblog-learning/app/__init__.py -Scanned: 2016-10-19 08:44:39.029994 -No vulnerabilities found. - - -AhnSeongHyun/logis -https://github.com/AhnSeongHyun/logis -Entry file: logis/example.py -Scanned: 2016-10-19 08:44:41.784457 -No vulnerabilities found. - - -karldreher/skim.py -https://github.com/karldreher/skim.py -Entry file: None -Scanned: 2016-10-19 08:44:43.095185 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/karldreher/skim.py. - -makeittotop/q_mon -https://github.com/makeittotop/q_mon -Entry file: q_mon/q_mon.py -Scanned: 2016-10-19 08:44:50.298604 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akshshar/proxy_slave_graphite -https://github.com/akshshar/proxy_slave_graphite -Entry file: proxy_slave_graphite/__init__.py -Scanned: 2016-10-19 08:44:51.868328 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arunvelsriram/auwebportal -https://github.com/arunvelsriram/auwebportal -Entry file: auwebportal/auwebportal/__init__.py -Scanned: 2016-10-19 08:44:53.571578 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amydshelton/API_tutorial -https://github.com/amydshelton/API_tutorial -Entry file: API_tutorial/app.py -Scanned: 2016-10-19 08:44:54.832335 -Vulnerability 1: -File: API_tutorial/app.py - > User input at line 56, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: API_tutorial/app.py - > reaches line 63, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -cfezequiel/fleedr -https://github.com/cfezequiel/fleedr -Entry file: fleedr/fleedr.py -Scanned: 2016-10-19 08:44:56.100527 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -markebbole/partyspot -https://github.com/markebbole/partyspot -Entry file: partyspot/webserver.py -Scanned: 2016-10-19 08:44:57.579085 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hojas/flask -https://github.com/hojas/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 08:44:59.789761 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -uclaacm/teach_reddit_clone_flask -https://github.com/uclaacm/teach_reddit_clone_flask -Entry file: teach_reddit_clone_flask/app/__init__.py -Scanned: 2016-10-19 08:45:01.153632 -No vulnerabilities found. - - -jimjshields/flask_app -https://github.com/jimjshields/flask_app -Entry file: None -Scanned: 2016-10-19 08:45:01.653085 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jimjshields/flask_app. - -melvin0008/FlaskBoilerplate -https://github.com/melvin0008/FlaskBoilerplate -Entry file: None -Scanned: 2016-10-19 08:45:04.006446 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/melvin0008/FlaskBoilerplate. - -stefoo411/flask-boilerplate-master-git -https://github.com/stefoo411/flask-boilerplate-master-git -Entry file: flask-boilerplate-master-git/app.py -Scanned: 2016-10-19 08:45:04.584553 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -felixmulder/flaskcards -https://github.com/felixmulder/flaskcards -Entry file: flaskcards/app.py -Scanned: 2016-10-19 08:45:05.984479 -No vulnerabilities found. - - -jasonshiffler/flasktaskr -https://github.com/jasonshiffler/flasktaskr -Entry file: None -Scanned: 2016-10-19 08:45:08.513076 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -truep/flaskapp -https://github.com/truep/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-19 08:45:09.032493 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Atuuh/FlaskPi -https://github.com/Atuuh/FlaskPi -Entry file: FlaskPi/app/__init__.py -Scanned: 2016-10-19 08:45:11.270920 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SRITANU/FlaskApp -https://github.com/SRITANU/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 08:45:22.978148 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -s3nk4s/flaskTutorials -https://github.com/s3nk4s/flaskTutorials -Entry file: flaskTutorials/FlaskApp/FlaskApp/__init__.py -Scanned: 2016-10-19 08:45:26.761775 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Obiwancodi/hello_flask -https://github.com/Obiwancodi/hello_flask -Entry file: hello_flask/hello_world.py -Scanned: 2016-10-19 08:45:28.043801 -No vulnerabilities found. - - -elysium31/flask_tutorial -https://github.com/elysium31/flask_tutorial -Entry file: flask_tutorial/app/__init__.py -Scanned: 2016-10-19 08:45:29.543801 -No vulnerabilities found. - - -victormocioiu/flask_tasky -https://github.com/victormocioiu/flask_tasky -Entry file: flask_tasky/views.py -Scanned: 2016-10-19 08:45:31.333920 -No vulnerabilities found. - - -allofthefasts/flask-mega -https://github.com/allofthefasts/flask-mega -Entry file: flask-mega/app/__init__.py -Scanned: 2016-10-19 08:45:32.977634 -No vulnerabilities found. - - -Marleg/flask-blog -https://github.com/Marleg/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:45:33.548705 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -commadelimited/flask-demo -https://github.com/commadelimited/flask-demo -Entry file: None -Scanned: 2016-10-19 08:45:35.050029 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/commadelimited/flask-demo. - -jeromefiot/FLASK_base -https://github.com/jeromefiot/FLASK_base -Entry file: FLASK_base/app/__init__.py -Scanned: 2016-10-19 08:45:37.768534 -No vulnerabilities found. - - -gergob/flask_web -https://github.com/gergob/flask_web -Entry file: flask_web/app.py -Scanned: 2016-10-19 08:45:39.381659 -Vulnerability 1: -File: flask_web/app.py - > User input at line 34, trigger word "form[": - user_name = request.form['username'] -Reassigned in: - File: flask_web/app.py - > Line 38: error_message = 'User {} successfuly logged in.'.format(user_name) - File: flask_web/app.py - > Line 47: error_message = 'Invalid request method:{}'.format(request.method) -File: flask_web/app.py - > reaches line 39, trigger word "flash(": - flash(error_message) - -Vulnerability 2: -File: flask_web/app.py - > User input at line 34, trigger word "form[": - user_name = request.form['username'] -Reassigned in: - File: flask_web/app.py - > Line 38: error_message = 'User {} successfuly logged in.'.format(user_name) - File: flask_web/app.py - > Line 47: error_message = 'Invalid request method:{}'.format(request.method) -File: flask_web/app.py - > reaches line 49, trigger word "flash(": - flash(error_message) - - - -ravindersahni/hello-flask -https://github.com/ravindersahni/hello-flask -Entry file: hello-flask/hello_flask.py -Scanned: 2016-10-19 08:45:40.631187 -No vulnerabilities found. - - -juzten/QuickFlask -https://github.com/juzten/QuickFlask -Entry file: QuickFlask/ChadevPython/app.py -Scanned: 2016-10-19 08:45:42.918998 -No vulnerabilities found. - - -JaehyunAhn/testFlask -https://github.com/JaehyunAhn/testFlask -Entry file: testFlask/testFlask.py -Scanned: 2016-10-19 08:45:44.139264 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -HyperStandard/py-flask -https://github.com/HyperStandard/py-flask -Entry file: py-flask/flaskapp.py -Scanned: 2016-10-19 08:45:45.623349 -No vulnerabilities found. - - -libhide/todo-flask -https://github.com/libhide/todo-flask -Entry file: todo-flask/app/__init__.py -Scanned: 2016-10-19 08:45:51.113706 -No vulnerabilities found. - - -th4tirishguy/flask-skeleton -https://github.com/th4tirishguy/flask-skeleton -Entry file: None -Scanned: 2016-10-19 08:45:52.634984 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/th4tirishguy/flask-skeleton. - -vocky/flask-test -https://github.com/vocky/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 08:45:54.203032 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -hw810/flask_microblog -https://github.com/hw810/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 08:45:56.820274 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Rand01ph/flask-blog -https://github.com/Rand01ph/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:45:57.349621 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -nehaavishwa/GameFlask -https://github.com/nehaavishwa/GameFlask -Entry file: GameFlask/app.py -Scanned: 2016-10-19 08:46:01.076581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -billmccord/im-real-time-flask -https://github.com/billmccord/im-real-time-flask -Entry file: im-real-time-flask/website/website.py -Scanned: 2016-10-19 08:46:02.736539 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bwilks27/flask-hello-world -https://github.com/bwilks27/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 08:46:03.288082 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -sportnak/flask-emojiTweet -https://github.com/sportnak/flask-emojiTweet -Entry file: flask-emojiTweet/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-19 08:46:13.899517 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sb2gh/flask_login_1 -https://github.com/sb2gh/flask_login_1 -Entry file: flask_login_1/app/__init__.py -Scanned: 2016-10-19 08:46:15.308615 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -harshk360/python-flask-test -https://github.com/harshk360/python-flask-test -Entry file: python-flask-test/app.py -Scanned: 2016-10-19 08:46:16.510570 -No vulnerabilities found. - - -liupeng330/PythonFlaskTest -https://github.com/liupeng330/PythonFlaskTest -Entry file: PythonFlaskTest/FlaskTest/src/app.py -Scanned: 2016-10-19 08:46:17.720533 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shihpeng/flask-site-template -https://github.com/shihpeng/flask-site-template -Entry file: None -Scanned: 2016-10-19 08:46:19.322897 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shihpeng/flask-site-template. - -macdart/flask-hello-world -https://github.com/macdart/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 08:46:19.897278 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -PMcCarth/flask-hellow-world -https://github.com/PMcCarth/flask-hellow-world -Entry file: flask-hellow-world/app.py -Scanned: 2016-10-19 08:46:21.127344 -No vulnerabilities found. - - -mattupstate/pytest-flask-error -https://github.com/mattupstate/pytest-flask-error -Entry file: pytest-flask-error/myapp.py -Scanned: 2016-10-19 08:46:22.346522 -No vulnerabilities found. - - -aslamup/Student-Record-using-flask- -https://github.com/aslamup/Student-Record-using-flask- -Entry file: Student-Record-using-flask-/student.py -Scanned: 2016-10-19 08:46:23.967439 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bonfy/dianji-data-flask -https://github.com/bonfy/dianji-data-flask -Entry file: dianji-data-flask/project/__init__.py -Scanned: 2016-10-19 08:46:26.349396 -No vulnerabilities found. - - -davemenninger/flask-blockio-faucet -https://github.com/davemenninger/flask-blockio-faucet -Entry file: flask-blockio-faucet/faucet.py -Scanned: 2016-10-19 08:46:29.880161 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Call' object has no attribute 'value' - -bwainstock/ba-flask-rest_api -https://github.com/bwainstock/ba-flask-rest_api -Entry file: ba-flask-rest_api/routes.py -Scanned: 2016-10-19 08:46:33.803990 -No vulnerabilities found. - - -ElizHarbinger/Simple-Flask-Application -https://github.com/ElizHarbinger/Simple-Flask-Application -Entry file: Simple-Flask-Application/app.py -Scanned: 2016-10-19 08:46:35.060911 -No vulnerabilities found. - - -ZhaoYun17/flask-hello-world -https://github.com/ZhaoYun17/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 08:46:35.613398 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ddingman/CommitSwimmingFlask -https://github.com/ddingman/CommitSwimmingFlask -Entry file: CommitSwimmingFlask/app/__init__.py -Scanned: 2016-10-19 08:46:37.903281 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aslamup/Blog-app-using-flask -https://github.com/aslamup/Blog-app-using-flask -Entry file: Blog-app-using-flask/flaskr.py -Scanned: 2016-10-19 08:46:39.162048 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -erm/twisted-flask-irc -https://github.com/erm/twisted-flask-irc -Entry file: twisted-flask-irc/app.py -Scanned: 2016-10-19 08:46:40.445750 -No vulnerabilities found. - - -agsgs2007/learn-flasky -https://github.com/agsgs2007/learn-flasky -Entry file: learn-flasky/hello.py -Scanned: 2016-10-19 08:46:41.843870 -No vulnerabilities found. - - -deanvlue/pBitsket -https://github.com/deanvlue/pBitsket -Entry file: None -Scanned: 2016-10-19 08:46:43.086822 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/deanvlue/pBitsket. - -peggykh/JungleMonks -https://github.com/peggykh/JungleMonks -Entry file: JungleMonks/app/__init__.py -Scanned: 2016-10-19 08:46:47.995279 -No vulnerabilities found. - - -Nonse/monkeys -https://github.com/Nonse/monkeys -Entry file: monkeys/monkeygod/__init__.py -Scanned: 2016-10-19 08:46:49.567774 -No vulnerabilities found. - - -bobcolner/material-girl -https://github.com/bobcolner/material-girl -Entry file: material-girl/app/__init__.py -Scanned: 2016-10-19 08:46:52.765472 -Vulnerability 1: -File: material-girl/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: material-girl/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: material-girl/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: material-girl/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: material-girl/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: material-girl/app/api_1_0/users.py - > Line 20: prev = None - File: material-girl/app/api_1_0/users.py - > Line 23: next = None -File: material-girl/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: material-girl/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: material-girl/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: material-girl/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: material-girl/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: material-girl/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: material-girl/app/api_1_0/users.py - > Line 42: prev = None - File: material-girl/app/api_1_0/users.py - > Line 45: next = None -File: material-girl/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: material-girl/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: material-girl/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: material-girl/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: material-girl/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: material-girl/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: material-girl/app/api_1_0/posts.py - > Line 16: prev = None - File: material-girl/app/api_1_0/posts.py - > Line 19: next = None -File: material-girl/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: material-girl/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: material-girl/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: material-girl/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: material-girl/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: material-girl/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: material-girl/app/api_1_0/comments.py - > Line 15: prev = None - File: material-girl/app/api_1_0/comments.py - > Line 18: next = None -File: material-girl/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: material-girl/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: material-girl/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: material-girl/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: material-girl/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: material-girl/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: material-girl/app/api_1_0/comments.py - > Line 43: prev = None - File: material-girl/app/api_1_0/comments.py - > Line 46: next = None -File: material-girl/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -levy5674/hello_world -https://github.com/levy5674/hello_world -Entry file: hello_world/hello.py -Scanned: 2016-10-19 08:46:54.067144 -No vulnerabilities found. - - -pokeyjoey/microblog -https://github.com/pokeyjoey/microblog -Entry file: None -Scanned: 2016-10-19 08:46:54.587634 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Eddolan/TwilioControlViaSMS -https://github.com/Eddolan/TwilioControlViaSMS -Entry file: TwilioControlViaSMS/flaskApp.py -Scanned: 2016-10-19 08:46:56.963581 -No vulnerabilities found. - - -gabrielfalcao/tumbler -https://github.com/gabrielfalcao/tumbler -Entry file: None -Scanned: 2016-10-19 08:46:58.430431 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/gabrielfalcao/tumbler. - -sivajipr/student_details_app_in_flask -https://github.com/sivajipr/student_details_app_in_flask -Entry file: None -Scanned: 2016-10-19 08:46:59.792225 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sivajipr/student_details_app_in_flask. - -reneighbor/pwitter -https://github.com/reneighbor/pwitter -Entry file: pwitter/create_user.py -Scanned: 2016-10-19 08:47:01.371976 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aachik/pyheart -https://github.com/aachik/pyheart -Entry file: pyheart/pyheart.py -Scanned: 2016-10-19 08:47:03.969403 -No vulnerabilities found. - - -stensoootla/spotpix_api -https://github.com/stensoootla/spotpix_api -Entry file: spotpix_api/api/__init__.py -Scanned: 2016-10-19 08:47:04.496004 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -aquarion/retort -https://github.com/aquarion/retort -Entry file: retort/webapp.py -Scanned: 2016-10-19 08:47:06.188978 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -haharazer/short-url -https://github.com/haharazer/short-url -Entry file: short-url/app/__init__.py -Scanned: 2016-10-19 08:47:18.069772 -No vulnerabilities found. - - -stdgy/foosball_backend -https://github.com/stdgy/foosball_backend -Entry file: foosball_backend/debug.py -Scanned: 2016-10-19 08:47:19.645676 -No vulnerabilities found. - - -den-is/rp2-ch9-flasktaskr -https://github.com/den-is/rp2-ch9-flasktaskr -Entry file: rp2-ch9-flasktaskr/app/views.py -Scanned: 2016-10-19 08:47:21.273668 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cr5315/paste -https://github.com/cr5315/paste -Entry file: paste/app/__init__.py -Scanned: 2016-10-19 08:47:22.667239 -No vulnerabilities found. - - -Raghavan-Lab/BioDashboard -https://github.com/Raghavan-Lab/BioDashboard -Entry file: BioDashboard/app/__init__.py -Scanned: 2016-10-19 08:47:24.047472 -No vulnerabilities found. - - -houxiaohou/juzi-blog -https://github.com/houxiaohou/juzi-blog -Entry file: juzi-blog/__init__.py -Scanned: 2016-10-19 08:47:25.294926 -No vulnerabilities found. - - -oyld/microblog -https://github.com/oyld/microblog -Entry file: None -Scanned: 2016-10-19 08:47:25.803653 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tcxurun/sheep -https://github.com/tcxurun/sheep -Entry file: sheep/app/__init__.py -Scanned: 2016-10-19 08:47:28.780175 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -droptak/droptak-backend -https://github.com/droptak/droptak-backend -Entry file: None -Scanned: 2016-10-19 08:47:43.929445 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yeaske/layer_7_check -https://github.com/yeaske/layer_7_check -Entry file: layer_7_check/checker.py -Scanned: 2016-10-19 08:47:45.289050 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wuyazi/microblog-learning -https://github.com/wuyazi/microblog-learning -Entry file: microblog-learning/app/__init__.py -Scanned: 2016-10-19 08:47:46.515179 -No vulnerabilities found. - - -bigfang/blog -https://github.com/bigfang/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 08:47:47.011516 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -masnun/api.howtocode.com.bd -https://github.com/masnun/api.howtocode.com.bd -Entry file: None -Scanned: 2016-10-19 08:47:49.151389 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/masnun/api.howtocode.com.bd. - -guilhermebruzzi/matchesjson -https://github.com/guilhermebruzzi/matchesjson -Entry file: None -Scanned: 2016-10-19 08:47:50.484876 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/guilhermebruzzi/matchesjson. - -bhoopeshkumaar/Meal_Customize -https://github.com/bhoopeshkumaar/Meal_Customize -Entry file: Meal_Customize/mealSystem.py -Scanned: 2016-10-19 08:48:00.267651 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kdjomeda/iwallet-konohashop-python -https://github.com/kdjomeda/iwallet-konohashop-python -Entry file: iwallet-konohashop-python/iwallet-konohashop-python.py -Scanned: 2016-10-19 08:48:01.492654 -No vulnerabilities found. - - -thefinn93/Seattle-911-to-RSS -https://github.com/thefinn93/Seattle-911-to-RSS -Entry file: Seattle-911-to-RSS/app.py -Scanned: 2016-10-19 08:48:02.867780 -No vulnerabilities found. - - -saposki/saposki7 -https://github.com/saposki/saposki7 -Entry file: saposki7/lib/python2.7/site-packages/flask/sessions.py -Scanned: 2016-10-19 08:48:07.558501 -No vulnerabilities found. - - -realpython/flask-skeleton -https://github.com/realpython/flask-skeleton -Entry file: None -Scanned: 2016-10-19 08:48:09.267242 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/realpython/flask-skeleton. - -nicolaiarocci/flask-sentinel -https://github.com/nicolaiarocci/flask-sentinel -Entry file: flask-sentinel/flask_sentinel/tests/base.py -Scanned: 2016-10-19 08:48:11.029000 -No vulnerabilities found. - - -pyexcel/Flask-Excel -https://github.com/pyexcel/Flask-Excel -Entry file: Flask-Excel/examples/tiny_example.py -Scanned: 2016-10-19 08:48:12.594074 -No vulnerabilities found. - - -fromzeroedu/flask_blog -https://github.com/fromzeroedu/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 08:48:13.091623 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jwhelland/flask-socketio-celery-example -https://github.com/jwhelland/flask-socketio-celery-example -Entry file: flask-socketio-celery-example/app.py -Scanned: 2016-10-19 08:48:14.404121 -No vulnerabilities found. - - -NoGameNoLife00/mybolg -https://github.com/NoGameNoLife00/mybolg -Entry file: mybolg/blogapp.py -Scanned: 2016-10-19 08:48:19.212527 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Abubakarmani/flask -https://github.com/Abubakarmani/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 08:48:20.501655 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -surfermac14/flask -https://github.com/surfermac14/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 08:48:21.488965 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -kylewm/flask-micropub -https://github.com/kylewm/flask-micropub -Entry file: flask-micropub/example.py -Scanned: 2016-10-19 08:48:23.924753 -No vulnerabilities found. - - -uclaacm/teach_reddit_clone_flask -https://github.com/uclaacm/teach_reddit_clone_flask -Entry file: teach_reddit_clone_flask/app/__init__.py -Scanned: 2016-10-19 08:48:25.279458 -No vulnerabilities found. - - -jay3dec/PythonFlaskMySQLApp_Part2 -https://github.com/jay3dec/PythonFlaskMySQLApp_Part2 -Entry file: PythonFlaskMySQLApp_Part2/app.py -Scanned: 2016-10-19 08:48:26.863524 -No vulnerabilities found. - - -heynemann/generator-flask-app -https://github.com/heynemann/generator-flask-app -Entry file: generator-flask-app/app/templates/_app.py -Scanned: 2016-10-19 08:48:28.325295 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benoittgt/flask_omdb_api -https://github.com/benoittgt/flask_omdb_api -Entry file: flask_omdb_api/flask_demo.py -Scanned: 2016-10-19 08:48:29.692236 -No vulnerabilities found. - - -qddegtya/Weixin-Flask -https://github.com/qddegtya/Weixin-Flask -Entry file: Weixin-Flask/WeixinFlask.py -Scanned: 2016-10-19 08:48:32.034714 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sejoharp/flasktimetracker -https://github.com/sejoharp/flasktimetracker -Entry file: flasktimetracker/flasktimetracker.py -Scanned: 2016-10-19 08:48:34.408683 -No vulnerabilities found. - - -xkjcf/flaskrexample -https://github.com/xkjcf/flaskrexample -Entry file: flaskrexample/flaskr.py -Scanned: 2016-10-19 08:48:35.677185 -No vulnerabilities found. - - -BenHagan/flasktaskr -https://github.com/BenHagan/flasktaskr -Entry file: None -Scanned: 2016-10-19 08:48:36.198832 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ivantikhonov/flasktest -https://github.com/ivantikhonov/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 08:48:46.828435 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -FenceAtMHacks/flaskbackend -https://github.com/FenceAtMHacks/flaskbackend -Entry file: flaskbackend/fence-api/flask/backend.py -Scanned: 2016-10-19 08:48:49.774349 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbackend/fence-api/flask/lib/python2.7/genericpath.py - -greedo/flask-oauth2-devices -https://github.com/greedo/flask-oauth2-devices -Entry file: flask-oauth2-devices/myservice.py -Scanned: 2016-10-19 08:48:51.327235 -Vulnerability 1: -File: flask-oauth2-devices/myservice.py - > User input at line 59, trigger word "get(": - user_code = load_auth_code(request.values.get('user_code')) -Reassigned in: - File: flask-oauth2-devices/myservice.py - > Line 69: ret_MAYBE_FUNCTION_NAME = resp - File: flask-oauth2-devices/myservice.py - > Line 62: ret_MAYBE_FUNCTION_NAME = render_template('app_auth_error.html') -File: flask-oauth2-devices/myservice.py - > reaches line 64, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/oauth/authorization/accept?user_code= ' + str(user_code.code)) - -Vulnerability 2: -File: flask-oauth2-devices/devices/provider/devices.py - > User input at line 100, trigger word "get(": - error_endpoint = self.app.config.get('OAUTH2_DEVICES_PROVIDER_ERROR_ENDPOINT') -Reassigned in: - File: flask-oauth2-devices/devices/provider/devices.py - > Line 104: ret_MAYBE_FUNCTION_NAME = '/oauth/errors' - File: flask-oauth2-devices/devices/provider/devices.py - > Line 99: ret_MAYBE_FUNCTION_NAME = error_uri -File: flask-oauth2-devices/devices/provider/devices.py - > reaches line 103, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint) - -Vulnerability 3: -File: flask-oauth2-devices/example/myservice.py - > User input at line 59, trigger word "get(": - user_code = load_auth_code(request.values.get('user_code')) -Reassigned in: - File: flask-oauth2-devices/example/myservice.py - > Line 69: ret_MAYBE_FUNCTION_NAME = resp - File: flask-oauth2-devices/example/myservice.py - > Line 62: ret_MAYBE_FUNCTION_NAME = render_template('app_auth_error.html') -File: flask-oauth2-devices/example/myservice.py - > reaches line 64, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/oauth/authorization/accept?user_code= ' + str(user_code.code)) - - - -sfmailand/flaskTutorial -https://github.com/sfmailand/flaskTutorial -Entry file: flaskTutorial/flaskr.py -Scanned: 2016-10-19 08:48:54.746553 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskTutorial/venv/lib/python2.7/genericpath.py - -robintw/FlaskTemperature -https://github.com/robintw/FlaskTemperature -Entry file: FlaskTemperature/app.py -Scanned: 2016-10-19 08:48:56.026670 -No vulnerabilities found. - - -Wannuc/flaskExample -https://github.com/Wannuc/flaskExample -Entry file: flaskExample/app.py -Scanned: 2016-10-19 08:48:57.287624 -No vulnerabilities found. - - -SRITANU/FlaskApp -https://github.com/SRITANU/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 08:49:02.367556 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PyClass/FlaskBasic -https://github.com/PyClass/FlaskBasic -Entry file: FlaskBasic/main.py -Scanned: 2016-10-19 08:49:04.661374 -No vulnerabilities found. - - -pvarsh/flask_tutorial -https://github.com/pvarsh/flask_tutorial -Entry file: flask_tutorial/hello_app/__init__.py -Scanned: 2016-10-19 08:49:06.031088 -No vulnerabilities found. - - -guowei1003/Flask-blog -https://github.com/guowei1003/Flask-blog -Entry file: Flask-blog/Flask-blog.py -Scanned: 2016-10-19 08:49:10.314497 -No vulnerabilities found. - - -padraic-padraic/AnxietyFlask -https://github.com/padraic-padraic/AnxietyFlask -Entry file: AnxietyFlask/AnxietyFlask/__init__.py -Scanned: 2016-10-19 08:49:13.376510 -No vulnerabilities found. - - -adsabs/flask-discoverer -https://github.com/adsabs/flask-discoverer -Entry file: None -Scanned: 2016-10-19 08:49:14.759605 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/adsabs/flask-discoverer. - -hunt3ri/flask-scaffold -https://github.com/hunt3ri/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-19 08:49:16.728504 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sorlovsky/Flask-Site -https://github.com/sorlovsky/Flask-Site -Entry file: Flask-Site/app.py -Scanned: 2016-10-19 08:49:23.725438 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Site/venv/lib/python2.7/genericpath.py - -rhlobo/flask-bigtempo -https://github.com/rhlobo/flask-bigtempo -Entry file: flask-bigtempo/example_store.py -Scanned: 2016-10-19 08:49:25.169918 -No vulnerabilities found. - - -Nalian79/flask_hello -https://github.com/Nalian79/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-19 08:49:26.468378 -No vulnerabilities found. - - -BOBTommy/flask_blog -https://github.com/BOBTommy/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 08:49:27.475816 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pjwarner/flask-template -https://github.com/pjwarner/flask-template -Entry file: flask-template/yourapp/__init__.py -Scanned: 2016-10-19 08:49:29.108512 -No vulnerabilities found. - - -BenHagan/flask-blog -https://github.com/BenHagan/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:49:29.684694 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -bolenton/flask_test -https://github.com/bolenton/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 08:49:30.242646 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dblackdblack/flask_test -https://github.com/dblackdblack/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 08:49:30.787674 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ZhaoYun17/flask-blog -https://github.com/ZhaoYun17/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:49:31.351683 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -nicolewhite/flask-celery -https://github.com/nicolewhite/flask-celery -Entry file: flask-celery/webapp/__init__.py -Scanned: 2016-10-19 08:49:34.596512 -No vulnerabilities found. - - -benasse/canal-flask -https://github.com/benasse/canal-flask -Entry file: canal-flask/canal-flask.py -Scanned: 2016-10-19 08:49:36.990968 -No vulnerabilities found. - - -zhangshy/hello -https://github.com/zhangshy/hello -Entry file: hello/blog/__init__.py -Scanned: 2016-10-19 08:49:38.351097 -No vulnerabilities found. - - -lmcdonough/SR-FlaskApi -https://github.com/lmcdonough/SR-FlaskApi -Entry file: SR-FlaskApi/app.py -Scanned: 2016-10-19 08:49:47.882529 -No vulnerabilities found. - - -tom-price/flaskQuickStart -https://github.com/tom-price/flaskQuickStart -Entry file: flaskQuickStart/app.py -Scanned: 2016-10-19 08:49:49.295933 -No vulnerabilities found. - - -liupeng330/PythonFlaskTest -https://github.com/liupeng330/PythonFlaskTest -Entry file: PythonFlaskTest/FlaskTest/src/app.py -Scanned: 2016-10-19 08:49:53.307564 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -harshk360/python-flask-test -https://github.com/harshk360/python-flask-test -Entry file: python-flask-test/app.py -Scanned: 2016-10-19 08:49:57.591748 -No vulnerabilities found. - - -cikenerd/flask_login_demo -https://github.com/cikenerd/flask_login_demo -Entry file: flask_login_demo/flask_login_demo/app.py -Scanned: 2016-10-19 08:49:59.192878 -No vulnerabilities found. - - -jimjshields/flask_mega_tutorial -https://github.com/jimjshields/flask_mega_tutorial -Entry file: flask_mega_tutorial/app/__init__.py -Scanned: 2016-10-19 08:50:00.723419 -No vulnerabilities found. - - -aaabhilash97/url-shortner-in-flask -https://github.com/aaabhilash97/url-shortner-in-flask -Entry file: url-shortner-in-flask/app/__init__.py -Scanned: 2016-10-19 08:50:04.988619 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akhripko/flask_python_examples -https://github.com/akhripko/flask_python_examples -Entry file: flask_python_examples/web/__init__.py -Scanned: 2016-10-19 08:50:06.281648 -No vulnerabilities found. - - -phrase/flask-demo-application -https://github.com/phrase/flask-demo-application -Entry file: flask-demo-application/flaskr.py -Scanned: 2016-10-19 08:50:07.654549 -No vulnerabilities found. - - -bearzk/radio-in-flask -https://github.com/bearzk/radio-in-flask -Entry file: radio-in-flask/radio.py -Scanned: 2016-10-19 08:50:12.309766 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DiegoPires/test-flask-py3 -https://github.com/DiegoPires/test-flask-py3 -Entry file: test-flask-py3/app/__init__.py -Scanned: 2016-10-19 08:50:13.843282 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -prashannth/openid-login-flask -https://github.com/prashannth/openid-login-flask -Entry file: openid-login-flask/app/__init__.py -Scanned: 2016-10-19 08:50:16.151488 -No vulnerabilities found. - - -hordecore/RandomTestingFlask -https://github.com/hordecore/RandomTestingFlask -Entry file: RandomTestingFlask/main.py -Scanned: 2016-10-19 08:50:17.387729 -No vulnerabilities found. - - -shibinp/blog_using_flask -https://github.com/shibinp/blog_using_flask -Entry file: None -Scanned: 2016-10-19 08:50:18.756408 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shibinp/blog_using_flask. - -PMcCarth/flask-hellow-world -https://github.com/PMcCarth/flask-hellow-world -Entry file: flask-hellow-world/app.py -Scanned: 2016-10-19 08:50:20.000953 -No vulnerabilities found. - - -BenHagan/flask-hello-world -https://github.com/BenHagan/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 08:50:20.567883 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -fxa90id/up-flask-forum -https://github.com/fxa90id/up-flask-forum -Entry file: up-flask-forum/app.py -Scanned: 2016-10-19 08:50:23.980000 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TatianaTylosky/first_flask_app -https://github.com/TatianaTylosky/first_flask_app -Entry file: first_flask_app/hello_world.py -Scanned: 2016-10-19 08:50:26.238553 -No vulnerabilities found. - - -deanvlue/pBitsket -https://github.com/deanvlue/pBitsket -Entry file: None -Scanned: 2016-10-19 08:50:26.743242 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/deanvlue/pBitsket. - -SRITANU/flblog -https://github.com/SRITANU/flblog -Entry file: flblog/blog.py -Scanned: 2016-10-19 08:50:29.055795 -No vulnerabilities found. - - -shibinp/Url_shortner_app_using_flask -https://github.com/shibinp/Url_shortner_app_using_flask -Entry file: Url_shortner_app_using_flask/app.py -Scanned: 2016-10-19 08:50:30.572393 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aklaussen/tumblelog -https://github.com/aklaussen/tumblelog -Entry file: tumblelog/flask-tumblelog-master/tumblelog/__init__.py -Scanned: 2016-10-19 08:50:35.338074 -No vulnerabilities found. - - -mperham2/flasktaskr_project_old -https://github.com/mperham2/flasktaskr_project_old -Entry file: None -Scanned: 2016-10-19 08:50:40.356152 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aaabhilash97/Flipkart-Product-Details-Extraction-Flask-Python -https://github.com/aaabhilash97/Flipkart-Product-Details-Extraction-Flask-Python -Entry file: Flipkart-Product-Details-Extraction-Flask-Python/app/__init__.py -Scanned: 2016-10-19 08:50:41.734064 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cgeoffroy/foobar-skeleton-site -https://github.com/cgeoffroy/foobar-skeleton-site -Entry file: None -Scanned: 2016-10-19 08:50:43.111427 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cgeoffroy/foobar-skeleton-site. - -harrismendell/zoteroapp -https://github.com/harrismendell/zoteroapp -Entry file: None -Scanned: 2016-10-19 08:50:46.711962 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -abouzek/lq_api -https://github.com/abouzek/lq_api -Entry file: lq_api/love_quest/app.py -Scanned: 2016-10-19 08:50:48.127696 -No vulnerabilities found. - - -salilpa/knowlarity-hack -https://github.com/salilpa/knowlarity-hack -Entry file: knowlarity-hack/main.py -Scanned: 2016-10-19 08:50:49.738089 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chriswood/kiteeatingtree -https://github.com/chriswood/kiteeatingtree -Entry file: None -Scanned: 2016-10-19 08:50:52.153850 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chriswood/kiteeatingtree. - -svenXY/hostdb -https://github.com/svenXY/hostdb -Entry file: hostdb/app/__init__.py -Scanned: 2016-10-19 08:50:53.704648 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -rye761/fDict -https://github.com/rye761/fDict -Entry file: fDict/fdict.py -Scanned: 2016-10-19 08:50:55.049516 -No vulnerabilities found. - - -vbalien/CutUrl -https://github.com/vbalien/CutUrl -Entry file: CutUrl/cuturl/__init__.py -Scanned: 2016-10-19 08:50:56.629730 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -cr5315/paste -https://github.com/cr5315/paste -Entry file: paste/app/__init__.py -Scanned: 2016-10-19 08:50:57.947995 -No vulnerabilities found. - - -Raghavan-Lab/BioDashboard -https://github.com/Raghavan-Lab/BioDashboard -Entry file: BioDashboard/app/__init__.py -Scanned: 2016-10-19 08:50:59.279957 -No vulnerabilities found. - - -betezed/TweetApi -https://github.com/betezed/TweetApi -Entry file: TweetApi/microTweet.py -Scanned: 2016-10-19 08:51:00.684690 -No vulnerabilities found. - - -lukasheinrich/projects.lukasheinrich.com -https://github.com/lukasheinrich/projects.lukasheinrich.com -Entry file: None -Scanned: 2016-10-19 08:51:01.917513 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lukasheinrich/projects.lukasheinrich.com. - -kmorrell27/viewcounter -https://github.com/kmorrell27/viewcounter -Entry file: viewcounter/app.py -Scanned: 2016-10-19 08:51:06.123798 -No vulnerabilities found. - - -Duke-GCB/WebDiskUsage -https://github.com/Duke-GCB/WebDiskUsage -Entry file: WebDiskUsage/usage.py -Scanned: 2016-10-19 08:51:07.407517 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laurogama/raspyxbee -https://github.com/laurogama/raspyxbee -Entry file: raspyxbee/rest.py -Scanned: 2016-10-19 08:51:08.748539 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -charlieRode/web_blog -https://github.com/charlieRode/web_blog -Entry file: web_blog/web_blog.py -Scanned: 2016-10-19 08:51:13.070848 -No vulnerabilities found. - - -redbridge/rb-apps-admin -https://github.com/redbridge/rb-apps-admin -Entry file: rb-apps-admin/rb_apps_admin/__init__.py -Scanned: 2016-10-19 08:51:18.777507 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -angelospanag/gaia-alert-backend-python -https://github.com/angelospanag/gaia-alert-backend-python -Entry file: gaia-alert-backend-python/hello.py -Scanned: 2016-10-19 08:51:20.127004 -No vulnerabilities found. - - -mfwarren/NagServer -https://github.com/mfwarren/NagServer -Entry file: NagServer/app/__init__.py -Scanned: 2016-10-19 08:51:21.713284 -No vulnerabilities found. - - -kkauffman/CourseWatcher -https://github.com/kkauffman/CourseWatcher -Entry file: CourseWatcher/app/__init__.py -Scanned: 2016-10-19 08:51:23.414171 -No vulnerabilities found. - - -iv597/battery-test-api -https://github.com/iv597/battery-test-api -Entry file: battery-test-api/main.py -Scanned: 2016-10-19 08:51:24.717927 -No vulnerabilities found. - - -bearcott/pennapps -https://github.com/bearcott/pennapps -Entry file: pennapps/app/__init__.py -Scanned: 2016-10-19 08:51:26.403072 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nicolaiarocci/flask-sentinel -https://github.com/nicolaiarocci/flask-sentinel -Entry file: flask-sentinel/flask_sentinel/tests/base.py -Scanned: 2016-10-19 08:51:29.575941 -No vulnerabilities found. - - -miguelgrinberg/flask-live-coding-webcast -https://github.com/miguelgrinberg/flask-live-coding-webcast -Entry file: flask-live-coding-webcast/shopping.py -Scanned: 2016-10-19 08:51:32.840610 -No vulnerabilities found. - - -pedrovanzella/Flask-DODDNS -https://github.com/pedrovanzella/Flask-DODDNS -Entry file: Flask-DODDNS/doddns.py -Scanned: 2016-10-19 08:51:38.747409 -No vulnerabilities found. - - -barrachri/flask_docker -https://github.com/barrachri/flask_docker -Entry file: flask_docker/app.py -Scanned: 2016-10-19 08:51:43.373372 -No vulnerabilities found. - - -jay3dec/PythonFlaskMySQLApp_Part3 -https://github.com/jay3dec/PythonFlaskMySQLApp_Part3 -Entry file: PythonFlaskMySQLApp_Part3/app.py -Scanned: 2016-10-19 08:51:44.921196 -No vulnerabilities found. - - -Flask-Framework-Cookbook/Chapter-1 -https://github.com/Flask-Framework-Cookbook/Chapter-1 -Entry file: Chapter-1/my_app/__init__.py -Scanned: 2016-10-19 08:51:46.175461 -No vulnerabilities found. - - -ynakayama/flask-hello -https://github.com/ynakayama/flask-hello -Entry file: flask-hello/app.py -Scanned: 2016-10-19 08:51:49.864043 -No vulnerabilities found. - - -itgsodbojo/flask_rest_db -https://github.com/itgsodbojo/flask_rest_db -Entry file: flask_rest_db/IFK/__init__.py -Scanned: 2016-10-19 08:51:51.254212 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -heynemann/generator-flask-app -https://github.com/heynemann/generator-flask-app -Entry file: generator-flask-app/app/templates/_app.py -Scanned: 2016-10-19 08:51:51.751192 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benoittgt/flask_omdb_api -https://github.com/benoittgt/flask_omdb_api -Entry file: flask_omdb_api/flask_demo.py -Scanned: 2016-10-19 08:51:54.999556 -No vulnerabilities found. - - -mattgathu/flask-celery -https://github.com/mattgathu/flask-celery -Entry file: flask-celery/flascelery/__init__.py -Scanned: 2016-10-19 08:51:56.232225 -Vulnerability 1: -File: flask-celery/flascelery/views.py - > User input at line 24, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: flask-celery/flascelery/views.py - > Line 25: session['email'] = email -File: flask-celery/flascelery/views.py - > reaches line 34, trigger word "flash(": - flash('Sending email to {}'.format(email)) - -Vulnerability 2: -File: flask-celery/flascelery/views.py - > User input at line 24, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: flask-celery/flascelery/views.py - > Line 25: session['email'] = email -File: flask-celery/flascelery/views.py - > reaches line 38, trigger word "flash(": - flash('An email will be sent to {} in one minute'.format(email)) - -Vulnerability 3: -File: flask-celery/flascelery/views.py - > User input at line 68, trigger word "get(": - response = 'state''current''total''status'task.statetask.info.get('current', 0)task.info.get('total', 1)task.info.get('status', '') -Reassigned in: - File: flask-celery/flascelery/views.py - > Line 61: response = 'state''current''total''status'task.state01'Pending..' - File: flask-celery/flascelery/views.py - > Line 78: response = 'state''current''total''status'task.state11str(task.info) -File: flask-celery/flascelery/views.py - > reaches line 85, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(response) - - - -phodal-archive/project-x -https://github.com/phodal-archive/project-x -Entry file: None -Scanned: 2016-10-19 08:51:57.933226 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/phodal-archive/project-x. - -elferherrera/flasky -https://github.com/elferherrera/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 08:51:58.448943 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pee-dee/flasktaskr -https://github.com/pee-dee/flasktaskr -Entry file: None -Scanned: 2016-10-19 08:51:59.956887 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -herambh129/flaskapp -https://github.com/herambh129/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-19 08:52:01.463874 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcreekp/flasktaskr -https://github.com/dcreekp/flasktaskr -Entry file: None -Scanned: 2016-10-19 08:52:02.965433 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kwikiel/flasker -https://github.com/kwikiel/flasker -Entry file: flasker/app/__init__.py -Scanned: 2016-10-19 08:52:07.319654 -No vulnerabilities found. - - -keyan/flaskcounter -https://github.com/keyan/flaskcounter -Entry file: flaskcounter/app.py -Scanned: 2016-10-19 08:52:17.865841 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ZhaoYun17/flasktaskr -https://github.com/ZhaoYun17/flasktaskr -Entry file: None -Scanned: 2016-10-19 08:52:18.856580 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Charlotteis/flasky -https://github.com/Charlotteis/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 08:52:19.354334 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -VenDream/flaskr -https://github.com/VenDream/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:52:19.847504 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kingname/unknown_way -https://github.com/kingname/unknown_way -Entry file: unknown_way/simpleReader.py -Scanned: 2016-10-19 08:52:21.682873 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -giblets2570/FlaskApp -https://github.com/giblets2570/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 08:52:22.256455 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Wannuc/flaskExample -https://github.com/Wannuc/flaskExample -Entry file: flaskExample/app.py -Scanned: 2016-10-19 08:52:24.531952 -No vulnerabilities found. - - -robintw/FlaskTemperature -https://github.com/robintw/FlaskTemperature -Entry file: FlaskTemperature/app.py -Scanned: 2016-10-19 08:52:25.776778 -No vulnerabilities found. - - -PyClass/FlaskBasic -https://github.com/PyClass/FlaskBasic -Entry file: FlaskBasic/main.py -Scanned: 2016-10-19 08:52:27.037280 -No vulnerabilities found. - - -ejdigby/FlaskTest -https://github.com/ejdigby/FlaskTest -Entry file: None -Scanned: 2016-10-19 08:52:29.315779 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ejdigby/FlaskTest. - -Joe312341/FlaskTest -https://github.com/Joe312341/FlaskTest -Entry file: None -Scanned: 2016-10-19 08:52:29.819224 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Joe312341/FlaskTest. - -Flask-Framework-Cookbook/Chapter-3 -https://github.com/Flask-Framework-Cookbook/Chapter-3 -Entry file: Chapter-3/my_app/__init__.py -Scanned: 2016-10-19 08:52:32.580347 -No vulnerabilities found. - - -at4260/Flask-Madlibs -https://github.com/at4260/Flask-Madlibs -Entry file: Flask-Madlibs/madlibs.py -Scanned: 2016-10-19 08:52:34.087942 -No vulnerabilities found. - - -dcreekp/flask-blog -https://github.com/dcreekp/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:52:34.640062 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Charlotteis/guestbook_flask -https://github.com/Charlotteis/guestbook_flask -Entry file: guestbook_flask/app.py -Scanned: 2016-10-19 08:52:40.077996 -No vulnerabilities found. - - -guowei1003/Flask-blog -https://github.com/guowei1003/Flask-blog -Entry file: Flask-blog/Flask-blog.py -Scanned: 2016-10-19 08:52:44.394084 -No vulnerabilities found. - - -byarges/flask-api -https://github.com/byarges/flask-api -Entry file: flask-api/App.py -Scanned: 2016-10-19 08:52:45.675855 -No vulnerabilities found. - - -pvarsh/flask_tutorial -https://github.com/pvarsh/flask_tutorial -Entry file: flask_tutorial/hello_app/__init__.py -Scanned: 2016-10-19 08:52:47.929507 -No vulnerabilities found. - - -id774/flask-bootstrap -https://github.com/id774/flask-bootstrap -Entry file: flask-bootstrap/app.py -Scanned: 2016-10-19 08:52:51.670939 -No vulnerabilities found. - - -dcotelessa/alpha_flask -https://github.com/dcotelessa/alpha_flask -Entry file: alpha_flask/app.py -Scanned: 2016-10-19 08:52:57.515571 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kevmo/flask-patterns -https://github.com/kevmo/flask-patterns -Entry file: None -Scanned: 2016-10-19 08:52:58.825810 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kevmo/flask-patterns. - -sorlovsky/Flask-Site -https://github.com/sorlovsky/Flask-Site -Entry file: Flask-Site/app.py -Scanned: 2016-10-19 08:52:59.399908 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Site/venv/lib/python2.7/genericpath.py - -scottdunstan/flask-play -https://github.com/scottdunstan/flask-play -Entry file: flask-play/playtime.py -Scanned: 2016-10-19 08:53:01.171999 -No vulnerabilities found. - - -GUC-SE-2015/redditFlask -https://github.com/GUC-SE-2015/redditFlask -Entry file: redditFlask/application/__init__.py -Scanned: 2016-10-19 08:53:02.625419 -No vulnerabilities found. - - -Nalian79/flask_hello -https://github.com/Nalian79/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-19 08:53:05.341337 -No vulnerabilities found. - - -pee-dee/flask-blog -https://github.com/pee-dee/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:53:07.916201 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -marvin0815/flask-test -https://github.com/marvin0815/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 08:53:19.937876 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -bradomski/flask_exercises -https://github.com/bradomski/flask_exercises -Entry file: flask_exercises/hello.py -Scanned: 2016-10-19 08:53:23.164976 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_exercises/venv/lib/python2.7/genericpath.py - -keyan/flask-sandbox -https://github.com/keyan/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-19 08:53:25.973582 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -candywow/learn_flask -https://github.com/candywow/learn_flask -Entry file: learn_flask/flasky/hello.py -Scanned: 2016-10-19 08:53:28.274996 -No vulnerabilities found. - - -btigercl/Hackbright_Flask -https://github.com/btigercl/Hackbright_Flask -Entry file: Hackbright_Flask/madlibs.py -Scanned: 2016-10-19 08:53:29.715257 -No vulnerabilities found. - - -a-tsioh/Taigi-IM-flask -https://github.com/a-tsioh/Taigi-IM-flask -Entry file: Taigi-IM-flask/server.py -Scanned: 2016-10-19 08:53:32.373661 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prashannth/digi-mart-flask -https://github.com/prashannth/digi-mart-flask -Entry file: digi-mart-flask/app/__init__.py -Scanned: 2016-10-19 08:53:34.296756 -No vulnerabilities found. - - -blakedallen/flask-api-starter -https://github.com/blakedallen/flask-api-starter -Entry file: flask-api-starter/app.py -Scanned: 2016-10-19 08:53:35.583070 -No vulnerabilities found. - - -florije1988/flask_restful_custom_type -https://github.com/florije1988/flask_restful_custom_type -Entry file: flask_restful_custom_type/flask_restful_custom_type.py -Scanned: 2016-10-19 08:53:36.899960 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcolussi/flask-hello-world -https://github.com/dcolussi/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 08:53:37.462997 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -fincham/flask-minecraft-auth -https://github.com/fincham/flask-minecraft-auth -Entry file: flask-minecraft-auth/hotplate_minecraft.py -Scanned: 2016-10-19 08:53:39.766892 -No vulnerabilities found. - - -nsnitesh7/Rest-Api-Flask -https://github.com/nsnitesh7/Rest-Api-Flask -Entry file: Rest-Api-Flask/app.py -Scanned: 2016-10-19 08:53:41.113028 -Vulnerability 1: -File: Rest-Api-Flask/app.py - > User input at line 56, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: Rest-Api-Flask/app.py - > reaches line 63, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201) - - - -bearzk/radio-in-flask -https://github.com/bearzk/radio-in-flask -Entry file: radio-in-flask/radio.py -Scanned: 2016-10-19 08:53:44.622153 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -LiQing8839/flask-mysql-exemplo -https://github.com/LiQing8839/flask-mysql-exemplo -Entry file: flask-mysql-exemplo/app.py -Scanned: 2016-10-19 08:53:46.912698 -Vulnerability 1: -File: flask-mysql-exemplo/app.py - > User input at line 18, trigger word "form[": - nome = request.form['nome'] -File: flask-mysql-exemplo/app.py - > reaches line 23, trigger word "execute(": - cur.execute('INSERT INTO presidentes(nome, cpf, nascimento) VALUES('%s', '%s', '%s');' % (nome, cpf, nascimento)) - -Vulnerability 2: -File: flask-mysql-exemplo/app.py - > User input at line 19, trigger word "form[": - cpf = request.form['cpf'] -File: flask-mysql-exemplo/app.py - > reaches line 23, trigger word "execute(": - cur.execute('INSERT INTO presidentes(nome, cpf, nascimento) VALUES('%s', '%s', '%s');' % (nome, cpf, nascimento)) - -Vulnerability 3: -File: flask-mysql-exemplo/app.py - > User input at line 20, trigger word "form[": - nascimento = request.form['nascimento'] -File: flask-mysql-exemplo/app.py - > reaches line 23, trigger word "execute(": - cur.execute('INSERT INTO presidentes(nome, cpf, nascimento) VALUES('%s', '%s', '%s');' % (nome, cpf, nascimento)) - - - -gabygandrade/HB_Madlibs-Flask -https://github.com/gabygandrade/HB_Madlibs-Flask -Entry file: HB_Madlibs-Flask/madlibs.py -Scanned: 2016-10-19 08:53:49.334173 -No vulnerabilities found. - - -kyle8285/flask_hello_world -https://github.com/kyle8285/flask_hello_world -Entry file: flask_hello_world/run.py -Scanned: 2016-10-19 08:53:52.668574 -No vulnerabilities found. - - -amolborcar/flask-web-development -https://github.com/amolborcar/flask-web-development -Entry file: flask-web-development/chapter-3/hello.py -Scanned: 2016-10-19 08:53:57.073003 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prashannth/openid-login-flask -https://github.com/prashannth/openid-login-flask -Entry file: openid-login-flask/app/__init__.py -Scanned: 2016-10-19 08:53:58.458418 -No vulnerabilities found. - - -jhorwit2/docker_flask_example -https://github.com/jhorwit2/docker_flask_example -Entry file: docker_flask_example/app.py -Scanned: 2016-10-19 08:54:00.809051 -No vulnerabilities found. - - -dkdewitt/flask_angular_skeleton -https://github.com/dkdewitt/flask_angular_skeleton -Entry file: flask_angular_skeleton/app/__init__.py -Scanned: 2016-10-19 08:54:02.541079 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hansmaryil/Radialpoint-Hackathon-Flask-App -https://github.com/hansmaryil/Radialpoint-Hackathon-Flask-App -Entry file: Radialpoint-Hackathon-Flask-App/app.py -Scanned: 2016-10-19 08:54:03.964727 -No vulnerabilities found. - - -gorlovn/flask-hello-world -https://github.com/gorlovn/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 08:54:04.531048 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -harrisonfeng/flask-restful-api -https://github.com/harrisonfeng/flask-restful-api -Entry file: flask-restful-api/restful/api.py -Scanned: 2016-10-19 08:54:05.844002 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tesb/Flask-MicroBlog -https://github.com/tesb/Flask-MicroBlog -Entry file: Flask-MicroBlog/flask/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 08:54:11.483198 -No vulnerabilities found. - - -stanleyhlng/flask_shopping_list -https://github.com/stanleyhlng/flask_shopping_list -Entry file: flask_shopping_list/shopping.py -Scanned: 2016-10-19 08:54:14.853370 -No vulnerabilities found. - - -dternyak/flask-real-python -https://github.com/dternyak/flask-real-python -Entry file: flask-real-python/blog.py -Scanned: 2016-10-19 08:54:17.799834 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-real-python/venv/lib/python2.7/genericpath.py - -dpmehta02/demo_flask_api -https://github.com/dpmehta02/demo_flask_api -Entry file: demo_flask_api/app/utils/__init__.py -Scanned: 2016-10-19 08:54:19.215500 -No vulnerabilities found. - - -dimaosa/Flask_QA_app -https://github.com/dimaosa/Flask_QA_app -Entry file: Flask_QA_app/project/__init__.py -Scanned: 2016-10-19 08:54:24.798320 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -YanareKu/Flask_MadLibs -https://github.com/YanareKu/Flask_MadLibs -Entry file: Flask_MadLibs/madlibs.py -Scanned: 2016-10-19 08:54:26.334317 -No vulnerabilities found. - - -dtarasiuk/flask-docker-seed -https://github.com/dtarasiuk/flask-docker-seed -Entry file: flask-docker-seed/app.py -Scanned: 2016-10-19 08:54:27.670274 -No vulnerabilities found. - - -ArunRamachandran/Student_App_using-Flask -https://github.com/ArunRamachandran/Student_App_using-Flask -Entry file: Student_App_using-Flask/app/__init__.py -Scanned: 2016-10-19 08:54:29.574269 -Vulnerability 1: -File: Student_App_using-Flask/app/views.py - > User input at line 82, trigger word "form[": - sname = request.form['sname'] -File: Student_App_using-Flask/app/views.py - > reaches line 94, trigger word "execute(": - cur.execute('insert into student(sname, mark) values(?,?)', [sname, mark]) - -Vulnerability 2: -File: Student_App_using-Flask/app/views.py - > User input at line 83, trigger word "form[": - mark = request.form['mark'] -File: Student_App_using-Flask/app/views.py - > reaches line 94, trigger word "execute(": - cur.execute('insert into student(sname, mark) values(?,?)', [sname, mark]) - - - -imnikkiz/Madlibs -https://github.com/imnikkiz/Madlibs -Entry file: Madlibs/madlibs.py -Scanned: 2016-10-19 08:54:31.760313 -No vulnerabilities found. - - -itstriz/microblog -https://github.com/itstriz/microblog -Entry file: None -Scanned: 2016-10-19 08:54:32.303090 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Flask-Framework-Cookbook/Chapter-6 -https://github.com/Flask-Framework-Cookbook/Chapter-6 -Entry file: Chapter-6/my_app/__init__.py -Scanned: 2016-10-19 08:54:33.844697 -Vulnerability 1: -File: Chapter-6/my_app/auth/views.py - > User input at line 141, trigger word "get(": - me = facebook.get('/me') -Reassigned in: - File: Chapter-6/my_app/auth/views.py - > Line 145: user = User(me.data['email'], '') - File: Chapter-6/my_app/auth/views.py - > Line 143: user = User.query.filter_by(username=me.data['email']).first() -File: Chapter-6/my_app/auth/views.py - > reaches line 150, trigger word "flash(": - flash('Logged in as id=%s name=%s' % (me.data['id'], me.data['name']), 'success') - -Vulnerability 2: -File: Chapter-6/my_app/auth/views.py - > User input at line 177, trigger word "get(": - userinfo = requests.get(GOOGLE_OAUTH2_USERINFO_URL,params=dict(access_token=resp['access_token'])).json() -Reassigned in: - File: Chapter-6/my_app/auth/views.py - > Line 183: user = User(userinfo['email'], '') - File: Chapter-6/my_app/auth/views.py - > Line 181: user = User.query.filter_by(username=userinfo['email']).first() -File: Chapter-6/my_app/auth/views.py - > reaches line 188, trigger word "flash(": - flash('Logged in as id=%s name=%s' % (userinfo['id'], userinfo['name']), 'success') - - - -hacksu/hackernews-clone -https://github.com/hacksu/hackernews-clone -Entry file: hackernews-clone/app/__init__.py -Scanned: 2016-10-19 08:54:35.257524 -No vulnerabilities found. - - -Zmeylol/lib -https://github.com/Zmeylol/lib -Entry file: lib/init.py -Scanned: 2016-10-19 08:54:37.016624 -No vulnerabilities found. - - -Shumakriss/thermostat_web -https://github.com/Shumakriss/thermostat_web -Entry file: thermostat_web/thermostat_web/__init__.py -Scanned: 2016-10-19 08:54:38.447940 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -lekanovic/pecunia -https://github.com/lekanovic/pecunia -Entry file: pecunia/app/__init__.py -Scanned: 2016-10-19 08:54:41.062001 -No vulnerabilities found. - - -Flask-Framework-Cookbook/Chapter-8 -https://github.com/Flask-Framework-Cookbook/Chapter-8 -Entry file: Chapter-8/my_app/__init__.py -Scanned: 2016-10-19 08:54:42.642394 -No vulnerabilities found. - - -induhub/mod_wsgi-flask-apache-centos7- -https://github.com/induhub/mod_wsgi-flask-apache-centos7- -Entry file: mod_wsgi-flask-apache-centos7-/flask_dev/hello.py -Scanned: 2016-10-19 08:54:43.951310 -No vulnerabilities found. - - -aaabhilash97/Flipkart-Product-Details-Extraction-Flask-Python -https://github.com/aaabhilash97/Flipkart-Product-Details-Extraction-Flask-Python -Entry file: Flipkart-Product-Details-Extraction-Flask-Python/app/__init__.py -Scanned: 2016-10-19 08:54:44.453779 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rajatguptarg/calc -https://github.com/rajatguptarg/calc -Entry file: calc/calc.py -Scanned: 2016-10-19 08:54:45.844282 -No vulnerabilities found. - - -wsankey/wsankey -https://github.com/wsankey/wsankey -Entry file: wsankey/sitebuilder.py -Scanned: 2016-10-19 08:54:51.140408 -No vulnerabilities found. - - -bolenton/flog -https://github.com/bolenton/flog -Entry file: flog/blog.py -Scanned: 2016-10-19 08:54:52.456519 -No vulnerabilities found. - - -CognitionGuidedSurgery/storage -https://github.com/CognitionGuidedSurgery/storage -Entry file: storage/storage/provider.py -Scanned: 2016-10-19 08:54:53.869063 -No vulnerabilities found. - - -leocelis/simpletornadoflask -https://github.com/leocelis/simpletornadoflask -Entry file: simpletornadoflask/simple.py -Scanned: 2016-10-19 08:54:55.166643 -No vulnerabilities found. - - -kimshangyup/brandnew -https://github.com/kimshangyup/brandnew -Entry file: None -Scanned: 2016-10-19 08:54:56.446479 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kimshangyup/brandnew. - -oss-practice/flask -https://github.com/oss-practice/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 08:55:02.056713 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -vertical-knowledge/flask-ripozo -https://github.com/vertical-knowledge/flask-ripozo -Entry file: flask-ripozo/examples/flask_example.py -Scanned: 2016-10-19 08:55:06.581190 -No vulnerabilities found. - - -lobeck/flask-bower -https://github.com/lobeck/flask-bower -Entry file: flask-bower/tests/test_build_url.py -Scanned: 2016-10-19 08:55:08.209858 -No vulnerabilities found. - - -csuzhangxc/Flask-QiniuStorage -https://github.com/csuzhangxc/Flask-QiniuStorage -Entry file: Flask-QiniuStorage/tests.py -Scanned: 2016-10-19 08:55:17.605272 -No vulnerabilities found. - - -tonyseek/flask-docker -https://github.com/tonyseek/flask-docker -Entry file: flask-docker/tests/test_simple.py -Scanned: 2016-10-19 08:55:21.159730 -No vulnerabilities found. - - -AminHuang/flask -https://github.com/AminHuang/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 08:55:24.114874 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -Yellow-Rice/Flask -https://github.com/Yellow-Rice/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 08:55:26.680697 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jgoney/flask-messenger -https://github.com/jgoney/flask-messenger -Entry file: flask-messenger/messenger.py -Scanned: 2016-10-19 08:55:29.119723 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rsj217/flask--scaffold -https://github.com/rsj217/flask--scaffold -Entry file: flask--scaffold/redis-queue/main.py -Scanned: 2016-10-19 08:55:30.962779 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shalabhaggarwal/Flask-LDAP-Auth-Demo -https://github.com/shalabhaggarwal/Flask-LDAP-Auth-Demo -Entry file: Flask-LDAP-Auth-Demo/my_app/__init__.py -Scanned: 2016-10-19 08:55:32.836358 -No vulnerabilities found. - - -csuzhangxc/Flask-BCS -https://github.com/csuzhangxc/Flask-BCS -Entry file: Flask-BCS/tests.py -Scanned: 2016-10-19 08:55:34.750056 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -urvineet/flask-ang -https://github.com/urvineet/flask-ang -Entry file: flask-ang/angular-flask-sqlalchemy/server.py -Scanned: 2016-10-19 08:55:40.124231 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -netplusdesign/home-performance-flask-api -https://github.com/netplusdesign/home-performance-flask-api -Entry file: home-performance-flask-api/chartingperformance/__init__.py -Scanned: 2016-10-19 08:55:41.741584 -No vulnerabilities found. - - -mattgathu/flask-celery -https://github.com/mattgathu/flask-celery -Entry file: flask-celery/flascelery/__init__.py -Scanned: 2016-10-19 08:55:44.188946 -Vulnerability 1: -File: flask-celery/flascelery/views.py - > User input at line 24, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: flask-celery/flascelery/views.py - > Line 25: session['email'] = email -File: flask-celery/flascelery/views.py - > reaches line 34, trigger word "flash(": - flash('Sending email to {}'.format(email)) - -Vulnerability 2: -File: flask-celery/flascelery/views.py - > User input at line 24, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: flask-celery/flascelery/views.py - > Line 25: session['email'] = email -File: flask-celery/flascelery/views.py - > reaches line 38, trigger word "flash(": - flash('An email will be sent to {} in one minute'.format(email)) - -Vulnerability 3: -File: flask-celery/flascelery/views.py - > User input at line 68, trigger word "get(": - response = 'state''current''total''status'task.statetask.info.get('current', 0)task.info.get('total', 1)task.info.get('status', '') -Reassigned in: - File: flask-celery/flascelery/views.py - > Line 61: response = 'state''current''total''status'task.state01'Pending..' - File: flask-celery/flascelery/views.py - > Line 78: response = 'state''current''total''status'task.state11str(task.info) -File: flask-celery/flascelery/views.py - > reaches line 85, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(response) - - - -herambh129/flaskapp -https://github.com/herambh129/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-19 08:55:44.700485 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seanchen1991/flaskr -https://github.com/seanchen1991/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:55:46.210986 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zackszhu/Flaskr -https://github.com/zackszhu/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 08:55:46.734746 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bhamhawker/flasktaskr -https://github.com/bhamhawker/flasktaskr -Entry file: None -Scanned: 2016-10-19 08:55:52.755485 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ForrestSutton/flasky -https://github.com/ForrestSutton/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 08:55:54.259661 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -info3180/contrived_calculator -https://github.com/info3180/contrived_calculator -Entry file: contrived_calculator/app.py -Scanned: 2016-10-19 08:55:56.794795 -No vulnerabilities found. - - -sjs7007/flaskRandom -https://github.com/sjs7007/flaskRandom -Entry file: flaskRandom/megaTut/app/__init__.py -Scanned: 2016-10-19 08:55:58.215601 -No vulnerabilities found. - - -mandrive/FlaskTest -https://github.com/mandrive/FlaskTest -Entry file: None -Scanned: 2016-10-19 08:56:00.739921 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mandrive/FlaskTest. - -Andygmb/flask_blog -https://github.com/Andygmb/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 08:56:02.272996 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyejayvee/flask_jinja -https://github.com/eyejayvee/flask_jinja -Entry file: flask_jinja/run.py -Scanned: 2016-10-19 08:56:07.553694 -No vulnerabilities found. - - -bhamhawker/flask-blog -https://github.com/bhamhawker/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:56:09.116855 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -at4260/Flask-Madlibs -https://github.com/at4260/Flask-Madlibs -Entry file: Flask-Madlibs/madlibs.py -Scanned: 2016-10-19 08:56:11.647972 -No vulnerabilities found. - - -heyimdan/slack_flask -https://github.com/heyimdan/slack_flask -Entry file: slack_flask/app.py -Scanned: 2016-10-19 08:56:19.540315 -No vulnerabilities found. - - -joshcoen/flask-example -https://github.com/joshcoen/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-19 08:56:28.079270 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bnlong/flask-docker -https://github.com/bnlong/flask-docker -Entry file: flask-docker/app/app.py -Scanned: 2016-10-19 08:56:30.511594 -No vulnerabilities found. - - -anthonysea/flask-blog -https://github.com/anthonysea/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:56:31.093684 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -ch4in/flask_code -https://github.com/ch4in/flask_code -Entry file: flask_code/flaskr/flaskr.py -Scanned: 2016-10-19 08:56:33.416140 -No vulnerabilities found. - - -sasaki-d/test_flask -https://github.com/sasaki-d/test_flask -Entry file: test_flask/app/__init__.py -Scanned: 2016-10-19 08:56:36.345552 -No vulnerabilities found. - - -runningwendybird/flask_madlibs -https://github.com/runningwendybird/flask_madlibs -Entry file: flask_madlibs/madlibs.py -Scanned: 2016-10-19 08:56:38.874031 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -taygrave/hb_flask -https://github.com/taygrave/hb_flask -Entry file: hb_flask/madlibs.py -Scanned: 2016-10-19 08:56:40.389919 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dstroppa/flask-blog -https://github.com/dstroppa/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:56:40.943451 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Isendir/flask_app -https://github.com/Isendir/flask_app -Entry file: None -Scanned: 2016-10-19 08:56:42.504551 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Isendir/flask_app. - -btigercl/Hackbright_Flask -https://github.com/btigercl/Hackbright_Flask -Entry file: Hackbright_Flask/madlibs.py -Scanned: 2016-10-19 08:56:45.960176 -No vulnerabilities found. - - -larissaleite/flask_todo -https://github.com/larissaleite/flask_todo -Entry file: None -Scanned: 2016-10-19 08:56:48.448301 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -herambh129/flask-bio -https://github.com/herambh129/flask-bio -Entry file: flask-bio/bio.py -Scanned: 2016-10-19 08:56:49.747072 -No vulnerabilities found. - - -zplizzi/flask-play -https://github.com/zplizzi/flask-play -Entry file: flask-play/flask/app/__init__.py -Scanned: 2016-10-19 08:56:52.076096 -No vulnerabilities found. - - -holdenweb/flask_wf -https://github.com/holdenweb/flask_wf -Entry file: flask_wf/htdocs/main/__init__.py -Scanned: 2016-10-19 08:56:54.695357 -No vulnerabilities found. - - -Railag/firrael-backend -https://github.com/Railag/firrael-backend -Entry file: firrael-backend/first.py -Scanned: 2016-10-19 08:56:55.996346 -No vulnerabilities found. - - -jasondarcy01/MFIYZC_FlaskApp -https://github.com/jasondarcy01/MFIYZC_FlaskApp -Entry file: MFIYZC_FlaskApp/app.py -Scanned: 2016-10-19 08:56:57.935973 -No vulnerabilities found. - - -zackszhu/FlaskMegaTut -https://github.com/zackszhu/FlaskMegaTut -Entry file: FlaskMegaTut/app/__init__.py -Scanned: 2016-10-19 08:57:02.875174 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DJO3/flask3_intro -https://github.com/DJO3/flask3_intro -Entry file: flask3_intro/shopping.py -Scanned: 2016-10-19 08:57:04.174075 -No vulnerabilities found. - - -Laukess/FlaskTaskr_Part_4 -https://github.com/Laukess/FlaskTaskr_Part_4 -Entry file: FlaskTaskr_Part_4/app/view.py -Scanned: 2016-10-19 08:57:06.591876 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joalisson/flask-bcrypt-2 -https://github.com/joalisson/flask-bcrypt-2 -Entry file: flask-bcrypt-2/bcrypt-final/app.py -Scanned: 2016-10-19 08:57:07.872333 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -a-tsioh/Taigi-IM-flask -https://github.com/a-tsioh/Taigi-IM-flask -Entry file: Taigi-IM-flask/server.py -Scanned: 2016-10-19 08:57:08.377757 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ArunRamachandran/Blog_App_Using-Flask -https://github.com/ArunRamachandran/Blog_App_Using-Flask -Entry file: None -Scanned: 2016-10-19 08:57:15.986634 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gabygandrade/HB_Madlibs-Flask -https://github.com/gabygandrade/HB_Madlibs-Flask -Entry file: HB_Madlibs-Flask/madlibs.py -Scanned: 2016-10-19 08:57:17.480579 -No vulnerabilities found. - - -kb0rg/hb_flask_madlibs -https://github.com/kb0rg/hb_flask_madlibs -Entry file: hb_flask_madlibs/madlibs.py -Scanned: 2016-10-19 08:57:18.997963 -No vulnerabilities found. - - -czotti/yCombinatorFlaskApi -https://github.com/czotti/yCombinatorFlaskApi -Entry file: yCombinatorFlaskApi/yCombRest.py -Scanned: 2016-10-19 08:57:21.334980 -No vulnerabilities found. - - -mrbenji/thinkful-flask-jinja-example -https://github.com/mrbenji/thinkful-flask-jinja-example -Entry file: thinkful-flask-jinja-example/run.py -Scanned: 2016-10-19 08:57:24.638923 -No vulnerabilities found. - - -nathan-lapinski/Flask-REST-API -https://github.com/nathan-lapinski/Flask-REST-API -Entry file: None -Scanned: 2016-10-19 08:57:27.938355 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nathan-lapinski/Flask-REST-API. - -txhuin/SQLPythonFlask-Webapp -https://github.com/txhuin/SQLPythonFlask-Webapp -Entry file: SQLPythonFlask-Webapp/webapp.py -Scanned: 2016-10-19 08:57:30.530369 -No vulnerabilities found. - - -PuZheng/generator-flask-skeleton -https://github.com/PuZheng/generator-flask-skeleton -Entry file: None -Scanned: 2016-10-19 08:57:32.594066 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/PuZheng/generator-flask-skeleton. - -kandito/flask-starter-project -https://github.com/kandito/flask-starter-project -Entry file: flask-starter-project/app.py -Scanned: 2016-10-19 08:57:33.919130 -No vulnerabilities found. - - -garfunkel/flask-babel-example -https://github.com/garfunkel/flask-babel-example -Entry file: flask-babel-example/app/__init__.py -Scanned: 2016-10-19 08:57:35.380869 -No vulnerabilities found. - - -gnyoung19/flask_mortgage_calculator -https://github.com/gnyoung19/flask_mortgage_calculator -Entry file: None -Scanned: 2016-10-19 08:57:40.219876 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bhamhawker/flask-hello-world -https://github.com/bhamhawker/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 08:57:40.793880 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -hansmaryil/Radialpoint-Hackathon-Flask-App -https://github.com/hansmaryil/Radialpoint-Hackathon-Flask-App -Entry file: Radialpoint-Hackathon-Flask-App/app.py -Scanned: 2016-10-19 08:57:42.222877 -No vulnerabilities found. - - -mattboston/flask-security-test -https://github.com/mattboston/flask-security-test -Entry file: flask-security-test/dashboard/__init__.py -Scanned: 2016-10-19 08:57:43.557588 -No vulnerabilities found. - - -geekpradd/PyDictionary-Flask-API -https://github.com/geekpradd/PyDictionary-Flask-API -Entry file: None -Scanned: 2016-10-19 08:57:44.947552 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/geekpradd/PyDictionary-Flask-API. - -Dotnaught/flask_hello_world -https://github.com/Dotnaught/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-19 08:57:46.275445 -No vulnerabilities found. - - -zatosource/zato-flask-integration -https://github.com/zatosource/zato-flask-integration -Entry file: zato-flask-integration/sampleapp/customer.py -Scanned: 2016-10-19 08:57:47.558237 -No vulnerabilities found. - - -matt-gaspar/Flask-MegaTutorial -https://github.com/matt-gaspar/Flask-MegaTutorial -Entry file: Flask-MegaTutorial/app/__init__.py -Scanned: 2016-10-19 08:57:48.987718 -No vulnerabilities found. - - -dimaosa/Flask_QA_app -https://github.com/dimaosa/Flask_QA_app -Entry file: Flask_QA_app/project/__init__.py -Scanned: 2016-10-19 08:57:50.510957 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -YanareKu/Flask_MadLibs -https://github.com/YanareKu/Flask_MadLibs -Entry file: Flask_MadLibs/madlibs.py -Scanned: 2016-10-19 08:57:53.038701 -No vulnerabilities found. - - -sambbaron/flask_hello_world -https://github.com/sambbaron/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-19 08:57:55.438087 -No vulnerabilities found. - - -007rahulraman/flask_fb_app -https://github.com/007rahulraman/flask_fb_app -Entry file: flask_fb_app/frankly.py -Scanned: 2016-10-19 08:57:59.442147 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -WanHaoGroup/MicroBlog-Flask -https://github.com/WanHaoGroup/MicroBlog-Flask -Entry file: None -Scanned: 2016-10-19 08:58:03.741860 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ArunRamachandran/Student_App_using-Flask -https://github.com/ArunRamachandran/Student_App_using-Flask -Entry file: Student_App_using-Flask/app/__init__.py -Scanned: 2016-10-19 08:58:06.145699 -Vulnerability 1: -File: Student_App_using-Flask/app/views.py - > User input at line 82, trigger word "form[": - sname = request.form['sname'] -File: Student_App_using-Flask/app/views.py - > reaches line 94, trigger word "execute(": - cur.execute('insert into student(sname, mark) values(?,?)', [sname, mark]) - -Vulnerability 2: -File: Student_App_using-Flask/app/views.py - > User input at line 83, trigger word "form[": - mark = request.form['mark'] -File: Student_App_using-Flask/app/views.py - > reaches line 94, trigger word "execute(": - cur.execute('insert into student(sname, mark) values(?,?)', [sname, mark]) - - - -eyejayvee/flask_hello_world -https://github.com/eyejayvee/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-19 08:58:07.384023 -No vulnerabilities found. - - -rohanil/Sample-Flask-App -https://github.com/rohanil/Sample-Flask-App -Entry file: Sample-Flask-App/highchart/app.py -Scanned: 2016-10-19 08:58:09.278350 -No vulnerabilities found. - - -Spanarchie/NeoLink -https://github.com/Spanarchie/NeoLink -Entry file: NeoLink/NeoLink.py -Scanned: 2016-10-19 08:58:10.577445 -No vulnerabilities found. - - -lr-discovery/bgxml -https://github.com/lr-discovery/bgxml -Entry file: bgxml/app/SampleApp.py -Scanned: 2016-10-19 08:58:12.003246 -No vulnerabilities found. - - -psilikon/leadloader -https://github.com/psilikon/leadloader -Entry file: leadloader/leadloader.py -Scanned: 2016-10-19 08:58:23.416738 -No vulnerabilities found. - - -imnikkiz/Madlibs -https://github.com/imnikkiz/Madlibs -Entry file: Madlibs/madlibs.py -Scanned: 2016-10-19 08:58:24.925542 -No vulnerabilities found. - - -QueenJolene/hackbright_madlibs -https://github.com/QueenJolene/hackbright_madlibs -Entry file: hackbright_madlibs/madlibs.py -Scanned: 2016-10-19 08:58:26.351590 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -llucasmendes/blog -https://github.com/llucasmendes/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 08:58:26.854487 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -grepme/CMPUT410Lab04 -https://github.com/grepme/CMPUT410Lab04 -Entry file: CMPUT410Lab04/server.py -Scanned: 2016-10-19 08:58:28.244243 -No vulnerabilities found. - - -hziling/Blog -https://github.com/hziling/Blog -Entry file: Blog/app/__init__.py -Scanned: 2016-10-19 08:58:31.898243 -No vulnerabilities found. - - -oss-practice/flask -https://github.com/oss-practice/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 08:58:35.064631 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -miguelgrinberg/two-factor-auth-flask -https://github.com/miguelgrinberg/two-factor-auth-flask -Entry file: two-factor-auth-flask/app.py -Scanned: 2016-10-19 08:58:36.393166 -No vulnerabilities found. - - -vertical-knowledge/flask-ripozo -https://github.com/vertical-knowledge/flask-ripozo -Entry file: flask-ripozo/examples/flask_example.py -Scanned: 2016-10-19 08:58:38.042367 -No vulnerabilities found. - - -dinp/dinp-demo-python-flask -https://github.com/dinp/dinp-demo-python-flask -Entry file: dinp-demo-python-flask/wsgi.py -Scanned: 2016-10-19 08:58:43.597820 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aws-troutman/magic8ball-flask -https://github.com/aws-troutman/magic8ball-flask -Entry file: magic8ball-flask/magic8ball/magic8ball/__init__.py -Scanned: 2016-10-19 08:58:46.858934 -No vulnerabilities found. - - -Parkayun/initpy -https://github.com/Parkayun/initpy -Entry file: initpy/initpy/templates/flask.py -Scanned: 2016-10-19 08:58:48.460200 -No vulnerabilities found. - - -jidn/flask-resteasy -https://github.com/jidn/flask-resteasy -Entry file: flask-resteasy/flask_resteasy.py -Scanned: 2016-10-19 08:58:50.053078 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -SPRIME01/Flask-Boilerplate -https://github.com/SPRIME01/Flask-Boilerplate -Entry file: Flask-Boilerplate/Application/__init__.py -Scanned: 2016-10-19 08:58:52.926071 -Vulnerability 1: -File: Flask-Boilerplate/Application/views/UploadsView.py - > User input at line 26, trigger word ".data": - filename = main_uploads.save(form.file_upload.data) -File: Flask-Boilerplate/Application/views/UploadsView.py - > reaches line 27, trigger word "flash(": - flash('Uploaded %s' % filename, 'success') - - - -shalabhaggarwal/Flask-LDAP-Auth-Demo -https://github.com/shalabhaggarwal/Flask-LDAP-Auth-Demo -Entry file: Flask-LDAP-Auth-Demo/my_app/__init__.py -Scanned: 2016-10-19 08:58:54.348386 -No vulnerabilities found. - - -BrunoCodeman/flaskafolding -https://github.com/BrunoCodeman/flaskafolding -Entry file: None -Scanned: 2016-10-19 08:58:55.630424 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/BrunoCodeman/flaskafolding. - -csuzhangxc/Flask-BCS -https://github.com/csuzhangxc/Flask-BCS -Entry file: Flask-BCS/tests.py -Scanned: 2016-10-19 08:58:56.172440 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cloudwalkio/coreos-confd-nginx-flask -https://github.com/cloudwalkio/coreos-confd-nginx-flask -Entry file: coreos-confd-nginx-flask/app/app.py -Scanned: 2016-10-19 08:58:57.584021 -No vulnerabilities found. - - -jonparrott/App-Engine-Flask-Restful-Example -https://github.com/jonparrott/App-Engine-Flask-Restful-Example -Entry file: App-Engine-Flask-Restful-Example/main.py -Scanned: 2016-10-19 08:58:59.012837 -No vulnerabilities found. - - -mardix/Propel -https://github.com/mardix/Propel -Entry file: Propel/example/app.py -Scanned: 2016-10-19 08:59:02.727003 -No vulnerabilities found. - - -nikhil2kulkarni/Flask-Flasky -https://github.com/nikhil2kulkarni/Flask-Flasky -Entry file: Flask-Flasky/tumblelog/__init__.py -Scanned: 2016-10-19 08:59:13.845994 -No vulnerabilities found. - - -NorfairHistorys/Flaskkit -https://github.com/NorfairHistorys/Flaskkit -Entry file: Flaskkit/flaskkit.py -Scanned: 2016-10-19 08:59:16.313511 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cxplanet/flaskapp -https://github.com/cxplanet/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-19 08:59:16.816156 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seanchen1991/flaskr -https://github.com/seanchen1991/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:59:17.311905 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -k-q-11/flasktaskr -https://github.com/k-q-11/flasktaskr -Entry file: None -Scanned: 2016-10-19 08:59:17.836993 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -limake/flaskr -https://github.com/limake/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:59:18.384253 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chiller/flaskdemo -https://github.com/chiller/flaskdemo -Entry file: flaskdemo/userflask.py -Scanned: 2016-10-19 08:59:26.736376 -No vulnerabilities found. - - -n3wtn9/flaskr -https://github.com/n3wtn9/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 08:59:27.262591 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -villacelt/flaskapp -https://github.com/villacelt/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-19 08:59:28.806416 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bhamhawker/flasktaskr -https://github.com/bhamhawker/flasktaskr -Entry file: None -Scanned: 2016-10-19 08:59:29.334601 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mattmakai/taskrouter-multi-channel-support-desk -https://github.com/mattmakai/taskrouter-multi-channel-support-desk -Entry file: taskrouter-multi-channel-support-desk/app.py -Scanned: 2016-10-19 08:59:31.178440 -No vulnerabilities found. - - -GCatChris/FlaskTutorial -https://github.com/GCatChris/FlaskTutorial -Entry file: None -Scanned: 2016-10-19 08:59:38.819184 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jcaine04/flasky2 -https://github.com/jcaine04/flasky2 -Entry file: flasky2/hello.py -Scanned: 2016-10-19 08:59:40.285137 -No vulnerabilities found. - - -mandrive/FlaskTest -https://github.com/mandrive/FlaskTest -Entry file: None -Scanned: 2016-10-19 08:59:40.794736 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mandrive/FlaskTest. - -mmahnken/flask_g_example -https://github.com/mmahnken/flask_g_example -Entry file: flask_g_example/g_example.py -Scanned: 2016-10-19 08:59:42.095112 -No vulnerabilities found. - - -geekpradd/Sublime-Flask-Starter -https://github.com/geekpradd/Sublime-Flask-Starter -Entry file: Sublime-Flask-Starter/flask-starter.py -Scanned: 2016-10-19 08:59:43.442963 -No vulnerabilities found. - - -flaskalobet/flask_learn -https://github.com/flaskalobet/flask_learn -Entry file: flask_learn/app/__init__.py -Scanned: 2016-10-19 08:59:44.768251 -No vulnerabilities found. - - -last-ent/flask-rest -https://github.com/last-ent/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-19 08:59:45.286886 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -heyimdan/slack_flask -https://github.com/heyimdan/slack_flask -Entry file: slack_flask/app.py -Scanned: 2016-10-19 08:59:50.224808 -No vulnerabilities found. - - -bhamhawker/flask-blog -https://github.com/bhamhawker/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:59:50.784115 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -edwilliams/flask-blog -https://github.com/edwilliams/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:59:52.350468 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rayray1/flask-blog -https://github.com/rayray1/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 08:59:58.392659 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Bovril-IT/allianceauth-flask -https://github.com/Bovril-IT/allianceauth-flask -Entry file: allianceauth-flask/app/__init__.py -Scanned: 2016-10-19 09:00:01.456783 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -manoelbo/flask_todos -https://github.com/manoelbo/flask_todos -Entry file: flask_todos/run.py -Scanned: 2016-10-19 09:00:05.998820 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_todos/lib/python2.7/genericpath.py - -mjp2220/flask-skeleton -https://github.com/mjp2220/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:00:07.523133 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mjp2220/flask-skeleton. - -pwgraham91/flask_playground -https://github.com/pwgraham91/flask_playground -Entry file: flask_playground/hello_world.py -Scanned: 2016-10-19 09:00:18.082665 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rtuita23/Flask-Jedi -https://github.com/rtuita23/Flask-Jedi -Entry file: Flask-Jedi/hello_world.py -Scanned: 2016-10-19 09:00:19.376994 -No vulnerabilities found. - - -frediana/www-flask -https://github.com/frediana/www-flask -Entry file: www-flask/main.py -Scanned: 2016-10-19 09:00:22.373658 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: www-flask/venv/lib/python2.7/genericpath.py - -aaabhilash97/Flask-Blog -https://github.com/aaabhilash97/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-19 09:00:22.881471 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brendanmckenzie/flask-imageserver -https://github.com/brendanmckenzie/flask-imageserver -Entry file: flask-imageserver/main.py -Scanned: 2016-10-19 09:00:24.217458 -No vulnerabilities found. - - -george-silva/speed-flask -https://github.com/george-silva/speed-flask -Entry file: speed-flask/src/flaskr/flaskr.py -Scanned: 2016-10-19 09:00:25.532688 -Vulnerability 1: -File: speed-flask/src/flaskr/flaskr.py - > User input at line 13, trigger word "form(": - QUERY = 'select - osm_id, - access, - "addr:housename", - "addr:housenumber", - admin_level, - highway, - maxspeed, - name, - oneway - from planet_osm_line where ST_DWithin(way, ST_Transform(ST_GeomFromText('POINT(%(x)s %(y)s)', 4326), 900913), %(dist)s) ORDER BY st_distance(way, ST_Transform(ST_GeomFromText('POINT(%(x)s %(y)s)', 4326), 900913));' -File: speed-flask/src/flaskr/flaskr.py - > reaches line 36, trigger word "execute(": - cursor.execute(QUERY, 'x''y''dist'xydist) - - - -droustchev/flask-wordcount -https://github.com/droustchev/flask-wordcount -Entry file: flask-wordcount/app.py -Scanned: 2016-10-19 09:00:27.829326 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mdeland/flask-test -https://github.com/mdeland/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 09:00:28.367356 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -Minras/flask-microblog -https://github.com/Minras/flask-microblog -Entry file: None -Scanned: 2016-10-19 09:00:29.975763 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -belerris/redditFlask -https://github.com/belerris/redditFlask -Entry file: redditFlask/app.py -Scanned: 2016-10-19 09:00:32.116639 -No vulnerabilities found. - - -khanduri/flaskPycharmTest -https://github.com/khanduri/flaskPycharmTest -Entry file: flaskPycharmTest/app/__init__.py -Scanned: 2016-10-19 09:00:41.424427 -No vulnerabilities found. - - -Rscho314/mallampati-rest-flask -https://github.com/Rscho314/mallampati-rest-flask -Entry file: None -Scanned: 2016-10-19 09:00:42.727214 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Rscho314/mallampati-rest-flask. - -joalisson/flask-bcrypt-2 -https://github.com/joalisson/flask-bcrypt-2 -Entry file: flask-bcrypt-2/bcrypt-final/app.py -Scanned: 2016-10-19 09:00:43.280261 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Alkaselzer22/flask-hello-world -https://github.com/Alkaselzer22/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:00:43.855367 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -nezaj/flask-api-skeleton -https://github.com/nezaj/flask-api-skeleton -Entry file: flask-api-skeleton/src/app.py -Scanned: 2016-10-19 09:00:47.760374 -No vulnerabilities found. - - -jimjshields/flask_by_example -https://github.com/jimjshields/flask_by_example -Entry file: flask_by_example/app.py -Scanned: 2016-10-19 09:00:49.071401 -No vulnerabilities found. - - -datamade/flask_app_template -https://github.com/datamade/flask_app_template -Entry file: flask_app_template/template/__init__.py -Scanned: 2016-10-19 09:00:51.661261 -No vulnerabilities found. - - -ncub8/flask-hello-world -https://github.com/ncub8/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:00:52.223771 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -tcotav/subdir_flask_wsgi -https://github.com/tcotav/subdir_flask_wsgi -Entry file: subdir_flask_wsgi/var_www_dash/dash/__init__.py -Scanned: 2016-10-19 09:00:54.534648 -No vulnerabilities found. - - -rayray1/flask-hello-world -https://github.com/rayray1/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:00:56.144361 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -mdmullendore/Python-Flask-Framework -https://github.com/mdmullendore/Python-Flask-Framework -Entry file: Python-Flask-Framework/routes.py -Scanned: 2016-10-19 09:00:59.938674 -No vulnerabilities found. - - -gnyoung19/flask_mortgage_calculator -https://github.com/gnyoung19/flask_mortgage_calculator -Entry file: None -Scanned: 2016-10-19 09:01:00.453176 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kkzxak47/flask-mega-tutorial -https://github.com/kkzxak47/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 09:01:00.967285 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mlfryman/pytn-flask-demo -https://github.com/mlfryman/pytn-flask-demo -Entry file: None -Scanned: 2016-10-19 09:01:05.262513 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mlfryman/pytn-flask-demo. - -blortfish/rasberrypi_gpio-flask -https://github.com/blortfish/rasberrypi_gpio-flask -Entry file: None -Scanned: 2016-10-19 09:01:18.112712 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/blortfish/rasberrypi_gpio-flask. - -rohanil/Sample-Flask-App -https://github.com/rohanil/Sample-Flask-App -Entry file: Sample-Flask-App/highchart/app.py -Scanned: 2016-10-19 09:01:21.008199 -No vulnerabilities found. - - -kks8142/flask_hello_world -https://github.com/kks8142/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-19 09:01:24.802959 -No vulnerabilities found. - - -mperham2/flaskr-bdd -https://github.com/mperham2/flaskr-bdd -Entry file: flaskr-bdd/flaskr.py -Scanned: 2016-10-19 09:01:28.360315 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskr-bdd/env/lib/python2.7/genericpath.py - -lr-discovery/bgxml -https://github.com/lr-discovery/bgxml -Entry file: bgxml/app/SampleApp.py -Scanned: 2016-10-19 09:01:29.758646 -No vulnerabilities found. - - -llucasmendes/blog -https://github.com/llucasmendes/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 09:01:30.306491 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -abinashmeher999/microblog -https://github.com/abinashmeher999/microblog -Entry file: None -Scanned: 2016-10-19 09:01:30.816146 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -checor/El-flasker -https://github.com/checor/El-flasker -Entry file: El-flasker/flaskr.py -Scanned: 2016-10-19 09:01:32.924357 -No vulnerabilities found. - - -DeaconDesperado/cookiecutter-flaskext -https://github.com/DeaconDesperado/cookiecutter-flaskext -Entry file: cookiecutter-flaskext/{{cookiecutter.repo_name}}/example/app.py -Scanned: 2016-10-19 09:01:34.585840 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cruor99/nettverkkrs -https://github.com/cruor99/nettverkkrs -Entry file: nettverkkrs/appname/__init__.py -Scanned: 2016-10-19 09:01:39.252051 -No vulnerabilities found. - - -DeaconDesperado/cookiecutter-flaskapp -https://github.com/DeaconDesperado/cookiecutter-flaskapp -Entry file: cookiecutter-flaskapp/{{cookiecutter.repo_name}}/{{cookiecutter.repo_name}}/app.py -Scanned: 2016-10-19 09:01:40.911401 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laurenceputra/smu-paypal-demo-python-flask -https://github.com/laurenceputra/smu-paypal-demo-python-flask -Entry file: smu-paypal-demo-python-flask/web.py -Scanned: 2016-10-19 09:01:43.331639 -No vulnerabilities found. - - -bergey/irc-query -https://github.com/bergey/irc-query -Entry file: None -Scanned: 2016-10-19 09:03:51.625218 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ArunRamachandran/Url_Shortner -https://github.com/ArunRamachandran/Url_Shortner -Entry file: Url_Shortner/app/__init__.py -Scanned: 2016-10-19 09:03:53.019837 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -razz0/traffic_disruption_heroku -https://github.com/razz0/traffic_disruption_heroku -Entry file: traffic_disruption_heroku/prediction.py -Scanned: 2016-10-19 09:03:54.404410 -No vulnerabilities found. - - -Dit81/links-saver -https://github.com/Dit81/links-saver -Entry file: links-saver/links_app.py -Scanned: 2016-10-19 09:03:55.738050 -Vulnerability 1: -File: links-saver/links_app.py - > User input at line 71, trigger word "form[": - link = request.form['link'] -File: links-saver/links_app.py - > reaches line 84, trigger word "execute(": - c.execute('INSERT INTO links(link, label, description) VALUES (?, ?, ?)', (link, label, description)) - -Vulnerability 2: -File: links-saver/links_app.py - > User input at line 79, trigger word "form[": - label = request.form['label'] -File: links-saver/links_app.py - > reaches line 84, trigger word "execute(": - c.execute('INSERT INTO links(link, label, description) VALUES (?, ?, ?)', (link, label, description)) - -Vulnerability 3: -File: links-saver/links_app.py - > User input at line 80, trigger word "form[": - description = request.form['description'] -File: links-saver/links_app.py - > reaches line 84, trigger word "execute(": - c.execute('INSERT INTO links(link, label, description) VALUES (?, ?, ?)', (link, label, description)) - -Vulnerability 4: -File: links-saver/links_app.py - > User input at line 118, trigger word "form[": - link = request.form['link'] -File: links-saver/links_app.py - > reaches line 124, trigger word "execute(": - c.execute('UPDATE links SET link = ?, label = ?, description = ? WHERE id = ?', (link, label, description, id)) - -Vulnerability 5: -File: links-saver/links_app.py - > User input at line 119, trigger word "form[": - label = request.form['label'] -File: links-saver/links_app.py - > reaches line 124, trigger word "execute(": - c.execute('UPDATE links SET link = ?, label = ?, description = ? WHERE id = ?', (link, label, description, id)) - -Vulnerability 6: -File: links-saver/links_app.py - > User input at line 120, trigger word "form[": - description = request.form['description'] -File: links-saver/links_app.py - > reaches line 124, trigger word "execute(": - c.execute('UPDATE links SET link = ?, label = ?, description = ? WHERE id = ?', (link, label, description, id)) - - - -gabygandrade/HB_MovieRatingsApp -https://github.com/gabygandrade/HB_MovieRatingsApp -Entry file: HB_MovieRatingsApp/judgement.py -Scanned: 2016-10-19 09:03:58.809877 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aaabhilash97/StudentApp -https://github.com/aaabhilash97/StudentApp -Entry file: None -Scanned: 2016-10-19 09:04:00.170126 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/aaabhilash97/StudentApp. - -JuliaDi/GitHub-Search -https://github.com/JuliaDi/GitHub-Search -Entry file: GitHub-Search/app.py -Scanned: 2016-10-19 09:04:01.738268 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vicdor/microblog -https://github.com/vicdor/microblog -Entry file: None -Scanned: 2016-10-19 09:04:02.261118 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -admiralobvious/flask-mysqldb -https://github.com/admiralobvious/flask-mysqldb -Entry file: flask-mysqldb/examples/app.py -Scanned: 2016-10-19 09:04:04.926123 -No vulnerabilities found. - - -geogas/scrapy-flask-imdb-python -https://github.com/geogas/scrapy-flask-imdb-python -Entry file: scrapy-flask-imdb-python/flask_imdb/__init__.py -Scanned: 2016-10-19 09:04:06.443381 -No vulnerabilities found. - - -dubu/flask -https://github.com/dubu/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:04:07.849404 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -kalyanavasanth/flask -https://github.com/kalyanavasanth/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:04:08.816967 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -dtheodor/flask-sqlalchemy-session -https://github.com/dtheodor/flask-sqlalchemy-session -Entry file: flask-sqlalchemy-session/tests/test_flask_sqlalchemy_session.py -Scanned: 2016-10-19 09:04:10.191572 -No vulnerabilities found. - - -jay3dec/PythonFlaskMySQLApp_Part4 -https://github.com/jay3dec/PythonFlaskMySQLApp_Part4 -Entry file: PythonFlaskMySQLApp_Part4/app.py -Scanned: 2016-10-19 09:04:12.260339 -No vulnerabilities found. - - -cloudwalkio/coreos-confd-nginx-flask -https://github.com/cloudwalkio/coreos-confd-nginx-flask -Entry file: coreos-confd-nginx-flask/app/app.py -Scanned: 2016-10-19 09:04:13.604847 -No vulnerabilities found. - - -yangsiy/flask_base -https://github.com/yangsiy/flask_base -Entry file: flask_base/app/__init__.py -Scanned: 2016-10-19 09:04:14.852408 -No vulnerabilities found. - - -cfpb/flask-eventics -https://github.com/cfpb/flask-eventics -Entry file: flask-eventics/run.py -Scanned: 2016-10-19 09:04:16.526630 -No vulnerabilities found. - - -mivade/flask-sse-demo -https://github.com/mivade/flask-sse-demo -Entry file: flask-sse-demo/sse.py -Scanned: 2016-10-19 09:04:18.201429 -No vulnerabilities found. - - -yinrongping/flaskblog -https://github.com/yinrongping/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 09:04:18.725957 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -moonorongo/flaskdemo -https://github.com/moonorongo/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 09:04:19.918868 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pwgraham91/flaskr -https://github.com/pwgraham91/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:04:20.880577 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nbob/flask-multi-session -https://github.com/nbob/flask-multi-session -Entry file: flask-multi-session/example.py -Scanned: 2016-10-19 09:04:22.218176 -No vulnerabilities found. - - -admiralobvious/flask-minitwit-mongodb -https://github.com/admiralobvious/flask-minitwit-mongodb -Entry file: flask-minitwit-mongodb/minitwit.py -Scanned: 2016-10-19 09:04:24.262107 -No vulnerabilities found. - - -Alkaselzer22/flask-blog -https://github.com/Alkaselzer22/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:04:24.789730 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -dimitriwalters/flask-app -https://github.com/dimitriwalters/flask-app -Entry file: flask-app/flask_app.py -Scanned: 2016-10-19 09:04:26.006615 -No vulnerabilities found. - - -szabgab/flask-poll -https://github.com/szabgab/flask-poll -Entry file: flask-poll/poll.py -Scanned: 2016-10-19 09:04:27.199429 -No vulnerabilities found. - - -joegillon/allocat_flask -https://github.com/joegillon/allocat_flask -Entry file: allocat_flask/app/__init__.py -Scanned: 2016-10-19 09:04:54.700586 -No vulnerabilities found. - - -lukeaanderso/Flask-Restful -https://github.com/lukeaanderso/Flask-Restful -Entry file: Flask-Restful/server/app.py -Scanned: 2016-10-19 09:04:57.391225 -No vulnerabilities found. - - -hakimu/flask_exception -https://github.com/hakimu/flask_exception -Entry file: flask_exception/test.py -Scanned: 2016-10-19 09:04:58.701651 -No vulnerabilities found. - - -heyericnelson/flask_projects -https://github.com/heyericnelson/flask_projects -Entry file: flask_projects/flask_hello_world/app.py -Scanned: 2016-10-19 09:05:01.903515 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SliceOLife/flask_skeleton -https://github.com/SliceOLife/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-19 09:05:03.883715 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -vasalx/flask-learn -https://github.com/vasalx/flask-learn -Entry file: flask-learn/myhello.py -Scanned: 2016-10-19 09:05:06.717920 -No vulnerabilities found. - - -rayray1/flask-blog -https://github.com/rayray1/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:05:07.267199 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -litmisty/flask-skeleton -https://github.com/litmisty/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:05:08.755304 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/litmisty/flask-skeleton. - -lennart96/bluemix-flask -https://github.com/lennart96/bluemix-flask -Entry file: bluemix-flask/server.py -Scanned: 2016-10-19 09:05:09.981391 -No vulnerabilities found. - - -kosamari/flask_heroku -https://github.com/kosamari/flask_heroku -Entry file: flask_heroku/app.py -Scanned: 2016-10-19 09:05:11.175922 -No vulnerabilities found. - - -mhockenbury/todo-flask -https://github.com/mhockenbury/todo-flask -Entry file: None -Scanned: 2016-10-19 09:05:12.586838 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mhockenbury/todo-flask. - -superpig2046/flask-Test -https://github.com/superpig2046/flask-Test -Entry file: flask-Test/flaskr.py -Scanned: 2016-10-19 09:05:13.780151 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eyejayvee/flask_blogful -https://github.com/eyejayvee/flask_blogful -Entry file: flask_blogful/blog/__init__.py -Scanned: 2016-10-19 09:05:14.957001 -No vulnerabilities found. - - -kylebillings/flask-test -https://github.com/kylebillings/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 09:05:15.485599 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -chilas/flask-learn -https://github.com/chilas/flask-learn -Entry file: flask-learn/intro_to_flask/__init__.py -Scanned: 2016-10-19 09:05:16.818545 -No vulnerabilities found. - - -ahakkal/Backend-flask -https://github.com/ahakkal/Backend-flask -Entry file: None -Scanned: 2016-10-19 09:05:21.829333 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rayray1/flask-tasker -https://github.com/rayray1/flask-tasker -Entry file: flask-tasker/env/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 09:05:27.166537 -No vulnerabilities found. - - -jahoy/flask-project- -https://github.com/jahoy/flask-project- -Entry file: None -Scanned: 2016-10-19 09:05:31.006074 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jahoy/flask-project-. - -AlwxSin/flask_newbie -https://github.com/AlwxSin/flask_newbie -Entry file: flask_newbie/app/__init__.py -Scanned: 2016-10-19 09:05:32.768958 -No vulnerabilities found. - - -belerris/redditFlask -https://github.com/belerris/redditFlask -Entry file: redditFlask/app.py -Scanned: 2016-10-19 09:05:34.538112 -No vulnerabilities found. - - -sumnous/backendTest -https://github.com/sumnous/backendTest -Entry file: backendTest/app.py -Scanned: 2016-10-19 09:05:35.748009 -No vulnerabilities found. - - -itestedthis1/FlaskBasicAPI -https://github.com/itestedthis1/FlaskBasicAPI -Entry file: None -Scanned: 2016-10-19 09:05:37.201470 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/itestedthis1/FlaskBasicAPI. - -praetore/FlaskBlogEngine -https://github.com/praetore/FlaskBlogEngine -Entry file: FlaskBlogEngine/app/__init__.py -Scanned: 2016-10-19 09:05:38.670080 -No vulnerabilities found. - - -rayray1/Flask-tasker-03 -https://github.com/rayray1/Flask-tasker-03 -Entry file: Flask-tasker-03/env/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 09:05:43.718385 -No vulnerabilities found. - - -inkmonk/mailchimp-oauth-flask -https://github.com/inkmonk/mailchimp-oauth-flask -Entry file: mailchimp-oauth-flask/mchimp.py -Scanned: 2016-10-19 09:05:45.009961 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ClarkMitchell/flask-hello-world -https://github.com/ClarkMitchell/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:05:45.531620 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -jjgalvez/tcga_ticker_flask -https://github.com/jjgalvez/tcga_ticker_flask -Entry file: tcga_ticker_flask/tcga.py -Scanned: 2016-10-19 09:05:55.908440 -No vulnerabilities found. - - -tamland/kodi-flask-demo -https://github.com/tamland/kodi-flask-demo -Entry file: kodi-flask-demo/app.py -Scanned: 2016-10-19 09:06:00.757334 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -nezaj/flask-api-skeleton -https://github.com/nezaj/flask-api-skeleton -Entry file: flask-api-skeleton/src/app.py -Scanned: 2016-10-19 09:06:02.063379 -No vulnerabilities found. - - -rayray1/Flask-tasker-02 -https://github.com/rayray1/Flask-tasker-02 -Entry file: Flask-tasker-02/env/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 09:06:06.505835 -No vulnerabilities found. - - -kaiocesar/flask-with-redis -https://github.com/kaiocesar/flask-with-redis -Entry file: flask-with-redis/app.py -Scanned: 2016-10-19 09:06:07.786696 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sergelab/flask-buildout-empty -https://github.com/sergelab/flask-buildout-empty -Entry file: flask-buildout-empty/src/sergelab/init.py -Scanned: 2016-10-19 09:06:09.798976 -No vulnerabilities found. - - -whitfiea/bluemix-python-flask-sample -https://github.com/whitfiea/bluemix-python-flask-sample -Entry file: bluemix-python-flask-sample/welcome.py -Scanned: 2016-10-19 09:06:11.016304 -No vulnerabilities found. - - -rayray1/flask-hello-world -https://github.com/rayray1/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:06:11.542523 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -mbuotte/flask_hello_world -https://github.com/mbuotte/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:06:12.733917 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mbuotte/flask_hello_world. - -eyejayvee/flask_blogful_local -https://github.com/eyejayvee/flask_blogful_local -Entry file: flask_blogful_local/blog/__init__.py -Scanned: 2016-10-19 09:06:14.527444 -No vulnerabilities found. - - -equancy/flask-tag-collector -https://github.com/equancy/flask-tag-collector -Entry file: flask-tag-collector/equancy-tag.py -Scanned: 2016-10-19 09:06:15.739079 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sb2gh/flask_hello_1 -https://github.com/sb2gh/flask_hello_1 -Entry file: flask_hello_1/fhello.py -Scanned: 2016-10-19 09:06:16.942603 -No vulnerabilities found. - - -blortfish/rasberrypi_gpio-flask -https://github.com/blortfish/rasberrypi_gpio-flask -Entry file: None -Scanned: 2016-10-19 09:06:17.431844 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/blortfish/rasberrypi_gpio-flask. - -galinapok/web_chat_flask -https://github.com/galinapok/web_chat_flask -Entry file: web_chat_flask/flask_app.py -Scanned: 2016-10-19 09:06:19.711545 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mik3cap/private-flask-security -https://github.com/mik3cap/private-flask-security -Entry file: private-flask-security/tests/conftest.py -Scanned: 2016-10-19 09:06:21.704133 -No vulnerabilities found. - - -bastianh/flask_signal_test -https://github.com/bastianh/flask_signal_test -Entry file: flask_signal_test/webapp/app.py -Scanned: 2016-10-19 09:06:24.913582 -No vulnerabilities found. - - -kks8142/flask_hello_world -https://github.com/kks8142/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:06:29.432975 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kks8142/flask_hello_world. - -justinwp/croplands -https://github.com/justinwp/croplands -Entry file: croplands/croplands_api/__init__.py -Scanned: 2016-10-19 09:06:37.728220 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -primal100/flask-admin-web_configuration_tool -https://github.com/primal100/flask-admin-web_configuration_tool -Entry file: flask-admin-web_configuration_tool/sampleapp.py -Scanned: 2016-10-19 09:06:39.046800 -No vulnerabilities found. - - -colmoneill/microblog -https://github.com/colmoneill/microblog -Entry file: None -Scanned: 2016-10-19 09:06:40.524227 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Ketouem/collabo-markdown -https://github.com/Ketouem/collabo-markdown -Entry file: collabo-markdown/collabo/__init__.py -Scanned: 2016-10-19 09:06:41.827387 -No vulnerabilities found. - - -mattgaff/urlchopin -https://github.com/mattgaff/urlchopin -Entry file: urlchopin/app/views.py -Scanned: 2016-10-19 09:06:43.130108 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Chr12t0pher/FastPoll -https://github.com/Chr12t0pher/FastPoll -Entry file: FastPoll/app/__init__.py -Scanned: 2016-10-19 09:06:46.715576 -No vulnerabilities found. - - -tomhogans/deploytest -https://github.com/tomhogans/deploytest -Entry file: deploytest/app.py -Scanned: 2016-10-19 09:06:47.923368 -No vulnerabilities found. - - -vicdor/microblog -https://github.com/vicdor/microblog -Entry file: None -Scanned: 2016-10-19 09:06:56.491478 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -spurll/crosspost -https://github.com/spurll/crosspost -Entry file: crosspost/crosspost/__init__.py -Scanned: 2016-10-19 09:06:59.032224 -No vulnerabilities found. - - -thedrew82/microblog -https://github.com/thedrew82/microblog -Entry file: None -Scanned: 2016-10-19 09:06:59.561086 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fogonwater/tinyapi -https://github.com/fogonwater/tinyapi -Entry file: tinyapi/app.py -Scanned: 2016-10-19 09:07:05.346333 -No vulnerabilities found. - - -jimjshields/thank_the_academy -https://github.com/jimjshields/thank_the_academy -Entry file: thank_the_academy/app.py -Scanned: 2016-10-19 09:07:10.176083 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -harmon25/metaflask -https://github.com/harmon25/metaflask -Entry file: metaflask/metaflask/__init__.py -Scanned: 2016-10-19 09:07:13.595372 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mbyta/socially -https://github.com/mbyta/socially -Entry file: socially/app/__init__.py -Scanned: 2016-10-19 09:07:15.292461 -Vulnerability 1: -File: socially/app/main/views.py - > User input at line 25, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: socially/app/main/views.py - > Line 33: posts = pagination.items - File: socially/app/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('main/index.html',form=form, posts=posts, LIKE=PostLike.LIKE, UNLIKE=PostLike.UNLIKE) - File: socially/app/main/views.py - > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: socially/app/main/views.py - > reaches line 26, trigger word "filter(": - pagination = Post.query.join(Follow, Follow.followed_id == Post.author_id).filter(Follow.follower_id == current_user.id).order_by(Post.created_at.desc()).paginate(page,per_page=current_app.config['SOCIALLY_POSTS_PER_PAGE'], error_out=False) - - - -smelnicki/smelnicki.com -https://github.com/smelnicki/smelnicki.com -Entry file: None -Scanned: 2016-10-19 09:07:17.199264 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/smelnicki/smelnicki.com. - -Sadin/ritoPLS -https://github.com/Sadin/ritoPLS -Entry file: None -Scanned: 2016-10-19 09:07:30.455078 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Sadin/ritoPLS. - -aaabhilash97/Github-repo-and-Twitter-Tweets-extractor-using-ajax-and-flask-python -https://github.com/aaabhilash97/Github-repo-and-Twitter-Tweets-extractor-using-ajax-and-flask-python -Entry file: None -Scanned: 2016-10-19 09:07:32.765712 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/aaabhilash97/Github-repo-and-Twitter-Tweets-extractor-using-ajax-and-flask-python. - -Retorz/microblog -https://github.com/Retorz/microblog -Entry file: None -Scanned: 2016-10-19 09:07:33.286422 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -patrickbeeson/has-it-ever-been -https://github.com/patrickbeeson/has-it-ever-been -Entry file: has-it-ever-been/tests.py -Scanned: 2016-10-19 09:07:35.151589 -Vulnerability 1: -File: has-it-ever-been/app/views.py - > User input at line 75, trigger word ".data": - location = geocode_location(form.location.data) -Reassigned in: - File: has-it-ever-been/app/views.py - > Line 76: lat = location.latitude - File: has-it-ever-been/app/views.py - > Line 77: lon = location.longitude - File: has-it-ever-been/app/views.py - > Line 79: current_temp = get_current_temp(lat, lon) - File: has-it-ever-been/app/views.py - > Line 80: almanac_data = get_almanac_data(lat, lon) - File: has-it-ever-been/app/views.py - > Line 81: record_high = int(almanac_data['record_high']) - File: has-it-ever-been/app/views.py - > Line 82: record_low = int(almanac_data['record_low']) - File: has-it-ever-been/app/views.py - > Line 83: record_high_year = int(almanac_data['record_high_year']) - File: has-it-ever-been/app/views.py - > Line 84: record_low_year = int(almanac_data['record_low_year']) - File: has-it-ever-been/app/views.py - > Line 85: temp_diff_high_above = current_temp - record_high - File: has-it-ever-been/app/views.py - > Line 86: temp_diff_high_below = record_high - current_temp - File: has-it-ever-been/app/views.py - > Line 87: temp_diff_low_above = current_temp - record_low - File: has-it-ever-been/app/views.py - > Line 88: temp_diff_low_below = record_low - current_temp - File: has-it-ever-been/app/views.py - > Line 132: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, current_temp=current_temp, record_high=record_high, record_low=record_low) - File: has-it-ever-been/app/views.py - > Line 139: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form) -File: has-it-ever-been/app/views.py - > reaches line 92, trigger word "flash(": - flash('It's never been this hot! - Currently, it's {} degrees, which is {} degrees above the - record of {}, set in {}.'.format(current_temp, temp_diff_high_above, record_high, record_high_year)) - -Vulnerability 2: -File: has-it-ever-been/app/views.py - > User input at line 75, trigger word ".data": - location = geocode_location(form.location.data) -Reassigned in: - File: has-it-ever-been/app/views.py - > Line 76: lat = location.latitude - File: has-it-ever-been/app/views.py - > Line 77: lon = location.longitude - File: has-it-ever-been/app/views.py - > Line 79: current_temp = get_current_temp(lat, lon) - File: has-it-ever-been/app/views.py - > Line 80: almanac_data = get_almanac_data(lat, lon) - File: has-it-ever-been/app/views.py - > Line 81: record_high = int(almanac_data['record_high']) - File: has-it-ever-been/app/views.py - > Line 82: record_low = int(almanac_data['record_low']) - File: has-it-ever-been/app/views.py - > Line 83: record_high_year = int(almanac_data['record_high_year']) - File: has-it-ever-been/app/views.py - > Line 84: record_low_year = int(almanac_data['record_low_year']) - File: has-it-ever-been/app/views.py - > Line 85: temp_diff_high_above = current_temp - record_high - File: has-it-ever-been/app/views.py - > Line 86: temp_diff_high_below = record_high - current_temp - File: has-it-ever-been/app/views.py - > Line 87: temp_diff_low_above = current_temp - record_low - File: has-it-ever-been/app/views.py - > Line 88: temp_diff_low_below = record_low - current_temp - File: has-it-ever-been/app/views.py - > Line 132: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, current_temp=current_temp, record_high=record_high, record_low=record_low) - File: has-it-ever-been/app/views.py - > Line 139: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form) -File: has-it-ever-been/app/views.py - > reaches line 102, trigger word "flash(": - flash('It's been this hot before. - Currently, it's {} degrees, which is {} degrees below the - record of {}, set in {}.'.format(current_temp, temp_diff_high_below, record_high, record_high_year)) - -Vulnerability 3: -File: has-it-ever-been/app/views.py - > User input at line 75, trigger word ".data": - location = geocode_location(form.location.data) -Reassigned in: - File: has-it-ever-been/app/views.py - > Line 76: lat = location.latitude - File: has-it-ever-been/app/views.py - > Line 77: lon = location.longitude - File: has-it-ever-been/app/views.py - > Line 79: current_temp = get_current_temp(lat, lon) - File: has-it-ever-been/app/views.py - > Line 80: almanac_data = get_almanac_data(lat, lon) - File: has-it-ever-been/app/views.py - > Line 81: record_high = int(almanac_data['record_high']) - File: has-it-ever-been/app/views.py - > Line 82: record_low = int(almanac_data['record_low']) - File: has-it-ever-been/app/views.py - > Line 83: record_high_year = int(almanac_data['record_high_year']) - File: has-it-ever-been/app/views.py - > Line 84: record_low_year = int(almanac_data['record_low_year']) - File: has-it-ever-been/app/views.py - > Line 85: temp_diff_high_above = current_temp - record_high - File: has-it-ever-been/app/views.py - > Line 86: temp_diff_high_below = record_high - current_temp - File: has-it-ever-been/app/views.py - > Line 87: temp_diff_low_above = current_temp - record_low - File: has-it-ever-been/app/views.py - > Line 88: temp_diff_low_below = record_low - current_temp - File: has-it-ever-been/app/views.py - > Line 132: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, current_temp=current_temp, record_high=record_high, record_low=record_low) - File: has-it-ever-been/app/views.py - > Line 139: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form) -File: has-it-ever-been/app/views.py - > reaches line 113, trigger word "flash(": - flash('It's never been this cold before. - Currently, it's {} degrees, which is {} degrees below the - record of {}, set in {}.'.format(current_temp, temp_diff_low_below, record_low, record_low_year)) - -Vulnerability 4: -File: has-it-ever-been/app/views.py - > User input at line 75, trigger word ".data": - location = geocode_location(form.location.data) -Reassigned in: - File: has-it-ever-been/app/views.py - > Line 76: lat = location.latitude - File: has-it-ever-been/app/views.py - > Line 77: lon = location.longitude - File: has-it-ever-been/app/views.py - > Line 79: current_temp = get_current_temp(lat, lon) - File: has-it-ever-been/app/views.py - > Line 80: almanac_data = get_almanac_data(lat, lon) - File: has-it-ever-been/app/views.py - > Line 81: record_high = int(almanac_data['record_high']) - File: has-it-ever-been/app/views.py - > Line 82: record_low = int(almanac_data['record_low']) - File: has-it-ever-been/app/views.py - > Line 83: record_high_year = int(almanac_data['record_high_year']) - File: has-it-ever-been/app/views.py - > Line 84: record_low_year = int(almanac_data['record_low_year']) - File: has-it-ever-been/app/views.py - > Line 85: temp_diff_high_above = current_temp - record_high - File: has-it-ever-been/app/views.py - > Line 86: temp_diff_high_below = record_high - current_temp - File: has-it-ever-been/app/views.py - > Line 87: temp_diff_low_above = current_temp - record_low - File: has-it-ever-been/app/views.py - > Line 88: temp_diff_low_below = record_low - current_temp - File: has-it-ever-been/app/views.py - > Line 132: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, current_temp=current_temp, record_high=record_high, record_low=record_low) - File: has-it-ever-been/app/views.py - > Line 139: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form) -File: has-it-ever-been/app/views.py - > reaches line 123, trigger word "flash(": - flash('It's been this cold before. - Currently, it's {} degrees, which is {} degrees above the - record of {}, set in {}.'.format(current_temp, temp_diff_low_above, record_low, record_low_year)) - - - -rxdt/GitViz -https://github.com/rxdt/GitViz -Entry file: GitViz/app/gitviz_app/routes.py -Scanned: 2016-10-19 09:07:36.954194 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -micahwalter/little-collection-api -https://github.com/micahwalter/little-collection-api -Entry file: little-collection-api/little-api.py -Scanned: 2016-10-19 09:07:38.262885 -No vulnerabilities found. - - -Temzasse/junglebook -https://github.com/Temzasse/junglebook -Entry file: junglebook/app/__init__.py -Scanned: 2016-10-19 09:07:40.710054 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jorgeastorga/microblog -https://github.com/jorgeastorga/microblog -Entry file: None -Scanned: 2016-10-19 09:07:41.195942 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -TwilioDevEd/authy2fa-flask -https://github.com/TwilioDevEd/authy2fa-flask -Entry file: authy2fa-flask/twofa/__init__.py -Scanned: 2016-10-19 09:07:45.000779 -No vulnerabilities found. - - -Sapphire64/FlaskReactTodoExample -https://github.com/Sapphire64/FlaskReactTodoExample -Entry file: None -Scanned: 2016-10-19 09:07:46.345180 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Sapphire64/FlaskReactTodoExample. - -Putas/flask -https://github.com/Putas/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:07:47.207721 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -baltazor5000/flask -https://github.com/baltazor5000/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:07:48.580377 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -MaraKovalcik/Flask -https://github.com/MaraKovalcik/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:07:49.159951 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sh4nks/flask-emoji -https://github.com/sh4nks/flask-emoji -Entry file: flask-emoji/tests/__init__.py -Scanned: 2016-10-19 09:07:53.161401 -No vulnerabilities found. - - -cfpb/flask-eventics -https://github.com/cfpb/flask-eventics -Entry file: flask-eventics/run.py -Scanned: 2016-10-19 09:07:55.326115 -No vulnerabilities found. - - -Nesta-CZ/flask-skeleton-db-2 -https://github.com/Nesta-CZ/flask-skeleton-db-2 -Entry file: flask-skeleton-db-2/flask-skeleton-db/src/app.py -Scanned: 2016-10-19 09:07:58.841575 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Nesta-CZ/flask-skeleton-db -https://github.com/Nesta-CZ/flask-skeleton-db -Entry file: flask-skeleton-db/src/app.py -Scanned: 2016-10-19 09:08:00.330818 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -harshays/prioritize -https://github.com/harshays/prioritize -Entry file: prioritize/app/__init__.py -Scanned: 2016-10-19 09:08:05.785093 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitsuhiko/pyladies-flask -https://github.com/mitsuhiko/pyladies-flask -Entry file: pyladies-flask/pastebin.py -Scanned: 2016-10-19 09:08:07.000153 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -marklandman/flasktutorial -https://github.com/marklandman/flasktutorial -Entry file: None -Scanned: 2016-10-19 09:08:10.497616 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -moonorongo/flaskdemo -https://github.com/moonorongo/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 09:08:11.986811 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -KKConrad/flaskr -https://github.com/KKConrad/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:08:15.492579 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bmelton/flasktest -https://github.com/bmelton/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 09:08:19.477264 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nbob/flask-multi-session -https://github.com/nbob/flask-multi-session -Entry file: flask-multi-session/example.py -Scanned: 2016-10-19 09:08:33.678384 -No vulnerabilities found. - - -kartikluke/cron -https://github.com/kartikluke/cron -Entry file: cron/main.py -Scanned: 2016-10-19 09:08:40.473000 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -BenDoan/fhb -https://github.com/BenDoan/fhb -Entry file: fhb/server.py -Scanned: 2016-10-19 09:08:42.175440 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -socialpanic/FlaskAuth -https://github.com/socialpanic/FlaskAuth -Entry file: FlaskAuth/testapp/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 09:08:48.927545 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shafi-codez/FlaskDemo -https://github.com/shafi-codez/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 09:08:50.261332 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -abdonrd/appengine-flask-template -https://github.com/abdonrd/appengine-flask-template -Entry file: appengine-flask-template/main.py -Scanned: 2016-10-19 09:08:52.426713 -No vulnerabilities found. - - -colmoneill/flask-tumblelog -https://github.com/colmoneill/flask-tumblelog -Entry file: flask-tumblelog/blog/__init__.py -Scanned: 2016-10-19 09:08:53.756429 -No vulnerabilities found. - - -joegillon/allocat_flask -https://github.com/joegillon/allocat_flask -Entry file: allocat_flask/app/__init__.py -Scanned: 2016-10-19 09:08:55.548496 -No vulnerabilities found. - - -JannyK/flask-dockerized -https://github.com/JannyK/flask-dockerized -Entry file: flask-dockerized/app/app.py -Scanned: 2016-10-19 09:08:56.770405 -No vulnerabilities found. - - -vanceb/flask-weather -https://github.com/vanceb/flask-weather -Entry file: flask-weather/app.py -Scanned: 2016-10-19 09:08:58.173747 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EnkeyMC/Flask-test -https://github.com/EnkeyMC/Flask-test -Entry file: Flask-test/Flask-test.py -Scanned: 2016-10-19 09:08:59.412943 -No vulnerabilities found. - - -ryanallen82/flask-angular -https://github.com/ryanallen82/flask-angular -Entry file: flask-angular/app.py -Scanned: 2016-10-19 09:09:01.084456 -No vulnerabilities found. - - -Shashwat986/Flask-Test -https://github.com/Shashwat986/Flask-Test -Entry file: Flask-Test/app.py -Scanned: 2016-10-19 09:09:02.281481 -No vulnerabilities found. - - -vasalx/flask-learn -https://github.com/vasalx/flask-learn -Entry file: flask-learn/myhello.py -Scanned: 2016-10-19 09:09:03.677506 -No vulnerabilities found. - - -sssingh/flask-blog -https://github.com/sssingh/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:09:04.235053 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -bigbi/flask-skeleton -https://github.com/bigbi/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:09:04.734582 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bigbi/flask-skeleton. - -Domca17/flask-skeleton -https://github.com/Domca17/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:09:05.282698 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Domca17/flask-skeleton. - -xyos/words-flask -https://github.com/xyos/words-flask -Entry file: words-flask/app/__init__.py -Scanned: 2016-10-19 09:09:06.525578 -No vulnerabilities found. - - -jgoodacre71/flask_hello -https://github.com/jgoodacre71/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-19 09:09:07.818600 -No vulnerabilities found. - - -doosik71/helloFlask -https://github.com/doosik71/helloFlask -Entry file: helloFlask/src/chapter2.py -Scanned: 2016-10-19 09:09:09.053757 -No vulnerabilities found. - - -petrgru/flask-skeleton -https://github.com/petrgru/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:09:09.557837 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/petrgru/flask-skeleton. - -internetmosquito/flask-scheduler -https://github.com/internetmosquito/flask-scheduler -Entry file: flask-scheduler/project/__init__.py -Scanned: 2016-10-19 09:09:11.163592 -No vulnerabilities found. - - -flaskalobet/flask_simple -https://github.com/flaskalobet/flask_simple -Entry file: flask_simple/app/__init__.py -Scanned: 2016-10-19 09:09:12.489327 -No vulnerabilities found. - - -Kubko1/flask-skeleton -https://github.com/Kubko1/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:09:13.038300 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Kubko1/flask-skeleton. - -leebird/alchemy-flask -https://github.com/leebird/alchemy-flask -Entry file: None -Scanned: 2016-10-19 09:09:17.428302 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/leebird/alchemy-flask. - -internetmosquito/flask-blog -https://github.com/internetmosquito/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:09:18.973723 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -danggrianto/flask-by-example -https://github.com/danggrianto/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 09:09:22.266526 -No vulnerabilities found. - - -sbarb/PiGPIO-FlaskServer -https://github.com/sbarb/PiGPIO-FlaskServer -Entry file: PiGPIO-FlaskServer/pyserv.py -Scanned: 2016-10-19 09:09:34.697115 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -itestedthis1/FlaskBasicAPI -https://github.com/itestedthis1/FlaskBasicAPI -Entry file: None -Scanned: 2016-10-19 09:09:36.181283 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/itestedthis1/FlaskBasicAPI. - -abhiii5459/todo-api-flask -https://github.com/abhiii5459/todo-api-flask -Entry file: None -Scanned: 2016-10-19 09:09:46.019801 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -JohnnyJukes/flask_skeleton_databaze -https://github.com/JohnnyJukes/flask_skeleton_databaze -Entry file: flask_skeleton_databaze/src/app.py -Scanned: 2016-10-19 09:09:47.594712 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ErhoSen/TutsPlus_Foundational_Flask -https://github.com/ErhoSen/TutsPlus_Foundational_Flask -Entry file: TutsPlus_Foundational_Flask/generator.py -Scanned: 2016-10-19 09:09:51.908508 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rileynat/BlankFlaskApp -https://github.com/rileynat/BlankFlaskApp -Entry file: None -Scanned: 2016-10-19 09:09:54.269278 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jjgalvez/tcga_ticker_flask -https://github.com/jjgalvez/tcga_ticker_flask -Entry file: tcga_ticker_flask/tcga.py -Scanned: 2016-10-19 09:09:55.618739 -No vulnerabilities found. - - -chanshik/Flask-Kazoo-Test -https://github.com/chanshik/Flask-Kazoo-Test -Entry file: Flask-Kazoo-Test/flask_kazoo_test.py -Scanned: 2016-10-19 09:09:57.330896 -No vulnerabilities found. - - -tjmehta/flask-hello-world -https://github.com/tjmehta/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:09:57.864997 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -tamland/kodi-flask-demo -https://github.com/tamland/kodi-flask-demo -Entry file: kodi-flask-demo/app.py -Scanned: 2016-10-19 09:10:00.830545 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -rayray1/Flask-tasker-04 -https://github.com/rayray1/Flask-tasker-04 -Entry file: Flask-tasker-04/flasktaskr_project/project/__init__.py -Scanned: 2016-10-19 09:10:05.921158 -No vulnerabilities found. - - -AshidoKano/flask-skeleton_db -https://github.com/AshidoKano/flask-skeleton_db -Entry file: flask-skeleton_db/src/app.py -Scanned: 2016-10-19 09:10:07.485259 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cavens/flask_hello_world -https://github.com/cavens/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:10:07.992460 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cavens/flask_hello_world. - -equancy/flask-tag-collector -https://github.com/equancy/flask-tag-collector -Entry file: flask-tag-collector/equancy-tag.py -Scanned: 2016-10-19 09:10:08.484051 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cavens/flask_hello_world_bis -https://github.com/cavens/flask_hello_world_bis -Entry file: flask_hello_world_bis/hello_world.py -Scanned: 2016-10-19 09:10:12.327555 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_hello_world_bis/env/lib/python2.7/genericpath.py - -aachik/blog_flask_practica -https://github.com/aachik/blog_flask_practica -Entry file: blog_flask_practica/blog.py -Scanned: 2016-10-19 09:10:13.558116 -Vulnerability 1: -File: blog_flask_practica/blog.py - > User input at line 64, trigger word "form[": - titulo = request.form['title'] -File: blog_flask_practica/blog.py - > reaches line 71, trigger word "execute(": - g.db.execute('insert into posts (title, post) values(?,?)', [titulo, post]) - -Vulnerability 2: -File: blog_flask_practica/blog.py - > User input at line 65, trigger word "form[": - post = request.form['post'] -File: blog_flask_practica/blog.py - > reaches line 71, trigger word "execute(": - g.db.execute('insert into posts (title, post) values(?,?)', [titulo, post]) - - - -MichelAquino/LearningFlaskPython -https://github.com/MichelAquino/LearningFlaskPython -Entry file: LearningFlaskPython/app/__init__.py -Scanned: 2016-10-19 09:10:15.577490 -No vulnerabilities found. - - -w8s/flask_api_sample -https://github.com/w8s/flask_api_sample -Entry file: flask_api_sample/flask_api.py -Scanned: 2016-10-19 09:10:16.913270 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -moranned/flask_api_example -https://github.com/moranned/flask_api_example -Entry file: flask_api_example/app.py -Scanned: 2016-10-19 09:10:18.129208 -Vulnerability 1: -File: flask_api_example/app.py - > User input at line 42, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flask_api_example/app.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -moranned/flask_hello_world -https://github.com/moranned/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:10:19.090423 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/moranned/flask_hello_world. - -Orel741/Flask-Skeleton-Projekt -https://github.com/Orel741/Flask-Skeleton-Projekt -Entry file: Flask-Skeleton-Projekt/flask-skeleton/src/app.py -Scanned: 2016-10-19 09:10:20.999679 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bitstein/flask-login-demo -https://github.com/bitstein/flask-login-demo -Entry file: flask-login-demo/app/__init__.py -Scanned: 2016-10-19 09:10:22.209207 -No vulnerabilities found. - - -kleinjoshuaa/microblog -https://github.com/kleinjoshuaa/microblog -Entry file: None -Scanned: 2016-10-19 09:10:23.174601 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rtuita23/blog -https://github.com/rtuita23/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 09:10:35.688979 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Fajkowsky/LiveChat -https://github.com/Fajkowsky/LiveChat -Entry file: LiveChat/app.py -Scanned: 2016-10-19 09:10:39.489817 -No vulnerabilities found. - - -grant/capture-opencv -https://github.com/grant/capture-opencv -Entry file: capture-opencv/index.py -Scanned: 2016-10-19 09:10:49.784172 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arneunruh/VisualStockDivergence -https://github.com/arneunruh/VisualStockDivergence -Entry file: None -Scanned: 2016-10-19 09:10:53.496338 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/arneunruh/VisualStockDivergence. - -karthikbox/pork_chop -https://github.com/karthikbox/pork_chop -Entry file: None -Scanned: 2016-10-19 09:11:01.062284 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -GohNicho/microblog -https://github.com/GohNicho/microblog -Entry file: None -Scanned: 2016-10-19 09:11:01.587135 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -patallen/snip.space -https://github.com/patallen/snip.space -Entry file: None -Scanned: 2016-10-19 09:11:03.202792 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/patallen/snip.space. - -colmoneill/json_feeds-flask-website-proof_of_concept -https://github.com/colmoneill/json_feeds-flask-website-proof_of_concept -Entry file: json_feeds-flask-website-proof_of_concept/website/__init__.py -Scanned: 2016-10-19 09:11:04.539775 -No vulnerabilities found. - - -marchon/Debug-Dokku.alt-Mongodb-Flask-Python -https://github.com/marchon/Debug-Dokku.alt-Mongodb-Flask-Python -Entry file: None -Scanned: 2016-10-19 09:11:05.969196 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/marchon/Debug-Dokku.alt-Mongodb-Flask-Python. - -ET-CS/Python-Flask-large-app-structure-boilerplate -https://github.com/ET-CS/Python-Flask-large-app-structure-boilerplate -Entry file: None -Scanned: 2016-10-19 09:11:07.273406 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ET-CS/Python-Flask-large-app-structure-boilerplate. - -mrghen/groupfit -https://github.com/mrghen/groupfit -Entry file: groupfit/__init__.py -Scanned: 2016-10-19 09:11:10.227758 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jslvtr/FriendFinderBackend -https://github.com/jslvtr/FriendFinderBackend -Entry file: None -Scanned: 2016-10-19 09:11:11.559023 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jslvtr/FriendFinderBackend. - -rghose/lol3 -https://github.com/rghose/lol3 -Entry file: lol3/app.py -Scanned: 2016-10-19 09:11:13.593983 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattgaff/urlchopin -https://github.com/mattgaff/urlchopin -Entry file: urlchopin/app/views.py -Scanned: 2016-10-19 09:11:14.086801 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Chr12t0pher/FastPoll -https://github.com/Chr12t0pher/FastPoll -Entry file: FastPoll/app/__init__.py -Scanned: 2016-10-19 09:11:15.683828 -No vulnerabilities found. - - -shivamprakash/Port-Knocking -https://github.com/shivamprakash/Port-Knocking -Entry file: Port-Knocking/app/views.py -Scanned: 2016-10-19 09:11:20.637401 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -parryjacob/sitemap -https://github.com/parryjacob/sitemap -Entry file: sitemap/app.py -Scanned: 2016-10-19 09:11:22.473615 -No vulnerabilities found. - - -gangverk/flask-swagger -https://github.com/gangverk/flask-swagger -Entry file: flask-swagger/examples/example.py -Scanned: 2016-10-19 09:11:25.168674 -No vulnerabilities found. - - -no13bus/redispapa -https://github.com/no13bus/redispapa -Entry file: redispapa/run.py -Scanned: 2016-10-19 09:11:27.155656 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shekhargulati/python-flask-docker-hello-world -https://github.com/shekhargulati/python-flask-docker-hello-world -Entry file: python-flask-docker-hello-world/app.py -Scanned: 2016-10-19 09:11:28.409493 -No vulnerabilities found. - - -iXtreme/flask -https://github.com/iXtreme/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:11:29.942000 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -quokkaproject/flask-htmlbuilder -https://github.com/quokkaproject/flask-htmlbuilder -Entry file: flask-htmlbuilder/tests/test_flask-htmlbuilder.py -Scanned: 2016-10-19 09:11:31.999683 -No vulnerabilities found. - - -lavr/flask-emails -https://github.com/lavr/flask-emails -Entry file: flask-emails/tests/tests.py -Scanned: 2016-10-19 09:11:33.487628 -No vulnerabilities found. - - -jsbueno/fotolog_com_flask -https://github.com/jsbueno/fotolog_com_flask -Entry file: fotolog_com_flask/photolog.py -Scanned: 2016-10-19 09:11:34.849946 -No vulnerabilities found. - - -Nesta-CZ/flask-skeleton-db-2 -https://github.com/Nesta-CZ/flask-skeleton-db-2 -Entry file: flask-skeleton-db-2/flask-skeleton-db/src/app.py -Scanned: 2016-10-19 09:11:35.345315 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spk/flask-recipes -https://github.com/spk/flask-recipes -Entry file: flask-recipes/app/factory.py -Scanned: 2016-10-19 09:11:36.711635 -No vulnerabilities found. - - -sudssm/Flask-Talk -https://github.com/sudssm/Flask-Talk -Entry file: Flask-Talk/website/app.py -Scanned: 2016-10-19 09:11:38.143551 -No vulnerabilities found. - - -enric612/flaskquickstart -https://github.com/enric612/flaskquickstart -Entry file: flaskquickstart/hellodynamic.py -Scanned: 2016-10-19 09:11:40.423358 -No vulnerabilities found. - - -sedevc/flaskr -https://github.com/sedevc/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:11:45.921738 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sjbitcode/flaskr -https://github.com/sjbitcode/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:11:50.421745 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sadaf2605/facedetection-flaskwebapp-rabbitmq -https://github.com/sadaf2605/facedetection-flaskwebapp-rabbitmq -Entry file: facedetection-flaskwebapp-rabbitmq/server.py -Scanned: 2016-10-19 09:11:56.347973 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eric6356/flaskblog -https://github.com/eric6356/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 09:12:03.334463 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -underdogio/flask-json-multidict -https://github.com/underdogio/flask-json-multidict -Entry file: flask-json-multidict/docs/getting_started.py -Scanned: 2016-10-19 09:12:04.545070 -No vulnerabilities found. - - -aminrazer/FlaskVideo -https://github.com/aminrazer/FlaskVideo -Entry file: FlaskVideo/app/__init__.py -Scanned: 2016-10-19 09:12:05.843367 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MEhlinger/flaskrApp -https://github.com/MEhlinger/flaskrApp -Entry file: flaskrApp/flaskr.py -Scanned: 2016-10-19 09:12:07.155301 -No vulnerabilities found. - - -stekrtomas/FlaskGraf -https://github.com/stekrtomas/FlaskGraf -Entry file: FlaskGraf/app.py -Scanned: 2016-10-19 09:12:10.014134 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shafi-codez/FlaskDemo -https://github.com/shafi-codez/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 09:12:10.505674 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eternalthinker/flask-server-rq-example -https://github.com/eternalthinker/flask-server-rq-example -Entry file: flask-server-rq-example/app.py -Scanned: 2016-10-19 09:12:14.204663 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chrcoe/learning-flask -https://github.com/chrcoe/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-19 09:12:15.225309 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Suyash458/Flask_Microblog -https://github.com/Suyash458/Flask_Microblog -Entry file: Flask_Microblog/app/__init__.py -Scanned: 2016-10-19 09:12:16.861033 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -goncharovms/flask_library -https://github.com/goncharovms/flask_library -Entry file: flask_library/app/__init__.py -Scanned: 2016-10-19 09:12:18.407411 -Vulnerability 1: -File: flask_library/app/users/views.py - > User input at line 42, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -File: flask_library/app/users/views.py - > reaches line 48, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -abhi1991/Flask_LP -https://github.com/abhi1991/Flask_LP -Entry file: None -Scanned: 2016-10-19 09:12:23.625898 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/abhi1991/Flask_LP. - -heyericnelson/flask_blog -https://github.com/heyericnelson/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 09:12:24.114818 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -matthewst/flask-skeleton -https://github.com/matthewst/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:12:24.657481 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/matthewst/flask-skeleton. - -averyonghub/Flask-Skeleton -https://github.com/averyonghub/Flask-Skeleton -Entry file: Flask-Skeleton/www/__init__.py -Scanned: 2016-10-19 09:12:26.881731 -No vulnerabilities found. - - -AshidoKano/flask-skeleton -https://github.com/AshidoKano/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:12:27.380941 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AshidoKano/flask-skeleton. - -coderxiao/flask_test -https://github.com/coderxiao/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 09:12:28.959554 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cafe4it/flask-microblog -https://github.com/cafe4it/flask-microblog -Entry file: None -Scanned: 2016-10-19 09:12:30.467892 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -youqingkui/learn_flask -https://github.com/youqingkui/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-19 09:12:32.457372 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jgoodacre71/flask_hello -https://github.com/jgoodacre71/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-19 09:12:33.674658 -No vulnerabilities found. - - -Sidon/rpython_flask -https://github.com/Sidon/rpython_flask -Entry file: rpython_flask/app.py -Scanned: 2016-10-19 09:12:34.874546 -No vulnerabilities found. - - -nMustaki/flask-usul -https://github.com/nMustaki/flask-usul -Entry file: flask-usul/app/__init__.py -Scanned: 2016-10-19 09:12:36.547135 -No vulnerabilities found. - - -aromanovich/flask-tuktuk -https://github.com/aromanovich/flask-tuktuk -Entry file: flask-tuktuk/tests/testapp/app/__init__.py -Scanned: 2016-10-19 09:12:37.884221 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flaskalobet/flask_freeswitch -https://github.com/flaskalobet/flask_freeswitch -Entry file: flask_freeswitch/app/__init__.py -Scanned: 2016-10-19 09:12:39.469632 -No vulnerabilities found. - - -froi/flask-microblog -https://github.com/froi/flask-microblog -Entry file: None -Scanned: 2016-10-19 09:12:39.983249 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Solinari/Flask-Intro -https://github.com/Solinari/Flask-Intro -Entry file: Flask-Intro/Hello.py -Scanned: 2016-10-19 09:12:42.193608 -No vulnerabilities found. - - -leebird/alchemy-flask -https://github.com/leebird/alchemy-flask -Entry file: None -Scanned: 2016-10-19 09:12:47.682324 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/leebird/alchemy-flask. - -catalyst/flask-wol -https://github.com/catalyst/flask-wol -Entry file: flask-wol/flask-wol.py -Scanned: 2016-10-19 09:12:53.030759 -No vulnerabilities found. - - -AminHuang/blog-flask -https://github.com/AminHuang/blog-flask -Entry file: blog-flask/project/views.py -Scanned: 2016-10-19 09:13:02.990477 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sc0rp1us/flask-calc -https://github.com/sc0rp1us/flask-calc -Entry file: flask-calc/flask_calc/__init__.py -Scanned: 2016-10-19 09:13:04.254400 -No vulnerabilities found. - - -kubnymarek/flask-kubny -https://github.com/kubnymarek/flask-kubny -Entry file: None -Scanned: 2016-10-19 09:13:08.102102 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -klokoSSPU/flask-skeleton -https://github.com/klokoSSPU/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:13:08.595104 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/klokoSSPU/flask-skeleton. - -kushal124/learn-flask -https://github.com/kushal124/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 09:13:14.994855 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kessokujp/ta25-FlaskAngJinja -https://github.com/kessokujp/ta25-FlaskAngJinja -Entry file: ta25-FlaskAngJinja/main.py -Scanned: 2016-10-19 09:13:19.511058 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -Laukess/FlaskTaskr_Part_5 -https://github.com/Laukess/FlaskTaskr_Part_5 -Entry file: FlaskTaskr_Part_5/flasktaskr_project/project/__init__.py -Scanned: 2016-10-19 09:13:20.852173 -No vulnerabilities found. - - -skver/FlaskTestTask -https://github.com/skver/FlaskTestTask -Entry file: FlaskTestTask/app/__init__.py -Scanned: 2016-10-19 09:13:22.522885 -No vulnerabilities found. - - -Outfl3sh/flask-skeleton-hw -https://github.com/Outfl3sh/flask-skeleton-hw -Entry file: flask-skeleton-hw/3.2.2015/src/app.py -Scanned: 2016-10-19 09:13:26.052345 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -loomchild/flask_babel_test -https://github.com/loomchild/flask_babel_test -Entry file: flask_babel_test/flask_babel_test.py -Scanned: 2016-10-19 09:13:27.263075 -No vulnerabilities found. - - -antorof/restful-flask-simple -https://github.com/antorof/restful-flask-simple -Entry file: restful-flask-simple/simpleserver.py -Scanned: 2016-10-19 09:13:30.027734 -No vulnerabilities found. - - -petrgru/flask-karty-old -https://github.com/petrgru/flask-karty-old -Entry file: flask-karty-old/src/app.py -Scanned: 2016-10-19 09:13:34.169617 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -johnwook/flask-mega-tutorial -https://github.com/johnwook/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 09:13:34.676228 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AlexIskander/myFirstTaskFlask -https://github.com/AlexIskander/myFirstTaskFlask -Entry file: myFirstTaskFlask/app/__init__.py -Scanned: 2016-10-19 09:13:35.995361 -No vulnerabilities found. - - -zouzias/docker-compose-flask-example -https://github.com/zouzias/docker-compose-flask-example -Entry file: docker-compose-flask-example/app.py -Scanned: 2016-10-19 09:13:37.189284 -No vulnerabilities found. - - -padpach/flask-hello-world -https://github.com/padpach/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:13:38.168156 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -tetsuharu/flask_demo_app -https://github.com/tetsuharu/flask_demo_app -Entry file: flask_demo_app/hello.py -Scanned: 2016-10-19 09:13:40.361999 -No vulnerabilities found. - - -jpollar4/FirstFlaskSite -https://github.com/jpollar4/FirstFlaskSite -Entry file: FirstFlaskSite/hello.py -Scanned: 2016-10-19 09:13:42.576400 -No vulnerabilities found. - - -moranned/flask_api_example -https://github.com/moranned/flask_api_example -Entry file: flask_api_example/app.py -Scanned: 2016-10-19 09:13:43.763971 -Vulnerability 1: -File: flask_api_example/app.py - > User input at line 42, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flask_api_example/app.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -asldevi/flask-redis-socketio -https://github.com/asldevi/flask-redis-socketio -Entry file: flask-redis-socketio/webapp.py -Scanned: 2016-10-19 09:13:50.365510 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Domca17/flask-skeleton-karty -https://github.com/Domca17/flask-skeleton-karty -Entry file: flask-skeleton-karty/src/app.py -Scanned: 2016-10-19 09:13:56.869886 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pythonizame/flask-mongo-blog -https://github.com/pythonizame/flask-mongo-blog -Entry file: flask-mongo-blog/blog/__init__.py -Scanned: 2016-10-19 09:13:58.093201 -No vulnerabilities found. - - -SimoCi/flasktaskr-project -https://github.com/SimoCi/flasktaskr-project -Entry file: flasktaskr-project/project/__init__.py -Scanned: 2016-10-19 09:14:05.489366 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ctyneg/flaskapp_sxsw -https://github.com/ctyneg/flaskapp_sxsw -Entry file: None -Scanned: 2016-10-19 09:14:09.552077 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -efegirek/DynoCel -https://github.com/efegirek/DynoCel -Entry file: DynoCel/config/factory.py -Scanned: 2016-10-19 09:14:10.934267 -No vulnerabilities found. - - -DavidGSola/Basic-RESTful-Service-with-FLASK -https://github.com/DavidGSola/Basic-RESTful-Service-with-FLASK -Entry file: Basic-RESTful-Service-with-FLASK/practica1.py -Scanned: 2016-10-19 09:14:17.750106 -No vulnerabilities found. - - -dj80hd/konsole -https://github.com/dj80hd/konsole -Entry file: konsole/app/__init__.py -Scanned: 2016-10-19 09:14:19.328625 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GohNicho/microblog -https://github.com/GohNicho/microblog -Entry file: None -Scanned: 2016-10-19 09:14:21.858306 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -marchon/Debug-Dokku.alt-Mongodb-Flask-Python -https://github.com/marchon/Debug-Dokku.alt-Mongodb-Flask-Python -Entry file: None -Scanned: 2016-10-19 09:14:22.370297 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Akelio-zhang/sxk-microblog -https://github.com/Akelio-zhang/sxk-microblog -Entry file: None -Scanned: 2016-10-19 09:14:25.996033 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AnOctopus/imageboard -https://github.com/AnOctopus/imageboard -Entry file: imageboard/manage.py -Scanned: 2016-10-19 09:14:27.365323 -No vulnerabilities found. - - -thisissoon/FM-API -https://github.com/thisissoon/FM-API -Entry file: FM-API/fm/app.py -Scanned: 2016-10-19 09:14:30.697159 -No vulnerabilities found. - - -Saykar/Duty-Scheduler -https://github.com/Saykar/Duty-Scheduler -Entry file: Duty-Scheduler/duty_app/__init__.py -Scanned: 2016-10-19 09:14:32.708056 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sean-smith/api_workshop -https://github.com/sean-smith/api_workshop -Entry file: api_workshop/api.py -Scanned: 2016-10-19 09:14:33.979270 -No vulnerabilities found. - - -bnjmnjhnsn/pyServe -https://github.com/bnjmnjhnsn/pyServe -Entry file: pyServe/server.py -Scanned: 2016-10-19 09:14:35.310937 -No vulnerabilities found. - - -ddworken/proxyVerificationService -https://github.com/ddworken/proxyVerificationService -Entry file: proxyVerificationService/proxyVerifyAPI.py -Scanned: 2016-10-19 09:14:37.087823 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rohitkrai03/py-mdserver -https://github.com/rohitkrai03/py-mdserver -Entry file: py-mdserver/mdserve/mdserve.py -Scanned: 2016-10-19 09:14:38.919907 -No vulnerabilities found. - - -no13bus/redispapa -https://github.com/no13bus/redispapa -Entry file: redispapa/run.py -Scanned: 2016-10-19 09:14:41.298609 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gwongz/flask-apiblueprint -https://github.com/gwongz/flask-apiblueprint -Entry file: flask-apiblueprint/test_apiblueprint.py -Scanned: 2016-10-19 09:14:42.659210 -No vulnerabilities found. - - -nickw444/flask-ldap3-login -https://github.com/nickw444/flask-ldap3-login -Entry file: flask-ldap3-login/ldap_app.py -Scanned: 2016-10-19 09:14:44.642829 -No vulnerabilities found. - - -shekhargulati/python-flask-docker-hello-world -https://github.com/shekhargulati/python-flask-docker-hello-world -Entry file: python-flask-docker-hello-world/app.py -Scanned: 2016-10-19 09:14:45.885247 -No vulnerabilities found. - - -DevGone/flask -https://github.com/DevGone/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:14:46.786185 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -albingeorge/flask -https://github.com/albingeorge/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:14:47.669593 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jetou/flask -https://github.com/jetou/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:14:48.574806 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ironyee/djangoish_flask -https://github.com/ironyee/djangoish_flask -Entry file: djangoish_flask/djangoish_flask/__init__.py -Scanned: 2016-10-19 09:14:59.869441 -No vulnerabilities found. - - -bitstein/Flask-GPGAuth -https://github.com/bitstein/Flask-GPGAuth -Entry file: Flask-GPGAuth/app/__init__.py -Scanned: 2016-10-19 09:15:07.262768 -No vulnerabilities found. - - -achiku/sample-flask-sqlalchemy -https://github.com/achiku/sample-flask-sqlalchemy -Entry file: None -Scanned: 2016-10-19 09:15:08.582617 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/achiku/sample-flask-sqlalchemy. - -kevin386/flaskr -https://github.com/kevin386/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:15:11.088371 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sjbitcode/flaskr -https://github.com/sjbitcode/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:15:12.570799 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shidenggui/flaskexample -https://github.com/shidenggui/flaskexample -Entry file: flaskexample/flask/flaskr.py -Scanned: 2016-10-19 09:15:18.852767 -No vulnerabilities found. - - -sheoranjs24/flaskblog -https://github.com/sheoranjs24/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 09:15:19.360293 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -flaviobarros/flaskr -https://github.com/flaviobarros/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:15:22.849247 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -boyebn/flaskepost -https://github.com/boyebn/flaskepost -Entry file: flaskepost/server.py -Scanned: 2016-10-19 09:15:25.221714 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -atkailash/flaskbook -https://github.com/atkailash/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-19 09:15:30.480489 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -npineda/flaskproject -https://github.com/npineda/flaskproject -Entry file: None -Scanned: 2016-10-19 09:15:38.607600 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jaijuneja/summarizer-flask-app -https://github.com/jaijuneja/summarizer-flask-app -Entry file: summarizer-flask-app/tldrapp/__init__.py -Scanned: 2016-10-19 09:15:40.549888 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coursemdetw/flask_project -https://github.com/coursemdetw/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-19 09:15:43.481990 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -goncharovms/flask_library -https://github.com/goncharovms/flask_library -Entry file: flask_library/app/__init__.py -Scanned: 2016-10-19 09:15:45.066318 -Vulnerability 1: -File: flask_library/app/users/views.py - > User input at line 42, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -File: flask_library/app/users/views.py - > reaches line 48, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -stekrtomas/Flask-Karty -https://github.com/stekrtomas/Flask-Karty -Entry file: Flask-Karty/src/app.py -Scanned: 2016-10-19 09:15:48.763590 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -krisalpha/flask-programs -https://github.com/krisalpha/flask-programs -Entry file: flask-programs/hello.py -Scanned: 2016-10-19 09:15:50.051269 -No vulnerabilities found. - - -michaelreid/helloworld_flask -https://github.com/michaelreid/helloworld_flask -Entry file: helloworld_flask/hello_world.py -Scanned: 2016-10-19 09:15:51.269039 -No vulnerabilities found. - - -MaraKovalcik/flask-karty -https://github.com/MaraKovalcik/flask-karty -Entry file: flask-karty/src/app.py -Scanned: 2016-10-19 09:15:52.729200 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -castleodinland/simple-flask -https://github.com/castleodinland/simple-flask -Entry file: simple-flask/flaskapp.py -Scanned: 2016-10-19 09:15:53.966955 -No vulnerabilities found. - - -mr-bigbang/flask-frame -https://github.com/mr-bigbang/flask-frame -Entry file: flask-frame/src/website/__init__.py -Scanned: 2016-10-19 09:15:55.217784 -No vulnerabilities found. - - -neuralmancer/flask-basico -https://github.com/neuralmancer/flask-basico -Entry file: flask-basico/app/__init__.py -Scanned: 2016-10-19 09:15:56.560227 -No vulnerabilities found. - - -peggykh/Flask-Jungle -https://github.com/peggykh/Flask-Jungle -Entry file: None -Scanned: 2016-10-19 09:16:00.122239 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tabee/lifx_flask -https://github.com/tabee/lifx_flask -Entry file: lifx_flask/lifx_flask.py -Scanned: 2016-10-19 09:16:01.484987 -No vulnerabilities found. - - -Sidon/rpython_flask -https://github.com/Sidon/rpython_flask -Entry file: rpython_flask/app.py -Scanned: 2016-10-19 09:16:02.682847 -No vulnerabilities found. - - -klokoSSPU/flask-tutorial -https://github.com/klokoSSPU/flask-tutorial -Entry file: None -Scanned: 2016-10-19 09:16:07.634036 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -scottik4/Flask-Database -https://github.com/scottik4/Flask-Database -Entry file: Flask-Database/src/app.py -Scanned: 2016-10-19 09:16:13.342583 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -2blesd2bstresd/flask-taskr -https://github.com/2blesd2bstresd/flask-taskr -Entry file: flask-taskr/views.py -Scanned: 2016-10-19 09:16:18.524056 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-taskr/env/lib/python2.7/genericpath.py - -srtucker22/flask-cryptogram -https://github.com/srtucker22/flask-cryptogram -Entry file: flask-cryptogram/server.py -Scanned: 2016-10-19 09:16:20.211919 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alsimoes/learning-flask -https://github.com/alsimoes/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-19 09:16:20.749748 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leejaedus/flask-boilerplate -https://github.com/leejaedus/flask-boilerplate -Entry file: flask-boilerplate/app/__init__.py -Scanned: 2016-10-19 09:16:21.942677 -No vulnerabilities found. - - -jcofta/flask-pyladies -https://github.com/jcofta/flask-pyladies -Entry file: flask-pyladies/a2/a2.py -Scanned: 2016-10-19 09:16:23.289907 -No vulnerabilities found. - - -honzinec/flask-skeleton -https://github.com/honzinec/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:16:23.831699 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/honzinec/flask-skeleton. - -sc0rp1us/flask-calc -https://github.com/sc0rp1us/flask-calc -Entry file: flask-calc/flask_calc/__init__.py -Scanned: 2016-10-19 09:16:25.026963 -No vulnerabilities found. - - -padpach/flask-blog -https://github.com/padpach/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:16:25.543729 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -archerydwd/flask_blog -https://github.com/archerydwd/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 09:16:26.037533 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -archerydwd/flask_sakila -https://github.com/archerydwd/flask_sakila -Entry file: flask_sakila/main.py -Scanned: 2016-10-19 09:16:27.964785 -No vulnerabilities found. - - -AndreasDL/mobike-flask -https://github.com/AndreasDL/mobike-flask -Entry file: mobike-flask/api.py -Scanned: 2016-10-19 09:16:29.543974 -No vulnerabilities found. - - -muya/learn-flask -https://github.com/muya/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 09:16:30.630632 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akashbhunchal/AWSAutoScalingWithF5 -https://github.com/akashbhunchal/AWSAutoScalingWithF5 -Entry file: AWSAutoScalingWithF5/app.py -Scanned: 2016-10-19 09:16:32.575378 -No vulnerabilities found. - - -Pythonideus/FlaskPackageGenerator -https://github.com/Pythonideus/FlaskPackageGenerator -Entry file: FlaskPackageGenerator/Flask_Package_Template/app/packagename/__init__.py -Scanned: 2016-10-19 09:16:33.809295 -No vulnerabilities found. - - -oilnam/flask-micro-boilerplate -https://github.com/oilnam/flask-micro-boilerplate -Entry file: flask-micro-boilerplate/app/__init__.py -Scanned: 2016-10-19 09:16:41.036702 -No vulnerabilities found. - - -dejv997/flask-skeleton-karty-master -https://github.com/dejv997/flask-skeleton-karty-master -Entry file: flask-skeleton-karty-master/src/app.py -Scanned: 2016-10-19 09:16:49.239324 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -klokoSSPU/flask-skeleton-du -https://github.com/klokoSSPU/flask-skeleton-du -Entry file: flask-skeleton-du/src/app.py -Scanned: 2016-10-19 09:16:53.104592 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -YellowSharkMT/Flask-Endpoint-Example -https://github.com/YellowSharkMT/Flask-Endpoint-Example -Entry file: Flask-Endpoint-Example/app.py -Scanned: 2016-10-19 09:16:54.326082 -No vulnerabilities found. - - -majapklm/url_shortner_using_flask -https://github.com/majapklm/url_shortner_using_flask -Entry file: url_shortner_using_flask/app/__init__.py -Scanned: 2016-10-19 09:16:55.541841 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -primary157/siteprimary157flask -https://github.com/primary157/siteprimary157flask -Entry file: siteprimary157flask/app/__init__.py -Scanned: 2016-10-19 09:16:57.338895 -No vulnerabilities found. - - -johnwook/flask-restful-todo -https://github.com/johnwook/flask-restful-todo -Entry file: flask-restful-todo/app.py -Scanned: 2016-10-19 09:16:58.594955 -Vulnerability 1: -File: flask-restful-todo/api.py - > User input at line 64, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flask-restful-todo/api.py - > Line 70: user = User(username=username) -File: flask-restful-todo/api.py - > reaches line 74, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 2: -File: flask-restful-todo/api.py - > User input at line 64, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flask-restful-todo/api.py - > Line 70: user = User(username=username) -File: flask-restful-todo/api.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: flask-restful-todo/api.py - > User input at line 80, trigger word "get(": - user = User.query.get(id) -File: flask-restful-todo/api.py - > reaches line 83, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username) - - - -chang007/flask-skeleton-karty -https://github.com/chang007/flask-skeleton-karty -Entry file: flask-skeleton-karty/src/app.py -Scanned: 2016-10-19 09:16:59.145895 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Alben26/flask-skeleton-master -https://github.com/Alben26/flask-skeleton-master -Entry file: flask-skeleton-master/src/app.py -Scanned: 2016-10-19 09:17:03.616681 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Nesta-CZ/flask-skeleton-karty -https://github.com/Nesta-CZ/flask-skeleton-karty -Entry file: flask-skeleton-karty/src/app.py -Scanned: 2016-10-19 09:17:04.114862 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jonaseck2/xyz-python-3-flask -https://github.com/jonaseck2/xyz-python-3-flask -Entry file: xyz-python-3-flask/hello_world.py -Scanned: 2016-10-19 09:17:05.322174 -No vulnerabilities found. - - -cocodrips/GAE-flask-application -https://github.com/cocodrips/GAE-flask-application -Entry file: GAE-flask-application/main.py -Scanned: 2016-10-19 09:17:09.243206 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -vikas86/python_flask_vikas -https://github.com/vikas86/python_flask_vikas -Entry file: python_flask_vikas/vikas.py -Scanned: 2016-10-19 09:17:10.582817 -No vulnerabilities found. - - -rmotr/example-flask-app -https://github.com/rmotr/example-flask-app -Entry file: example-flask-app/rmotr/app.py -Scanned: 2016-10-19 09:17:15.789021 -Vulnerability 1: -File: example-flask-app/rmotr/app.py - > User input at line 44, trigger word "form[": - name = request.form['name'] -File: example-flask-app/rmotr/app.py - > reaches line 50, trigger word "execute(": - g.db.execute('insert into courses (name, instructor, description) values (?, ?, ?)', [name, instructor, description]) - -Vulnerability 2: -File: example-flask-app/rmotr/app.py - > User input at line 45, trigger word "form[": - instructor = request.form['instructor'] -File: example-flask-app/rmotr/app.py - > reaches line 50, trigger word "execute(": - g.db.execute('insert into courses (name, instructor, description) values (?, ?, ?)', [name, instructor, description]) - -Vulnerability 3: -File: example-flask-app/rmotr/app.py - > User input at line 46, trigger word "form[": - description = request.form['description'] -File: example-flask-app/rmotr/app.py - > reaches line 50, trigger word "execute(": - g.db.execute('insert into courses (name, instructor, description) values (?, ?, ?)', [name, instructor, description]) - - - -matthewst/flask-skeleton-karty -https://github.com/matthewst/flask-skeleton-karty -Entry file: flask-skeleton-karty/src/app.py -Scanned: 2016-10-19 09:17:20.410878 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -muhammadalie/Student-App-using-flask -https://github.com/muhammadalie/Student-App-using-flask -Entry file: None -Scanned: 2016-10-19 09:17:22.666686 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/muhammadalie/Student-App-using-flask. - -wklken/flask-qrcode-demo -https://github.com/wklken/flask-qrcode-demo -Entry file: flask-qrcode-demo/run.py -Scanned: 2016-10-19 09:17:23.861497 -No vulnerabilities found. - - -AlexIskander/myFirstTaskFlask -https://github.com/AlexIskander/myFirstTaskFlask -Entry file: myFirstTaskFlask/app/__init__.py -Scanned: 2016-10-19 09:17:25.191372 -No vulnerabilities found. - - -itsyash/Microblog-Using-Flask -https://github.com/itsyash/Microblog-Using-Flask -Entry file: Microblog-Using-Flask/flaskr/flaskr.py -Scanned: 2016-10-19 09:17:26.442761 -No vulnerabilities found. - - -aguerra/flask-restful-example -https://github.com/aguerra/flask-restful-example -Entry file: flask-restful-example/app/__init__.py -Scanned: 2016-10-19 09:17:27.633388 -No vulnerabilities found. - - -ondrejsika/flask-kniha-code-examples -https://github.com/ondrejsika/flask-kniha-code-examples -Entry file: flask-kniha-code-examples/post/app.py -Scanned: 2016-10-19 09:17:28.859175 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bigbi/flask-skeleton-id -https://github.com/bigbi/flask-skeleton-id -Entry file: flask-skeleton-id/src/app.py -Scanned: 2016-10-19 09:17:33.205993 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jonaseck2/xyz-python-2-flask -https://github.com/jonaseck2/xyz-python-2-flask -Entry file: xyz-python-2-flask/hello_world.py -Scanned: 2016-10-19 09:17:34.939952 -No vulnerabilities found. - - -SHDream/flask_sample_demo -https://github.com/SHDream/flask_sample_demo -Entry file: flask_sample_demo/Blog/Blog.py -Scanned: 2016-10-19 09:17:36.176695 -No vulnerabilities found. - - -go2starr/py-flask-video-stream -https://github.com/go2starr/py-flask-video-stream -Entry file: py-flask-video-stream/server.py -Scanned: 2016-10-19 09:17:37.392709 -No vulnerabilities found. - - -muhammadalie/Url-Shortner-Using-Flask -https://github.com/muhammadalie/Url-Shortner-Using-Flask -Entry file: None -Scanned: 2016-10-19 09:17:38.718658 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/muhammadalie/Url-Shortner-Using-Flask. - -majapklm/Flask-Blog-master -https://github.com/majapklm/Flask-Blog-master -Entry file: None -Scanned: 2016-10-19 09:17:40.247266 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/majapklm/Flask-Blog-master. - -raielin/flaskr_tutorial -https://github.com/raielin/flaskr_tutorial -Entry file: flaskr_tutorial/flaskr.py -Scanned: 2016-10-19 09:17:42.609427 -No vulnerabilities found. - - -yonglin/microblog -https://github.com/yonglin/microblog -Entry file: None -Scanned: 2016-10-19 09:17:44.160043 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -evanscottgray/slackwow -https://github.com/evanscottgray/slackwow -Entry file: slackwow/app.py -Scanned: 2016-10-19 09:17:47.397053 -No vulnerabilities found. - - -pegahkh/MonksJungle -https://github.com/pegahkh/MonksJungle -Entry file: None -Scanned: 2016-10-19 09:17:54.899709 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mennanov/todilo -https://github.com/mennanov/todilo -Entry file: todilo/app.py -Scanned: 2016-10-19 09:17:56.383932 -No vulnerabilities found. - - -christophervalles/backend-skeleton -https://github.com/christophervalles/backend-skeleton -Entry file: None -Scanned: 2016-10-19 09:17:57.710592 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/christophervalles/backend-skeleton. - -joeknows718/718Digital -https://github.com/joeknows718/718Digital -Entry file: 718Digital/app/__init__.py -Scanned: 2016-10-19 09:17:59.456650 -No vulnerabilities found. - - -tdanford/ga4gh-flask-api -https://github.com/tdanford/ga4gh-flask-api -Entry file: ga4gh-flask-api/ga4gh_service.py -Scanned: 2016-10-19 09:18:00.677818 -No vulnerabilities found. - - -muhammadalie/Twitter-Tweets-Extractor-Using-Flask -https://github.com/muhammadalie/Twitter-Tweets-Extractor-Using-Flask -Entry file: None -Scanned: 2016-10-19 09:18:01.986688 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/muhammadalie/Twitter-Tweets-Extractor-Using-Flask. - -przemyslawjanpietrzak/pyLadiesWorkshops3Flask -https://github.com/przemyslawjanpietrzak/pyLadiesWorkshops3Flask -Entry file: pyLadiesWorkshops3Flask/app.py -Scanned: 2016-10-19 09:18:03.312722 -No vulnerabilities found. - - -muhammadalie/Github-Repo-Extractor-using-Flask- -https://github.com/muhammadalie/Github-Repo-Extractor-using-Flask- -Entry file: None -Scanned: 2016-10-19 09:18:04.648589 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/muhammadalie/Github-Repo-Extractor-using-Flask-. - -tuvokki/data-api -https://github.com/tuvokki/data-api -Entry file: data-api/app.py -Scanned: 2016-10-19 09:18:07.586317 -No vulnerabilities found. - - -Winterflower/microblog -https://github.com/Winterflower/microblog -Entry file: None -Scanned: 2016-10-19 09:18:08.084939 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -htimstyler/GarageDoors -https://github.com/htimstyler/GarageDoors -Entry file: GarageDoors/GarageDoors.py -Scanned: 2016-10-19 09:18:09.320447 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TomBaxter/sandbox -https://github.com/TomBaxter/sandbox -Entry file: sandbox/sched/app.py -Scanned: 2016-10-19 09:18:11.586323 -No vulnerabilities found. - - -htimstyler/GarageControl -https://github.com/htimstyler/GarageControl -Entry file: GarageControl/GarageControl_02.py -Scanned: 2016-10-19 09:18:16.834077 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cshg/HNY_flaskr_eg -https://github.com/cshg/HNY_flaskr_eg -Entry file: HNY_flaskr_eg/flaskr.py -Scanned: 2016-10-19 09:18:22.051897 -No vulnerabilities found. - - -muhammadalie/Github-Repo-Extractor-using-Flask-Using-API -https://github.com/muhammadalie/Github-Repo-Extractor-using-Flask-Using-API -Entry file: None -Scanned: 2016-10-19 09:18:24.380592 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/muhammadalie/Github-Repo-Extractor-using-Flask-Using-API. - -LEWASatVT/leapi -https://github.com/LEWASatVT/leapi -Entry file: leapi/leapi/__init__.py -Scanned: 2016-10-19 09:18:25.939855 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miguelgrinberg/flask-pycon2015 -https://github.com/miguelgrinberg/flask-pycon2015 -Entry file: flask-pycon2015/app.py -Scanned: 2016-10-19 09:18:28.703558 -No vulnerabilities found. - - -IBM-Bluemix/python-hello-world-flask -https://github.com/IBM-Bluemix/python-hello-world-flask -Entry file: python-hello-world-flask/hello.py -Scanned: 2016-10-19 09:18:30.084638 -No vulnerabilities found. - - -JackStouffer/cookiecutter-Flask-Foundation -https://github.com/JackStouffer/cookiecutter-Flask-Foundation -Entry file: cookiecutter-Flask-Foundation/{{cookiecutter.repo_name}}/{{cookiecutter.repo_name}}/__init__.py -Scanned: 2016-10-19 09:18:32.780896 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cjoseph246/flask -https://github.com/cjoseph246/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:18:33.695320 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -lrolaz/flask -https://github.com/lrolaz/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:18:35.566794 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -madhav06/Flask -https://github.com/madhav06/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:18:36.171709 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jmccormack200/Flask -https://github.com/jmccormack200/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:18:36.741768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gkw/seotool -https://github.com/gkw/seotool -Entry file: seotool/webapp/__init__.py -Scanned: 2016-10-19 09:18:40.487664 -No vulnerabilities found. - - -soundslike/soundslike-server -https://github.com/soundslike/soundslike-server -Entry file: soundslike-server/app/__init__.py -Scanned: 2016-10-19 09:18:41.851725 -No vulnerabilities found. - - -rmed/flask_template -https://github.com/rmed/flask_template -Entry file: None -Scanned: 2016-10-19 09:18:46.558716 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rmed/flask_template. - -wangxunxun/flasktest -https://github.com/wangxunxun/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 09:18:48.073040 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -annanymouse/flaskproject -https://github.com/annanymouse/flaskproject -Entry file: None -Scanned: 2016-10-19 09:18:52.569989 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bot11/flasksample -https://github.com/bot11/flasksample -Entry file: flasksample/app/__init__.py -Scanned: 2016-10-19 09:18:57.817896 -No vulnerabilities found. - - -wangxunxun/flaskweb -https://github.com/wangxunxun/flaskweb -Entry file: flaskweb/app/__init__.py -Scanned: 2016-10-19 09:19:01.817844 -No vulnerabilities found. - - -huangnauh/flaskblog -https://github.com/huangnauh/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 09:19:02.340237 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -raywong702/flaskr -https://github.com/raywong702/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:19:02.831428 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -feeneyp/flaskhelloworld -https://github.com/feeneyp/flaskhelloworld -Entry file: flaskhelloworld/hello_world.py -Scanned: 2016-10-19 09:19:04.099038 -No vulnerabilities found. - - -boyebn/flaskepost -https://github.com/boyebn/flaskepost -Entry file: flaskepost/server.py -Scanned: 2016-10-19 09:19:04.592319 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -atkailash/flaskbook -https://github.com/atkailash/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-19 09:19:06.622932 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -cristobalrosa/flaskapps -https://github.com/cristobalrosa/flaskapps -Entry file: flaskapps/testgoogleauth/app/__init__.py -Scanned: 2016-10-19 09:19:09.937541 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gangeshwark/Travel -https://github.com/gangeshwark/Travel -Entry file: Travel/main.py -Scanned: 2016-10-19 09:19:24.422707 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bprinty/flask-starter -https://github.com/bprinty/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-19 09:19:24.911850 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bradyz/flask-stuff -https://github.com/bradyz/flask-stuff -Entry file: flask-stuff/app.py -Scanned: 2016-10-19 09:19:26.134262 -No vulnerabilities found. - - -jessicastewart-adroll/flask-experiments -https://github.com/jessicastewart-adroll/flask-experiments -Entry file: flask-experiments/8_1_heroku/hello.py -Scanned: 2016-10-19 09:19:27.516641 -No vulnerabilities found. - - -Allenliu0703/flask-UI- -https://github.com/Allenliu0703/flask-UI- -Entry file: flask-UI-/webserver.py -Scanned: 2016-10-19 09:19:30.669542 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -r0b0ticus/flask-kickstart -https://github.com/r0b0ticus/flask-kickstart -Entry file: flask-kickstart/kickstart.py -Scanned: 2016-10-19 09:19:32.586730 -No vulnerabilities found. - - -torrange/Flask-Polymer -https://github.com/torrange/Flask-Polymer -Entry file: Flask-Polymer/app.py -Scanned: 2016-10-19 09:19:36.410085 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Polymer/venv/lib/python2.7/genericpath.py - -neuralmancer/flask-basico -https://github.com/neuralmancer/flask-basico -Entry file: flask-basico/app/__init__.py -Scanned: 2016-10-19 09:19:37.759216 -No vulnerabilities found. - - -jyt109/flask_upload -https://github.com/jyt109/flask_upload -Entry file: flask_upload/app.py -Scanned: 2016-10-19 09:19:38.978977 -No vulnerabilities found. - - -jcsaaddupuy/cookiecutter-flask -https://github.com/jcsaaddupuy/cookiecutter-flask -Entry file: None -Scanned: 2016-10-19 09:19:40.336129 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jcsaaddupuy/cookiecutter-flask. - -ibivibiv/flask_rpi -https://github.com/ibivibiv/flask_rpi -Entry file: flask_rpi/rpi_server/app.py -Scanned: 2016-10-19 09:19:41.544144 -No vulnerabilities found. - - -stefanlegg/flask-social -https://github.com/stefanlegg/flask-social -Entry file: flask-social/app.py -Scanned: 2016-10-19 09:19:42.750344 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bwainstock/leaflet-flask -https://github.com/bwainstock/leaflet-flask -Entry file: leaflet-flask/app/__init__.py -Scanned: 2016-10-19 09:19:44.421945 -No vulnerabilities found. - - -plantin/microblog-flask -https://github.com/plantin/microblog-flask -Entry file: microblog-flask/app/__init__.py -Scanned: 2016-10-19 09:19:45.746350 -No vulnerabilities found. - - -Bfat-boy/learn-flask -https://github.com/Bfat-boy/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 09:19:46.358888 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jcofta/flask-pyladies -https://github.com/jcofta/flask-pyladies -Entry file: flask-pyladies/a2/a2.py -Scanned: 2016-10-19 09:19:47.675540 -No vulnerabilities found. - - -luismoramedina/hello-flask -https://github.com/luismoramedina/hello-flask -Entry file: hello-flask/helloflask.py -Scanned: 2016-10-19 09:19:48.917175 -No vulnerabilities found. - - -tntC4stl3/Learn-Flask -https://github.com/tntC4stl3/Learn-Flask -Entry file: Learn-Flask/microblog/app/__init__.py -Scanned: 2016-10-19 09:19:51.168216 -No vulnerabilities found. - - -curiosityandlearn/blog -https://github.com/curiosityandlearn/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 09:19:51.661021 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AndrewTse/WordGame -https://github.com/AndrewTse/WordGame -Entry file: WordGame/readingInFromFile.py -Scanned: 2016-10-19 09:19:58.393032 -No vulnerabilities found. - - -russomi/slask-app -https://github.com/russomi/slask-app -Entry file: slask-app/main.py -Scanned: 2016-10-19 09:20:00.001173 -No vulnerabilities found. - - -jhishan/link-extractor -https://github.com/jhishan/link-extractor -Entry file: link-extractor/handlers.py -Scanned: 2016-10-19 09:20:01.671467 -No vulnerabilities found. - - -SmartMammal/Flask_hello_world -https://github.com/SmartMammal/Flask_hello_world -Entry file: Flask_hello_world/run.py -Scanned: 2016-10-19 09:20:07.359758 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_hello_world/env/lib/python2.7/genericpath.py - -anyTV/python-flask-project-structure -https://github.com/anyTV/python-flask-project-structure -Entry file: None -Scanned: 2016-10-19 09:20:08.694390 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/anyTV/python-flask-project-structure. - -ibrahim12/flask-s3-bower -https://github.com/ibrahim12/flask-s3-bower -Entry file: flask-s3-bower/tests/test_flask_static.py -Scanned: 2016-10-19 09:20:10.146529 -No vulnerabilities found. - - -themouli/Flask-S3-Uploader -https://github.com/themouli/Flask-S3-Uploader -Entry file: Flask-S3-Uploader/app.py -Scanned: 2016-10-19 09:20:11.476068 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shinson/flask_aid_calculator -https://github.com/shinson/flask_aid_calculator -Entry file: flask_aid_calculator/flask_app.py -Scanned: 2016-10-19 09:20:12.854200 -No vulnerabilities found. - - -vitalk/flask-styleguide-example -https://github.com/vitalk/flask-styleguide-example -Entry file: flask-styleguide-example/app/app.py -Scanned: 2016-10-19 09:20:14.789257 -No vulnerabilities found. - - -richardasaurus/flask-view-cache -https://github.com/richardasaurus/flask-view-cache -Entry file: flask-view-cache/src/tests/test_decorator.py -Scanned: 2016-10-19 09:20:16.005992 -No vulnerabilities found. - - -vikas86/python_flask_vikas -https://github.com/vikas86/python_flask_vikas -Entry file: python_flask_vikas/vikas.py -Scanned: 2016-10-19 09:20:27.247875 -No vulnerabilities found. - - -CTTV/docker-flask-uwsgi -https://github.com/CTTV/docker-flask-uwsgi -Entry file: docker-flask-uwsgi/src/manage.py -Scanned: 2016-10-19 09:20:28.499417 -No vulnerabilities found. - - -ZCT/flask-whoosh-jieba -https://github.com/ZCT/flask-whoosh-jieba -Entry file: flask-whoosh-jieba/searchPage.py -Scanned: 2016-10-19 09:20:30.327438 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DamienCasoni/flask-hello-world -https://github.com/DamienCasoni/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:20:30.873808 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -PerryBhandal/LearnFlaskAdmin -https://github.com/PerryBhandal/LearnFlaskAdmin -Entry file: LearnFlaskAdmin/app/__init__.py -Scanned: 2016-10-19 09:20:33.203922 -No vulnerabilities found. - - -tryer3000/flask-hands-on -https://github.com/tryer3000/flask-hands-on -Entry file: flask-hands-on/app/__init__.py -Scanned: 2016-10-19 09:20:35.577037 -No vulnerabilities found. - - -mahbubme/Flask-Web-Development -https://github.com/mahbubme/Flask-Web-Development -Entry file: Flask-Web-Development/2.5example/hello.py -Scanned: 2016-10-19 09:20:40.579249 -No vulnerabilities found. - - -plopp/simple-flask-auth -https://github.com/plopp/simple-flask-auth -Entry file: simple-flask-auth/main.py -Scanned: 2016-10-19 09:20:41.930465 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arvinls/learn_flask-web -https://github.com/arvinls/learn_flask-web -Entry file: learn_flask-web/app/__init__.py -Scanned: 2016-10-19 09:20:47.550669 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thomasleveil/docker-flask-sockets -https://github.com/thomasleveil/docker-flask-sockets -Entry file: docker-flask-sockets/server.py -Scanned: 2016-10-19 09:20:48.762442 -No vulnerabilities found. - - -syn-ful/flask-hello-world -https://github.com/syn-ful/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:20:49.288474 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -willcraft/flask_sample01 -https://github.com/willcraft/flask_sample01 -Entry file: flask_sample01/app.py -Scanned: 2016-10-19 09:20:50.527545 -No vulnerabilities found. - - -x89/naycms -https://github.com/x89/naycms -Entry file: naycms/test.py -Scanned: 2016-10-19 09:20:51.761164 -No vulnerabilities found. - - -burness/burnessweibo -https://github.com/burness/burnessweibo -Entry file: burnessweibo/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-19 09:20:56.873519 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Huangtuzhi/GoLink -https://github.com/Huangtuzhi/GoLink -Entry file: GoLink/www/index.py -Scanned: 2016-10-19 09:20:58.696248 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -george-s/joke_assistant_web -https://github.com/george-s/joke_assistant_web -Entry file: None -Scanned: 2016-10-19 09:21:20.146828 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/george-s/joke_assistant_web. - -yubang/cms -https://github.com/yubang/cms -Entry file: None -Scanned: 2016-10-19 09:21:21.625744 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yubang/cms. - -TomBaxter/sandbox -https://github.com/TomBaxter/sandbox -Entry file: sandbox/sched/app.py -Scanned: 2016-10-19 09:21:23.823425 -No vulnerabilities found. - - -mbasanta/QR5Server -https://github.com/mbasanta/QR5Server -Entry file: QR5Server/qr5server/__init__.py -Scanned: 2016-10-19 09:21:25.301185 -Vulnerability 1: -File: QR5Server/qr5server/apiroutes.py - > User input at line 25, trigger word "get(": - datapage = QR5Record.query.paginate(page, app.config.get('RECORDS_PER_PAGE'), True) -Reassigned in: - File: QR5Server/qr5server/apiroutes.py - > Line 29: next_page = datapage.has_nextdatapage.next_num-1 - File: QR5Server/qr5server/apiroutes.py - > Line 30: prev_page = datapage.has_prevdatapage.prev_num-1 -File: QR5Server/qr5server/apiroutes.py - > reaches line 32, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('records''next_num''prev_num''items''pages'[item.to_dict for item in datapage.items]next_pageprev_pagedatapage.totaldatapage.pages) - - - -donalcarpenter/lolcatfancier -https://github.com/donalcarpenter/lolcatfancier -Entry file: lolcatfancier/app.py -Scanned: 2016-10-19 09:21:26.814876 -Vulnerability 1: -File: lolcatfancier/views.py - > User input at line 135, trigger word ".data": - cat.title = form.title.data -File: lolcatfancier/views.py - > reaches line 150, trigger word "flash(": - flash(flash_message.format(cat.title), 'success') - - - -coursemdetw/flaskr_on_openshift -https://github.com/coursemdetw/flaskr_on_openshift -Entry file: flaskr_on_openshift/wsgi/flaskr.py -Scanned: 2016-10-19 09:21:28.132052 -No vulnerabilities found. - - -Kaiyuanliu/simple-message-board -https://github.com/Kaiyuanliu/simple-message-board -Entry file: simple-message-board/app/__init__.py -Scanned: 2016-10-19 09:21:29.988874 -No vulnerabilities found. - - -stevesark/microblog -https://github.com/stevesark/microblog -Entry file: None -Scanned: 2016-10-19 09:21:30.491218 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -d9w/webite -https://github.com/d9w/webite -Entry file: webite/app/app.py -Scanned: 2016-10-19 09:21:32.254931 -No vulnerabilities found. - - -michaelreid/blogful -https://github.com/michaelreid/blogful -Entry file: blogful/blog/__init__.py -Scanned: 2016-10-19 09:21:33.614240 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jizhang/recommend-api-mock -https://github.com/jizhang/recommend-api-mock -Entry file: recommend-api-mock/recommend_api_mock/__init__.py -Scanned: 2016-10-19 09:21:34.937842 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JKhublal/RideCloud -https://github.com/JKhublal/RideCloud -Entry file: RideCloud/ridecloud.py -Scanned: 2016-10-19 09:21:36.924174 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jsafrit/microblog -https://github.com/jsafrit/microblog -Entry file: None -Scanned: 2016-10-19 09:21:37.424771 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mtamer/Secure-Authentication -https://github.com/mtamer/Secure-Authentication -Entry file: Secure-Authentication/login/lab01/__init__.py -Scanned: 2016-10-19 09:21:41.722799 -No vulnerabilities found. - - -gbrennon/pycangaco -https://github.com/gbrennon/pycangaco -Entry file: pycangaco/rest/api/__init__.py -Scanned: 2016-10-19 09:21:45.359794 -No vulnerabilities found. - - -harry528tt/Menu_Management_System -https://github.com/harry528tt/Menu_Management_System -Entry file: Menu_Management_System/restaurant_menu_system.py -Scanned: 2016-10-19 09:21:46.691713 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -part1zano/paste -https://github.com/part1zano/paste -Entry file: paste/app.py -Scanned: 2016-10-19 09:21:48.238444 -No vulnerabilities found. - - -rahulkhengare/letschat -https://github.com/rahulkhengare/letschat -Entry file: letschat/app/__init__.py -Scanned: 2016-10-19 09:21:52.474726 -No vulnerabilities found. - - -theworkingcomputer/twc_web -https://github.com/theworkingcomputer/twc_web -Entry file: twc_web/src/lib/flask/sessions.py -Scanned: 2016-10-19 09:21:54.856052 -No vulnerabilities found. - - -mikehking/anniversary_endurance -https://github.com/mikehking/anniversary_endurance -Entry file: anniversary_endurance/app.py -Scanned: 2016-10-19 09:21:58.439945 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: anniversary_endurance/venv/lib/python2.7/genericpath.py - -prohorse/papmg -https://github.com/prohorse/papmg -Entry file: papmg/app/__init__.py -Scanned: 2016-10-19 09:21:59.805150 -No vulnerabilities found. - - -zd123/plot-app -https://github.com/zd123/plot-app -Entry file: plot-app/myapp.py -Scanned: 2016-10-19 09:22:01.487981 -No vulnerabilities found. - - -garettmd/microblog -https://github.com/garettmd/microblog -Entry file: None -Scanned: 2016-10-19 09:22:01.995842 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wkcn/ApplyClassRoom -https://github.com/wkcn/ApplyClassRoom -Entry file: None -Scanned: 2016-10-19 09:22:03.522496 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -davidcrosby/microblog -https://github.com/davidcrosby/microblog -Entry file: None -Scanned: 2016-10-19 09:22:04.006835 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -miguelgrinberg/flask-pycon2015 -https://github.com/miguelgrinberg/flask-pycon2015 -Entry file: flask-pycon2015/app.py -Scanned: 2016-10-19 09:22:06.463259 -No vulnerabilities found. - - -IBM-Bluemix/python-hello-world-flask -https://github.com/IBM-Bluemix/python-hello-world-flask -Entry file: python-hello-world-flask/hello.py -Scanned: 2016-10-19 09:22:22.864483 -No vulnerabilities found. - - -JackStouffer/cookiecutter-Flask-Foundation -https://github.com/JackStouffer/cookiecutter-Flask-Foundation -Entry file: cookiecutter-Flask-Foundation/{{cookiecutter.repo_name}}/{{cookiecutter.repo_name}}/__init__.py -Scanned: 2016-10-19 09:22:23.354794 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cjoseph246/flask -https://github.com/cjoseph246/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:22:26.688484 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -lrolaz/flask -https://github.com/lrolaz/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:22:27.609822 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jonparrott/flask-ferris-example -https://github.com/jonparrott/flask-ferris-example -Entry file: flask-ferris-example/main.py -Scanned: 2016-10-19 09:22:29.444237 -No vulnerabilities found. - - -getting-started-md/python-flask -https://github.com/getting-started-md/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-19 09:22:30.004926 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dukepure/flaskdemo -https://github.com/dukepure/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 09:22:30.551894 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -cristobalrosa/flaskapps -https://github.com/cristobalrosa/flaskapps -Entry file: flaskapps/testgoogleauth/app/__init__.py -Scanned: 2016-10-19 09:22:32.078394 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JoshuaAcosta/flasktaskr -https://github.com/JoshuaAcosta/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:22:32.577409 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -JoshAddington/flaskplay -https://github.com/JoshAddington/flaskplay -Entry file: flaskplay/app.py -Scanned: 2016-10-19 09:22:35.549686 -No vulnerabilities found. - - -razage/flaskbooru -https://github.com/razage/flaskbooru -Entry file: flaskbooru/app/__init__.py -Scanned: 2016-10-19 09:22:36.934657 -No vulnerabilities found. - - -sgray10/flask-restful-auth-microservice -https://github.com/sgray10/flask-restful-auth-microservice -Entry file: flask-restful-auth-microservice/app/__init__.py -Scanned: 2016-10-19 09:22:38.154171 -No vulnerabilities found. - - -Munk801/FlaskTasks -https://github.com/Munk801/FlaskTasks -Entry file: FlaskTasks/views.py -Scanned: 2016-10-19 09:22:39.385736 -No vulnerabilities found. - - -NearTan/FlaskTutorial -https://github.com/NearTan/FlaskTutorial -Entry file: None -Scanned: 2016-10-19 09:22:39.894412 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ThrowsException/FlaskHmac -https://github.com/ThrowsException/FlaskHmac -Entry file: FlaskHmac/app.py -Scanned: 2016-10-19 09:22:44.143807 -No vulnerabilities found. - - -vishwanath79/FlaskBlogger -https://github.com/vishwanath79/FlaskBlogger -Entry file: None -Scanned: 2016-10-19 09:22:48.694614 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -roblayton/flask-restful -https://github.com/roblayton/flask-restful -Entry file: flask-restful/flask_restful/__init__.py -Scanned: 2016-10-19 09:22:49.747261 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -callumStudent/learning-flask -https://github.com/callumStudent/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-19 09:22:50.280739 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rncry/flask_service -https://github.com/rncry/flask_service -Entry file: flask_service/flask_service.py -Scanned: 2016-10-19 09:22:55.522910 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seyriz/flask-naver -https://github.com/seyriz/flask-naver -Entry file: flask-naver/test.py -Scanned: 2016-10-19 09:22:57.894817 -No vulnerabilities found. - - -Nevyn2345/flask_tutorial -https://github.com/Nevyn2345/flask_tutorial -Entry file: None -Scanned: 2016-10-19 09:23:04.740929 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MissiaL/Flask-Monitoring -https://github.com/MissiaL/Flask-Monitoring -Entry file: Flask-Monitoring/server.py -Scanned: 2016-10-19 09:23:06.261531 -No vulnerabilities found. - - -jessicastewart-adroll/flask-experiments -https://github.com/jessicastewart-adroll/flask-experiments -Entry file: flask-experiments/8_1_heroku/hello.py -Scanned: 2016-10-19 09:23:07.639319 -No vulnerabilities found. - - -r0b0ticus/flask-kickstart -https://github.com/r0b0ticus/flask-kickstart -Entry file: flask-kickstart/kickstart.py -Scanned: 2016-10-19 09:23:08.859093 -No vulnerabilities found. - - -yowenter/flask-test -https://github.com/yowenter/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 09:23:09.861344 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -mjhea0/flask-blog -https://github.com/mjhea0/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:23:10.392351 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -QianPeili/flask_learning -https://github.com/QianPeili/flask_learning -Entry file: flask_learning/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-19 09:23:28.070847 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shrayasr/teaching-flask -https://github.com/shrayasr/teaching-flask -Entry file: teaching-flask/app.py -Scanned: 2016-10-19 09:23:29.312478 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cponeill/DataFlask -https://github.com/cponeill/DataFlask -Entry file: DataFlask/app.py -Scanned: 2016-10-19 09:23:32.376652 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: DataFlask/env/lib/python2.7/genericpath.py - -Munk801/HelloFlask -https://github.com/Munk801/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-19 09:23:33.431989 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iancarv/base-flask -https://github.com/iancarv/base-flask -Entry file: base-flask/app/__init__.py -Scanned: 2016-10-19 09:23:34.681922 -No vulnerabilities found. - - -lgaticaq/flask-tbk -https://github.com/lgaticaq/flask-tbk -Entry file: flask-tbk/index.py -Scanned: 2016-10-19 09:23:35.919053 -No vulnerabilities found. - - -bbertka/mitrend-flask -https://github.com/bbertka/mitrend-flask -Entry file: None -Scanned: 2016-10-19 09:23:37.171926 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bbertka/mitrend-flask. - -reniwiner/Register_flask -https://github.com/reniwiner/Register_flask -Entry file: Register_flask/Register.py -Scanned: 2016-10-19 09:23:38.427620 -No vulnerabilities found. - - -corbincavolt/flask-starter -https://github.com/corbincavolt/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-19 09:23:38.925617 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aankit/flask_boilerplate -https://github.com/aankit/flask_boilerplate -Entry file: flask_boilerplate/application/__init__.py -Scanned: 2016-10-19 09:23:40.717302 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davidmb91/tuto-flask -https://github.com/davidmb91/tuto-flask -Entry file: tuto-flask/helloworld.py -Scanned: 2016-10-19 09:23:43.597228 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: tuto-flask/flask/lib/python2.7/genericpath.py - -ekiscrim/appimgurl -https://github.com/ekiscrim/appimgurl -Entry file: None -Scanned: 2016-10-19 09:23:48.038521 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SmartMammal/Flask_hello_world -https://github.com/SmartMammal/Flask_hello_world -Entry file: Flask_hello_world/run.py -Scanned: 2016-10-19 09:23:49.060220 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_hello_world/env/lib/python2.7/genericpath.py - -mahbubme/Flask-Blog-Application -https://github.com/mahbubme/Flask-Blog-Application -Entry file: Flask-Blog-Application/app/__init__.py -Scanned: 2016-10-19 09:23:50.588543 -No vulnerabilities found. - - -kmorrison/flask-gae-cookiecutter -https://github.com/kmorrison/flask-gae-cookiecutter -Entry file: flask-gae-cookiecutter/{{cookiecutter.repo_name}}/main.py -Scanned: 2016-10-19 09:23:51.943336 -No vulnerabilities found. - - -abhaykoduru/flask-hello-world -https://github.com/abhaykoduru/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:23:52.471537 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -AnryYang/flask_easy_blog -https://github.com/AnryYang/flask_easy_blog -Entry file: flask_easy_blog/views.py -Scanned: 2016-10-19 09:23:54.285030 -No vulnerabilities found. - - -LoganRickert/Python-Flask-Example1 -https://github.com/LoganRickert/Python-Flask-Example1 -Entry file: Python-Flask-Example1/simple_app.py -Scanned: 2016-10-19 09:23:59.101719 -No vulnerabilities found. - - -TangentSolutions/Flask-Service-Base -https://github.com/TangentSolutions/Flask-Service-Base -Entry file: Flask-Service-Base/service.py -Scanned: 2016-10-19 09:24:02.472020 -No vulnerabilities found. - - -richardasaurus/flask-view-cache -https://github.com/richardasaurus/flask-view-cache -Entry file: flask-view-cache/src/tests/test_decorator.py -Scanned: 2016-10-19 09:24:07.684818 -No vulnerabilities found. - - -tathagatnawadia/Flask-Time-Travel -https://github.com/tathagatnawadia/Flask-Time-Travel -Entry file: Flask-Time-Travel/main.py -Scanned: 2016-10-19 09:24:14.358176 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sim13/Flask-Server-Practice -https://github.com/sim13/Flask-Server-Practice -Entry file: Flask-Server-Practice/hello.py -Scanned: 2016-10-19 09:24:29.951822 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Slickness/NewFlaskRandy -https://github.com/Slickness/NewFlaskRandy -Entry file: NewFlaskRandy/hello.py -Scanned: 2016-10-19 09:24:31.943721 -No vulnerabilities found. - - -tiagoamemiya/python-flask-app -https://github.com/tiagoamemiya/python-flask-app -Entry file: python-flask-app/app.py -Scanned: 2016-10-19 09:24:36.500546 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-app/venv/lib/python2.7/genericpath.py - -sebgoa/hostname -https://github.com/sebgoa/hostname -Entry file: hostname/hello.py -Scanned: 2016-10-19 09:24:38.188550 -No vulnerabilities found. - - -mcruger/MicroBlog -https://github.com/mcruger/MicroBlog -Entry file: None -Scanned: 2016-10-19 09:24:44.164877 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nkthakur48/helloflask -https://github.com/nkthakur48/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 09:24:44.676413 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -philmui/simpleflask -https://github.com/philmui/simpleflask -Entry file: simpleflask/flask-example.py -Scanned: 2016-10-19 09:24:45.894767 -No vulnerabilities found. - - -qianka/qianka-flaskext -https://github.com/qianka/qianka-flaskext -Entry file: qianka-flaskext/qianka/flaskext/sqlalchemy.py -Scanned: 2016-10-19 09:24:47.236873 -No vulnerabilities found. - - -rgisiger/HES-SO_smarthepia-flask-zwave -https://github.com/rgisiger/HES-SO_smarthepia-flask-zwave -Entry file: HES-SO_smarthepia-flask-zwave/flask-main.py -Scanned: 2016-10-19 09:24:49.092861 -No vulnerabilities found. - - -ekiscrim/blog -https://github.com/ekiscrim/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 09:24:49.609277 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lonefreak/simple-python-hello -https://github.com/lonefreak/simple-python-hello -Entry file: simple-python-hello/hello.py -Scanned: 2016-10-19 09:24:50.812693 -No vulnerabilities found. - - -MichaMucha/math_ws -https://github.com/MichaMucha/math_ws -Entry file: math_ws/math_ws.py -Scanned: 2016-10-19 09:24:52.024023 -No vulnerabilities found. - - -jwestgard/elk -https://github.com/jwestgard/elk -Entry file: elk/elk.py -Scanned: 2016-10-19 09:24:53.243414 -No vulnerabilities found. - - -lzha5646/info9117_flaskr-master -https://github.com/lzha5646/info9117_flaskr-master -Entry file: info9117_flaskr-master/flaskr.py -Scanned: 2016-10-19 09:24:54.588433 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dawedawe/feedpflaster -https://github.com/dawedawe/feedpflaster -Entry file: feedpflaster/app/__init__.py -Scanned: 2016-10-19 09:24:55.821152 -No vulnerabilities found. - - -sergeio/docker_multiflask_server -https://github.com/sergeio/docker_multiflask_server -Entry file: None -Scanned: 2016-10-19 09:24:57.351247 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sergeio/docker_multiflask_server. - -acannon828/CrowdCapellaBackend -https://github.com/acannon828/CrowdCapellaBackend -Entry file: None -Scanned: 2016-10-19 09:25:03.109768 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/acannon828/CrowdCapellaBackend. - -jinpark/imageresizer -https://github.com/jinpark/imageresizer -Entry file: imageresizer/app.py -Scanned: 2016-10-19 09:25:04.460817 -Vulnerability 1: -File: imageresizer/app.py - > User input at line 71, trigger word "get(": - img = resize(img, query_string.get('rwidth'), query_string.get('rheight')) -Reassigned in: - File: imageresizer/app.py - > Line 73: img = crop(img, query_string.get('cwidth'), query_string.get('cheight'), query_string.get('gravity')) - File: imageresizer/app.py - > Line 75: temp_file = NamedTemporaryFile(mode='w+b', suffix=img.format) - File: imageresizer/app.py - > Line 79: ret_MAYBE_FUNCTION_NAME = response -File: imageresizer/app.py - > reaches line 78, trigger word "send_file(": - response = send_file(temp_file,mimetype=img.mimetype) - -Vulnerability 2: -File: imageresizer/app.py - > User input at line 73, trigger word "get(": - img = crop(img, query_string.get('cwidth'), query_string.get('cheight'), query_string.get('gravity')) -Reassigned in: - File: imageresizer/app.py - > Line 71: img = resize(img, query_string.get('rwidth'), query_string.get('rheight')) - File: imageresizer/app.py - > Line 75: temp_file = NamedTemporaryFile(mode='w+b', suffix=img.format) - File: imageresizer/app.py - > Line 79: ret_MAYBE_FUNCTION_NAME = response -File: imageresizer/app.py - > reaches line 78, trigger word "send_file(": - response = send_file(temp_file,mimetype=img.mimetype) - - - -Jackshenonly/PartyBranch -https://github.com/Jackshenonly/PartyBranch -Entry file: PartyBranch/PartyBranch_sqlite.py -Scanned: 2016-10-19 09:25:05.778380 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KajiMaster/mega-tut -https://github.com/KajiMaster/mega-tut -Entry file: mega-tut/app/__init__.py -Scanned: 2016-10-19 09:25:07.076343 -No vulnerabilities found. - - -JoeAcanfora/CrowdSite -https://github.com/JoeAcanfora/CrowdSite -Entry file: CrowdSite/flask_app.py -Scanned: 2016-10-19 09:25:08.469572 -Vulnerability 1: -File: CrowdSite/flask_app.py - > User input at line 805, trigger word ".data": - videoLength = int(str(form.videolength.data).split(':')[0]) * 60 + int(str(form.videolength.data).split(':')[1]) -Reassigned in: - File: CrowdSite/flask_app.py - > Line 798: videoLength = None - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 2: -File: CrowdSite/flask_app.py - > User input at line 812, trigger word ".data": - videoquality = form.videoquality.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 806: videoquality = None - File: CrowdSite/flask_app.py - > Line 810: videoquality = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 3: -File: CrowdSite/flask_app.py - > User input at line 818, trigger word ".data": - soldlevel = form.videoquality.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 806: soldlevel = None - File: CrowdSite/flask_app.py - > Line 816: soldlevel = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 4: -File: CrowdSite/flask_app.py - > User input at line 824, trigger word ".data": - othcompreference = form.othcompreference.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 806: othcompreference = None - File: CrowdSite/flask_app.py - > Line 822: othcompreference = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 5: -File: CrowdSite/flask_app.py - > User input at line 830, trigger word ".data": - othcompname = form.othcompname.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 806: othcompname = None - File: CrowdSite/flask_app.py - > Line 828: othcompname = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 6: -File: CrowdSite/flask_app.py - > User input at line 836, trigger word ".data": - founderschool = form.founderschool.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 806: founderschool = None - File: CrowdSite/flask_app.py - > Line 834: founderschool = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 7: -File: CrowdSite/flask_app.py - > User input at line 842, trigger word ".data": - founderschoolname = form.founderschoolname.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 806: founderschoolname = None - File: CrowdSite/flask_app.py - > Line 840: founderschoolname = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 8: -File: CrowdSite/flask_app.py - > User input at line 848, trigger word ".data": - founderstartup = form.founderstartup.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 806: founderstartup = None - File: CrowdSite/flask_app.py - > Line 846: founderstartup = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 9: -File: CrowdSite/flask_app.py - > User input at line 854, trigger word ".data": - founderstartupname = form.founderstartupname.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 852: founderstartupname = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 10: -File: CrowdSite/flask_app.py - > User input at line 860, trigger word ".data": - prototype = form.prototype.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 858: prototype = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 11: -File: CrowdSite/flask_app.py - > User input at line 866, trigger word ".data": - endorsement = form.endorsement.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 864: endorsement = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 12: -File: CrowdSite/flask_app.py - > User input at line 872, trigger word ".data": - endorsementname = form.endorsementname.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 870: endorsementname = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 13: -File: CrowdSite/flask_app.py - > User input at line 878, trigger word ".data": - music = form.music.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 876: music = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 14: -File: CrowdSite/flask_app.py - > User input at line 884, trigger word ".data": - animations = form.animations.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 882: animations = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 888: animations = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 890: animations = form.animations.data - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 15: -File: CrowdSite/flask_app.py - > User input at line 890, trigger word ".data": - animations = form.animations.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 882: animations = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 884: animations = form.animations.data - File: CrowdSite/flask_app.py - > Line 888: animations = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 16: -File: CrowdSite/flask_app.py - > User input at line 896, trigger word ".data": - patent = form.patent.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 894: patent = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 900: patent = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 902: patent = form.patent.data - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 17: -File: CrowdSite/flask_app.py - > User input at line 902, trigger word ".data": - patent = form.patent.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 894: patent = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 896: patent = form.patent.data - File: CrowdSite/flask_app.py - > Line 900: patent = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 18: -File: CrowdSite/flask_app.py - > User input at line 908, trigger word ".data": - rewardsmentioned = form.rewardsmentioned.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 906: rewardsmentioned = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 19: -File: CrowdSite/flask_app.py - > User input at line 914, trigger word ".data": - pitchfocusfounder = form.pitchfocusfounder.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 912: pitchfocusfounder = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 20: -File: CrowdSite/flask_app.py - > User input at line 920, trigger word ".data": - pitchfocustechnology = form.pitchfocustechnology.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 918: pitchfocustechnology = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 21: -File: CrowdSite/flask_app.py - > User input at line 926, trigger word ".data": - pitchfocuscustomer = form.pitchfocuscustomer.data -Reassigned in: - File: CrowdSite/flask_app.py - > Line 924: pitchfocuscustomer = c.fetchall()[0][0] - File: CrowdSite/flask_app.py - > Line 927: args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - -Vulnerability 22: -File: CrowdSite/flask_app.py - > User input at line 927, trigger word ".data": - args = (project_id, series_num, graded, str(form.graderPID.data) + regrade, videoquality, soldlevel, othcompreference, othcompname, founderschool, founderschoolname, founderstartup, founderstartupname, prototype, endorsement, endorsementname, music, animations, patent, rewardsmentioned, pitchfocusfounder, pitchfocustechnology, pitchfocuscustomer, videoLength) -File: CrowdSite/flask_app.py - > reaches line 952, trigger word "execute(": - c.execute('INSERT INTO video_grades_table (project_id, series_number, graded, graderPID, - videoquality, soldlevel, - othcompreference, othcompname, founderschool, founderschoolname, - founderstartup, founderstartupname, prototypes, endorsements, - endorsementname, music, animations, patent, - rewardsMentioned, pitchFounder, pitchTechnology, pitchCustomer, - videoLength) - VALUES(%s, %s, %s, %s, %s, %s, %s, %s, %s, %s, - %s, %s,%s,%s,%s,%s,%s,%s,%s,%s, - %s,%s,%s)', args) - - - -pzatrick/mini-weblog -https://github.com/pzatrick/mini-weblog -Entry file: mini-weblog/app/__init__.py -Scanned: 2016-10-19 09:25:20.509275 -No vulnerabilities found. - - -RobertoECruz/microblog -https://github.com/RobertoECruz/microblog -Entry file: None -Scanned: 2016-10-19 09:25:21.473445 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -peetonn/ndncon-www -https://github.com/peetonn/ndncon-www -Entry file: ndncon-www/app/main.py -Scanned: 2016-10-19 09:25:22.881432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aergener/nap_example -https://github.com/aergener/nap_example -Entry file: nap_example/app/__init__.py -Scanned: 2016-10-19 09:25:24.104942 -No vulnerabilities found. - - -nikiladonya/linter -https://github.com/nikiladonya/linter -Entry file: linter/app.py -Scanned: 2016-10-19 09:25:28.400687 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -green-latte/settle -https://github.com/green-latte/settle -Entry file: settle/config/application.py -Scanned: 2016-10-19 09:25:33.176620 -No vulnerabilities found. - - -a17levine/mint_server -https://github.com/a17levine/mint_server -Entry file: mint_server/mint_server.py -Scanned: 2016-10-19 09:25:34.443959 -No vulnerabilities found. - - -apulverizer/TweetMapping -https://github.com/apulverizer/TweetMapping -Entry file: TweetMapping/main.py -Scanned: 2016-10-19 09:25:39.135337 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -girishramnani/pox-load-finder -https://github.com/girishramnani/pox-load-finder -Entry file: pox-load-finder/loadFinder.py -Scanned: 2016-10-19 09:25:40.480255 -No vulnerabilities found. - - -indico/flask-multipass -https://github.com/indico/flask-multipass -Entry file: flask-multipass/example/example.py -Scanned: 2016-10-19 09:25:49.312964 -No vulnerabilities found. - - -gsbmac/Flask -https://github.com/gsbmac/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:25:50.292094 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seppaleinen/flask -https://github.com/seppaleinen/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:25:51.179560 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -garylawler/flask -https://github.com/garylawler/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:25:52.041574 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -calthoff/flask-orientdb -https://github.com/calthoff/flask-orientdb -Entry file: flask-orientdb/test_flask_orientdb.py -Scanned: 2016-10-19 09:25:56.448041 -No vulnerabilities found. - - -pferreir/flask-spoilerplate -https://github.com/pferreir/flask-spoilerplate -Entry file: None -Scanned: 2016-10-19 09:25:58.238550 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pferreir/flask-spoilerplate. - -perseghini/Flask_Templates -https://github.com/perseghini/Flask_Templates -Entry file: Flask_Templates/flask_templates/__init__.py -Scanned: 2016-10-19 09:26:00.568138 -No vulnerabilities found. - - -syndbg/flask-robohash -https://github.com/syndbg/flask-robohash -Entry file: flask-robohash/tests/__init__.py -Scanned: 2016-10-19 09:26:05.930644 -No vulnerabilities found. - - -carsongee/flask-htpasswd -https://github.com/carsongee/flask-htpasswd -Entry file: flask-htpasswd/tests/test_htpasswd.py -Scanned: 2016-10-19 09:26:07.298564 -No vulnerabilities found. - - -douglasstarnes/mempy-flask-heroku -https://github.com/douglasstarnes/mempy-flask-heroku -Entry file: mempy-flask-heroku/main.py -Scanned: 2016-10-19 09:26:09.384219 -No vulnerabilities found. - - -xavierornelas/flaskr -https://github.com/xavierornelas/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:26:10.361568 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andrej2704/flaskplayground -https://github.com/andrej2704/flaskplayground -Entry file: flaskplayground/flaskAuth.py -Scanned: 2016-10-19 09:26:23.601034 -Vulnerability 1: -File: flaskplayground/flaskAuth.py - > User input at line 23, trigger word "form[": - POST_USERNAME = str(request.form['username']) -File: flaskplayground/flaskAuth.py - > reaches line 28, trigger word "filter(": - query = s.query(User).filter(User.username.in_([POST_USERNAME]), User.password.in_([POST_PASSWORD])) - -Vulnerability 2: -File: flaskplayground/flaskAuth.py - > User input at line 24, trigger word "form[": - POST_PASSWORD = str(request.form['password']) -File: flaskplayground/flaskAuth.py - > reaches line 28, trigger word "filter(": - query = s.query(User).filter(User.username.in_([POST_USERNAME]), User.password.in_([POST_PASSWORD])) - - - -havid0707/flasky -https://github.com/havid0707/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 09:26:24.099113 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nnguyen012/flasktest -https://github.com/nnguyen012/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 09:26:24.609161 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jessyanjos/flaskr -https://github.com/jessyanjos/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:26:25.100605 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -superyaooo/flaskr -https://github.com/superyaooo/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:26:26.591114 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -malini-kamalambal/flasksite -https://github.com/malini-kamalambal/flasksite -Entry file: flasksite/hello.py -Scanned: 2016-10-19 09:26:31.705588 -No vulnerabilities found. - - -ardian/flaskblog -https://github.com/ardian/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 09:26:34.206831 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -luna825/flasky -https://github.com/luna825/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 09:26:34.709693 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -philmui/flasktemplate -https://github.com/philmui/flasktemplate -Entry file: flasktemplate/app/hello.py -Scanned: 2016-10-19 09:26:38.533750 -No vulnerabilities found. - - -JoshAddington/flaskplay -https://github.com/JoshAddington/flaskplay -Entry file: flaskplay/app.py -Scanned: 2016-10-19 09:26:41.540679 -No vulnerabilities found. - - -razage/flaskbooru -https://github.com/razage/flaskbooru -Entry file: flaskbooru/app/__init__.py -Scanned: 2016-10-19 09:26:42.906134 -No vulnerabilities found. - - -ronmcg/FlaskerNews -https://github.com/ronmcg/FlaskerNews -Entry file: FlaskerNews/FlaskerNews/FlaskerNews/__init__.py -Scanned: 2016-10-19 09:26:44.253141 -No vulnerabilities found. - - -BurningPixel/FlaskBin -https://github.com/BurningPixel/FlaskBin -Entry file: FlaskBin/flaskbin.py -Scanned: 2016-10-19 09:26:48.592115 -No vulnerabilities found. - - -michaelsaul/FlaskTutorial -https://github.com/michaelsaul/FlaskTutorial -Entry file: None -Scanned: 2016-10-19 09:26:49.097995 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -JishnuM/flask-angular -https://github.com/JishnuM/flask-angular -Entry file: flask-angular/app.py -Scanned: 2016-10-19 09:26:50.446000 -No vulnerabilities found. - - -sephioh/flask-learning -https://github.com/sephioh/flask-learning -Entry file: flask-learning/app.py -Scanned: 2016-10-19 09:26:51.656919 -No vulnerabilities found. - - -seyriz/flask-naver -https://github.com/seyriz/flask-naver -Entry file: flask-naver/test.py -Scanned: 2016-10-19 09:26:52.960589 -No vulnerabilities found. - - -yowenter/flask-test -https://github.com/yowenter/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 09:26:53.957246 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -mjhea0/flask-blog -https://github.com/mjhea0/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:26:54.473668 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -gbrennon/rest_flask -https://github.com/gbrennon/rest_flask -Entry file: rest_flask/api/__init__.py -Scanned: 2016-10-19 09:26:56.750209 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -alexgamas/flask-scaffolding -https://github.com/alexgamas/flask-scaffolding -Entry file: flask-scaffolding/app/__init__.py -Scanned: 2016-10-19 09:26:58.750785 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -airondumael/python_flask -https://github.com/airondumael/python_flask -Entry file: None -Scanned: 2016-10-19 09:27:02.602628 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/airondumael/python_flask. - -cyb3rD/LearnFlask -https://github.com/cyb3rD/LearnFlask -Entry file: LearnFlask/app/__init__.py -Scanned: 2016-10-19 09:27:03.895852 -No vulnerabilities found. - - -ffosilva/flask-auth -https://github.com/ffosilva/flask-auth -Entry file: flask-auth/example.py -Scanned: 2016-10-19 09:27:05.218079 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pkafei/flask-admin -https://github.com/pkafei/flask-admin -Entry file: flask-admin/app2.py -Scanned: 2016-10-19 09:27:07.442233 -No vulnerabilities found. - - -Chris-James/flask-springboard -https://github.com/Chris-James/flask-springboard -Entry file: flask-springboard/project/__init__.py -Scanned: 2016-10-19 09:27:08.798519 -No vulnerabilities found. - - -DeonHeyns/flask-generate -https://github.com/DeonHeyns/flask-generate -Entry file: flask-generate/scaffold/templates.py -Scanned: 2016-10-19 09:27:10.041014 -No vulnerabilities found. - - -mgushee/flask-catalog -https://github.com/mgushee/flask-catalog -Entry file: flask-catalog/app/flask_catalog.py -Scanned: 2016-10-19 09:27:12.378004 -No vulnerabilities found. - - -katembu/flask_tutorial -https://github.com/katembu/flask_tutorial -Entry file: None -Scanned: 2016-10-19 09:27:12.875818 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lhyfree/flask-admin -https://github.com/lhyfree/flask-admin -Entry file: flask-admin/index.py -Scanned: 2016-10-19 09:27:25.229235 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -e9wikner/flask-mediashare -https://github.com/e9wikner/flask-mediashare -Entry file: flask-mediashare/mediashare/__init__.py -Scanned: 2016-10-19 09:27:27.402748 -No vulnerabilities found. - - -kchen1025/flask_test -https://github.com/kchen1025/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 09:27:28.433385 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ekiscrim/appimgurl -https://github.com/ekiscrim/appimgurl -Entry file: None -Scanned: 2016-10-19 09:27:31.946798 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -skebix/flask-api-tutorial -https://github.com/skebix/flask-api-tutorial -Entry file: flask-api-tutorial/flask-api-tutorial.py -Scanned: 2016-10-19 09:27:36.306373 -No vulnerabilities found. - - -AnryYang/flask_easy_blog -https://github.com/AnryYang/flask_easy_blog -Entry file: flask_easy_blog/views.py -Scanned: 2016-10-19 09:27:39.031641 -No vulnerabilities found. - - -baolocdo/flask-proj-1 -https://github.com/baolocdo/flask-proj-1 -Entry file: flask-proj-1/app-folder/app.py -Scanned: 2016-10-19 09:27:42.287710 -No vulnerabilities found. - - -girishpandit88/python-flask-app -https://github.com/girishpandit88/python-flask-app -Entry file: python-flask-app/app.py -Scanned: 2016-10-19 09:27:43.827494 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-app/venv/lib/python2.7/genericpath.py - -omerkhan/flask-hello-world -https://github.com/omerkhan/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:27:45.367467 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -yggi49/flask-wtf-polyglot -https://github.com/yggi49/flask-wtf-polyglot -Entry file: flask-wtf-polyglot/tests/test_html5.py -Scanned: 2016-10-19 09:27:52.492306 -No vulnerabilities found. - - -decodigoyalgomas/Flask-Tutorial-RPG-Manager -https://github.com/decodigoyalgomas/Flask-Tutorial-RPG-Manager -Entry file: Flask-Tutorial-RPG-Manager/app/__init__.py -Scanned: 2016-10-19 09:27:53.851111 -Vulnerability 1: -File: Flask-Tutorial-RPG-Manager/app/entry/views.py - > User input at line 20, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: Flask-Tutorial-RPG-Manager/app/entry/views.py - > Line 25: existing_username = User.get(username=username) - File: Flask-Tutorial-RPG-Manager/app/entry/views.py - > Line 31: user = User(username=username, name=name, email=email, password=password) -File: Flask-Tutorial-RPG-Manager/app/entry/views.py - > reaches line 27, trigger word "flash(": - flash('Username {} already existst in the database'.format(username), 'error') - - - -kevcoxe/Simple-Flask-App -https://github.com/kevcoxe/Simple-Flask-App -Entry file: Simple-Flask-App/app.py -Scanned: 2016-10-19 09:27:57.766316 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Simple-Flask-App/venv/lib/python2.7/genericpath.py - -mattmakai/plapi-prototype-flask -https://github.com/mattmakai/plapi-prototype-flask -Entry file: plapi-prototype-flask/plapi/__init__.py -Scanned: 2016-10-19 09:27:59.167995 -No vulnerabilities found. - - -syndbg/flask-url-shortener -https://github.com/syndbg/flask-url-shortener -Entry file: flask-url-shortener/url_shortener/app.py -Scanned: 2016-10-19 09:28:00.407389 -Vulnerability 1: -File: flask-url-shortener/url_shortener/app.py - > User input at line 35, trigger word "get(": - page = data.get('page', DEFAULT_PAGE) -Reassigned in: - File: flask-url-shortener/url_shortener/app.py - > Line 38: db_result = db.Url.objects.paginate(page=page, per_page=per_page) - File: flask-url-shortener/url_shortener/app.py - > Line 39: output = [apify(r) for r in db_result] - File: flask-url-shortener/url_shortener/app.py - > Line 43: db_result = db.Url(data) - File: flask-url-shortener/url_shortener/app.py - > Line 45: output = apify(db_result) -File: flask-url-shortener/url_shortener/app.py - > reaches line 47, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(output), status_code) - -Vulnerability 2: -File: flask-url-shortener/url_shortener/app.py - > User input at line 36, trigger word "get(": - per_page = data.get('per_page', DEFAULT_PER_PAGE) -Reassigned in: - File: flask-url-shortener/url_shortener/app.py - > Line 38: db_result = db.Url.objects.paginate(page=page, per_page=per_page) - File: flask-url-shortener/url_shortener/app.py - > Line 39: output = [apify(r) for r in db_result] - File: flask-url-shortener/url_shortener/app.py - > Line 43: db_result = db.Url(data) - File: flask-url-shortener/url_shortener/app.py - > Line 45: output = apify(db_result) -File: flask-url-shortener/url_shortener/app.py - > reaches line 47, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(output), status_code) - - - -Matawhite/Hello-with-Flask -https://github.com/Matawhite/Hello-with-Flask -Entry file: Hello-with-Flask/app.py -Scanned: 2016-10-19 09:28:01.641629 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Andygmb/Generic-Flask-app -https://github.com/Andygmb/Generic-Flask-app -Entry file: Generic-Flask-app/application/__init__.py -Scanned: 2016-10-19 09:28:03.347694 -No vulnerabilities found. - - -EricSchles/high_school_flask -https://github.com/EricSchles/high_school_flask -Entry file: high_school_flask/basics/app.py -Scanned: 2016-10-19 09:28:04.685378 -No vulnerabilities found. - - -andreashuebner/flask_hello_world -https://github.com/andreashuebner/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:28:05.185937 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/andreashuebner/flask_hello_world. - -baolocdo/flask-proj-1-staging -https://github.com/baolocdo/flask-proj-1-staging -Entry file: flask-proj-1-staging/app-folder/app.py -Scanned: 2016-10-19 09:28:06.403838 -No vulnerabilities found. - - -sebgoa/hostname -https://github.com/sebgoa/hostname -Entry file: hostname/hello.py -Scanned: 2016-10-19 09:28:09.138166 -No vulnerabilities found. - - -openlabs/python-cloudfront-streaming -https://github.com/openlabs/python-cloudfront-streaming -Entry file: python-cloudfront-streaming/app.py -Scanned: 2016-10-19 09:28:10.364190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -philmui/simpleflask -https://github.com/philmui/simpleflask -Entry file: simpleflask/flask-example.py -Scanned: 2016-10-19 09:28:11.596344 -No vulnerabilities found. - - -qianka/qianka-flaskext -https://github.com/qianka/qianka-flaskext -Entry file: qianka-flaskext/qianka/flaskext/sqlalchemy.py -Scanned: 2016-10-19 09:28:16.128987 -No vulnerabilities found. - - -DavidGrey/remindify -https://github.com/DavidGrey/remindify -Entry file: remindify/main.py -Scanned: 2016-10-19 09:28:18.159703 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EricSchles/message_passing -https://github.com/EricSchles/message_passing -Entry file: message_passing/receive_app/app.py -Scanned: 2016-10-19 09:28:26.425096 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andreashuebner/blog -https://github.com/andreashuebner/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 09:28:26.908943 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scheung38/myPinClone -https://github.com/scheung38/myPinClone -Entry file: None -Scanned: 2016-10-19 09:28:28.691283 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/scheung38/myPinClone. - -dawedawe/feedpflaster -https://github.com/dawedawe/feedpflaster -Entry file: feedpflaster/app/__init__.py -Scanned: 2016-10-19 09:28:29.978912 -No vulnerabilities found. - - -salmansaleemkma/LogisticsAPI -https://github.com/salmansaleemkma/LogisticsAPI -Entry file: LogisticsAPI/web.py -Scanned: 2016-10-19 09:28:36.010359 -No vulnerabilities found. - - -RobertoECruz/microblog -https://github.com/RobertoECruz/microblog -Entry file: None -Scanned: 2016-10-19 09:28:36.583803 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rafaschein/manager -https://github.com/rafaschein/manager -Entry file: manager/app.py -Scanned: 2016-10-19 09:28:39.710931 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: manager/wtf_env/lib/python2.7/genericpath.py - -puhrez/PollSystem -https://github.com/puhrez/PollSystem -Entry file: PollSystem/app/__init__.py -Scanned: 2016-10-19 09:28:41.188225 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brunns/passgen -https://github.com/brunns/passgen -Entry file: passgen/index.py -Scanned: 2016-10-19 09:28:42.568848 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Bonemind/QuickRest -https://github.com/Bonemind/QuickRest -Entry file: QuickRest/test/__main__.py -Scanned: 2016-10-19 09:28:43.815873 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -peveloper/twizoo-internship-test -https://github.com/peveloper/twizoo-internship-test -Entry file: twizoo-internship-test/app/__init__.py -Scanned: 2016-10-19 09:28:46.179117 -No vulnerabilities found. - - -GinSmile/RobotSAE -https://github.com/GinSmile/RobotSAE -Entry file: RobotSAE/1/myApp.py -Scanned: 2016-10-19 09:28:47.659146 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -majapklm/Github-repo-and-Twitter-Tweets-extractor-using-ajax-and-flask-python -https://github.com/majapklm/Github-repo-and-Twitter-Tweets-extractor-using-ajax-and-flask-python -Entry file: None -Scanned: 2016-10-19 09:28:50.185440 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/majapklm/Github-repo-and-Twitter-Tweets-extractor-using-ajax-and-flask-python. - -colembolos/Proyecto_ATI -https://github.com/colembolos/Proyecto_ATI -Entry file: Proyecto_ATI/Proyecto_ATI/__init__.py -Scanned: 2016-10-19 09:28:58.972625 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bestvibes/neo4j-social-network -https://github.com/bestvibes/neo4j-social-network -Entry file: neo4j-social-network/env/lib/python2.7/site-packages/flask/sessions.py -Scanned: 2016-10-19 09:29:06.410627 -No vulnerabilities found. - - -Slottet/slottet-members -https://github.com/Slottet/slottet-members -Entry file: slottet-members/app.py -Scanned: 2016-10-19 09:29:08.009883 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -0victor0/api_demo -https://github.com/0victor0/api_demo -Entry file: api_demo/application.py -Scanned: 2016-10-19 09:29:09.393948 -No vulnerabilities found. - - -barm4ley/mfj -https://github.com/barm4ley/mfj -Entry file: mfj/app/__init__.py -Scanned: 2016-10-19 09:29:10.832917 -No vulnerabilities found. - - -bcalmeida/voten -https://github.com/bcalmeida/voten -Entry file: voten/app.py -Scanned: 2016-10-19 09:29:12.780897 -No vulnerabilities found. - - -apulverizer/TweetMapping -https://github.com/apulverizer/TweetMapping -Entry file: TweetMapping/main.py -Scanned: 2016-10-19 09:29:13.288340 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marco-hoyer/python-quickstart-example-api -https://github.com/marco-hoyer/python-quickstart-example-api -Entry file: python-quickstart-example-api/src/main/python/instance_inventory/api.py -Scanned: 2016-10-19 09:29:14.616113 -No vulnerabilities found. - - -eeWill/learnSomeWords -https://github.com/eeWill/learnSomeWords -Entry file: learnSomeWords/__init__.py -Scanned: 2016-10-19 09:29:15.855424 -No vulnerabilities found. - - -vodoman123/mytv -https://github.com/vodoman123/mytv -Entry file: mytv/app/__init__.py -Scanned: 2016-10-19 09:29:23.959145 -No vulnerabilities found. - - -Hardtack/Flask-aiohttp -https://github.com/Hardtack/Flask-aiohttp -Entry file: Flask-aiohttp/examples/app.py -Scanned: 2016-10-19 09:29:26.559367 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -danriti/nginx-gunicorn-flask -https://github.com/danriti/nginx-gunicorn-flask -Entry file: nginx-gunicorn-flask/app/hello.py -Scanned: 2016-10-19 09:29:27.825892 -No vulnerabilities found. - - -larrycai/codingwithme-flask -https://github.com/larrycai/codingwithme-flask -Entry file: codingwithme-flask/exer5/app.py -Scanned: 2016-10-19 09:29:29.180130 -No vulnerabilities found. - - -cimomo/hello-flask -https://github.com/cimomo/hello-flask -Entry file: hello-flask/hello-flask/app.py -Scanned: 2016-10-19 09:29:30.623215 -No vulnerabilities found. - - -vineetchawla/Flask -https://github.com/vineetchawla/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:29:31.133903 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shahbaziiita/Flask -https://github.com/shahbaziiita/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:29:31.673156 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danriti/gunicorn-flask -https://github.com/danriti/gunicorn-flask -Entry file: gunicorn-flask/app/hello.py -Scanned: 2016-10-19 09:29:33.606859 -No vulnerabilities found. - - -atbaker/docker-flask -https://github.com/atbaker/docker-flask -Entry file: docker-flask/app.py -Scanned: 2016-10-19 09:29:34.873591 -No vulnerabilities found. - - -jpf/okta-pysaml2-example -https://github.com/jpf/okta-pysaml2-example -Entry file: okta-pysaml2-example/app.py -Scanned: 2016-10-19 09:29:36.449906 -Vulnerability 1: -File: okta-pysaml2-example/app.py - > User input at line 180, trigger word "form[": - url = request.form['RelayState'] -Reassigned in: - File: okta-pysaml2-example/app.py - > Line 175: url = url_for('user') -File: okta-pysaml2-example/app.py - > reaches line 181, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - - - -carsongee/flask-htpasswd -https://github.com/carsongee/flask-htpasswd -Entry file: flask-htpasswd/tests/test_htpasswd.py -Scanned: 2016-10-19 09:29:39.309656 -No vulnerabilities found. - - -psykzz/flask-rollbar -https://github.com/psykzz/flask-rollbar -Entry file: flask-rollbar/tests/main_test.py -Scanned: 2016-10-19 09:29:42.681998 -No vulnerabilities found. - - -polaris340/flask-skeleton -https://github.com/polaris340/flask-skeleton -Entry file: None -Scanned: 2016-10-19 09:29:43.185866 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/polaris340/flask-skeleton. - -nnguyen012/flasktest -https://github.com/nnguyen012/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 09:29:47.164421 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vmseba/flaskr -https://github.com/vmseba/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:29:48.675270 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jykntr/flaskapp -https://github.com/jykntr/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-19 09:29:51.175974 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -binarycanary/flaskysockets -https://github.com/binarycanary/flaskysockets -Entry file: flaskysockets/server.py -Scanned: 2016-10-19 09:29:54.634672 -No vulnerabilities found. - - -danfromisrael/TodoApp-Flask-Angular -https://github.com/danfromisrael/TodoApp-Flask-Angular -Entry file: TodoApp-Flask-Angular/Server/Infrastructure/Framework/AppStarter.py -Scanned: 2016-10-19 09:30:02.596622 -No vulnerabilities found. - - -Petermck8806/FlaskTutorial -https://github.com/Petermck8806/FlaskTutorial -Entry file: None -Scanned: 2016-10-19 09:30:08.137337 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kanr/FlaskTutorial -https://github.com/Kanr/FlaskTutorial -Entry file: None -Scanned: 2016-10-19 09:30:09.633690 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jjk425/FlaskFun -https://github.com/jjk425/FlaskFun -Entry file: FlaskFun/app.py -Scanned: 2016-10-19 09:30:11.870038 -Vulnerability 1: -File: FlaskFun/app.py - > User input at line 20, trigger word "form[": - POST_USERNAME = str(request.form['username']) -Reassigned in: - File: FlaskFun/app.py - > Line 30: session['username'] = POST_USERNAME - File: FlaskFun/app.py - > Line 29: session['logged_in'] = True -File: FlaskFun/app.py - > reaches line 25, trigger word "filter(": - query = s.query(User).filter(User.username.in_([POST_USERNAME]), User.password.in_([POST_PASSWORD])) - -Vulnerability 2: -File: FlaskFun/app.py - > User input at line 21, trigger word "form[": - POST_PASSWORD = str(request.form['password']) -File: FlaskFun/app.py - > reaches line 25, trigger word "filter(": - query = s.query(User).filter(User.username.in_([POST_USERNAME]), User.password.in_([POST_PASSWORD])) - - - -michaelsaul/FlaskTutorial -https://github.com/michaelsaul/FlaskTutorial -Entry file: None -Scanned: 2016-10-19 09:30:12.357749 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -coneycode/flask-mongo -https://github.com/coneycode/flask-mongo -Entry file: flask-mongo/__init__.py -Scanned: 2016-10-19 09:30:16.251865 -No vulnerabilities found. - - -okbm/flask_json -https://github.com/okbm/flask_json -Entry file: flask_json/flask_json/__init__.py -Scanned: 2016-10-19 09:30:17.579014 -No vulnerabilities found. - - -petrgru/flask-karty -https://github.com/petrgru/flask-karty -Entry file: flask-karty/src/app.py -Scanned: 2016-10-19 09:30:18.081799 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kristoh/flask-intro -https://github.com/kristoh/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:30:18.575846 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jali/flask-urlshortener -https://github.com/jali/flask-urlshortener -Entry file: flask-urlshortener/coreapp/__init__.py -Scanned: 2016-10-19 09:30:20.622801 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -Ecoste/MouseFlask -https://github.com/Ecoste/MouseFlask -Entry file: MouseFlask/server.py -Scanned: 2016-10-19 09:30:27.067910 -No vulnerabilities found. - - -Chitrank-Dixit/Chitrank-flask -https://github.com/Chitrank-Dixit/Chitrank-flask -Entry file: None -Scanned: 2016-10-19 09:30:30.174725 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -iamvery/flask-tutorial -https://github.com/iamvery/flask-tutorial -Entry file: None -Scanned: 2016-10-19 09:30:30.729557 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -adilmoujahid/flask-poll -https://github.com/adilmoujahid/flask-poll -Entry file: None -Scanned: 2016-10-19 09:30:32.647558 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/adilmoujahid/flask-poll. - -kelsdutton/herokuapp-flask -https://github.com/kelsdutton/herokuapp-flask -Entry file: herokuapp-flask/microblog-version-0.6/app/__init__.py -Scanned: 2016-10-19 09:30:33.992578 -No vulnerabilities found. - - -msadig/flask-picedit -https://github.com/msadig/flask-picedit -Entry file: flask-picedit/app.py -Scanned: 2016-10-19 09:30:35.885648 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -caWhite/yum-flask -https://github.com/caWhite/yum-flask -Entry file: yum-flask/app/__init__.py -Scanned: 2016-10-19 09:30:37.145499 -No vulnerabilities found. - - -emilecaron/flask-errors -https://github.com/emilecaron/flask-errors -Entry file: flask-errors/app.py -Scanned: 2016-10-19 09:30:38.828238 -No vulnerabilities found. - - -henrykh/flask_treehouse -https://github.com/henrykh/flask_treehouse -Entry file: flask_treehouse/social_app/app.py -Scanned: 2016-10-19 09:30:40.203494 -No vulnerabilities found. - - -AislingBai/flask-quickstart -https://github.com/AislingBai/flask-quickstart -Entry file: flask-quickstart/flask-quickstart/cli.py -Scanned: 2016-10-19 09:30:41.540391 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cyb3rD/LearnFlask -https://github.com/cyb3rD/LearnFlask -Entry file: LearnFlask/app/__init__.py -Scanned: 2016-10-19 09:30:42.743271 -No vulnerabilities found. - - -Chris-James/flask-springboard -https://github.com/Chris-James/flask-springboard -Entry file: flask-springboard/project/__init__.py -Scanned: 2016-10-19 09:30:44.064847 -No vulnerabilities found. - - -dyerrington/Flask-Spotify -https://github.com/dyerrington/Flask-Spotify -Entry file: Flask-Spotify/serve.py -Scanned: 2016-10-19 09:30:47.975342 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -robinrob/flask-hello -https://github.com/robinrob/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-19 09:30:57.440922 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fedcuit/awesome-flask -https://github.com/fedcuit/awesome-flask -Entry file: awesome-flask/app/__init__.py -Scanned: 2016-10-19 09:30:58.780319 -No vulnerabilities found. - - -DevendraDesale/flask-intro -https://github.com/DevendraDesale/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:30:59.285405 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulinux/python-flask -https://github.com/rahulinux/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-19 09:30:59.800526 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaredvann/flask-base -https://github.com/jaredvann/flask-base -Entry file: None -Scanned: 2016-10-19 09:31:01.519535 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jaredvann/flask-base. - -ProfessionalIT/estudos_flask -https://github.com/ProfessionalIT/estudos_flask -Entry file: estudos_flask/tutorial_oficial/hello.py -Scanned: 2016-10-19 09:31:03.058906 -No vulnerabilities found. - - -jean-petitclerc/Flask_tut -https://github.com/jean-petitclerc/Flask_tut -Entry file: Flask_tut/photos.py -Scanned: 2016-10-19 09:31:04.441681 -No vulnerabilities found. - - -kchen1025/flask_test -https://github.com/kchen1025/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 09:31:10.005036 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -promisejohn/todo.flask -https://github.com/promisejohn/todo.flask -Entry file: None -Scanned: 2016-10-19 09:31:12.315836 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/promisejohn/todo.flask. - -fidiego/flask-boilerplate -https://github.com/fidiego/flask-boilerplate -Entry file: flask-boilerplate/application.py -Scanned: 2016-10-19 09:31:13.534910 -No vulnerabilities found. - - -AllisonQ/Micro-blog -https://github.com/AllisonQ/Micro-blog -Entry file: Micro-blog/app/__init__.py -Scanned: 2016-10-19 09:31:14.847268 -No vulnerabilities found. - - -lrmrthomas/Flask_Microblog_MT -https://github.com/lrmrthomas/Flask_Microblog_MT -Entry file: None -Scanned: 2016-10-19 09:31:20.633877 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Enapiuz/MyWebScrapingLearning -https://github.com/Enapiuz/MyWebScrapingLearning -Entry file: MyWebScrapingLearning/scrapingLearn03/scrapingLearn03.py -Scanned: 2016-10-19 09:31:22.082653 -No vulnerabilities found. - - -Gufgit/flask-hello-world -https://github.com/Gufgit/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:31:23.111289 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -skebix/flask-api-tutorial -https://github.com/skebix/flask-api-tutorial -Entry file: flask-api-tutorial/flask-api-tutorial.py -Scanned: 2016-10-19 09:31:28.951492 -No vulnerabilities found. - - -cmoscardi/flask_ci_test -https://github.com/cmoscardi/flask_ci_test -Entry file: flask_ci_test/app.py -Scanned: 2016-10-19 09:31:30.360973 -No vulnerabilities found. - - -Ottermad/Flask-Mega-Tutorial -https://github.com/Ottermad/Flask-Mega-Tutorial -Entry file: Flask-Mega-Tutorial/app/__init__.py -Scanned: 2016-10-19 09:31:30.864360 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -omerkhan/flask-hello-world -https://github.com/omerkhan/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:31:32.392546 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -leejaedus/Flask-SocialAPI -https://github.com/leejaedus/Flask-SocialAPI -Entry file: Flask-SocialAPI/test/facebook.py -Scanned: 2016-10-19 09:31:33.731790 -No vulnerabilities found. - - -decodigoyalgomas/Flask-Tutorial-RPG-Manager -https://github.com/decodigoyalgomas/Flask-Tutorial-RPG-Manager -Entry file: Flask-Tutorial-RPG-Manager/app/__init__.py -Scanned: 2016-10-19 09:31:35.061480 -Vulnerability 1: -File: Flask-Tutorial-RPG-Manager/app/entry/views.py - > User input at line 20, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: Flask-Tutorial-RPG-Manager/app/entry/views.py - > Line 25: existing_username = User.get(username=username) - File: Flask-Tutorial-RPG-Manager/app/entry/views.py - > Line 31: user = User(username=username, name=name, email=email, password=password) -File: Flask-Tutorial-RPG-Manager/app/entry/views.py - > reaches line 27, trigger word "flash(": - flash('Username {} already existst in the database'.format(username), 'error') - - - -johanneshhl/johanness-flask-boilerplate -https://github.com/johanneshhl/johanness-flask-boilerplate -Entry file: johanness-flask-boilerplate/application/__init__.py -Scanned: 2016-10-19 09:31:37.138764 -Vulnerability 1: -File: johanness-flask-boilerplate/application/views/user.py - > User input at line 61, trigger word "form[": - loggedIn = tryLogin(request.form['username'], request.form['password'], request.form['KeepMeLoggedIn'], request.form['authenticity_token']) -File: johanness-flask-boilerplate/application/views/user.py - > reaches line 64, trigger word "flash(": - flash(loggedIn[1], loggedIn[2]) - -Vulnerability 2: -File: johanness-flask-boilerplate/application/views/user.py - > User input at line 61, trigger word "form[": - loggedIn = tryLogin(request.form['username'], request.form['password'], request.form['KeepMeLoggedIn'], request.form['authenticity_token']) -File: johanness-flask-boilerplate/application/views/user.py - > reaches line 66, trigger word "flash(": - flash(loggedIn[1]) - -Vulnerability 3: -File: johanness-flask-boilerplate/application/views/user.py - > User input at line 130, trigger word "form[": - theUser = tryCreateUser(request.form['username'], request.form['userPassword'], request.form['KeepMeLoggedIn'], request.form['authenticity_token']) -File: johanness-flask-boilerplate/application/views/user.py - > reaches line 133, trigger word "flash(": - flash(theUser[1], theUser[2]) - -Vulnerability 4: -File: johanness-flask-boilerplate/application/views/user.py - > User input at line 130, trigger word "form[": - theUser = tryCreateUser(request.form['username'], request.form['userPassword'], request.form['KeepMeLoggedIn'], request.form['authenticity_token']) -File: johanness-flask-boilerplate/application/views/user.py - > reaches line 135, trigger word "flash(": - flash(theUser[1]) - - - -AmI-2015/Flask-ex1 -https://github.com/AmI-2015/Flask-ex1 -Entry file: Flask-ex1/FlaskEx1/src/ex1_v3.py -Scanned: 2016-10-19 09:31:38.520828 -No vulnerabilities found. - - -davidnieder/flask-blueprint-skeleton -https://github.com/davidnieder/flask-blueprint-skeleton -Entry file: flask-blueprint-skeleton/app/__init__.py -Scanned: 2016-10-19 09:31:39.764907 -No vulnerabilities found. - - -superyaooo/Flask_intro_learn -https://github.com/superyaooo/Flask_intro_learn -Entry file: Flask_intro_learn/app.py -Scanned: 2016-10-19 09:31:43.713328 -No vulnerabilities found. - - -garyherd/flask-hello-world -https://github.com/garyherd/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:31:44.230647 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -Hellemos/app-flask-test -https://github.com/Hellemos/app-flask-test -Entry file: app-flask-test/app.py -Scanned: 2016-10-19 09:31:49.249986 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: app-flask-test/flask-env/lib/python2.7/genericpath.py - -ashiver/flask_hello_world -https://github.com/ashiver/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:31:50.105397 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ashiver/flask_hello_world. - -lpil/teaching-with-flask -https://github.com/lpil/teaching-with-flask -Entry file: teaching-with-flask/001.py -Scanned: 2016-10-19 09:31:51.429026 -No vulnerabilities found. - - -randallprince/com.randallprince.flask -https://github.com/randallprince/com.randallprince.flask -Entry file: None -Scanned: 2016-10-19 09:32:00.784233 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/randallprince/com.randallprince.flask. - -samho/flasky_study -https://github.com/samho/flasky_study -Entry file: flasky_study/app/__init__.py -Scanned: 2016-10-19 09:32:02.204206 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kevlab/flasktaskr_project -https://github.com/kevlab/flasktaskr_project -Entry file: flasktaskr_project/project/__init__.py -Scanned: 2016-10-19 09:32:03.563206 -No vulnerabilities found. - - -matthew-shaw/microblog -https://github.com/matthew-shaw/microblog -Entry file: None -Scanned: 2016-10-19 09:32:04.069437 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -khachikyan/PenPoint -https://github.com/khachikyan/PenPoint -Entry file: PenPoint/app.py -Scanned: 2016-10-19 09:32:08.852149 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -porterjamesj/echo -https://github.com/porterjamesj/echo -Entry file: echo/echo.py -Scanned: 2016-10-19 09:32:12.062213 -No vulnerabilities found. - - -LlamaComedian/microblog -https://github.com/LlamaComedian/microblog -Entry file: None -Scanned: 2016-10-19 09:32:12.560280 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dstarner15/alumiboti -https://github.com/dstarner15/alumiboti -Entry file: alumiboti/flask/lib/python2.7/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 09:32:18.915700 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ericwang110/flasky-eric -https://github.com/ericwang110/flasky-eric -Entry file: flasky-eric/app/__init__.py -Scanned: 2016-10-19 09:32:23.372241 -No vulnerabilities found. - - -thatarchguy/FFA-CTF-Scoring-Engine-Flask -https://github.com/thatarchguy/FFA-CTF-Scoring-Engine-Flask -Entry file: FFA-CTF-Scoring-Engine-Flask/ctfscore/__init__.py -Scanned: 2016-10-19 09:32:24.717915 -Vulnerability 1: -File: FFA-CTF-Scoring-Engine-Flask/ctfscore/views.py - > User input at line 16, trigger word ".data": - flag = models.Flags.query.filter_by(flag=InputFlagForm.flag.data).first() -Reassigned in: - File: FFA-CTF-Scoring-Engine-Flask/ctfscore/views.py - > Line 29: submission = models.Completed(user=user, flag_id=flag.id) -File: FFA-CTF-Scoring-Engine-Flask/ctfscore/views.py - > reaches line 32, trigger word "flash(": - flash('Flag ' + flag.flag + ' Submitted for User ' + user) - -Vulnerability 2: -File: FFA-CTF-Scoring-Engine-Flask/ctfscore/views.py - > User input at line 23, trigger word ".data": - user = InputFlagForm.user.data -Reassigned in: - File: FFA-CTF-Scoring-Engine-Flask/ctfscore/views.py - > Line 29: submission = models.Completed(user=user, flag_id=flag.id) -File: FFA-CTF-Scoring-Engine-Flask/ctfscore/views.py - > reaches line 32, trigger word "flash(": - flash('Flag ' + flag.flag + ' Submitted for User ' + user) - - - -andreashuebner/blog -https://github.com/andreashuebner/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 09:32:25.229846 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scheung38/myPinClone -https://github.com/scheung38/myPinClone -Entry file: None -Scanned: 2016-10-19 09:32:25.723681 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/scheung38/myPinClone. - -krypticmind/km-static-minimal -https://github.com/krypticmind/km-static-minimal -Entry file: km-static-minimal/generator.py -Scanned: 2016-10-19 09:32:26.970032 -No vulnerabilities found. - - -astrodsg/coffee_clicker -https://github.com/astrodsg/coffee_clicker -Entry file: coffee_clicker/coffee_clicker/__init__.py -Scanned: 2016-10-19 09:32:28.279131 -No vulnerabilities found. - - -alvgustavoe/pot_flaskrestful-ndb -https://github.com/alvgustavoe/pot_flaskrestful-ndb -Entry file: pot_flaskrestful-ndb/api/main.py -Scanned: 2016-10-19 09:32:31.101851 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eashan/TweetMin -https://github.com/eashan/TweetMin -Entry file: TweetMin/app.py -Scanned: 2016-10-19 09:32:33.075647 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alecalve/py-fake-cas -https://github.com/alecalve/py-fake-cas -Entry file: py-fake-cas/app.py -Scanned: 2016-10-19 09:32:34.366741 -No vulnerabilities found. - - -JanellePearl/cs3130_Assignment7 -https://github.com/JanellePearl/cs3130_Assignment7 -Entry file: cs3130_Assignment7/db_flask.py -Scanned: 2016-10-19 09:32:35.730196 -No vulnerabilities found. - - -mehtapgundogan/Tellal -https://github.com/mehtapgundogan/Tellal -Entry file: None -Scanned: 2016-10-19 09:32:40.214998 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Necior/cukrowy-server -https://github.com/Necior/cukrowy-server -Entry file: cukrowy-server/server.py -Scanned: 2016-10-19 09:32:41.529046 -No vulnerabilities found. - - -leosquared/leo_geocoder -https://github.com/leosquared/leo_geocoder -Entry file: leo_geocoder/geocoder_app.py -Scanned: 2016-10-19 09:32:42.908503 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AndreasDL/mediacenter-backend -https://github.com/AndreasDL/mediacenter-backend -Entry file: mediacenter-backend/api.py -Scanned: 2016-10-19 09:32:44.292884 -No vulnerabilities found. - - -lfarah/Python-Rest -https://github.com/lfarah/Python-Rest -Entry file: Python-Rest/server.py -Scanned: 2016-10-19 09:32:45.718114 -No vulnerabilities found. - - -FuretBicephale/CAR_FuretEE -https://github.com/FuretBicephale/CAR_FuretEE -Entry file: CAR_FuretEE/app/__init__.py -Scanned: 2016-10-19 09:32:47.918953 -No vulnerabilities found. - - -skozlovf/flask-json -https://github.com/skozlovf/flask-json -Entry file: flask-json/examples/example4.py -Scanned: 2016-10-19 09:32:50.815424 -No vulnerabilities found. - - -larrycai/codingwithme-flask -https://github.com/larrycai/codingwithme-flask -Entry file: codingwithme-flask/exer5/app.py -Scanned: 2016-10-19 09:32:52.175151 -No vulnerabilities found. - - -cimomo/hello-flask -https://github.com/cimomo/hello-flask -Entry file: hello-flask/hello-flask/app.py -Scanned: 2016-10-19 09:32:53.444426 -No vulnerabilities found. - - -plotly/dash -https://github.com/plotly/dash -Entry file: None -Scanned: 2016-10-19 09:33:02.947652 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/plotly/dash. - -attekarhunen/flask -https://github.com/attekarhunen/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:33:03.836988 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -vineetchawla/Flask -https://github.com/vineetchawla/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:33:04.333088 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -XuYuanzhen/mysql_flask -https://github.com/XuYuanzhen/mysql_flask -Entry file: mysql_flask/app-mysql.py -Scanned: 2016-10-19 09:33:10.377056 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: mysql_flask/venv/lib/python2.6/genericpath.py - -XuYuanzhen/redis_flask -https://github.com/XuYuanzhen/redis_flask -Entry file: redis_flask/app-redis.py -Scanned: 2016-10-19 09:33:14.311997 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jefurry/flask-sessions -https://github.com/jefurry/flask-sessions -Entry file: flask-sessions/web.py -Scanned: 2016-10-19 09:33:14.822525 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Jaza/flask-s3-save-example -https://github.com/Jaza/flask-s3-save-example -Entry file: None -Scanned: 2016-10-19 09:33:16.238130 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Jaza/flask-s3-save-example. - -psykzz/flask-rollbar -https://github.com/psykzz/flask-rollbar -Entry file: flask-rollbar/tests/main_test.py -Scanned: 2016-10-19 09:33:18.095027 -No vulnerabilities found. - - -anbaoyong/flask_add_dns -https://github.com/anbaoyong/flask_add_dns -Entry file: flask_add_dns/login.py -Scanned: 2016-10-19 09:33:21.379317 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -falfaro/flask-example -https://github.com/falfaro/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-19 09:33:25.901765 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mcsrainbow/flaskdemo -https://github.com/mcsrainbow/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 09:33:26.423456 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -kba977/flasky -https://github.com/kba977/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 09:33:26.912057 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vmseba/flaskr -https://github.com/vmseba/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:33:28.878038 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garyherd/flasktaskr -https://github.com/garyherd/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:33:31.406109 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zhao-ji/flaskord -https://github.com/zhao-ji/flaskord -Entry file: flaskord/app.py -Scanned: 2016-10-19 09:33:33.964789 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -deja2011/flaskr -https://github.com/deja2011/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:33:35.482987 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danfromisrael/TodoApp-Flask-Angular -https://github.com/danfromisrael/TodoApp-Flask-Angular -Entry file: TodoApp-Flask-Angular/Server/Infrastructure/Framework/AppStarter.py -Scanned: 2016-10-19 09:33:38.181095 -No vulnerabilities found. - - -Mcphylus12/FlaskDBsite -https://github.com/Mcphylus12/FlaskDBsite -Entry file: FlaskDBsite/routes.py -Scanned: 2016-10-19 09:33:39.465469 -No vulnerabilities found. - - -eguy/FlaskApp -https://github.com/eguy/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 09:33:42.077456 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -okbm/flask_json -https://github.com/okbm/flask_json -Entry file: flask_json/flask_json/__init__.py -Scanned: 2016-10-19 09:33:44.463186 -No vulnerabilities found. - - -briennakh/flask-practice -https://github.com/briennakh/flask-practice -Entry file: None -Scanned: 2016-10-19 09:33:44.965789 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/briennakh/flask-practice. - -rwigo/flask-restmedia -https://github.com/rwigo/flask-restmedia -Entry file: flask-restmedia/examples/redis_storage.py -Scanned: 2016-10-19 09:33:47.365172 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -WritingPanda/flask-angular -https://github.com/WritingPanda/flask-angular -Entry file: flask-angular/app.py -Scanned: 2016-10-19 09:33:53.085709 -No vulnerabilities found. - - -pptonio/flask_template -https://github.com/pptonio/flask_template -Entry file: None -Scanned: 2016-10-19 09:33:54.092750 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pptonio/flask_template. - -wove/flask_blog -https://github.com/wove/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 09:33:54.606193 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhangda89/flask-blog -https://github.com/zhangda89/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:33:55.182479 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -caWhite/yum-flask -https://github.com/caWhite/yum-flask -Entry file: yum-flask/app/__init__.py -Scanned: 2016-10-19 09:33:56.549485 -No vulnerabilities found. - - -mnickey/flask_restaurants -https://github.com/mnickey/flask_restaurants -Entry file: flask_restaurants/finalproject.py -Scanned: 2016-10-19 09:34:03.055953 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -odubno/flask-intro -https://github.com/odubno/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:34:04.555723 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rg3915/despesas_flask -https://github.com/rg3915/despesas_flask -Entry file: despesas_flask/despesas.py -Scanned: 2016-10-19 09:34:06.939443 -No vulnerabilities found. - - -Mcyummylol/flask-blog -https://github.com/Mcyummylol/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:34:07.490524 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -inkmonk/flask-boilerplate -https://github.com/inkmonk/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 09:34:12.874711 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/inkmonk/flask-boilerplate. - -siko/flask-empty -https://github.com/siko/flask-empty -Entry file: flask-empty/fproject/app/__init__.py -Scanned: 2016-10-19 09:34:17.273889 -No vulnerabilities found. - - -dhutty/flask_ex -https://github.com/dhutty/flask_ex -Entry file: flask_ex/wsgi.py -Scanned: 2016-10-19 09:34:18.505171 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pmuellr/flask-sample -https://github.com/pmuellr/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-19 09:34:19.008604 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jreiher2003/flask-tutorial -https://github.com/jreiher2003/flask-tutorial -Entry file: None -Scanned: 2016-10-19 09:34:19.568397 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -firebender/thinkful-flask -https://github.com/firebender/thinkful-flask -Entry file: thinkful-flask/blog/__init__.py -Scanned: 2016-10-19 09:34:22.941404 -Vulnerability 1: -File: thinkful-flask/blog/views.py - > User input at line 51, trigger word "form[": - title = request.form['title'] -Reassigned in: - File: thinkful-flask/blog/views.py - > Line 60: post = Post(title=title, content=mistune.markdown(content), author=current_user) - File: thinkful-flask/blog/views.py - > Line 68: message = 'Successfully added new post: {}'.format(title) -File: thinkful-flask/blog/views.py - > reaches line 69, trigger word "flash(": - flash(message, 'success') - - - -anksharm/flask_learn -https://github.com/anksharm/flask_learn -Entry file: flask_learn/hello.py -Scanned: 2016-10-19 09:34:28.203093 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lyncir/flask-template -https://github.com/lyncir/flask-template -Entry file: None -Scanned: 2016-10-19 09:34:29.447000 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lyncir/flask-template. - -Mcyummylol/flask-hello -https://github.com/Mcyummylol/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-19 09:34:29.980807 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rizafahmi/rethink-flask -https://github.com/rizafahmi/rethink-flask -Entry file: rethink-flask/app/__init__.py -Scanned: 2016-10-19 09:34:31.970258 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cpilsworth/docker-flask -https://github.com/cpilsworth/docker-flask -Entry file: docker-flask/main.py -Scanned: 2016-10-19 09:34:33.287623 -No vulnerabilities found. - - -DevendraDesale/flask-intro -https://github.com/DevendraDesale/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:34:33.784622 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jean-petitclerc/Flask_tut -https://github.com/jean-petitclerc/Flask_tut -Entry file: Flask_tut/photos.py -Scanned: 2016-10-19 09:34:35.141409 -No vulnerabilities found. - - -muktadiur/flask-intro -https://github.com/muktadiur/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:34:36.682515 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rcelha/flask-desk -https://github.com/rcelha/flask-desk -Entry file: flask-desk/flask_desk/app.py -Scanned: 2016-10-19 09:34:38.071061 -No vulnerabilities found. - - -drbothen/Flasky_tut -https://github.com/drbothen/Flasky_tut -Entry file: Flasky_tut/app/__init__.py -Scanned: 2016-10-19 09:34:41.481618 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mainglis/fang -https://github.com/mainglis/fang -Entry file: fang/app.py -Scanned: 2016-10-19 09:34:50.778380 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -errickbensonpeart/flask-hello-world -https://github.com/errickbensonpeart/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:34:51.311565 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -hipol/Discussion-Forum-Api -https://github.com/hipol/Discussion-Forum-Api -Entry file: Discussion-Forum-Api/app/__init__.py -Scanned: 2016-10-19 09:34:53.205980 -Vulnerability 1: -File: Discussion-Forum-Api/app/user_auth/controllers.py - > User input at line 44, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: Discussion-Forum-Api/app/user_auth/controllers.py - > Line 54: user = User(first_name, last_name, email, postal_code) -File: Discussion-Forum-Api/app/user_auth/controllers.py - > reaches line 58, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201) - -Vulnerability 2: -File: Discussion-Forum-Api/app/user_auth/controllers.py - > User input at line 46, trigger word "get(": - first_name = request.json.get('first_name') -Reassigned in: - File: Discussion-Forum-Api/app/user_auth/controllers.py - > Line 54: user = User(first_name, last_name, email, postal_code) -File: Discussion-Forum-Api/app/user_auth/controllers.py - > reaches line 58, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201) - -Vulnerability 3: -File: Discussion-Forum-Api/app/user_auth/controllers.py - > User input at line 47, trigger word "get(": - last_name = request.json.get('last_name') -Reassigned in: - File: Discussion-Forum-Api/app/user_auth/controllers.py - > Line 54: user = User(first_name, last_name, email, postal_code) -File: Discussion-Forum-Api/app/user_auth/controllers.py - > reaches line 58, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201) - -Vulnerability 4: -File: Discussion-Forum-Api/app/user_auth/controllers.py - > User input at line 48, trigger word "get(": - postal_code = request.json.get('postal_code') -Reassigned in: - File: Discussion-Forum-Api/app/user_auth/controllers.py - > Line 54: user = User(first_name, last_name, email, postal_code) -File: Discussion-Forum-Api/app/user_auth/controllers.py - > reaches line 58, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201) - -Vulnerability 5: -File: Discussion-Forum-Api/app/user_auth/controllers.py - > User input at line 62, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: Discussion-Forum-Api/app/user_auth/controllers.py - > Line 72: user = User(first_name, last_name, email, postal_code) -File: Discussion-Forum-Api/app/user_auth/controllers.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201) - -Vulnerability 6: -File: Discussion-Forum-Api/app/user_auth/controllers.py - > User input at line 64, trigger word "get(": - first_name = request.json.get('first_name') -Reassigned in: - File: Discussion-Forum-Api/app/user_auth/controllers.py - > Line 72: user = User(first_name, last_name, email, postal_code) -File: Discussion-Forum-Api/app/user_auth/controllers.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201) - -Vulnerability 7: -File: Discussion-Forum-Api/app/user_auth/controllers.py - > User input at line 65, trigger word "get(": - last_name = request.json.get('last_name') -Reassigned in: - File: Discussion-Forum-Api/app/user_auth/controllers.py - > Line 72: user = User(first_name, last_name, email, postal_code) -File: Discussion-Forum-Api/app/user_auth/controllers.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201) - -Vulnerability 8: -File: Discussion-Forum-Api/app/user_auth/controllers.py - > User input at line 66, trigger word "get(": - postal_code = request.json.get('postal_code') -Reassigned in: - File: Discussion-Forum-Api/app/user_auth/controllers.py - > Line 72: user = User(first_name, last_name, email, postal_code) -File: Discussion-Forum-Api/app/user_auth/controllers.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201) - - - -ichris56/login-form -https://github.com/ichris56/login-form -Entry file: login-form/index.py -Scanned: 2016-10-19 09:34:54.495952 -Vulnerability 1: -File: login-form/index.py - > User input at line 140, trigger word "form[": - newUsername = request.form['username'] -File: login-form/index.py - > reaches line 147, trigger word "execute(": - data = c.execute(checkUsers, (newUsername)) - -Vulnerability 2: -File: login-form/index.py - > User input at line 140, trigger word "form[": - newUsername = request.form['username'] -File: login-form/index.py - > reaches line 156, trigger word "execute(": - c.execute(addUser, (newUsername, newPassword, None)) - -Vulnerability 3: -File: login-form/index.py - > User input at line 141, trigger word "form[": - newPassword = request.form['password'] -File: login-form/index.py - > reaches line 156, trigger word "execute(": - c.execute(addUser, (newUsername, newPassword, None)) - - - -Enapiuz/MyWebScrapingLearning -https://github.com/Enapiuz/MyWebScrapingLearning -Entry file: MyWebScrapingLearning/scrapingLearn03/scrapingLearn03.py -Scanned: 2016-10-19 09:34:55.993817 -No vulnerabilities found. - - -sujith7c/flask-sample-code -https://github.com/sujith7c/flask-sample-code -Entry file: flask-sample-code/helloworld.py -Scanned: 2016-10-19 09:34:57.699268 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samramez/first_flask_app -https://github.com/samramez/first_flask_app -Entry file: first_flask_app/project.py -Scanned: 2016-10-19 09:34:59.071289 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glcook/flask_hello_world -https://github.com/glcook/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:34:59.562485 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/glcook/flask_hello_world. - -Chaynoods/flask-grouped-users -https://github.com/Chaynoods/flask-grouped-users -Entry file: flask-grouped-users/grouped_users/app/__init__.py -Scanned: 2016-10-19 09:35:00.905757 -No vulnerabilities found. - - -jpshelley/bmi-flask-app -https://github.com/jpshelley/bmi-flask-app -Entry file: bmi-flask-app/app.py -Scanned: 2016-10-19 09:35:09.767594 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hold-entrance/flask-hello-world -https://github.com/hold-entrance/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:35:13.356762 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -LandRegistry/govuk-flask-skeleton -https://github.com/LandRegistry/govuk-flask-skeleton -Entry file: govuk-flask-skeleton/app/__init__.py -Scanned: 2016-10-19 09:35:18.742671 -No vulnerabilities found. - - -danakock/flask-hello-world -https://github.com/danakock/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:35:19.273719 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -bboalimoe/pyrecsys_test_flask -https://github.com/bboalimoe/pyrecsys_test_flask -Entry file: pyrecsys_test_flask/pyrecsys_test_flask.py -Scanned: 2016-10-19 09:35:24.455105 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Gherero/flask_lesson_habr -https://github.com/Gherero/flask_lesson_habr -Entry file: flask_lesson_habr/app/__init__.py -Scanned: 2016-10-19 09:35:25.856207 -No vulnerabilities found. - - -jjdenis/flask-crud-minimal-demo -https://github.com/jjdenis/flask-crud-minimal-demo -Entry file: None -Scanned: 2016-10-19 09:35:27.222335 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jjdenis/flask-crud-minimal-demo. - -oakie/oauth-flask-template -https://github.com/oakie/oauth-flask-template -Entry file: oauth-flask-template/auth.py -Scanned: 2016-10-19 09:35:29.472108 -Vulnerability 1: -File: oauth-flask-template/auth.py - > User input at line 40, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: oauth-flask-template/auth.py - > Line 41: state = base64.urlsafe_b64encode(str(uuid4()) + ';' + next) - File: oauth-flask-template/auth.py - > Line 44: params = 'client_id''response_type''state''redirect_uri''scope'CLIENT_ID'code'stateREDIRECT_URI'openid email' -File: oauth-flask-template/auth.py - > reaches line 50, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = html.format(next, url_for('secret'), AUTH_URL + '?' + urllib.urlencode(params)) - - - -tianhuil/flask_ci_test -https://github.com/tianhuil/flask_ci_test -Entry file: flask_ci_test/app.py -Scanned: 2016-10-19 09:35:31.344632 -No vulnerabilities found. - - -daveglo/flask_practice_app -https://github.com/daveglo/flask_practice_app -Entry file: None -Scanned: 2016-10-19 09:35:32.886389 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/daveglo/flask_practice_app. - -Hellemos/app-flask-test -https://github.com/Hellemos/app-flask-test -Entry file: app-flask-test/app.py -Scanned: 2016-10-19 09:35:33.465660 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: app-flask-test/flask-env/lib/python2.7/genericpath.py - -liruosong/simple-flask-app -https://github.com/liruosong/simple-flask-app -Entry file: simple-flask-app/flaskr.py -Scanned: 2016-10-19 09:35:34.709917 -No vulnerabilities found. - - -war-room-game/war_room-flask -https://github.com/war-room-game/war_room-flask -Entry file: war_room-flask/src/server.py -Scanned: 2016-10-19 09:35:36.665573 -Vulnerability 1: -File: war_room-flask/src/server.py - > User input at line 43, trigger word "form[": - user = request.form['user'] -File: war_room-flask/src/server.py - > reaches line 48, trigger word "execute(": - cur = g.db.execute('select * from moves where player_id=? and round=?', [getPlayerId(user), round_num]) - - - -bsmith64/Flaskr-Microblog -https://github.com/bsmith64/Flaskr-Microblog -Entry file: Flaskr-Microblog/flaskr.py -Scanned: 2016-10-19 09:35:37.957129 -No vulnerabilities found. - - -joeknows718/718dotDigital -https://github.com/joeknows718/718dotDigital -Entry file: 718dotDigital/app/__init__.py -Scanned: 2016-10-19 09:35:39.993336 -No vulnerabilities found. - - -seyar/adminka -https://github.com/seyar/adminka -Entry file: adminka/__blog/__init__.py -Scanned: 2016-10-19 09:35:43.410077 -No vulnerabilities found. - - -cyberjoac/django-flasktaskr -https://github.com/cyberjoac/django-flasktaskr -Entry file: django-flasktaskr/project/__init__.py -Scanned: 2016-10-19 09:35:53.420486 -No vulnerabilities found. - - -ityuhui/abcbookmarks -https://github.com/ityuhui/abcbookmarks -Entry file: abcbookmarks/abcbookmarks.py -Scanned: 2016-10-19 09:35:56.127672 -No vulnerabilities found. - - -l2t3r/ESapi -https://github.com/l2t3r/ESapi -Entry file: ESapi/esapi.py -Scanned: 2016-10-19 09:35:57.465017 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hold-entrance/blog-3 -https://github.com/hold-entrance/blog-3 -Entry file: blog-3/blog.py -Scanned: 2016-10-19 09:36:01.485457 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: blog-3/env/lib/python2.7/genericpath.py - -tnishank/Blog -https://github.com/tnishank/Blog -Entry file: Blog/app/__init__.py -Scanned: 2016-10-19 09:36:05.524250 -No vulnerabilities found. - - -rohit-jamuar/QnA -https://github.com/rohit-jamuar/QnA -Entry file: None -Scanned: 2016-10-19 09:36:07.046149 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rohit-jamuar/QnA. - -nevzheng/microblog -https://github.com/nevzheng/microblog -Entry file: None -Scanned: 2016-10-19 09:36:07.568843 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hold-entrance/blog-2 -https://github.com/hold-entrance/blog-2 -Entry file: blog-2/blog.py -Scanned: 2016-10-19 09:36:11.471596 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: blog-2/env/lib/python2.7/genericpath.py - -stewartwatts/flan -https://github.com/stewartwatts/flan -Entry file: flan/flan.py -Scanned: 2016-10-19 09:36:12.913321 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alecalve/py-fake-cas -https://github.com/alecalve/py-fake-cas -Entry file: py-fake-cas/app.py -Scanned: 2016-10-19 09:36:14.159242 -No vulnerabilities found. - - -wasamasa/guestbook -https://github.com/wasamasa/guestbook -Entry file: guestbook/app.py -Scanned: 2016-10-19 09:36:15.454506 -No vulnerabilities found. - - -sfalkoff/address-adder -https://github.com/sfalkoff/address-adder -Entry file: address-adder/controller.py -Scanned: 2016-10-19 09:36:16.847980 -No vulnerabilities found. - - -JanellePearl/cs3130_Assignment7 -https://github.com/JanellePearl/cs3130_Assignment7 -Entry file: cs3130_Assignment7/db_flask.py -Scanned: 2016-10-19 09:36:18.107815 -No vulnerabilities found. - - -nyabut/jeopardy_backend -https://github.com/nyabut/jeopardy_backend -Entry file: jeopardy_backend/app/__init__.py -Scanned: 2016-10-19 09:36:20.359225 -No vulnerabilities found. - - -rohan07/Blog -https://github.com/rohan07/Blog -Entry file: Blog/flaskr.py -Scanned: 2016-10-19 09:36:21.624268 -No vulnerabilities found. - - -mrjoes/flask-admin -https://github.com/mrjoes/flask-admin -Entry file: flask-admin/index.py -Scanned: 2016-10-19 09:36:26.588278 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -damyanbogoev/flask-bookshelf -https://github.com/damyanbogoev/flask-bookshelf -Entry file: flask-bookshelf/check.py -Scanned: 2016-10-19 09:36:29.297355 -No vulnerabilities found. - - -cravler/flask-twisted -https://github.com/cravler/flask-twisted -Entry file: flask-twisted/examples/hello/app.py -Scanned: 2016-10-19 09:36:31.146968 -No vulnerabilities found. - - -changx9/flask -https://github.com/changx9/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:36:32.073439 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -bb071988/flask -https://github.com/bb071988/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:36:34.016991 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -Vertabelo/vertabelo-flask -https://github.com/Vertabelo/vertabelo-flask -Entry file: vertabelo-flask/vertabelo_flask_sqlalchemy.py -Scanned: 2016-10-19 09:36:35.448450 -No vulnerabilities found. - - -sentinelleader/bootstrapper -https://github.com/sentinelleader/bootstrapper -Entry file: bootstrapper/bootstrap.py -Scanned: 2016-10-19 09:36:36.835104 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -XuYuanzhen/mysql_flask -https://github.com/XuYuanzhen/mysql_flask -Entry file: mysql_flask/app-mysql.py -Scanned: 2016-10-19 09:36:37.432635 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: mysql_flask/venv/lib/python2.6/genericpath.py - -XuYuanzhen/redis_flask -https://github.com/XuYuanzhen/redis_flask -Entry file: redis_flask/app-redis.py -Scanned: 2016-10-19 09:36:40.474758 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Jaza/flask-s3-save-example -https://github.com/Jaza/flask-s3-save-example -Entry file: None -Scanned: 2016-10-19 09:36:40.978293 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Jaza/flask-s3-save-example. - -cravler/flask-sockjs -https://github.com/cravler/flask-sockjs -Entry file: flask-sockjs/examples/auth/app.py -Scanned: 2016-10-19 09:36:46.915172 -No vulnerabilities found. - - -choleraehyq/WebChat -https://github.com/choleraehyq/WebChat -Entry file: WebChat/application/__init__.py -Scanned: 2016-10-19 09:36:55.344293 -No vulnerabilities found. - - -wove/flasktaskr -https://github.com/wove/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:36:55.868852 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mcsrainbow/flaskdemo -https://github.com/mcsrainbow/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 09:36:57.420178 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -cyb3rD/flaskr -https://github.com/cyb3rD/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:36:57.988799 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -peter14f/flasky -https://github.com/peter14f/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 09:36:59.491725 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhao-ji/flaskord -https://github.com/zhao-ji/flaskord -Entry file: flaskord/app.py -Scanned: 2016-10-19 09:37:03.027710 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chetstar/flaskbuild -https://github.com/chetstar/flaskbuild -Entry file: flaskbuild/app/__init__.py -Scanned: 2016-10-19 09:37:08.788292 -No vulnerabilities found. - - -eguy/FlaskApp -https://github.com/eguy/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 09:37:09.360665 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ryota-ka/flask-yo-slack-adapter -https://github.com/ryota-ka/flask-yo-slack-adapter -Entry file: flask-yo-slack-adapter/app.py -Scanned: 2016-10-19 09:37:10.582172 -No vulnerabilities found. - - -congocongo/flask-hipchat-addon -https://github.com/congocongo/flask-hipchat-addon -Entry file: flask-hipchat-addon/test_addon.py -Scanned: 2016-10-19 09:37:13.941178 -No vulnerabilities found. - - -WritingPanda/flask-angular -https://github.com/WritingPanda/flask-angular -Entry file: flask-angular/app.py -Scanned: 2016-10-19 09:37:19.033710 -No vulnerabilities found. - - -AthelasPeru/flask_tutorial -https://github.com/AthelasPeru/flask_tutorial -Entry file: None -Scanned: 2016-10-19 09:37:19.551487 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nrinn/flask-intro -https://github.com/nrinn/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:37:20.044460 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sadiew/flask-intro -https://github.com/sadiew/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:37:20.534278 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nuvipannu/flask-intro -https://github.com/nuvipannu/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:37:21.032352 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Julzerator/flask-intro -https://github.com/Julzerator/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:37:22.533132 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sshaman1101/flask-template -https://github.com/sshaman1101/flask-template -Entry file: None -Scanned: 2016-10-19 09:37:24.025401 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sshaman1101/flask-template. - -pptonio/flask_template -https://github.com/pptonio/flask_template -Entry file: None -Scanned: 2016-10-19 09:37:30.021515 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pptonio/flask_template. - -mirzap/docker-flask -https://github.com/mirzap/docker-flask -Entry file: docker-flask/web/app.py -Scanned: 2016-10-19 09:37:33.804004 -No vulnerabilities found. - - -danakock/flask-blog -https://github.com/danakock/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:37:35.386169 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -janmilosh/flask_tutorial -https://github.com/janmilosh/flask_tutorial -Entry file: None -Scanned: 2016-10-19 09:37:35.878730 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wove/flask_blog -https://github.com/wove/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 09:37:37.372388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cl4rke/flask-test -https://github.com/cl4rke/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 09:37:38.892980 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -gusutabopb/flask_server -https://github.com/gusutabopb/flask_server -Entry file: flask_server/testapp.py -Scanned: 2016-10-19 09:37:41.118393 -No vulnerabilities found. - - -Matawhite/Flask_blog -https://github.com/Matawhite/Flask_blog -Entry file: Flask_blog/blog.py -Scanned: 2016-10-19 09:37:44.636023 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_blog/ENV/lib/python2.7/genericpath.py - -twaldear/flask-csp -https://github.com/twaldear/flask-csp -Entry file: flask-csp/flask_csp/test_csp.py -Scanned: 2016-10-19 09:37:46.213663 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ciprianc/hello_flask -https://github.com/ciprianc/hello_flask -Entry file: hello_flask/hello_flask/hello_flask_web.py -Scanned: 2016-10-19 09:37:47.586282 -No vulnerabilities found. - - -michelelee/flask-intro -https://github.com/michelelee/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:37:48.086015 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lindsaygrizzard/ex-flask -https://github.com/lindsaygrizzard/ex-flask -Entry file: ex-flask/nice.py -Scanned: 2016-10-19 09:37:56.369428 -No vulnerabilities found. - - -danafallon/flask-intro -https://github.com/danafallon/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:37:56.872936 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -judychau/flask_exercise -https://github.com/judychau/flask_exercise -Entry file: flask_exercise/nice.py -Scanned: 2016-10-19 09:37:59.109320 -No vulnerabilities found. - - -theresa-clare/flask-intro -https://github.com/theresa-clare/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:37:59.626671 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sigihuber/flask_basics -https://github.com/sigihuber/flask_basics -Entry file: flask_basics/get_post.py -Scanned: 2016-10-19 09:38:01.877093 -No vulnerabilities found. - - -marcelomd/flask-template -https://github.com/marcelomd/flask-template -Entry file: None -Scanned: 2016-10-19 09:38:04.378721 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/marcelomd/flask-template. - -lesguillemets/flask-playard -https://github.com/lesguillemets/flask-playard -Entry file: None -Scanned: 2016-10-19 09:38:09.707738 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rachelledunn/flask-intro -https://github.com/rachelledunn/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:38:11.195143 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -levi006/Flask-Intro -https://github.com/levi006/Flask-Intro -Entry file: Flask-Intro/nice.py -Scanned: 2016-10-19 09:38:12.403715 -No vulnerabilities found. - - -alenajk/flask-intro -https://github.com/alenajk/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:38:14.893437 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amrocha/flask-guide -https://github.com/amrocha/flask-guide -Entry file: flask-guide/app/__init__.py -Scanned: 2016-10-19 09:38:17.133455 -No vulnerabilities found. - - -andyhui/my_flask -https://github.com/andyhui/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-19 09:38:24.408857 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -zrq495/flask-ckfinder -https://github.com/zrq495/flask-ckfinder -Entry file: flask-ckfinder/app.py -Scanned: 2016-10-19 09:38:26.983226 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -McMenemy/flask-microblog -https://github.com/McMenemy/flask-microblog -Entry file: None -Scanned: 2016-10-19 09:38:27.479694 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -baotingfang/flask-demo -https://github.com/baotingfang/flask-demo -Entry file: None -Scanned: 2016-10-19 09:38:28.102975 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/baotingfang/flask-demo. - -kcart/Flask-Intro- -https://github.com/kcart/Flask-Intro- -Entry file: Flask-Intro-/nice.py -Scanned: 2016-10-19 09:38:29.319646 -No vulnerabilities found. - - -mainglis/fang -https://github.com/mainglis/fang -Entry file: fang/app.py -Scanned: 2016-10-19 09:38:30.070942 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BurningPixel/FlaskLoginExample -https://github.com/BurningPixel/FlaskLoginExample -Entry file: FlaskLoginExample/app.py -Scanned: 2016-10-19 09:38:32.549423 -Vulnerability 1: -File: FlaskLoginExample/app.py - > User input at line 15, trigger word "form[": - user_name = request.form['username'] -File: FlaskLoginExample/app.py - > reaches line 41, trigger word "execute(": - cursor.execute(' - INSERT INTO users(id, username, password) - VALUES(NULL, ?, ?) - ', (user_name, password)) - -Vulnerability 2: -File: FlaskLoginExample/app.py - > User input at line 16, trigger word "form[": - password = request.form['password'] -File: FlaskLoginExample/app.py - > reaches line 41, trigger word "execute(": - cursor.execute(' - INSERT INTO users(id, username, password) - VALUES(NULL, ?, ?) - ', (user_name, password)) - - - -stueken/FSND-P3_Music-Catalog-Web-App -https://github.com/stueken/FSND-P3_Music-Catalog-Web-App -Entry file: FSND-P3_Music-Catalog-Web-App/application.py -Scanned: 2016-10-19 09:38:34.629794 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apromessi/flask-intro-complimenter -https://github.com/apromessi/flask-intro-complimenter -Entry file: flask-intro-complimenter/nice.py -Scanned: 2016-10-19 09:38:38.446921 -No vulnerabilities found. - - -jon-engelbert/flask-oauth-restaurant -https://github.com/jon-engelbert/flask-oauth-restaurant -Entry file: flask-oauth-restaurant/pkg/__init__.py -Scanned: 2016-10-19 09:38:40.045188 -Vulnerability 1: -File: flask-oauth-restaurant/pkg/mod_restaurant/controllers.py - > User input at line 58, trigger word "form[": - newRestaurant = Restaurant(name=request.form['name'], user_id=login_session['user_id']) -File: flask-oauth-restaurant/pkg/mod_restaurant/controllers.py - > reaches line 61, trigger word "flash(": - flash('New Restaurant %s Successfully Created' % newRestaurant.name) - -Vulnerability 2: -File: flask-oauth-restaurant/pkg/mod_menuitem/controllers.py - > User input at line 34, trigger word "form[": - newItem = MenuItem(name=request.form['name'], description=request.form['description'], price=request.form['price'], course=request.form['course'], restaurant_id=restaurant_id, user_id=restaurant.user_id) -File: flask-oauth-restaurant/pkg/mod_menuitem/controllers.py - > reaches line 37, trigger word "flash(": - flash('New Menu %s Item Successfully Created' % newItem.name) - - - -tranc99/flask-python-taskr -https://github.com/tranc99/flask-python-taskr -Entry file: flask-python-taskr/flaskr.py -Scanned: 2016-10-19 09:38:44.310581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabhjot008/flask-calculator-api -https://github.com/prabhjot008/flask-calculator-api -Entry file: flask-calculator-api/app/__init__.py -Scanned: 2016-10-19 09:39:03.039776 -No vulnerabilities found. - - -ColeKettler/learning-flask-web-development -https://github.com/ColeKettler/learning-flask-web-development -Entry file: learning-flask-web-development/app/__init__.py -Scanned: 2016-10-19 09:39:37.240493 -No vulnerabilities found. - - -Tiffany8/Introduction-to-Flask-Exercise -https://github.com/Tiffany8/Introduction-to-Flask-Exercise -Entry file: Introduction-to-Flask-Exercise/nice.py -Scanned: 2016-10-19 09:39:38.441290 -No vulnerabilities found. - - -realpython/flask-scaffold -https://github.com/realpython/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-19 09:39:51.568464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -python-cn/flask-slackbot -https://github.com/python-cn/flask-slackbot -Entry file: flask-slackbot/examples/myapp.py -Scanned: 2016-10-19 09:39:59.997279 -No vulnerabilities found. - - -wilfilho/flask-facebook-example -https://github.com/wilfilho/flask-facebook-example -Entry file: flask-facebook-example/app.py -Scanned: 2016-10-19 09:40:01.216571 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ashwini0529/flask -https://github.com/ashwini0529/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:40:02.096428 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -brandnetworks/base-flask-api -https://github.com/brandnetworks/base-flask-api -Entry file: base-flask-api/api/__init__.py -Scanned: 2016-10-19 09:40:03.452719 -No vulnerabilities found. - - -ssundarraj/flask-gcm-server -https://github.com/ssundarraj/flask-gcm-server -Entry file: flask-gcm-server/app/__init__.py -Scanned: 2016-10-19 09:40:08.311944 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dflorent/flaskdem -https://github.com/dflorent/flaskdem -Entry file: flaskdem/flaskdem/__init__.py -Scanned: 2016-10-19 09:40:12.533214 -No vulnerabilities found. - - -kcart/FLASKHW -https://github.com/kcart/FLASKHW -Entry file: FLASKHW/directory.py -Scanned: 2016-10-19 09:40:14.760137 -Vulnerability 1: -File: FLASKHW/directory.py - > User input at line 21, trigger word "get(": - name = request.args.get('employee_name') -File: FLASKHW/directory.py - > reaches line 30, trigger word "flash(": - flash('%s not found.' % name) - - - -jreiher2003/flaskgae -https://github.com/jreiher2003/flaskgae -Entry file: None -Scanned: 2016-10-19 09:40:17.445580 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jasonherngwang/flasktaskr -https://github.com/jasonherngwang/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:40:17.946596 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -charlesjavelona/flasktaskr -https://github.com/charlesjavelona/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:40:19.456116 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -shipperizer/flasking -https://github.com/shipperizer/flasking -Entry file: flasking/flaskr.py -Scanned: 2016-10-19 09:40:23.990186 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasking/venv/lib/python2.7/genericpath.py - -liammccartney/flaskr -https://github.com/liammccartney/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:40:27.485844 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rafaelrc13/flasktutorial -https://github.com/rafaelrc13/flasktutorial -Entry file: None -Scanned: 2016-10-19 09:40:31.029268 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mnzr/flaskr -https://github.com/mnzr/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:40:31.521258 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kamkard/Flasktest -https://github.com/kamkard/Flasktest -Entry file: Flasktest/flaskr/flaskr.py -Scanned: 2016-10-19 09:40:33.181859 -No vulnerabilities found. - - -phenomeno/flaskpractice -https://github.com/phenomeno/flaskpractice -Entry file: None -Scanned: 2016-10-19 09:40:35.474733 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Popo-lth/FlaskTest -https://github.com/Popo-lth/FlaskTest -Entry file: None -Scanned: 2016-10-19 09:40:35.981666 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Popo-lth/FlaskTest. - -byaka/flaskJSONRPCServer -https://github.com/byaka/flaskJSONRPCServer -Entry file: None -Scanned: 2016-10-19 09:40:37.710230 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/byaka/flaskJSONRPCServer. - -nrinn/flask-intro -https://github.com/nrinn/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:40:39.678070 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sadiew/flask-intro -https://github.com/sadiew/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:40:40.194743 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nuvipannu/flask-intro -https://github.com/nuvipannu/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:40:40.690942 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Julzerator/flask-intro -https://github.com/Julzerator/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:40:42.179185 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sshaman1101/flask-template -https://github.com/sshaman1101/flask-template -Entry file: None -Scanned: 2016-10-19 09:40:43.666276 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sshaman1101/flask-template. - -cl4rke/flask-test -https://github.com/cl4rke/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 09:40:46.654304 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -Matawhite/Flask_blog -https://github.com/Matawhite/Flask_blog -Entry file: Flask_blog/blog.py -Scanned: 2016-10-19 09:40:51.711082 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_blog/ENV/lib/python2.7/genericpath.py - -g4b1nagy/flask-boilerplate -https://github.com/g4b1nagy/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 09:40:53.207536 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/g4b1nagy/flask-boilerplate. - -ciprianc/hello_flask -https://github.com/ciprianc/hello_flask -Entry file: hello_flask/hello_flask/hello_flask_web.py -Scanned: 2016-10-19 09:41:01.543157 -No vulnerabilities found. - - -michelelee/flask-intro -https://github.com/michelelee/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:41:02.027924 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lindsaygrizzard/ex-flask -https://github.com/lindsaygrizzard/ex-flask -Entry file: ex-flask/nice.py -Scanned: 2016-10-19 09:41:04.254149 -No vulnerabilities found. - - -danafallon/flask-intro -https://github.com/danafallon/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:41:04.743860 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -judychau/flask_exercise -https://github.com/judychau/flask_exercise -Entry file: flask_exercise/nice.py -Scanned: 2016-10-19 09:41:05.972098 -No vulnerabilities found. - - -theresa-clare/flask-intro -https://github.com/theresa-clare/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:41:08.468544 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ykhadilkar-rei/flask-demo -https://github.com/ykhadilkar-rei/flask-demo -Entry file: None -Scanned: 2016-10-19 09:41:12.993812 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ykhadilkar-rei/flask-demo. - -kmorinaka/flask-intro -https://github.com/kmorinaka/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:41:15.490541 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -anniejw6/art_flask -https://github.com/anniejw6/art_flask -Entry file: art_flask/app/__init__.py -Scanned: 2016-10-19 09:41:18.427752 -No vulnerabilities found. - - -huangjunque/flask_web -https://github.com/huangjunque/flask_web -Entry file: flask_web/helloflask.py -Scanned: 2016-10-19 09:41:22.922105 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py - -jas0ndyq/flask-me -https://github.com/jas0ndyq/flask-me -Entry file: flask-me/app/__init__.py -Scanned: 2016-10-19 09:41:27.848849 -No vulnerabilities found. - - -ysdhaixin/learn-flask -https://github.com/ysdhaixin/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 09:41:28.588222 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tassin-/Flask_Blog -https://github.com/Tassin-/Flask_Blog -Entry file: Flask_Blog/Blog/blog.py -Scanned: 2016-10-19 09:41:31.924250 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jacky168/flask_test -https://github.com/jacky168/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 09:41:32.528833 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rachelledunn/flask-intro -https://github.com/rachelledunn/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:41:33.498211 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -levi006/Flask-Intro -https://github.com/levi006/Flask-Intro -Entry file: Flask-Intro/nice.py -Scanned: 2016-10-19 09:41:35.725969 -No vulnerabilities found. - - -alenajk/flask-intro -https://github.com/alenajk/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:41:37.217596 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kcart/Flask-Intro- -https://github.com/kcart/Flask-Intro- -Entry file: Flask-Intro-/nice.py -Scanned: 2016-10-19 09:41:38.455056 -No vulnerabilities found. - - -kevinpie/flask-blog -https://github.com/kevinpie/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:41:39.980441 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -pelucky/Flask-test -https://github.com/pelucky/Flask-test -Entry file: Flask-test/app/__init__.py -Scanned: 2016-10-19 09:41:43.337874 -No vulnerabilities found. - - -pford68/flask-example -https://github.com/pford68/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-19 09:41:43.841484 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -takukawasaki/flask_blog -https://github.com/takukawasaki/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 09:41:44.332285 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chevrondev/python_flask -https://github.com/chevrondev/python_flask -Entry file: None -Scanned: 2016-10-19 09:41:44.837838 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chevrondev/python_flask. - -blumonk/Flask-Micro -https://github.com/blumonk/Flask-Micro -Entry file: None -Scanned: 2016-10-19 09:41:51.874670 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sulsaho/hello-flask -https://github.com/sulsaho/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 09:41:56.075883 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -lindsaygrizzard/flask-app -https://github.com/lindsaygrizzard/flask-app -Entry file: flask-app/hackbright-web.py -Scanned: 2016-10-19 09:41:57.410027 -No vulnerabilities found. - - -IvannaBesarab/flask-intro -https://github.com/IvannaBesarab/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:41:57.939643 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BurningPixel/FlaskLoginExample -https://github.com/BurningPixel/FlaskLoginExample -Entry file: FlaskLoginExample/app.py -Scanned: 2016-10-19 09:41:59.156498 -Vulnerability 1: -File: FlaskLoginExample/app.py - > User input at line 15, trigger word "form[": - user_name = request.form['username'] -File: FlaskLoginExample/app.py - > reaches line 41, trigger word "execute(": - cursor.execute(' - INSERT INTO users(id, username, password) - VALUES(NULL, ?, ?) - ', (user_name, password)) - -Vulnerability 2: -File: FlaskLoginExample/app.py - > User input at line 16, trigger word "form[": - password = request.form['password'] -File: FlaskLoginExample/app.py - > reaches line 41, trigger word "execute(": - cursor.execute(' - INSERT INTO users(id, username, password) - VALUES(NULL, ?, ?) - ', (user_name, password)) - - - -Raizan/FlaskGrayscaleWebservice -https://github.com/Raizan/FlaskGrayscaleWebservice -Entry file: FlaskGrayscaleWebservice/app.py -Scanned: 2016-10-19 09:42:00.379478 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TomNeyland/eve-sso -https://github.com/TomNeyland/eve-sso -Entry file: None -Scanned: 2016-10-19 09:42:02.714404 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/TomNeyland/eve-sso. - -alayek/fullstack-intro -https://github.com/alayek/fullstack-intro -Entry file: fullstack-intro/server.py -Scanned: 2016-10-19 09:42:04.141536 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apromessi/flask-intro-complimenter -https://github.com/apromessi/flask-intro-complimenter -Entry file: flask-intro-complimenter/nice.py -Scanned: 2016-10-19 09:42:05.355772 -No vulnerabilities found. - - -jon-engelbert/flask-oauth-restaurant -https://github.com/jon-engelbert/flask-oauth-restaurant -Entry file: flask-oauth-restaurant/pkg/__init__.py -Scanned: 2016-10-19 09:42:06.855316 -Vulnerability 1: -File: flask-oauth-restaurant/pkg/mod_restaurant/controllers.py - > User input at line 58, trigger word "form[": - newRestaurant = Restaurant(name=request.form['name'], user_id=login_session['user_id']) -File: flask-oauth-restaurant/pkg/mod_restaurant/controllers.py - > reaches line 61, trigger word "flash(": - flash('New Restaurant %s Successfully Created' % newRestaurant.name) - -Vulnerability 2: -File: flask-oauth-restaurant/pkg/mod_menuitem/controllers.py - > User input at line 34, trigger word "form[": - newItem = MenuItem(name=request.form['name'], description=request.form['description'], price=request.form['price'], course=request.form['course'], restaurant_id=restaurant_id, user_id=restaurant.user_id) -File: flask-oauth-restaurant/pkg/mod_menuitem/controllers.py - > reaches line 37, trigger word "flash(": - flash('New Menu %s Item Successfully Created' % newItem.name) - - - -Julzerator/project-tracker-flask -https://github.com/Julzerator/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:42:10.636477 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kmorinaka/project-tracker-flask -https://github.com/kmorinaka/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:42:14.122168 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NotTheEconomist/some_flask_project -https://github.com/NotTheEconomist/some_flask_project -Entry file: some_flask_project/flaskr/__init__.py -Scanned: 2016-10-19 09:42:19.635583 -No vulnerabilities found. - - -aachik/flask-blog-abdulmx -https://github.com/aachik/flask-blog-abdulmx -Entry file: flask-blog-abdulmx/web.py -Scanned: 2016-10-19 09:42:23.219202 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kennysong/Flask-on-EC2 -https://github.com/kennysong/Flask-on-EC2 -Entry file: Flask-on-EC2/demoapp/server.py -Scanned: 2016-10-19 09:42:25.918796 -No vulnerabilities found. - - -apromessi/madlibs_flask_jinja -https://github.com/apromessi/madlibs_flask_jinja -Entry file: madlibs_flask_jinja/madlibs.py -Scanned: 2016-10-19 09:42:30.339324 -No vulnerabilities found. - - -Tiffany8/Introduction-to-Flask-Exercise -https://github.com/Tiffany8/Introduction-to-Flask-Exercise -Entry file: Introduction-to-Flask-Exercise/nice.py -Scanned: 2016-10-19 09:42:32.091423 -No vulnerabilities found. - - -michelelee/project-tracker-flask -https://github.com/michelelee/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:42:33.622060 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pamelot/project-tracker-flask -https://github.com/pamelot/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:42:34.111493 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sarahfo/Flask-ProjectTracker -https://github.com/sarahfo/Flask-ProjectTracker -Entry file: Flask-ProjectTracker/hackbright-web.py -Scanned: 2016-10-19 09:42:35.337246 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dheerajgopi/StudentDetails-Flask -https://github.com/dheerajgopi/StudentDetails-Flask -Entry file: None -Scanned: 2016-10-19 09:42:39.708822 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pombredanne/scale-with-flask -https://github.com/pombredanne/scale-with-flask -Entry file: scale-with-flask/example/app/__init__.py -Scanned: 2016-10-19 09:42:41.737868 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -phonedeveloper/flask_auth_securedb -https://github.com/phonedeveloper/flask_auth_securedb -Entry file: flask_auth_securedb/flask_securedb.py -Scanned: 2016-10-19 09:42:43.312832 -No vulnerabilities found. - - -sadiew/project-tracker-flask -https://github.com/sadiew/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:42:43.856755 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shabemdadi/SQL-Flask-Python-Project -https://github.com/shabemdadi/SQL-Flask-Python-Project -Entry file: SQL-Flask-Python-Project/hackbright-web.py -Scanned: 2016-10-19 09:42:45.112860 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -relekang/flask-docker-status -https://github.com/relekang/flask-docker-status -Entry file: flask-docker-status/server.py -Scanned: 2016-10-19 09:42:46.345215 -No vulnerabilities found. - - -taliegarcia/project-tracker-flask -https://github.com/taliegarcia/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:42:46.840497 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leskat47/project-tracker-flask-exercise -https://github.com/leskat47/project-tracker-flask-exercise -Entry file: project-tracker-flask-exercise/hackbright-web.py -Scanned: 2016-10-19 09:42:48.152089 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nrinn/project-tracker-flask -https://github.com/nrinn/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:42:48.677709 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -johannakate/project-tracker-flask -https://github.com/johannakate/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:42:54.226988 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -levi006/project-tracker-flask -https://github.com/levi006/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:42:57.726190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BostonREB/flask_hello_world -https://github.com/BostonREB/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:42:59.255726 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/BostonREB/flask_hello_world. - -nuvipannu/project-tracker-flask -https://github.com/nuvipannu/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:42:59.741500 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -VerSprite/flask-json-pickle -https://github.com/VerSprite/flask-json-pickle -Entry file: flask-json-pickle/flask-json-pickle.py -Scanned: 2016-10-19 09:43:04.472667 -No vulnerabilities found. - - -SamLin95/Flask_email_recover -https://github.com/SamLin95/Flask_email_recover -Entry file: Flask_email_recover/app.py -Scanned: 2016-10-19 09:43:05.724502 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -acastanieto/flask-intro-HB-exercise -https://github.com/acastanieto/flask-intro-HB-exercise -Entry file: flask-intro-HB-exercise/nice.py -Scanned: 2016-10-19 09:43:06.941136 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danafallon/project-tracker-flask -https://github.com/danafallon/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:43:07.434570 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jonrovira/flask-by-example -https://github.com/jonrovira/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 09:43:12.988589 -No vulnerabilities found. - - -johannakate/flask-intro-exercise -https://github.com/johannakate/flask-intro-exercise -Entry file: flask-intro-exercise/nice.py -Scanned: 2016-10-19 09:43:14.217641 -No vulnerabilities found. - - -bpownow/flask-intro-exercise -https://github.com/bpownow/flask-intro-exercise -Entry file: flask-intro-exercise/nice.py -Scanned: 2016-10-19 09:43:16.418379 -No vulnerabilities found. - - -codecaptain76/flask-intro-exercise -https://github.com/codecaptain76/flask-intro-exercise -Entry file: flask-intro-exercise/nice.py -Scanned: 2016-10-19 09:43:18.639767 -No vulnerabilities found. - - -dinosk/flask_project -https://github.com/dinosk/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-19 09:43:25.617665 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -VladKh/Flask -https://github.com/VladKh/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:43:27.123691 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Rowzson/Flask -https://github.com/Rowzson/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:43:30.650808 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -St-B/flask -https://github.com/St-B/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:43:32.571393 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -eleweek/histsync -https://github.com/eleweek/histsync -Entry file: histsync/app.py -Scanned: 2016-10-19 09:43:36.202467 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -salmanwahed/flask-restful-mongodb-api -https://github.com/salmanwahed/flask-restful-mongodb-api -Entry file: flask-restful-mongodb-api/api.py -Scanned: 2016-10-19 09:43:37.559344 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nagpurtechies/flaskblog -https://github.com/nagpurtechies/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 09:43:38.085548 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -ivoreali/Python-Flask-MongoDB -https://github.com/ivoreali/Python-Flask-MongoDB -Entry file: Python-Flask-MongoDB/app/app.py -Scanned: 2016-10-19 09:43:39.311568 -No vulnerabilities found. - - -kracekumar/flask_vs_django_bench -https://github.com/kracekumar/flask_vs_django_bench -Entry file: flask_vs_django_bench/flask_app.py -Scanned: 2016-10-19 09:43:42.531172 -No vulnerabilities found. - - -cmabastar/flask-rest-boilerplate -https://github.com/cmabastar/flask-rest-boilerplate -Entry file: flask-rest-boilerplate/app/__init__.py -Scanned: 2016-10-19 09:43:44.953680 -No vulnerabilities found. - - -enzoliao/flaskr -https://github.com/enzoliao/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:43:45.451729 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cstuy-ai/flasksite -https://github.com/cstuy-ai/flasksite -Entry file: flasksite/app.py -Scanned: 2016-10-19 09:43:46.775292 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -renanvicente/flaskdocket -https://github.com/renanvicente/flaskdocket -Entry file: flaskdocket/hello.py -Scanned: 2016-10-19 09:43:47.969986 -No vulnerabilities found. - - -kevinpie/flasktaskr -https://github.com/kevinpie/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:43:48.955916 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Anwesh43/flaskdemo -https://github.com/Anwesh43/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 09:43:50.464966 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ferdirn/flaskr -https://github.com/ferdirn/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:43:55.983460 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Matawhite/FlaskTaskr -https://github.com/Matawhite/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-19 09:44:02.219402 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -colrodia/flaskTest -https://github.com/colrodia/flaskTest -Entry file: flaskTest/url.py -Scanned: 2016-10-19 09:44:03.464138 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tony/cookiecutter-flask-pythonic -https://github.com/tony/cookiecutter-flask-pythonic -Entry file: cookiecutter-flask-pythonic/{{cookiecutter.repo_name}}/{{cookiecutter.repo_name}}/{{cookiecutter.repo_name}}.py -Scanned: 2016-10-19 09:44:05.883401 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -CharlesZhong/Blog -https://github.com/CharlesZhong/Blog -Entry file: Blog/app/__init__.py -Scanned: 2016-10-19 09:44:11.396614 -No vulnerabilities found. - - -duc1701/flask_experiments -https://github.com/duc1701/flask_experiments -Entry file: flask_experiments/main.py -Scanned: 2016-10-19 09:44:12.622419 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rcelha/flask-history -https://github.com/rcelha/flask-history -Entry file: flask-history/flask_history/app.py -Scanned: 2016-10-19 09:44:13.862343 -No vulnerabilities found. - - -joedanz/flask-weather -https://github.com/joedanz/flask-weather -Entry file: flask-weather/app.py -Scanned: 2016-10-19 09:44:15.382499 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cgautamkrish/flask_whoosh -https://github.com/cgautamkrish/flask_whoosh -Entry file: flask_whoosh/server.py -Scanned: 2016-10-19 09:44:17.720016 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dj80hd/SimpleFlask -https://github.com/dj80hd/SimpleFlask -Entry file: None -Scanned: 2016-10-19 09:44:20.037538 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dj80hd/SimpleFlask. - -joedanz/flask-bpm -https://github.com/joedanz/flask-bpm -Entry file: flask-bpm/app/__init__.py -Scanned: 2016-10-19 09:44:29.322586 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -00000111/flask_rma -https://github.com/00000111/flask_rma -Entry file: flask_rma/app/__init__.py -Scanned: 2016-10-19 09:44:34.682628 -Vulnerability 1: -File: flask_rma/app/views.py - > User input at line 82, trigger word "get(": - case = models.Case.query.get(int(case_no)) -Reassigned in: - File: flask_rma/app/views.py - > Line 96: ret_MAYBE_FUNCTION_NAME = render_template('details.html',case=case, form=form) - File: flask_rma/app/views.py - > Line 95: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask_rma/app/views.py - > reaches line 87, trigger word "flash(": - flash('Кейс %d был подтвержден' % case.id) - -Vulnerability 2: -File: flask_rma/app/views.py - > User input at line 103, trigger word ".data": - company = models.Company(name=form.name.data) -File: flask_rma/app/views.py - > reaches line 106, trigger word "flash(": - flash('Компания %s успешно добавлена' % company.name) - - - -ryankanno/cookiecutter-flask -https://github.com/ryankanno/cookiecutter-flask -Entry file: None -Scanned: 2016-10-19 09:44:35.209213 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ryankanno/cookiecutter-flask. - -armeo/docker-flask -https://github.com/armeo/docker-flask -Entry file: docker-flask/app.py -Scanned: 2016-10-19 09:44:36.448064 -No vulnerabilities found. - - -gilsondev/flask_wordcounts -https://github.com/gilsondev/flask_wordcounts -Entry file: flask_wordcounts/app.py -Scanned: 2016-10-19 09:44:37.710642 -No vulnerabilities found. - - -gilsondev/flask_talks -https://github.com/gilsondev/flask_talks -Entry file: flask_talks/app/__init__.py -Scanned: 2016-10-19 09:44:39.096966 -No vulnerabilities found. - - -pattisdr/flask_microblog -https://github.com/pattisdr/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 09:44:39.626888 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshua7v/flask-demo -https://github.com/joshua7v/flask-demo -Entry file: None -Scanned: 2016-10-19 09:44:40.126509 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/joshua7v/flask-demo. - -rahvar/flask-reg -https://github.com/rahvar/flask-reg -Entry file: flask-reg/app/__init__.py -Scanned: 2016-10-19 09:44:47.282774 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -debuggerboy/flask_blog -https://github.com/debuggerboy/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 09:44:47.771668 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -moloch/flask_blog -https://github.com/moloch/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 09:44:48.259478 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zyrys/Flask_No1 -https://github.com/zyrys/Flask_No1 -Entry file: Flask_No1/app/__init__.py -Scanned: 2016-10-19 09:44:49.492062 -No vulnerabilities found. - - -tecoholic/Zimbalaka -https://github.com/tecoholic/Zimbalaka -Entry file: Zimbalaka/zimbalaka/__init__.py -Scanned: 2016-10-19 09:44:51.215207 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tassin-/FlaskTaskR -https://github.com/Tassin-/FlaskTaskR -Entry file: FlaskTaskR/task/views.py -Scanned: 2016-10-19 09:44:56.025738 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kennysong/Flask-on-EC2 -https://github.com/kennysong/Flask-on-EC2 -Entry file: Flask-on-EC2/demoapp/server.py -Scanned: 2016-10-19 09:44:57.734771 -No vulnerabilities found. - - -haukurk/api-client-proxy-flask -https://github.com/haukurk/api-client-proxy-flask -Entry file: None -Scanned: 2016-10-19 09:44:58.977195 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/haukurk/api-client-proxy-flask. - -mdevey/Demo-Flask-GUnicorn -https://github.com/mdevey/Demo-Flask-GUnicorn -Entry file: Demo-Flask-GUnicorn/app.py -Scanned: 2016-10-19 09:45:02.199229 -No vulnerabilities found. - - -CortYuming/docker-hello-flask -https://github.com/CortYuming/docker-hello-flask -Entry file: docker-hello-flask/hello.py -Scanned: 2016-10-19 09:45:05.444328 -No vulnerabilities found. - - -chadduffey/SimpleBlog-Flask -https://github.com/chadduffey/SimpleBlog-Flask -Entry file: SimpleBlog-Flask/app/__init__.py -Scanned: 2016-10-19 09:45:09.347466 -No vulnerabilities found. - - -florije1988/flask_celery_redis -https://github.com/florije1988/flask_celery_redis -Entry file: flask_celery_redis/redis_demo.py -Scanned: 2016-10-19 09:45:10.783239 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jasonsbrooks/HackYale-Flask-Course -https://github.com/jasonsbrooks/HackYale-Flask-Course -Entry file: HackYale-Flask-Course/app/__init__.py -Scanned: 2016-10-19 09:45:12.007957 -No vulnerabilities found. - - -ni8mr/Flask-hello-world -https://github.com/ni8mr/Flask-hello-world -Entry file: Flask-hello-world/app.py -Scanned: 2016-10-19 09:45:13.703517 -No vulnerabilities found. - - -relekang/flask-docker-status -https://github.com/relekang/flask-docker-status -Entry file: flask-docker-status/server.py -Scanned: 2016-10-19 09:45:14.909949 -No vulnerabilities found. - - -roman0316/flask-by-example -https://github.com/roman0316/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 09:45:17.599780 -No vulnerabilities found. - - -Keuha/ios-pics-flask-server -https://github.com/Keuha/ios-pics-flask-server -Entry file: ios-pics-flask-server/Python/new_app.py -Scanned: 2016-10-19 09:45:20.237425 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: ios-pics-flask-server/Python/flask/lib/python2.7/genericpath.py - -saromanov/twitter-flask-app -https://github.com/saromanov/twitter-flask-app -Entry file: twitter-flask-app/app.py -Scanned: 2016-10-19 09:45:21.456127 -No vulnerabilities found. - - -MengmengZHANG/flask-babel-zh -https://github.com/MengmengZHANG/flask-babel-zh -Entry file: flask-babel-zh/app.py -Scanned: 2016-10-19 09:45:32.287124 -No vulnerabilities found. - - -michaelreid/flask-api-posts -https://github.com/michaelreid/flask-api-posts -Entry file: flask-api-posts/posts/__init__.py -Scanned: 2016-10-19 09:45:37.694182 -Vulnerability 1: -File: flask-api-posts/posts/api.py - > User input at line 36, trigger word "get(": - body_like = request.args.get('body_like') -Reassigned in: - File: flask-api-posts/posts/api.py - > Line 46: posts = posts.filter(models.Post.title.contains(title_like)) - File: flask-api-posts/posts/api.py - > Line 52: posts = posts.all() - File: flask-api-posts/posts/api.py - > Line 55: data = json.dumps([post.as_dictionary() for post in posts]) - File: flask-api-posts/posts/api.py - > Line 56: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: flask-api-posts/posts/api.py - > Line 40: posts = session.query(models.Post) -File: flask-api-posts/posts/api.py - > reaches line 42, trigger word "filter(": - posts = posts.filter(models.Post.title.contains(title_like)).filter(models.Post.body.contains(body_like)) - -Vulnerability 2: -File: flask-api-posts/posts/api.py - > User input at line 33, trigger word "get(": - title_like = request.args.get('title_like') -Reassigned in: - File: flask-api-posts/posts/api.py - > Line 49: posts = posts.filter(models.Post.body.contains(body_like)) - File: flask-api-posts/posts/api.py - > Line 52: posts = posts.all() - File: flask-api-posts/posts/api.py - > Line 55: data = json.dumps([post.as_dictionary() for post in posts]) - File: flask-api-posts/posts/api.py - > Line 56: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: flask-api-posts/posts/api.py - > Line 40: posts = session.query(models.Post) - File: flask-api-posts/posts/api.py - > Line 42: posts = posts.filter(models.Post.title.contains(title_like)).filter(models.Post.body.contains(body_like)) -File: flask-api-posts/posts/api.py - > reaches line 46, trigger word "filter(": - posts = posts.filter(models.Post.title.contains(title_like)) - -Vulnerability 3: -File: flask-api-posts/posts/api.py - > User input at line 36, trigger word "get(": - body_like = request.args.get('body_like') -Reassigned in: - File: flask-api-posts/posts/api.py - > Line 46: posts = posts.filter(models.Post.title.contains(title_like)) - File: flask-api-posts/posts/api.py - > Line 52: posts = posts.all() - File: flask-api-posts/posts/api.py - > Line 55: data = json.dumps([post.as_dictionary() for post in posts]) - File: flask-api-posts/posts/api.py - > Line 56: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: flask-api-posts/posts/api.py - > Line 40: posts = session.query(models.Post) -File: flask-api-posts/posts/api.py - > reaches line 49, trigger word "filter(": - posts = posts.filter(models.Post.body.contains(body_like)) - - - -lukehammer/flask-by-example -https://github.com/lukehammer/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 09:45:38.928702 -No vulnerabilities found. - - -maverickneo/bluemix-python-flask-sample -https://github.com/maverickneo/bluemix-python-flask-sample -Entry file: bluemix-python-flask-sample/welcome.py -Scanned: 2016-10-19 09:45:40.243512 -No vulnerabilities found. - - -judychau/project_tracker_flask -https://github.com/judychau/project_tracker_flask -Entry file: project_tracker_flask/hackbright-web.py -Scanned: 2016-10-19 09:45:41.463509 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jlybianto/flask_hello_world -https://github.com/jlybianto/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:45:41.967701 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jlybianto/flask_hello_world. - -ni8mr/A-blog-with-Flask -https://github.com/ni8mr/A-blog-with-Flask -Entry file: A-blog-with-Flask/blog.py -Scanned: 2016-10-19 09:45:43.206560 -No vulnerabilities found. - - -lindsaygrizzard/project-tracker-flask -https://github.com/lindsaygrizzard/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 09:45:44.696277 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kwikiel/realflask -https://github.com/kwikiel/realflask -Entry file: realflask/app.py -Scanned: 2016-10-19 09:45:50.925135 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kjplunkett/python-api -https://github.com/kjplunkett/python-api -Entry file: python-api/app.py -Scanned: 2016-10-19 09:45:52.166276 -No vulnerabilities found. - - -rubenwardy/minetest_web_panel -https://github.com/rubenwardy/minetest_web_panel -Entry file: minetest_web_panel/web_panel/__init__.py -Scanned: 2016-10-19 09:45:54.691675 -Vulnerability 1: -File: minetest_web_panel/web_panel/views.py - > User input at line 37, trigger word "get(": - r = request.args.get('r') -Reassigned in: - File: minetest_web_panel/web_panel/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login',r=r)) - File: minetest_web_panel/web_panel/views.py - > Line 50: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login',r=r)) - File: minetest_web_panel/web_panel/views.py - > Line 56: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: minetest_web_panel/web_panel/views.py - > Line 58: ret_MAYBE_FUNCTION_NAME = render_template('login.html',redirect=r) - File: minetest_web_panel/web_panel/views.py - > Line 39: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: minetest_web_panel/web_panel/views.py - > reaches line 54, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(r) - - - -peteshadbolt/nhs -https://github.com/peteshadbolt/nhs -Entry file: nhs/nhs.py -Scanned: 2016-10-19 09:45:58.953822 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nithintech/student-Record-app -https://github.com/nithintech/student-Record-app -Entry file: None -Scanned: 2016-10-19 09:46:00.505145 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nithintech/student-Record-app. - -jlybianto/blogful -https://github.com/jlybianto/blogful -Entry file: blogful/blog/__init__.py -Scanned: 2016-10-19 09:46:01.007755 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dpollot/petsy-server -https://github.com/dpollot/petsy-server -Entry file: petsy-server/index.py -Scanned: 2016-10-19 09:46:03.243082 -No vulnerabilities found. - - -DerekDuchesne/tweetsneak -https://github.com/DerekDuchesne/tweetsneak -Entry file: tweetsneak/tweetsneak_python/main.py -Scanned: 2016-10-19 09:46:09.655034 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -chrsbats/hmac_signer -https://github.com/chrsbats/hmac_signer -Entry file: hmac_signer/hmac_signer/tests/test_server.py -Scanned: 2016-10-19 09:46:13.963972 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -margrami/menuapp -https://github.com/margrami/menuapp -Entry file: menuapp/Lesson-4/Final-Project/finalproject.py -Scanned: 2016-10-19 09:46:15.500090 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -boshika/Python -https://github.com/boshika/Python -Entry file: Python/Flask_test.py -Scanned: 2016-10-19 09:46:33.370531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaschneidr/safetytips -https://github.com/jaschneidr/safetytips -Entry file: safetytips/safetytips.py -Scanned: 2016-10-19 09:46:34.614031 -No vulnerabilities found. - - -chrisrink10/cjblog -https://github.com/chrisrink10/cjblog -Entry file: None -Scanned: 2016-10-19 09:46:36.093094 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chrisrink10/cjblog. - -cmutti/deadpoll -https://github.com/cmutti/deadpoll -Entry file: deadpoll/app.py -Scanned: 2016-10-19 09:46:37.765551 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kimrob/microblog -https://github.com/kimrob/microblog -Entry file: None -Scanned: 2016-10-19 09:46:38.267731 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -BurningPixel/FoldrsCMS -https://github.com/BurningPixel/FoldrsCMS -Entry file: FoldrsCMS/app.py -Scanned: 2016-10-19 09:46:39.505798 -No vulnerabilities found. - - -Tiffany8/Ratings -https://github.com/Tiffany8/Ratings -Entry file: Ratings/server.py -Scanned: 2016-10-19 09:46:42.574917 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -peterlin741/YoutubeComments -https://github.com/peterlin741/YoutubeComments -Entry file: YoutubeComments/youtube.py -Scanned: 2016-10-19 09:46:44.383585 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GerardoGR/chained_task -https://github.com/GerardoGR/chained_task -Entry file: chained_task/api/app.py -Scanned: 2016-10-19 09:46:45.608923 -No vulnerabilities found. - - -imidya/WebCalculator -https://github.com/imidya/WebCalculator -Entry file: WebCalculator/run.py -Scanned: 2016-10-19 09:46:47.282206 -Vulnerability 1: -File: WebCalculator/run.py - > User input at line 17, trigger word "get(": - formula = request.form.get('formula') -Reassigned in: - File: WebCalculator/run.py - > Line 20: result = c.cal(formula) - File: WebCalculator/run.py - > Line 23: ret_MAYBE_FUNCTION_NAME = jsonify('msg''formula is none.') - File: WebCalculator/run.py - > Line 24: ret_MAYBE_FUNCTION_NAME = jsonify('msg''error') -File: WebCalculator/run.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('result''msg'result'ok') - - - -melevittfl/message2email -https://github.com/melevittfl/message2email -Entry file: message2email/message2email.py -Scanned: 2016-10-19 09:46:48.615916 -No vulnerabilities found. - - -nuvipannu/judgemental-eye -https://github.com/nuvipannu/judgemental-eye -Entry file: judgemental-eye/server.py -Scanned: 2016-10-19 09:46:53.269247 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jon-engelbert/catalog -https://github.com/jon-engelbert/catalog -Entry file: catalog/finalproject.py -Scanned: 2016-10-19 09:46:55.314817 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tiffany8/Shopping-Site-Exercise -https://github.com/Tiffany8/Shopping-Site-Exercise -Entry file: Shopping-Site-Exercise/shoppingsite.py -Scanned: 2016-10-19 09:46:56.900695 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shabemdadi/Ratings-Site -https://github.com/shabemdadi/Ratings-Site -Entry file: Ratings-Site/server.py -Scanned: 2016-10-19 09:46:59.759385 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Leo-G/Flask-Scaffold -https://github.com/Leo-G/Flask-Scaffold -Entry file: None -Scanned: 2016-10-19 09:47:07.177058 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Leo-G/Flask-Scaffold. - -viniciuschiele/flask-apscheduler -https://github.com/viniciuschiele/flask-apscheduler -Entry file: flask-apscheduler/examples/allowed_host.py -Scanned: 2016-10-19 09:47:08.671061 -No vulnerabilities found. - - -miguelgrinberg/flasky-with-celery -https://github.com/miguelgrinberg/flasky-with-celery -Entry file: flasky-with-celery/app/__init__.py -Scanned: 2016-10-19 09:47:10.206289 -Vulnerability 1: -File: flasky-with-celery/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-with-celery/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-with-celery/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky-with-celery/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-with-celery/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-with-celery/app/api_1_0/users.py - > Line 20: prev = None - File: flasky-with-celery/app/api_1_0/users.py - > Line 23: next = None -File: flasky-with-celery/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: flasky-with-celery/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-with-celery/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-with-celery/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky-with-celery/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-with-celery/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-with-celery/app/api_1_0/users.py - > Line 42: prev = None - File: flasky-with-celery/app/api_1_0/users.py - > Line 45: next = None -File: flasky-with-celery/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: flasky-with-celery/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-with-celery/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-with-celery/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky-with-celery/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-with-celery/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-with-celery/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky-with-celery/app/api_1_0/posts.py - > Line 19: next = None -File: flasky-with-celery/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flasky-with-celery/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-with-celery/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky-with-celery/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky-with-celery/app/api_1_0/comments.py - > Line 18: next = None -File: flasky-with-celery/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: flasky-with-celery/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-with-celery/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky-with-celery/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky-with-celery/app/api_1_0/comments.py - > Line 46: next = None -File: flasky-with-celery/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -hoangminhitvn/flask -https://github.com/hoangminhitvn/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:47:11.148733 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -alvingeek/flask -https://github.com/alvingeek/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:47:12.014436 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -St-B/flask -https://github.com/St-B/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:47:12.880493 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -IndicoDataSolutions/indi-flask -https://github.com/IndicoDataSolutions/indi-flask -Entry file: indi-flask/app.py -Scanned: 2016-10-19 09:47:14.326174 -No vulnerabilities found. - - -mattmakai/video-service-flask -https://github.com/mattmakai/video-service-flask -Entry file: None -Scanned: 2016-10-19 09:47:15.992690 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mattmakai/video-service-flask. - -twaldear/flask-secure-headers -https://github.com/twaldear/flask-secure-headers -Entry file: flask-secure-headers/flask_secure_headers/tests/core_test.py -Scanned: 2016-10-19 09:47:17.472132 -No vulnerabilities found. - - -russomi/appengine-python-flask-travis-ci -https://github.com/russomi/appengine-python-flask-travis-ci -Entry file: appengine-python-flask-travis-ci/main.py -Scanned: 2016-10-19 09:47:18.909139 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -realpython/flask-matplotlib -https://github.com/realpython/flask-matplotlib -Entry file: flask-matplotlib/app.py -Scanned: 2016-10-19 09:47:20.122746 -No vulnerabilities found. - - -russomi/flasky-appengine -https://github.com/russomi/flasky-appengine -Entry file: flasky-appengine/app/__init__.py -Scanned: 2016-10-19 09:47:21.756887 -Vulnerability 1: -File: flasky-appengine/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-appengine/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-appengine/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky-appengine/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-appengine/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-appengine/app/api_1_0/users.py - > Line 20: prev = None - File: flasky-appengine/app/api_1_0/users.py - > Line 23: next = None -File: flasky-appengine/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: flasky-appengine/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-appengine/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-appengine/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky-appengine/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-appengine/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-appengine/app/api_1_0/users.py - > Line 42: prev = None - File: flasky-appengine/app/api_1_0/users.py - > Line 45: next = None -File: flasky-appengine/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: flasky-appengine/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-appengine/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-appengine/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky-appengine/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-appengine/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-appengine/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky-appengine/app/api_1_0/posts.py - > Line 19: next = None -File: flasky-appengine/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flasky-appengine/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-appengine/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky-appengine/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky-appengine/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky-appengine/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky-appengine/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky-appengine/app/api_1_0/comments.py - > Line 18: next = None -File: flasky-appengine/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: flasky-appengine/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-appengine/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky-appengine/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky-appengine/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky-appengine/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky-appengine/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky-appengine/app/api_1_0/comments.py - > Line 46: next = None -File: flasky-appengine/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -vagarsak/Chip-n-Dale -https://github.com/vagarsak/Chip-n-Dale -Entry file: Chip-n-Dale/flaskr.py -Scanned: 2016-10-19 09:47:23.217695 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -FireDrunk/ZFSmond -https://github.com/FireDrunk/ZFSmond -Entry file: None -Scanned: 2016-10-19 09:47:38.057347 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/FireDrunk/ZFSmond. - -yesdoc/api -https://github.com/yesdoc/api -Entry file: api/app/__init__.py -Scanned: 2016-10-19 09:47:39.785854 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -viile/flask_test -https://github.com/viile/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 09:47:40.399412 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Running-Snail/flask-backend -https://github.com/Running-Snail/flask-backend -Entry file: flask-backend/main.py -Scanned: 2016-10-19 09:47:41.626169 -No vulnerabilities found. - - -z20/flaskmicroblog -https://github.com/z20/flaskmicroblog -Entry file: None -Scanned: 2016-10-19 09:47:47.483456 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ericso/flaskr -https://github.com/ericso/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:47:47.972962 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bdeangelis/flasker -https://github.com/bdeangelis/flasker -Entry file: flasker/flask-hello-world/app.py -Scanned: 2016-10-19 09:47:49.211056 -No vulnerabilities found. - - -dmanier/flasktaskr -https://github.com/dmanier/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:47:49.713262 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -brainsqueeze/FlaskExamples -https://github.com/brainsqueeze/FlaskExamples -Entry file: FlaskExamples/app.py -Scanned: 2016-10-19 09:47:50.930676 -No vulnerabilities found. - - -mqchau/flask2 -https://github.com/mqchau/flask2 -Entry file: flask2/app.py -Scanned: 2016-10-19 09:47:52.167687 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -terrybu/flaskPractice -https://github.com/terrybu/flaskPractice -Entry file: flaskPractice/app/__init__.py -Scanned: 2016-10-19 09:47:53.473937 -No vulnerabilities found. - - -patallen/FlaskAPI -https://github.com/patallen/FlaskAPI -Entry file: FlaskAPI/app.py -Scanned: 2016-10-19 09:47:54.847775 -No vulnerabilities found. - - -dmi-try/flask-sandbox -https://github.com/dmi-try/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-19 09:47:55.368073 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Cyrus-Xi/Microblog-Flask -https://github.com/Cyrus-Xi/Microblog-Flask -Entry file: Microblog-Flask/app/__init__.py -Scanned: 2016-10-19 09:47:56.705551 -No vulnerabilities found. - - -jstnstwrt/heroku-flask -https://github.com/jstnstwrt/heroku-flask -Entry file: heroku-flask/app.py -Scanned: 2016-10-19 09:47:59.604571 -No vulnerabilities found. - - -mjheller/thundrFlask -https://github.com/mjheller/thundrFlask -Entry file: thundrFlask/Src/routes.py -Scanned: 2016-10-19 09:48:05.322720 -No vulnerabilities found. - - -tinta/flask-jags -https://github.com/tinta/flask-jags -Entry file: flask-jags/server/app/routes.py -Scanned: 2016-10-19 09:48:06.817025 -No vulnerabilities found. - - -armeo/docker-flask -https://github.com/armeo/docker-flask -Entry file: docker-flask/app.py -Scanned: 2016-10-19 09:48:10.061051 -No vulnerabilities found. - - -gilsondev/flask_wordcounts -https://github.com/gilsondev/flask_wordcounts -Entry file: flask_wordcounts/app.py -Scanned: 2016-10-19 09:48:11.341504 -No vulnerabilities found. - - -gilsondev/flask_talks -https://github.com/gilsondev/flask_talks -Entry file: flask_talks/app/__init__.py -Scanned: 2016-10-19 09:48:12.703162 -No vulnerabilities found. - - -pattisdr/flask_microblog -https://github.com/pattisdr/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 09:48:13.236389 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -inaki/flask-stripe -https://github.com/inaki/flask-stripe -Entry file: flask-stripe/app/__init__.py -Scanned: 2016-10-19 09:48:18.333630 -No vulnerabilities found. - - -c1f3r/flask_tutor -https://github.com/c1f3r/flask_tutor -Entry file: flask_tutor/tmp/main.py -Scanned: 2016-10-19 09:48:19.638871 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cryptosan/flask-board -https://github.com/cryptosan/flask-board -Entry file: flask-board/app/__init__.py -Scanned: 2016-10-19 09:48:21.053046 -No vulnerabilities found. - - -ericso/microblog-flask -https://github.com/ericso/microblog-flask -Entry file: microblog-flask/app/__init__.py -Scanned: 2016-10-19 09:48:22.822604 -No vulnerabilities found. - - -VovaT/Flask_start -https://github.com/VovaT/Flask_start -Entry file: Flask_start/app/__init__.py -Scanned: 2016-10-19 09:48:24.567306 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ydawant/twitter_flask -https://github.com/ydawant/twitter_flask -Entry file: twitter_flask/api.py -Scanned: 2016-10-19 09:48:26.114172 -No vulnerabilities found. - - -ovidiucs/flask-blog -https://github.com/ovidiucs/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:48:26.662496 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -jjclark1982/flask-example -https://github.com/jjclark1982/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-19 09:48:27.156566 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dannguyen/flask-firerain -https://github.com/dannguyen/flask-firerain -Entry file: flask-firerain/app.py -Scanned: 2016-10-19 09:48:38.859955 -Vulnerability 1: -File: flask-firerain/app.py - > User input at line 24, trigger word "get(": - address = request.form.get('address') -Reassigned in: - File: flask-firerain/app.py - > Line 26: fixed_path = quote_plus(address) -File: flask-firerain/app.py - > reaches line 27, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/address/%s' % fixed_path) - - - -dmanier/flask-blog -https://github.com/dmanier/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:48:40.438543 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -manjithd2/flask-webpoll -https://github.com/manjithd2/flask-webpoll -Entry file: flask-webpoll/app.py -Scanned: 2016-10-19 09:48:45.092791 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-webpoll/env/lib/python2.7/genericpath.py - -Leo-G/Flask-Search -https://github.com/Leo-G/Flask-Search -Entry file: Flask-Search/app/__init__.py -Scanned: 2016-10-19 09:48:49.819927 -Vulnerability 1: -File: Flask-Search/app/users/views.py - > User input at line 28, trigger word ".data": - tags = schema.dump(query,many=True).data -File: Flask-Search/app/users/views.py - > reaches line 29, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('tags'tags) - - - -gekkey/Flask-Auth -https://github.com/gekkey/Flask-Auth -Entry file: None -Scanned: 2016-10-19 09:48:51.080914 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/gekkey/Flask-Auth. - -pazzo83/microblog -https://github.com/pazzo83/microblog -Entry file: None -Scanned: 2016-10-19 09:48:51.602259 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -TimIainMarsh/microblog -https://github.com/TimIainMarsh/microblog -Entry file: None -Scanned: 2016-10-19 09:48:52.117451 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -motomizuki/FlaskApplicationTemplate -https://github.com/motomizuki/FlaskApplicationTemplate -Entry file: FlaskApplicationTemplate/app/__init__.py -Scanned: 2016-10-19 09:48:53.343801 -No vulnerabilities found. - - -18F/cg-quotas-db -https://github.com/18F/cg-quotas-db -Entry file: None -Scanned: 2016-10-19 09:48:54.895039 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/18F/cg-quotas-db. - -EricSchles/sample_flask_ember -https://github.com/EricSchles/sample_flask_ember -Entry file: sample_flask_ember/app.py -Scanned: 2016-10-19 09:48:56.105472 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kongling893/Personal_Website_Python_Flask -https://github.com/kongling893/Personal_Website_Python_Flask -Entry file: Personal_Website_Python_Flask/website.py -Scanned: 2016-10-19 09:49:00.791160 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MentorWebServiceTeam/flask-config-override -https://github.com/MentorWebServiceTeam/flask-config-override -Entry file: flask-config-override/tests/basic_flask_test.py -Scanned: 2016-10-19 09:49:02.025177 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mitulshah44/flask_crud_app -https://github.com/mitulshah44/flask_crud_app -Entry file: flask_crud_app/config.py -Scanned: 2016-10-19 09:49:05.444579 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mdevey/Demo-Flask-GUnicorn -https://github.com/mdevey/Demo-Flask-GUnicorn -Entry file: Demo-Flask-GUnicorn/app.py -Scanned: 2016-10-19 09:49:06.649912 -No vulnerabilities found. - - -florije1988/flask_celery_redis -https://github.com/florije1988/flask_celery_redis -Entry file: flask_celery_redis/redis_demo.py -Scanned: 2016-10-19 09:49:07.152437 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rasalt/flask_hello_world -https://github.com/rasalt/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:49:07.640921 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasalt/flask_hello_world. - -jstnstwrt/lightweight_flask_app -https://github.com/jstnstwrt/lightweight_flask_app -Entry file: lightweight_flask_app/app.py -Scanned: 2016-10-19 09:49:08.852645 -No vulnerabilities found. - - -heyitzaustin/DraftStocked-Flask -https://github.com/heyitzaustin/DraftStocked-Flask -Entry file: DraftStocked-Flask/FlaskApp/__init__.py -Scanned: 2016-10-19 09:49:11.928176 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: DraftStocked-Flask/FlaskApp/venv/lib/python3.4/struct.py - -infoliebich123/Web-Application-with-Flask -https://github.com/infoliebich123/Web-Application-with-Flask -Entry file: Web-Application-with-Flask/app/__init__.py -Scanned: 2016-10-19 09:49:15.621176 -Vulnerability 1: -File: Web-Application-with-Flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 20: prev = None - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 23: next = None -File: Web-Application-with-Flask/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: Web-Application-with-Flask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 42: prev = None - File: Web-Application-with-Flask/app/api_1_0/users.py - > Line 45: next = None -File: Web-Application-with-Flask/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: Web-Application-with-Flask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Web-Application-with-Flask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Web-Application-with-Flask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: Web-Application-with-Flask/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: Web-Application-with-Flask/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: Web-Application-with-Flask/app/api_1_0/posts.py - > Line 16: prev = None - File: Web-Application-with-Flask/app/api_1_0/posts.py - > Line 19: next = None -File: Web-Application-with-Flask/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: Web-Application-with-Flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 15: prev = None - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 18: next = None -File: Web-Application-with-Flask/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: Web-Application-with-Flask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 43: prev = None - File: Web-Application-with-Flask/app/api_1_0/comments.py - > Line 46: next = None -File: Web-Application-with-Flask/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -saromanov/twitter-flask-app -https://github.com/saromanov/twitter-flask-app -Entry file: twitter-flask-app/app.py -Scanned: 2016-10-19 09:49:17.313432 -No vulnerabilities found. - - -rlazoryshchak/flask-mongo-login -https://github.com/rlazoryshchak/flask-mongo-login -Entry file: flask-mongo-login/app.py -Scanned: 2016-10-19 09:49:18.878269 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maqwqa/flask-mongodb-tumblelog -https://github.com/maqwqa/flask-mongodb-tumblelog -Entry file: flask-mongodb-tumblelog/tumblelog/__init__.py -Scanned: 2016-10-19 09:49:22.593079 -No vulnerabilities found. - - -balloon-studios/cf-example-flask -https://github.com/balloon-studios/cf-example-flask -Entry file: cf-example-flask/app.py -Scanned: 2016-10-19 09:49:23.867833 -No vulnerabilities found. - - -jamesfowkes/Flask-By-Example -https://github.com/jamesfowkes/Flask-By-Example -Entry file: Flask-By-Example/app.py -Scanned: 2016-10-19 09:49:25.102688 -No vulnerabilities found. - - -nithintech/blog-app-using-flask -https://github.com/nithintech/blog-app-using-flask -Entry file: None -Scanned: 2016-10-19 09:49:27.664278 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nithintech/blog-app-using-flask. - -allanlewis/stb-inventory-flask-mongo -https://github.com/allanlewis/stb-inventory-flask-mongo -Entry file: stb-inventory-flask-mongo/stb_inventory/__init__.py -Scanned: 2016-10-19 09:49:29.384587 -No vulnerabilities found. - - -lukehammer/flask-by-example -https://github.com/lukehammer/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 09:49:39.638555 -No vulnerabilities found. - - -SiliconValleyInsight/flask-api-template -https://github.com/SiliconValleyInsight/flask-api-template -Entry file: flask-api-template/app/__init__.py -Scanned: 2016-10-19 09:49:42.976491 -No vulnerabilities found. - - -erroneousboat/docker-flask-elasticseach -https://github.com/erroneousboat/docker-flask-elasticseach -Entry file: docker-flask-elasticseach/code/app/__init__.py -Scanned: 2016-10-19 09:49:44.308310 -No vulnerabilities found. - - -inaki/flask-leaflet-draw -https://github.com/inaki/flask-leaflet-draw -Entry file: flask-leaflet-draw/app/__init__.py -Scanned: 2016-10-19 09:49:49.656243 -No vulnerabilities found. - - -rayray1/Tasker---4 -https://github.com/rayray1/Tasker---4 -Entry file: Tasker---4/env/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 09:49:57.606881 -No vulnerabilities found. - - -johnwook/trevari-api -https://github.com/johnwook/trevari-api -Entry file: trevari-api/manage.py -Scanned: 2016-10-19 09:49:59.015102 -No vulnerabilities found. - - -skiermw/WTF -https://github.com/skiermw/WTF -Entry file: None -Scanned: 2016-10-19 09:50:04.610081 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -KolevDarko/flasky-extended -https://github.com/KolevDarko/flasky-extended -Entry file: flasky-extended/app/__init__.py -Scanned: 2016-10-19 09:50:06.274181 -Vulnerability 1: -File: flasky-extended/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-extended/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-extended/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky-extended/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-extended/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-extended/app/api_1_0/users.py - > Line 20: prev = None - File: flasky-extended/app/api_1_0/users.py - > Line 23: next = None -File: flasky-extended/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: flasky-extended/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-extended/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-extended/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky-extended/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-extended/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-extended/app/api_1_0/users.py - > Line 42: prev = None - File: flasky-extended/app/api_1_0/users.py - > Line 45: next = None -File: flasky-extended/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: flasky-extended/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-extended/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-extended/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky-extended/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-extended/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-extended/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky-extended/app/api_1_0/posts.py - > Line 19: next = None -File: flasky-extended/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flasky-extended/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-extended/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky-extended/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky-extended/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky-extended/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky-extended/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky-extended/app/api_1_0/comments.py - > Line 18: next = None -File: flasky-extended/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: flasky-extended/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-extended/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky-extended/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky-extended/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky-extended/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky-extended/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky-extended/app/api_1_0/comments.py - > Line 46: next = None -File: flasky-extended/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -hello-albee/my_flasky -https://github.com/hello-albee/my_flasky -Entry file: None -Scanned: 2016-10-19 09:50:07.615107 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hello-albee/my_flasky. - -paradox41/tuber -https://github.com/paradox41/tuber -Entry file: None -Scanned: 2016-10-19 09:50:09.058754 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/paradox41/tuber. - -rayray1/Tasker---3 -https://github.com/rayray1/Tasker---3 -Entry file: Tasker---3/env/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 09:50:12.470626 -No vulnerabilities found. - - -rogerhoward/iiify -https://github.com/rogerhoward/iiify -Entry file: iiify/iiify.py -Scanned: 2016-10-19 09:50:18.925689 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -malltshik/flmanage -https://github.com/malltshik/flmanage -Entry file: flmanage/flmanage/data/app.py -Scanned: 2016-10-19 09:50:21.199620 -No vulnerabilities found. - - -peteshadbolt/nhs -https://github.com/peteshadbolt/nhs -Entry file: nhs/nhs.py -Scanned: 2016-10-19 09:50:21.698018 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -varunrisbud/StarBucks -https://github.com/varunrisbud/StarBucks -Entry file: StarBucks/OrderQueue.py -Scanned: 2016-10-19 09:50:23.064769 -Vulnerability 1: -File: StarBucks/OrderQueue.py - > User input at line 72, trigger word "get(": - order = orderQueue.get(block=False) -Reassigned in: - File: StarBucks/OrderQueue.py - > Line 75: responsedata = 'custId''customerName''itemName'order.customeridorder.customernameorder.itemname - File: StarBucks/OrderQueue.py - > Line 84: ret_MAYBE_FUNCTION_NAME = jsondata - File: StarBucks/OrderQueue.py - > Line 64: responsedata = 'status''No order' -File: StarBucks/OrderQueue.py - > reaches line 68, trigger word "jsonify(": - jsondata = jsonify(responsedata) - -Vulnerability 2: -File: StarBucks/OrderQueue.py - > User input at line 72, trigger word "get(": - order = orderQueue.get(block=False) -Reassigned in: - File: StarBucks/OrderQueue.py - > Line 75: responsedata = 'custId''customerName''itemName'order.customeridorder.customernameorder.itemname - File: StarBucks/OrderQueue.py - > Line 84: ret_MAYBE_FUNCTION_NAME = jsondata - File: StarBucks/OrderQueue.py - > Line 64: responsedata = 'status''No order' -File: StarBucks/OrderQueue.py - > reaches line 81, trigger word "jsonify(": - jsondata = jsonify(responsedata) - -Vulnerability 3: -File: StarBucks/CashierQueue.py - > User input at line 31, trigger word "get(": - custId = q.custQueue.get(block=False) -Reassigned in: - File: StarBucks/CashierQueue.py - > Line 29: ret_MAYBE_FUNCTION_NAME = (jsonify('status''No Customer in queue'), 204) -File: StarBucks/CashierQueue.py - > reaches line 32, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('status''id''customer deleted successfully'custId), 200) - - - -nmutalik/groupme-analytics -https://github.com/nmutalik/groupme-analytics -Entry file: groupme-analytics/hello.py -Scanned: 2016-10-19 09:50:24.899527 -No vulnerabilities found. - - -truep/truep_blog -https://github.com/truep/truep_blog -Entry file: truep_blog/app.py -Scanned: 2016-10-19 09:50:26.217312 -No vulnerabilities found. - - -patallen/patallen.me -https://github.com/patallen/patallen.me -Entry file: None -Scanned: 2016-10-19 09:50:27.788223 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/patallen/patallen.me. - -shinjs0728/chatapp -https://github.com/shinjs0728/chatapp -Entry file: None -Scanned: 2016-10-19 09:50:30.550390 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jeffsp/ratex -https://github.com/jeffsp/ratex -Entry file: ratex/test_runkeeper.py -Scanned: 2016-10-19 09:50:33.012342 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mad01/hermit -https://github.com/mad01/hermit -Entry file: hermit/src/app.py -Scanned: 2016-10-19 09:50:34.699346 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -nchronas/webServerPython -https://github.com/nchronas/webServerPython -Entry file: webServerPython/server.py -Scanned: 2016-10-19 09:50:35.926606 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -steny138/TwssApi -https://github.com/steny138/TwssApi -Entry file: TwssApi/app.py -Scanned: 2016-10-19 09:50:37.159157 -No vulnerabilities found. - - -boshika/Python -https://github.com/boshika/Python -Entry file: Python/Flask_test.py -Scanned: 2016-10-19 09:50:38.282766 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cfmeyers/acme-wines -https://github.com/cfmeyers/acme-wines -Entry file: acme-wines/app.py -Scanned: 2016-10-19 09:50:39.609118 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mardix/flask-cloudy -https://github.com/mardix/flask-cloudy -Entry file: flask-cloudy/example/app.py -Scanned: 2016-10-19 09:50:42.349559 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miguelgrinberg/flasky-with-celery -https://github.com/miguelgrinberg/flasky-with-celery -Entry file: flasky-with-celery/app/__init__.py -Scanned: 2016-10-19 09:50:43.880298 -Vulnerability 1: -File: flasky-with-celery/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-with-celery/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-with-celery/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky-with-celery/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-with-celery/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-with-celery/app/api_1_0/users.py - > Line 20: prev = None - File: flasky-with-celery/app/api_1_0/users.py - > Line 23: next = None -File: flasky-with-celery/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: flasky-with-celery/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-with-celery/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-with-celery/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky-with-celery/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-with-celery/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-with-celery/app/api_1_0/users.py - > Line 42: prev = None - File: flasky-with-celery/app/api_1_0/users.py - > Line 45: next = None -File: flasky-with-celery/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: flasky-with-celery/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-with-celery/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-with-celery/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky-with-celery/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-with-celery/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-with-celery/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky-with-celery/app/api_1_0/posts.py - > Line 19: next = None -File: flasky-with-celery/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flasky-with-celery/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-with-celery/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky-with-celery/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky-with-celery/app/api_1_0/comments.py - > Line 18: next = None -File: flasky-with-celery/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: flasky-with-celery/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-with-celery/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky-with-celery/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky-with-celery/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky-with-celery/app/api_1_0/comments.py - > Line 46: next = None -File: flasky-with-celery/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -chanyying/Flask -https://github.com/chanyying/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:50:44.415689 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoangminhitvn/flask -https://github.com/hoangminhitvn/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:50:45.304769 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -IndicoDataSolutions/indi-flask -https://github.com/IndicoDataSolutions/indi-flask -Entry file: indi-flask/app.py -Scanned: 2016-10-19 09:50:49.218762 -No vulnerabilities found. - - -kpurdon/docker-flask-todo -https://github.com/kpurdon/docker-flask-todo -Entry file: docker-flask-todo/app.py -Scanned: 2016-10-19 09:50:54.463253 -No vulnerabilities found. - - -russomi/flasky-appengine -https://github.com/russomi/flasky-appengine -Entry file: flasky-appengine/app/__init__.py -Scanned: 2016-10-19 09:51:02.576513 -Vulnerability 1: -File: flasky-appengine/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-appengine/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-appengine/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky-appengine/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-appengine/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-appengine/app/api_1_0/users.py - > Line 20: prev = None - File: flasky-appengine/app/api_1_0/users.py - > Line 23: next = None -File: flasky-appengine/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: flasky-appengine/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-appengine/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-appengine/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky-appengine/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-appengine/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-appengine/app/api_1_0/users.py - > Line 42: prev = None - File: flasky-appengine/app/api_1_0/users.py - > Line 45: next = None -File: flasky-appengine/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: flasky-appengine/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-appengine/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky-appengine/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky-appengine/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky-appengine/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky-appengine/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky-appengine/app/api_1_0/posts.py - > Line 19: next = None -File: flasky-appengine/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flasky-appengine/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-appengine/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky-appengine/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky-appengine/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky-appengine/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky-appengine/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky-appengine/app/api_1_0/comments.py - > Line 18: next = None -File: flasky-appengine/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: flasky-appengine/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky-appengine/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky-appengine/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky-appengine/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky-appengine/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky-appengine/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky-appengine/app/api_1_0/comments.py - > Line 46: next = None -File: flasky-appengine/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -mattharley/flask-geoip2 -https://github.com/mattharley/flask-geoip2 -Entry file: flask-geoip2/app.py -Scanned: 2016-10-19 09:51:07.954231 -No vulnerabilities found. - - -trendsetter37/Flaskdev -https://github.com/trendsetter37/Flaskdev -Entry file: Flaskdev/hello.py -Scanned: 2016-10-19 09:51:09.325771 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yooner/flasker -https://github.com/yooner/flasker -Entry file: flasker/flasker.py -Scanned: 2016-10-19 09:51:10.584210 -No vulnerabilities found. - - -zedzew/flaskblog -https://github.com/zedzew/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 09:51:11.099784 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -princeli/flaskr -https://github.com/princeli/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:51:14.624198 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ni8mr/Flasktaskr -https://github.com/ni8mr/Flasktaskr -Entry file: Flasktaskr/flask_api.py -Scanned: 2016-10-19 09:51:24.516789 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NearTan/FlaskBase -https://github.com/NearTan/FlaskBase -Entry file: FlaskBase/app_name/app.py -Scanned: 2016-10-19 09:51:25.860741 -No vulnerabilities found. - - -iamchenxin/flask1 -https://github.com/iamchenxin/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-19 09:51:30.374144 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -sdingex/FlaskDemo -https://github.com/sdingex/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 09:51:30.890830 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tusharbabbar/FlaskScaffoldings -https://github.com/tusharbabbar/FlaskScaffoldings -Entry file: FlaskScaffoldings/core/app/__init__.py -Scanned: 2016-10-19 09:51:32.733708 -No vulnerabilities found. - - -samskeller/flask_demo -https://github.com/samskeller/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-19 09:51:33.240021 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -henrynguyen7/tapease-flask -https://github.com/henrynguyen7/tapease-flask -Entry file: tapease-flask/model.py -Scanned: 2016-10-19 09:51:34.586597 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tylerlim/flask_python -https://github.com/tylerlim/flask_python -Entry file: flask_python/app.py -Scanned: 2016-10-19 09:51:37.445123 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_python/venv/lib/python2.7/genericpath.py - -MasterGip/microblog_flask -https://github.com/MasterGip/microblog_flask -Entry file: microblog_flask/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 09:51:38.124962 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ethan-jiang-1/flask_sample -https://github.com/ethan-jiang-1/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-19 09:51:39.369992 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -myang321/myFlask -https://github.com/myang321/myFlask -Entry file: myFlask/project.py -Scanned: 2016-10-19 09:51:40.666887 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -okmyomar/flask-implementation -https://github.com/okmyomar/flask-implementation -Entry file: None -Scanned: 2016-10-19 09:51:41.901926 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/okmyomar/flask-implementation. - -bbirec/flask-template -https://github.com/bbirec/flask-template -Entry file: None -Scanned: 2016-10-19 09:51:42.415367 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bbirec/flask-template. - -thanhson1085/flask-webhdfs -https://github.com/thanhson1085/flask-webhdfs -Entry file: flask-webhdfs/app/__init__.py -Scanned: 2016-10-19 09:51:44.414710 -No vulnerabilities found. - - -macjustice/garage-flask -https://github.com/macjustice/garage-flask -Entry file: garage-flask/run.py -Scanned: 2016-10-19 09:51:45.704803 -No vulnerabilities found. - - -lisbitid/less_flask -https://github.com/lisbitid/less_flask -Entry file: less_flask/test/flask_admin_examples/quickstart/app.py -Scanned: 2016-10-19 09:52:23.340207 -No vulnerabilities found. - - -qdzzyb2014/flask-test -https://github.com/qdzzyb2014/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 09:52:24.691938 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -raghavendra990/Flask-website -https://github.com/raghavendra990/Flask-website -Entry file: Flask-website/app.py -Scanned: 2016-10-19 09:52:29.998141 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jesscxu/Flask_Attempt -https://github.com/jesscxu/Flask_Attempt -Entry file: None -Scanned: 2016-10-19 09:52:33.837684 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fuhrer196/HelloFlask -https://github.com/fuhrer196/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-19 09:52:34.350101 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -extraordinarius/flask_microblog -https://github.com/extraordinarius/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 09:52:34.859875 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Leo-G/Flask-Search -https://github.com/Leo-G/Flask-Search -Entry file: Flask-Search/app/__init__.py -Scanned: 2016-10-19 09:52:38.853995 -Vulnerability 1: -File: Flask-Search/app/users/views.py - > User input at line 28, trigger word ".data": - tags = schema.dump(query,many=True).data -File: Flask-Search/app/users/views.py - > reaches line 29, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('tags'tags) - - - -bloomark/f13x -https://github.com/bloomark/f13x -Entry file: f13x/app/__init__.py -Scanned: 2016-10-19 09:52:40.635346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miscbits/flaskTestApp -https://github.com/miscbits/flaskTestApp -Entry file: flaskTestApp/hello.py -Scanned: 2016-10-19 09:52:43.492114 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskTestApp/venv/lib/python3.4/struct.py - -giantswarm/python-flask-helloworld -https://github.com/giantswarm/python-flask-helloworld -Entry file: python-flask-helloworld/server.py -Scanned: 2016-10-19 09:52:44.714972 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -igsm/Flask-SocialApp -https://github.com/igsm/Flask-SocialApp -Entry file: Flask-SocialApp/app.py -Scanned: 2016-10-19 09:52:46.056661 -No vulnerabilities found. - - -zeugmato/awesome-flask-todo -https://github.com/zeugmato/awesome-flask-todo -Entry file: None -Scanned: 2016-10-19 09:52:47.281897 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeugmato/awesome-flask-todo. - -nankej/flask-by-example -https://github.com/nankej/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 09:52:48.526084 -No vulnerabilities found. - - -OmieP/flask-hello-world -https://github.com/OmieP/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:52:49.071067 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -2blesd2bstresd/flask_web_app -https://github.com/2blesd2bstresd/flask_web_app -Entry file: flask_web_app/project/__init__.py -Scanned: 2016-10-19 09:52:50.419137 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jstnstwrt/flask-restaurant-app -https://github.com/jstnstwrt/flask-restaurant-app -Entry file: flask-restaurant-app/app.py -Scanned: 2016-10-19 09:52:52.245313 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -annanymouse/flask_hello_world -https://github.com/annanymouse/flask_hello_world -Entry file: None -Scanned: 2016-10-19 09:52:52.760712 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/annanymouse/flask_hello_world. - -ryankanno/cookiecutter-flask-api -https://github.com/ryankanno/cookiecutter-flask-api -Entry file: None -Scanned: 2016-10-19 09:52:54.082272 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ryankanno/cookiecutter-flask-api. - -Hellemos/flask-intro-posts -https://github.com/Hellemos/flask-intro-posts -Entry file: flask-intro-posts/app.py -Scanned: 2016-10-19 09:52:57.226237 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-intro-posts/venv/lib/python2.7/genericpath.py - -mausch/python-flask-gunicorn-docker -https://github.com/mausch/python-flask-gunicorn-docker -Entry file: python-flask-gunicorn-docker/server.py -Scanned: 2016-10-19 09:52:58.446003 -No vulnerabilities found. - - -fainle/flask_restful_angularjs_blog -https://github.com/fainle/flask_restful_angularjs_blog -Entry file: flask_restful_angularjs_blog/site-packages/flask/sessions.py -Scanned: 2016-10-19 09:53:01.159370 -No vulnerabilities found. - - -saulgray/nemio-flask-old -https://github.com/saulgray/nemio-flask-old -Entry file: None -Scanned: 2016-10-19 09:53:06.878202 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -allingeek/dockerized-hello-flask -https://github.com/allingeek/dockerized-hello-flask -Entry file: dockerized-hello-flask/hihi.py -Scanned: 2016-10-19 09:53:08.114384 -No vulnerabilities found. - - -agleister/flaskr_tutorial -https://github.com/agleister/flaskr_tutorial -Entry file: flaskr_tutorial/flaskr/flaskr.py -Scanned: 2016-10-19 09:53:09.794495 -No vulnerabilities found. - - -purejade/myflask -https://github.com/purejade/myflask -Entry file: myflask/app/__init__.py -Scanned: 2016-10-19 09:53:12.572371 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Erachter/logsys -https://github.com/Erachter/logsys -Entry file: logsys/app.py -Scanned: 2016-10-19 09:53:14.650048 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jpashok/customer -https://github.com/jpashok/customer -Entry file: customer/flask/webapp/app.py -Scanned: 2016-10-19 09:53:27.036057 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cyb3rD/Game -https://github.com/cyb3rD/Game -Entry file: Game/app/__init__.py -Scanned: 2016-10-19 09:53:30.490728 -No vulnerabilities found. - - -skiermw/WTF -https://github.com/skiermw/WTF -Entry file: None -Scanned: 2016-10-19 09:53:32.129148 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -knitori/thumbnail-app -https://github.com/knitori/thumbnail-app -Entry file: None -Scanned: 2016-10-19 09:53:36.476902 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/knitori/thumbnail-app. - -scraperwiki/newsreader-api -https://github.com/scraperwiki/newsreader-api -Entry file: newsreader-api/app/__init__.py -Scanned: 2016-10-19 09:53:38.168373 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ttlttl/microblog -https://github.com/ttlttl/microblog -Entry file: None -Scanned: 2016-10-19 09:53:38.662322 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bboalimoe/senz.template.docker.multi.instan.flask -https://github.com/bboalimoe/senz.template.docker.multi.instan.flask -Entry file: None -Scanned: 2016-10-19 09:53:41.892532 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bboalimoe/senz.template.docker.multi.instan.flask. - -b-buehler/Blogful -https://github.com/b-buehler/Blogful -Entry file: Blogful/blog/__init__.py -Scanned: 2016-10-19 09:53:47.197916 -No vulnerabilities found. - - -aantonw/notesapi -https://github.com/aantonw/notesapi -Entry file: notesapi/notesapi.py -Scanned: 2016-10-19 09:53:48.440631 -Vulnerability 1: -File: notesapi/notesapi.py - > User input at line 106, trigger word "get(": - db = db_get() -Reassigned in: - File: notesapi/notesapi.py - > Line 107: dbnote = note_byid(db, note_id) - File: notesapi/notesapi.py - > Line 109: ret_MAYBE_FUNCTION_NAME = abort(404) -File: notesapi/notesapi.py - > reaches line 110, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('notes'dbnote) - -Vulnerability 2: -File: notesapi/notesapi.py - > User input at line 117, trigger word "get(": - note = 'title''content'request.json['title']request.json.get('content', '') -File: notesapi/notesapi.py - > reaches line 122, trigger word "execute(": - db.execute('INSERT INTO notes (title, content) VALUES (?, ?)', [note['title'], note['content']]) - -Vulnerability 3: -File: notesapi/notesapi.py - > User input at line 117, trigger word "get(": - note = 'title''content'request.json['title']request.json.get('content', '') -File: notesapi/notesapi.py - > reaches line 125, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('notes'note), 201) - -Vulnerability 4: -File: notesapi/notesapi.py - > User input at line 139, trigger word "get(": - note = 'title''content'request.json['title']request.json.get('content', '') -Reassigned in: - File: notesapi/notesapi.py - > Line 133: ret_MAYBE_FUNCTION_NAME = abort(404) -File: notesapi/notesapi.py - > reaches line 143, trigger word "execute(": - db.execute('UPDATE notes SET title=?, content=? WHERE id=?', [note['title'], note['content'], note_id]) - -Vulnerability 5: -File: notesapi/notesapi.py - > User input at line 139, trigger word "get(": - note = 'title''content'request.json['title']request.json.get('content', '') -Reassigned in: - File: notesapi/notesapi.py - > Line 133: ret_MAYBE_FUNCTION_NAME = abort(404) -File: notesapi/notesapi.py - > reaches line 146, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('notes'note) - - - -Namdeus/pirateapp -https://github.com/Namdeus/pirateapp -Entry file: pirateapp/app.py -Scanned: 2016-10-19 09:53:51.130775 -No vulnerabilities found. - - -Naoto-Ida/PiStats-Server -https://github.com/Naoto-Ida/PiStats-Server -Entry file: PiStats-Server/application/__init__.py -Scanned: 2016-10-19 09:53:52.828396 -No vulnerabilities found. - - -ThaWeatherman/text_command -https://github.com/ThaWeatherman/text_command -Entry file: text_command/run.py -Scanned: 2016-10-19 09:53:54.653875 -No vulnerabilities found. - - -MrNiebieski/RaspberryPiStreamming -https://github.com/MrNiebieski/RaspberryPiStreamming -Entry file: RaspberryPiStreamming/stream.py -Scanned: 2016-10-19 09:53:56.312723 -No vulnerabilities found. - - -anuradhavakil/FinalBusSimulator -https://github.com/anuradhavakil/FinalBusSimulator -Entry file: FinalBusSimulator/Bus.py -Scanned: 2016-10-19 09:53:57.629732 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Turistforeningen/sherpa-response -https://github.com/Turistforeningen/sherpa-response -Entry file: sherpa-response/flaskr/flaskr.py -Scanned: 2016-10-19 09:53:59.957223 -No vulnerabilities found. - - -LChristakis/chalice-hunter -https://github.com/LChristakis/chalice-hunter -Entry file: chalice-hunter/chalice-hunter.py -Scanned: 2016-10-19 09:54:04.542603 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: chalice-hunter/lib/python3.4/struct.py - -g12mcgov/Macon-Command-Center-API -https://github.com/g12mcgov/Macon-Command-Center-API -Entry file: Macon-Command-Center-API/app.py -Scanned: 2016-10-19 09:54:05.878745 -No vulnerabilities found. - - -jazzblue/mgorest -https://github.com/jazzblue/mgorest -Entry file: mgorest/mgorest/__init__.py -Scanned: 2016-10-19 09:54:07.226912 -No vulnerabilities found. - - -gouthambs/Flask-Blogging -https://github.com/gouthambs/Flask-Blogging -Entry file: Flask-Blogging/test/__init__.py -Scanned: 2016-10-19 09:54:10.440923 -No vulnerabilities found. - - -mardix/flask-cloudy -https://github.com/mardix/flask-cloudy -Entry file: flask-cloudy/example/app.py -Scanned: 2016-10-19 09:54:10.935428 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -convox-archive/flask -https://github.com/convox-archive/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:54:11.961879 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -onlytiancai/ansible-celery-flask-demo -https://github.com/onlytiancai/ansible-celery-flask-demo -Entry file: ansible-celery-flask-demo/app.py -Scanned: 2016-10-19 09:54:13.188000 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chanyying/Flask -https://github.com/chanyying/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:54:14.691896 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rituraj0/Flask -https://github.com/rituraj0/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:54:15.179632 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nylas/ansible-flask-example -https://github.com/nylas/ansible-flask-example -Entry file: ansible-flask-example/roles/app/files/flask_app.py -Scanned: 2016-10-19 09:54:29.996689 -No vulnerabilities found. - - -matteotiziano/secret-harbor -https://github.com/matteotiziano/secret-harbor -Entry file: secret-harbor/app.py -Scanned: 2016-10-19 09:54:34.252063 -Vulnerability 1: -File: secret-harbor/app.py - > User input at line 46, trigger word "get(": - hocr = request.form.get('hocr') or '' -Reassigned in: - File: secret-harbor/app.py - > Line 47: ext = hocr'.hocr''.txt' - File: secret-harbor/app.py - > Line 55: command = ['tesseract', input_file, output_file, '-l', request.form['lang'], hocr] - File: secret-harbor/app.py - > Line 56: proc = subprocess.Popen(command,stderr=subprocess.PIPE) - File: secret-harbor/app.py - > Line 59: output_file += ext - File: secret-harbor/app.py - > Line 62: f = open(output_file) - File: secret-harbor/app.py - > Line 52: output_file = os.path.join(folder, app.config['OCR_OUTPUT_FILE']) -File: secret-harbor/app.py - > reaches line 63, trigger word "jsonify(": - resp = jsonify('status''ocr'200{k : v.decode('utf-8') for (k, v) in enumerate(f.read().splitlines())}) - - - -sasubillis/flask_experiments -https://github.com/sasubillis/flask_experiments -Entry file: flask_experiments/main.py -Scanned: 2016-10-19 09:54:38.245449 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thanhson1085/flask-celery-rabbitmq-generate-thumbnail -https://github.com/thanhson1085/flask-celery-rabbitmq-generate-thumbnail -Entry file: flask-celery-rabbitmq-generate-thumbnail/server.py -Scanned: 2016-10-19 09:54:40.574034 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -letfly/flask-examples -https://github.com/letfly/flask-examples -Entry file: flask-examples/minitwit/minitwit.py -Scanned: 2016-10-19 09:54:43.125677 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -andrewheekin/flasky -https://github.com/andrewheekin/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 09:54:47.104320 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AbuzzT/flasktaskr -https://github.com/AbuzzT/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:54:47.593369 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kuba777/flasktaskr -https://github.com/kuba777/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:54:49.106955 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dbourdeveloper/flaskrdb -https://github.com/dbourdeveloper/flaskrdb -Entry file: flaskrdb/webapp.py -Scanned: 2016-10-19 09:54:53.869861 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskrdb/venv/lib/python2.7/genericpath.py - -byoungdale/flasktaskr -https://github.com/byoungdale/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:54:54.374182 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -akicqi/flaskr -https://github.com/akicqi/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:54:54.877548 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -taishi06/flaskr -https://github.com/taishi06/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:54:55.362922 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zedzew/flaskblog -https://github.com/zedzew/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 09:54:55.878987 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -nathanhilbert/flaskboiler -https://github.com/nathanhilbert/flaskboiler -Entry file: flaskboiler/flaskboiler/core.py -Scanned: 2016-10-19 09:54:57.333220 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Augustles/flaskdemo -https://github.com/Augustles/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 09:54:57.857636 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -abunsen/FlaskProxy -https://github.com/abunsen/FlaskProxy -Entry file: FlaskProxy/proxy.py -Scanned: 2016-10-19 09:55:01.677577 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -sarangbaheti/flaskpython1 -https://github.com/sarangbaheti/flaskpython1 -Entry file: flaskpython1/flask1.py -Scanned: 2016-10-19 09:55:03.020163 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iGaskin/FlaskExample -https://github.com/iGaskin/FlaskExample -Entry file: FlaskExample/routes.py -Scanned: 2016-10-19 09:55:06.524570 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PiJoules/FlaskApache -https://github.com/PiJoules/FlaskApache -Entry file: FlaskApache/__init__.py -Scanned: 2016-10-19 09:55:08.864353 -No vulnerabilities found. - - -IcedNecro/FlaskTask -https://github.com/IcedNecro/FlaskTask -Entry file: FlaskTask/modules/controller.py -Scanned: 2016-10-19 09:55:10.104835 -No vulnerabilities found. - - -myang321/myFlask -https://github.com/myang321/myFlask -Entry file: myFlask/project.py -Scanned: 2016-10-19 09:55:10.589872 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -okmyomar/flask-implementation -https://github.com/okmyomar/flask-implementation -Entry file: None -Scanned: 2016-10-19 09:55:12.103335 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/okmyomar/flask-implementation. - -Condla/flask-exp -https://github.com/Condla/flask-exp -Entry file: flask-exp/app.py -Scanned: 2016-10-19 09:55:13.331498 -No vulnerabilities found. - - -smoll/flask-container -https://github.com/smoll/flask-container -Entry file: flask-container/web/app.py -Scanned: 2016-10-19 09:55:14.560322 -No vulnerabilities found. - - -parvez210/flask-setup -https://github.com/parvez210/flask-setup -Entry file: None -Scanned: 2016-10-19 09:55:18.444456 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -joelviel/flask-jtable -https://github.com/joelviel/flask-jtable -Entry file: flask-jtable/main.py -Scanned: 2016-10-19 09:55:22.041763 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -pkulev/flask-study -https://github.com/pkulev/flask-study -Entry file: flask-study/hello_flask.py -Scanned: 2016-10-19 09:55:32.464657 -No vulnerabilities found. - - -pbernat/flask-start -https://github.com/pbernat/flask-start -Entry file: flask-start/main.py -Scanned: 2016-10-19 09:55:37.133319 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -paradox41/flask-boilerplate -https://github.com/paradox41/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 09:55:38.642437 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/paradox41/flask-boilerplate. - -mgenkin/flask-app -https://github.com/mgenkin/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-19 09:55:41.324154 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -viniciuschiele/flask-password -https://github.com/viniciuschiele/flask-password -Entry file: flask-password/examples/bcrypt_example.py -Scanned: 2016-10-19 09:55:45.177822 -No vulnerabilities found. - - -christopher-hartley/flask-blog -https://github.com/christopher-hartley/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:55:45.749686 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -lisbitid/less_flask -https://github.com/lisbitid/less_flask -Entry file: less_flask/test/flask_admin_examples/quickstart/app.py -Scanned: 2016-10-19 09:56:24.170875 -No vulnerabilities found. - - -PurplePilot/flask-intro -https://github.com/PurplePilot/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:56:25.526946 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rob-nn/flask_examples -https://github.com/rob-nn/flask_examples -Entry file: flask_examples/hello.py -Scanned: 2016-10-19 09:56:26.886486 -No vulnerabilities found. - - -guikingma/flask_studies -https://github.com/guikingma/flask_studies -Entry file: flask_studies/app.py -Scanned: 2016-10-19 09:56:28.562929 -No vulnerabilities found. - - -AbuzzT/flask-blog -https://github.com/AbuzzT/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:56:29.143069 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rysev-a/flask-start -https://github.com/rysev-a/flask-start -Entry file: flask-start/main.py -Scanned: 2016-10-19 09:56:30.347498 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -iamsteveholmes/flask-test -https://github.com/iamsteveholmes/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 09:56:30.860080 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -takuti-sandbox/hello-flask -https://github.com/takuti-sandbox/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 09:56:31.488285 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -miscbits/flaskTestApp -https://github.com/miscbits/flaskTestApp -Entry file: flaskTestApp/hello.py -Scanned: 2016-10-19 09:56:32.076634 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskTestApp/venv/lib/python3.4/struct.py - -chihhaolin/FlaskWebDevelopment -https://github.com/chihhaolin/FlaskWebDevelopment -Entry file: FlaskWebDevelopment/Full_Stack_Foundations/finalproject.py -Scanned: 2016-10-19 09:56:33.762702 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikeywaites/kim-flask-example -https://github.com/mikeywaites/kim-flask-example -Entry file: kim-flask-example/fooder/app.py -Scanned: 2016-10-19 09:56:35.148180 -No vulnerabilities found. - - -prakhar-agarwal/Flask-integration-with-Celery -https://github.com/prakhar-agarwal/Flask-integration-with-Celery -Entry file: Flask-integration-with-Celery/app.py -Scanned: 2016-10-19 09:56:36.372420 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -igsm/Flask-SocialApp -https://github.com/igsm/Flask-SocialApp -Entry file: Flask-SocialApp/app.py -Scanned: 2016-10-19 09:56:37.742580 -No vulnerabilities found. - - -zeugmato/awesome-flask-todo -https://github.com/zeugmato/awesome-flask-todo -Entry file: None -Scanned: 2016-10-19 09:56:38.249206 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeugmato/awesome-flask-todo. - -roblayton/flask-pyserver2 -https://github.com/roblayton/flask-pyserver2 -Entry file: flask-pyserver2/app.py -Scanned: 2016-10-19 09:56:40.596334 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-pyserver2/venv/lib/python2.7/genericpath.py - -gregorynicholas/appengine-flask-restplus -https://github.com/gregorynicholas/appengine-flask-restplus -Entry file: appengine-flask-restplus/main.py -Scanned: 2016-10-19 09:56:41.952417 -No vulnerabilities found. - - -emilyhorsman/flask-login-authomatic -https://github.com/emilyhorsman/flask-login-authomatic -Entry file: flask-login-authomatic/app.py -Scanned: 2016-10-19 09:56:43.175630 -No vulnerabilities found. - - -yakudzam/flask-gae-blog -https://github.com/yakudzam/flask-gae-blog -Entry file: flask-gae-blog/src/lib/flask/sessions.py -Scanned: 2016-10-19 09:56:48.686893 -No vulnerabilities found. - - -Prequell/Flask-Boilerplate-Extended -https://github.com/Prequell/Flask-Boilerplate-Extended -Entry file: Flask-Boilerplate-Extended/app/__init__.py -Scanned: 2016-10-19 09:56:49.964147 -No vulnerabilities found. - - -Hellemos/flask-intro-posts -https://github.com/Hellemos/flask-intro-posts -Entry file: flask-intro-posts/app.py -Scanned: 2016-10-19 09:56:50.530628 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-intro-posts/venv/lib/python2.7/genericpath.py - -idimmmko/Flask-FilesExchange -https://github.com/idimmmko/Flask-FilesExchange -Entry file: Flask-FilesExchange/application.py -Scanned: 2016-10-19 09:56:51.743812 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jbuchstaller/flask-hello-world -https://github.com/jbuchstaller/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:56:52.275047 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -oleksdovz/docker-flask-orchestrator -https://github.com/oleksdovz/docker-flask-orchestrator -Entry file: docker-flask-orchestrator/docker-flask-orchestrator.py -Scanned: 2016-10-19 09:56:53.491239 -No vulnerabilities found. - - -christopher-hartley/flask-hello-world -https://github.com/christopher-hartley/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:56:54.033520 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -melignus/flask-ldap-base -https://github.com/melignus/flask-ldap-base -Entry file: flask-ldap-base/app/__init__.py -Scanned: 2016-10-19 09:56:55.246110 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AbuzzT/flask-hello-world -https://github.com/AbuzzT/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:56:56.235605 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -jlybianto/flask_api_posts -https://github.com/jlybianto/flask_api_posts -Entry file: flask_api_posts/posts/__init__.py -Scanned: 2016-10-19 09:56:57.603165 -Vulnerability 1: -File: flask_api_posts/posts/api.py - > User input at line 28, trigger word "get(": - body_like = request.args.get('body_like') -Reassigned in: - File: flask_api_posts/posts/api.py - > Line 40: posts = posts.filter(models.Post.title.contains(title_like)) - File: flask_api_posts/posts/api.py - > Line 46: posts = posts.all() - File: flask_api_posts/posts/api.py - > Line 49: data = json.dumps([post.as_dictionary() for post in posts]) - File: flask_api_posts/posts/api.py - > Line 50: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: flask_api_posts/posts/api.py - > Line 31: posts = session.query(models.Post) -File: flask_api_posts/posts/api.py - > reaches line 35, trigger word "filter(": - posts = posts.filter(models.Post.title.contains(title_like)).filter(models.Post.body.contains(body_like)) - -Vulnerability 2: -File: flask_api_posts/posts/api.py - > User input at line 25, trigger word "get(": - title_like = request.args.get('title_like') -Reassigned in: - File: flask_api_posts/posts/api.py - > Line 44: posts = posts.filter(models.Post.body.contains(body_like)) - File: flask_api_posts/posts/api.py - > Line 46: posts = posts.all() - File: flask_api_posts/posts/api.py - > Line 49: data = json.dumps([post.as_dictionary() for post in posts]) - File: flask_api_posts/posts/api.py - > Line 50: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: flask_api_posts/posts/api.py - > Line 31: posts = session.query(models.Post) - File: flask_api_posts/posts/api.py - > Line 35: posts = posts.filter(models.Post.title.contains(title_like)).filter(models.Post.body.contains(body_like)) -File: flask_api_posts/posts/api.py - > reaches line 40, trigger word "filter(": - posts = posts.filter(models.Post.title.contains(title_like)) - -Vulnerability 3: -File: flask_api_posts/posts/api.py - > User input at line 28, trigger word "get(": - body_like = request.args.get('body_like') -Reassigned in: - File: flask_api_posts/posts/api.py - > Line 40: posts = posts.filter(models.Post.title.contains(title_like)) - File: flask_api_posts/posts/api.py - > Line 46: posts = posts.all() - File: flask_api_posts/posts/api.py - > Line 49: data = json.dumps([post.as_dictionary() for post in posts]) - File: flask_api_posts/posts/api.py - > Line 50: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: flask_api_posts/posts/api.py - > Line 31: posts = session.query(models.Post) -File: flask_api_posts/posts/api.py - > reaches line 44, trigger word "filter(": - posts = posts.filter(models.Post.body.contains(body_like)) - - - -bourdibay/MinimalistPythonFlaskServer -https://github.com/bourdibay/MinimalistPythonFlaskServer -Entry file: MinimalistPythonFlaskServer/server.py -Scanned: 2016-10-19 09:56:58.980250 -No vulnerabilities found. - - -jreiher2003/Web-Development-with-Flask -https://github.com/jreiher2003/Web-Development-with-Flask -Entry file: Web-Development-with-Flask/lesson 4 -User Accounts and Security/cookie.py -Scanned: 2016-10-19 09:57:02.084469 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -johnwfisherii/flask-pdf-generator -https://github.com/johnwfisherii/flask-pdf-generator -Entry file: flask-pdf-generator/flaskpdf/main.py -Scanned: 2016-10-19 09:57:03.413322 -No vulnerabilities found. - - -flask-admin/flask-admin-profiler -https://github.com/flask-admin/flask-admin-profiler -Entry file: None -Scanned: 2016-10-19 09:57:27.689900 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/flask-admin/flask-admin-profiler. - -sdia/Antoine_App -https://github.com/sdia/Antoine_App -Entry file: Antoine_App/app.py -Scanned: 2016-10-19 09:57:29.863852 -No vulnerabilities found. - - -dannguyen/babynames-flaskapp -https://github.com/dannguyen/babynames-flaskapp -Entry file: babynames-flaskapp/app.py -Scanned: 2016-10-19 09:57:31.922769 -No vulnerabilities found. - - -Maurius-03/helloapp -https://github.com/Maurius-03/helloapp -Entry file: helloapp/hello.py -Scanned: 2016-10-19 09:57:33.152849 -No vulnerabilities found. - - -kevin2007/mm -https://github.com/kevin2007/mm -Entry file: None -Scanned: 2016-10-19 09:57:34.740611 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kevin2007/mm. - -jegsmith/textlocationapp -https://github.com/jegsmith/textlocationapp -Entry file: None -Scanned: 2016-10-19 09:57:36.847530 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jegsmith/textlocationapp. - -pathunstrom/giveaway -https://github.com/pathunstrom/giveaway -Entry file: giveaway/app/routes.py -Scanned: 2016-10-19 09:57:38.179762 -No vulnerabilities found. - - -toumorokoshi/pitcher -https://github.com/toumorokoshi/pitcher -Entry file: pitcher/pitcher/pitcher/app.py -Scanned: 2016-10-19 09:57:39.441407 -No vulnerabilities found. - - -travelton/pork -https://github.com/travelton/pork -Entry file: pork/pork/pork.py -Scanned: 2016-10-19 09:57:40.805651 -Vulnerability 1: -File: pork/pork/pork.py - > User input at line 29, trigger word "get(": - mime = request.json.get('mime', None) -Reassigned in: - File: pork/pork/pork.py - > Line 47: raw_scan_result = client.request(app.config['SPAMD_SERVER'], app.config['SPAMD_PORT'], spamassassin_command, mime) - File: pork/pork/pork.py - > Line 55: parsed_scan_result = client.parse(spamassassin_command, raw_scan_result) - File: pork/pork/pork.py - > Line 66: ret_MAYBE_FUNCTION_NAME = response - File: pork/pork/pork.py - > Line 42: response = jsonify('result''MIME required!') - File: pork/pork/pork.py - > Line 44: ret_MAYBE_FUNCTION_NAME = response -File: pork/pork/pork.py - > reaches line 57, trigger word "jsonify(": - response = jsonify('spamassassin'parsed_scan_result) - -Vulnerability 2: -File: pork/pork/pork.py - > User input at line 36, trigger word "get(": - spamassassin_command = spamassassin_config.get('command') -Reassigned in: - File: pork/pork/pork.py - > Line 38: spamassassin_command = 'REPORT' - File: pork/pork/pork.py - > Line 47: raw_scan_result = client.request(app.config['SPAMD_SERVER'], app.config['SPAMD_PORT'], spamassassin_command, mime) - File: pork/pork/pork.py - > Line 55: parsed_scan_result = client.parse(spamassassin_command, raw_scan_result) - File: pork/pork/pork.py - > Line 66: ret_MAYBE_FUNCTION_NAME = response - File: pork/pork/pork.py - > Line 42: response = jsonify('result''MIME required!') - File: pork/pork/pork.py - > Line 44: ret_MAYBE_FUNCTION_NAME = response -File: pork/pork/pork.py - > reaches line 57, trigger word "jsonify(": - response = jsonify('spamassassin'parsed_scan_result) - -Vulnerability 3: -File: pork/pork/pork.py - > User input at line 29, trigger word "get(": - mime = request.json.get('mime', None) -Reassigned in: - File: pork/pork/pork.py - > Line 47: raw_scan_result = client.request(app.config['SPAMD_SERVER'], app.config['SPAMD_PORT'], spamassassin_command, mime) - File: pork/pork/pork.py - > Line 55: parsed_scan_result = client.parse(spamassassin_command, raw_scan_result) - File: pork/pork/pork.py - > Line 66: ret_MAYBE_FUNCTION_NAME = response - File: pork/pork/pork.py - > Line 42: response = jsonify('result''MIME required!') - File: pork/pork/pork.py - > Line 44: ret_MAYBE_FUNCTION_NAME = response -File: pork/pork/pork.py - > reaches line 60, trigger word "jsonify(": - response = jsonify('spamassassin''raw'raw_scan_result) - -Vulnerability 4: -File: pork/pork/pork.py - > User input at line 36, trigger word "get(": - spamassassin_command = spamassassin_config.get('command') -Reassigned in: - File: pork/pork/pork.py - > Line 38: spamassassin_command = 'REPORT' - File: pork/pork/pork.py - > Line 47: raw_scan_result = client.request(app.config['SPAMD_SERVER'], app.config['SPAMD_PORT'], spamassassin_command, mime) - File: pork/pork/pork.py - > Line 55: parsed_scan_result = client.parse(spamassassin_command, raw_scan_result) - File: pork/pork/pork.py - > Line 66: ret_MAYBE_FUNCTION_NAME = response - File: pork/pork/pork.py - > Line 42: response = jsonify('result''MIME required!') - File: pork/pork/pork.py - > Line 44: ret_MAYBE_FUNCTION_NAME = response -File: pork/pork/pork.py - > reaches line 60, trigger word "jsonify(": - response = jsonify('spamassassin''raw'raw_scan_result) - - - -aantonw/notesapi -https://github.com/aantonw/notesapi -Entry file: notesapi/notesapi.py -Scanned: 2016-10-19 09:57:42.047247 -Vulnerability 1: -File: notesapi/notesapi.py - > User input at line 106, trigger word "get(": - db = db_get() -Reassigned in: - File: notesapi/notesapi.py - > Line 107: dbnote = note_byid(db, note_id) - File: notesapi/notesapi.py - > Line 109: ret_MAYBE_FUNCTION_NAME = abort(404) -File: notesapi/notesapi.py - > reaches line 110, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('notes'dbnote) - -Vulnerability 2: -File: notesapi/notesapi.py - > User input at line 117, trigger word "get(": - note = 'title''content'request.json['title']request.json.get('content', '') -File: notesapi/notesapi.py - > reaches line 122, trigger word "execute(": - db.execute('INSERT INTO notes (title, content) VALUES (?, ?)', [note['title'], note['content']]) - -Vulnerability 3: -File: notesapi/notesapi.py - > User input at line 117, trigger word "get(": - note = 'title''content'request.json['title']request.json.get('content', '') -File: notesapi/notesapi.py - > reaches line 125, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('notes'note), 201) - -Vulnerability 4: -File: notesapi/notesapi.py - > User input at line 139, trigger word "get(": - note = 'title''content'request.json['title']request.json.get('content', '') -Reassigned in: - File: notesapi/notesapi.py - > Line 133: ret_MAYBE_FUNCTION_NAME = abort(404) -File: notesapi/notesapi.py - > reaches line 143, trigger word "execute(": - db.execute('UPDATE notes SET title=?, content=? WHERE id=?', [note['title'], note['content'], note_id]) - -Vulnerability 5: -File: notesapi/notesapi.py - > User input at line 139, trigger word "get(": - note = 'title''content'request.json['title']request.json.get('content', '') -Reassigned in: - File: notesapi/notesapi.py - > Line 133: ret_MAYBE_FUNCTION_NAME = abort(404) -File: notesapi/notesapi.py - > reaches line 146, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('notes'note) - - - -ahmedsalman/Social-crawler -https://github.com/ahmedsalman/Social-crawler -Entry file: Social-crawler/index.py -Scanned: 2016-10-19 09:57:43.393773 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adedot/adelabs-dashboard-project -https://github.com/adedot/adelabs-dashboard-project -Entry file: adelabs-dashboard-project/lwazi_web_service.py -Scanned: 2016-10-19 09:57:44.628042 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ZhangBohan/smshub -https://github.com/ZhangBohan/smshub -Entry file: smshub/smshub.py -Scanned: 2016-10-19 09:57:45.970584 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fabasoad/py_restservice -https://github.com/fabasoad/py_restservice -Entry file: py_restservice/RestService/__init__.py -Scanned: 2016-10-19 09:57:47.321983 -No vulnerabilities found. - - -CosineGaming/cosine-gaming -https://github.com/CosineGaming/cosine-gaming -Entry file: cosine-gaming/main.py -Scanned: 2016-10-19 09:57:56.455135 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AllenLH0/Microblog -https://github.com/AllenLH0/Microblog -Entry file: Microblog/flask/lib/python3.4/site-packages/flask_openid.py -Scanned: 2016-10-19 09:58:03.274541 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Kagyi/kagyi.io -https://github.com/Kagyi/kagyi.io -Entry file: None -Scanned: 2016-10-19 09:58:05.603647 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Kagyi/kagyi.io. - -nemonanja/spawncamping-wight -https://github.com/nemonanja/spawncamping-wight -Entry file: spawncamping-wight/db_api/resources.py -Scanned: 2016-10-19 09:58:07.421948 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -whotemp/movie-site -https://github.com/whotemp/movie-site -Entry file: movie-site/app/__init__.py -Scanned: 2016-10-19 09:58:09.071113 -No vulnerabilities found. - - -recio862/RestTickets -https://github.com/recio862/RestTickets -Entry file: None -Scanned: 2016-10-19 09:58:13.491230 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -LChristakis/chalice-hunter -https://github.com/LChristakis/chalice-hunter -Entry file: chalice-hunter/chalice-hunter.py -Scanned: 2016-10-19 09:58:14.073527 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: chalice-hunter/lib/python3.4/struct.py - -walkerdb/galactic_odometer -https://github.com/walkerdb/galactic_odometer -Entry file: galactic_odometer/gped.py -Scanned: 2016-10-19 09:58:15.777852 -No vulnerabilities found. - - -b-cube/pipeline-demo -https://github.com/b-cube/pipeline-demo -Entry file: pipeline-demo/demo/demo.py -Scanned: 2016-10-19 09:58:17.347470 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -felzix/game-of-life -https://github.com/felzix/game-of-life -Entry file: game-of-life/web_server/game_of_life_web_server/__init__.py -Scanned: 2016-10-19 09:58:18.692176 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nickjj/flask-webpack -https://github.com/nickjj/flask-webpack -Entry file: flask-webpack/flask_webpack/tests/test_app/app.py -Scanned: 2016-10-19 09:58:21.593790 -No vulnerabilities found. - - -manishbalyan/flask -https://github.com/manishbalyan/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:58:22.978551 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -carolinetychen/flask -https://github.com/carolinetychen/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 09:58:23.859274 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -blha303/question -https://github.com/blha303/question -Entry file: question/question.py -Scanned: 2016-10-19 09:58:29.147481 -No vulnerabilities found. - - -kunalashu/Flask -https://github.com/kunalashu/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 09:58:29.707381 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nylas/ansible-flask-example -https://github.com/nylas/ansible-flask-example -Entry file: ansible-flask-example/roles/app/files/flask_app.py -Scanned: 2016-10-19 09:58:32.131861 -No vulnerabilities found. - - -jennielees/flask-sqlalchemy-example -https://github.com/jennielees/flask-sqlalchemy-example -Entry file: flask-sqlalchemy-example/app.py -Scanned: 2016-10-19 09:58:34.733835 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -toumorokoshi/flask-transmute -https://github.com/toumorokoshi/flask-transmute -Entry file: flask-transmute/examples/deck.py -Scanned: 2016-10-19 09:58:36.437886 -No vulnerabilities found. - - -josephrosenberg/flask_template -https://github.com/josephrosenberg/flask_template -Entry file: None -Scanned: 2016-10-19 09:58:36.947132 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/josephrosenberg/flask_template. - -Leo-G/Flask-Users -https://github.com/Leo-G/Flask-Users -Entry file: Flask-Users/app/__init__.py -Scanned: 2016-10-19 09:58:45.869907 -No vulnerabilities found. - - -ethan-jiang-1/flaskr -https://github.com/ethan-jiang-1/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:58:46.416861 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andrewheekin/flasky -https://github.com/andrewheekin/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 09:58:46.909095 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -christopher-hartley/flasktaskr -https://github.com/christopher-hartley/flasktaskr -Entry file: None -Scanned: 2016-10-19 09:58:47.455996 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -procha1/flaskproj -https://github.com/procha1/flaskproj -Entry file: flaskproj/hello.py -Scanned: 2016-10-19 09:58:48.751417 -No vulnerabilities found. - - -vehrka/flaskscaffold -https://github.com/vehrka/flaskscaffold -Entry file: flaskscaffold/app/__init__.py -Scanned: 2016-10-19 09:58:50.176073 -No vulnerabilities found. - - -riida/flaskr -https://github.com/riida/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:58:50.682259 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fogonthedowns/flaskapp -https://github.com/fogonthedowns/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-19 09:58:51.177104 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lucumt/flaskr -https://github.com/lucumt/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 09:58:58.684715 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vmalloc/flask-simple-api -https://github.com/vmalloc/flask-simple-api -Entry file: flask-simple-api/tests/conftest.py -Scanned: 2016-10-19 09:59:06.139576 -No vulnerabilities found. - - -KristoferEng/FlaskApp -https://github.com/KristoferEng/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 09:59:07.733810 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rituraj0/flaskT -https://github.com/rituraj0/flaskT -Entry file: flaskT/flaskT.py -Scanned: 2016-10-19 09:59:10.009269 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MortalCatalyst/CharmFlask -https://github.com/MortalCatalyst/CharmFlask -Entry file: CharmFlask/CharmFlask.py -Scanned: 2016-10-19 09:59:15.764416 -No vulnerabilities found. - - -parvez210/flask-setup -https://github.com/parvez210/flask-setup -Entry file: None -Scanned: 2016-10-19 09:59:16.285515 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -JungHun/flask-api -https://github.com/JungHun/flask-api -Entry file: flask-api/api/controllers.py -Scanned: 2016-10-19 09:59:21.750907 -No vulnerabilities found. - - -pastelblush/Flask-Python -https://github.com/pastelblush/Flask-Python -Entry file: Flask-Python/app.py -Scanned: 2016-10-19 09:59:23.049039 -No vulnerabilities found. - - -viniciuschiele/flask-password -https://github.com/viniciuschiele/flask-password -Entry file: flask-password/examples/bcrypt_example.py -Scanned: 2016-10-19 09:59:24.421311 -No vulnerabilities found. - - -uruddarraju/CeleryFlask -https://github.com/uruddarraju/CeleryFlask -Entry file: None -Scanned: 2016-10-19 09:59:25.685075 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/uruddarraju/CeleryFlask. - -sunze/py_flask -https://github.com/sunze/py_flask -Entry file: py_flask/app/__init__.py -Scanned: 2016-10-19 09:59:31.818261 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -christopher-hartley/flask-blog -https://github.com/christopher-hartley/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:59:32.393982 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -chengzhoukun/flask-blog -https://github.com/chengzhoukun/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:59:32.914240 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -joymove/flask-blog -https://github.com/joymove/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 09:59:33.917736 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -sure15/flask-intro -https://github.com/sure15/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 09:59:34.416824 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -slipvyne/hans-flask -https://github.com/slipvyne/hans-flask -Entry file: hans-flask/app/__init__.py -Scanned: 2016-10-19 09:59:37.392632 -No vulnerabilities found. - - -rob-nn/flask_examples -https://github.com/rob-nn/flask_examples -Entry file: flask_examples/hello.py -Scanned: 2016-10-19 09:59:39.635517 -No vulnerabilities found. - - -BartGo/flask-drafts -https://github.com/BartGo/flask-drafts -Entry file: flask-drafts/app/__init__.py -Scanned: 2016-10-19 09:59:40.984976 -No vulnerabilities found. - - -ghostrong/flask-template -https://github.com/ghostrong/flask-template -Entry file: None -Scanned: 2016-10-19 09:59:41.505738 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ghostrong/flask-template. - -KunstencentrumVooruit/flask_swagger -https://github.com/KunstencentrumVooruit/flask_swagger -Entry file: flask_swagger/template.py -Scanned: 2016-10-19 09:59:42.739032 -No vulnerabilities found. - - -takuti-sandbox/hello-flask -https://github.com/takuti-sandbox/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 09:59:48.306923 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -hectorbenitez/flask-heroku -https://github.com/hectorbenitez/flask-heroku -Entry file: flask-heroku/hello.py -Scanned: 2016-10-19 09:59:49.806893 -No vulnerabilities found. - - -benregn/flask-python-social-auth -https://github.com/benregn/flask-python-social-auth -Entry file: flask-python-social-auth/flask_social_auth/app.py -Scanned: 2016-10-19 09:59:51.188176 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -dipanjanS/flask-api-tutorials -https://github.com/dipanjanS/flask-api-tutorials -Entry file: flask-api-tutorials/flask-animals-apps/modularized-app/socapp/__init__.py -Scanned: 2016-10-19 09:59:52.479865 -No vulnerabilities found. - - -csbailey5t/flask_sample_app -https://github.com/csbailey5t/flask_sample_app -Entry file: flask_sample_app/flaskr/flaskr.py -Scanned: 2016-10-19 09:59:53.784379 -No vulnerabilities found. - - -martin-appcito/demo-flask-app -https://github.com/martin-appcito/demo-flask-app -Entry file: demo-flask-app/app.py -Scanned: 2016-10-19 09:59:55.120488 -No vulnerabilities found. - - -wadfordj/flask-hello-world -https://github.com/wadfordj/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 09:59:55.657684 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -cassiel/heroku-flask-mongodb -https://github.com/cassiel/heroku-flask-mongodb -Entry file: heroku-flask-mongodb/flask-db-example.py -Scanned: 2016-10-19 10:00:00.951067 -No vulnerabilities found. - - -markmuetz/flask-1000earths -https://github.com/markmuetz/flask-1000earths -Entry file: flask-1000earths/app.py -Scanned: 2016-10-19 10:00:07.979453 -Vulnerability 1: -File: flask-1000earths/app.py - > User input at line 148, trigger word "form[": - new_path = request.form['path'] -Reassigned in: - File: flask-1000earths/app.py - > Line 151: page.path = new_path -File: flask-1000earths/app.py - > reaches line 181, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(page.path) - - - -ecarrara/cookiecutter-flask-project -https://github.com/ecarrara/cookiecutter-flask-project -Entry file: cookiecutter-flask-project/{{cookiecutter.app_name}}/{{cookiecutter.app_name}}/__init__.py -Scanned: 2016-10-19 10:00:10.384631 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pasharik95/lab1-flask- -https://github.com/pasharik95/lab1-flask- -Entry file: lab1-flask-/Register.py -Scanned: 2016-10-19 10:00:11.743616 -No vulnerabilities found. - - -mattaudesse/flask-orgchart-api -https://github.com/mattaudesse/flask-orgchart-api -Entry file: None -Scanned: 2016-10-19 10:00:14.128755 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mattaudesse/flask-orgchart-api. - -nthock/flask_simple_app -https://github.com/nthock/flask_simple_app -Entry file: flask_simple_app/simple_app.py -Scanned: 2016-10-19 10:00:17.373803 -No vulnerabilities found. - - -nicovogelaar/time-tracker-flask -https://github.com/nicovogelaar/time-tracker-flask -Entry file: time-tracker-flask/app/__init__.py -Scanned: 2016-10-19 10:00:18.789606 -Vulnerability 1: -File: time-tracker-flask/app/views/media.py - > User input at line 37, trigger word "get(": - result = self.api.get('/api/v1/media/' + str(media_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/media.py - > Line 34: result = -File: time-tracker-flask/app/views/media.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 2: -File: time-tracker-flask/app/views/media.py - > User input at line 46, trigger word "files[": - file = request.files['media'] -Reassigned in: - File: time-tracker-flask/app/views/media.py - > Line 49: uploaded_file = save_uploaded_file(file) - File: time-tracker-flask/app/views/media.py - > Line 54: files = [('media', (secure_filename(file.filename), open(uploaded_file, 'rb'), file.content_type))] - File: time-tracker-flask/app/views/media.py - > Line 56: result = self.api.post('/api/v1/media.json', , 'files'files) - File: time-tracker-flask/app/views/media.py - > Line 43: result = -File: time-tracker-flask/app/views/media.py - > reaches line 58, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 3: -File: time-tracker-flask/app/views/api.py - > User input at line 29, trigger word "get(": - result = self.api.get('/api/v1/activities.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 31: result = self.api.get('/api/v1/activities/' + str(activity_id) + '.json') -File: time-tracker-flask/app/views/api.py - > reaches line 33, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 4: -File: time-tracker-flask/app/views/api.py - > User input at line 31, trigger word "get(": - result = self.api.get('/api/v1/activities/' + str(activity_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 29: result = self.api.get('/api/v1/activities.json', request.args.to_dict()) -File: time-tracker-flask/app/views/api.py - > reaches line 33, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 5: -File: time-tracker-flask/app/views/api.py - > User input at line 37, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 39: result = self.api.post('/api/v1/activities.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 41, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 6: -File: time-tracker-flask/app/views/api.py - > User input at line 51, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 53: result = self.api.put('/api/v1/activities/' + str(activity_id) + '.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 55, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 7: -File: time-tracker-flask/app/views/api.py - > User input at line 65, trigger word "get(": - result = self.api.get('/api/v1/addresses.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 67: result = self.api.get('/api/v1/addresses/' + str(address_id) + '.json') -File: time-tracker-flask/app/views/api.py - > reaches line 69, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 8: -File: time-tracker-flask/app/views/api.py - > User input at line 67, trigger word "get(": - result = self.api.get('/api/v1/addresses/' + str(address_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 65: result = self.api.get('/api/v1/addresses.json', request.args.to_dict()) -File: time-tracker-flask/app/views/api.py - > reaches line 69, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 9: -File: time-tracker-flask/app/views/api.py - > User input at line 79, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 81: result = self.api.put('/api/v1/addresses/' + str(address_id) + '.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 83, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 10: -File: time-tracker-flask/app/views/api.py - > User input at line 93, trigger word "get(": - result = self.api.get('/api/v1/companies.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 95: result = self.api.get('/api/v1/companies/' + str(company_id) + '.json') -File: time-tracker-flask/app/views/api.py - > reaches line 97, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 11: -File: time-tracker-flask/app/views/api.py - > User input at line 95, trigger word "get(": - result = self.api.get('/api/v1/companies/' + str(company_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 93: result = self.api.get('/api/v1/companies.json', request.args.to_dict()) -File: time-tracker-flask/app/views/api.py - > reaches line 97, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 12: -File: time-tracker-flask/app/views/api.py - > User input at line 101, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 103: result = self.api.post('/api/v1/companies.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 105, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 13: -File: time-tracker-flask/app/views/api.py - > User input at line 115, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 117: result = self.api.put('/api/v1/companies/' + str(company_id) + '.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 119, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 14: -File: time-tracker-flask/app/views/api.py - > User input at line 129, trigger word "get(": - result = self.api.get('/api/v1/contact-persons.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 131: result = self.api.get('/api/v1/contact-persons/' + str(contact_person_id) + '.json') -File: time-tracker-flask/app/views/api.py - > reaches line 133, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 15: -File: time-tracker-flask/app/views/api.py - > User input at line 131, trigger word "get(": - result = self.api.get('/api/v1/contact-persons/' + str(contact_person_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 129: result = self.api.get('/api/v1/contact-persons.json', request.args.to_dict()) -File: time-tracker-flask/app/views/api.py - > reaches line 133, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 16: -File: time-tracker-flask/app/views/api.py - > User input at line 143, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 145: result = self.api.put('/api/v1/contact-persons/' + str(contact_person_id) + '.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 147, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 17: -File: time-tracker-flask/app/views/api.py - > User input at line 157, trigger word "get(": - result = self.api.get('/api/v1/invoices.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 159: result = self.api.get('/api/v1/invoices/' + str(invoice_id) + '.json') -File: time-tracker-flask/app/views/api.py - > reaches line 161, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 18: -File: time-tracker-flask/app/views/api.py - > User input at line 159, trigger word "get(": - result = self.api.get('/api/v1/invoices/' + str(invoice_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 157: result = self.api.get('/api/v1/invoices.json', request.args.to_dict()) -File: time-tracker-flask/app/views/api.py - > reaches line 161, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 19: -File: time-tracker-flask/app/views/api.py - > User input at line 165, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 167: result = self.api.post('/api/v1/invoices.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 169, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 20: -File: time-tracker-flask/app/views/api.py - > User input at line 179, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 181: result = self.api.put('/api/v1/invoices/' + str(invoice_id) + '.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 183, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 21: -File: time-tracker-flask/app/views/api.py - > User input at line 204, trigger word "get(": - result = self.api.get('/api/v1/countries.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 206: result = self.api.get('/api/v1/countries/' + str(country_id) + '.json') -File: time-tracker-flask/app/views/api.py - > reaches line 208, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 22: -File: time-tracker-flask/app/views/api.py - > User input at line 206, trigger word "get(": - result = self.api.get('/api/v1/countries/' + str(country_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 204: result = self.api.get('/api/v1/countries.json', request.args.to_dict()) -File: time-tracker-flask/app/views/api.py - > reaches line 208, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 23: -File: time-tracker-flask/app/views/api.py - > User input at line 218, trigger word "get(": - result = self.api.get('/api/v1/currencies.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 220: result = self.api.get('/api/v1/currencies/' + str(country_id) + '.json') -File: time-tracker-flask/app/views/api.py - > reaches line 222, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 24: -File: time-tracker-flask/app/views/api.py - > User input at line 220, trigger word "get(": - result = self.api.get('/api/v1/currencies/' + str(country_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 218: result = self.api.get('/api/v1/currencies.json', request.args.to_dict()) -File: time-tracker-flask/app/views/api.py - > reaches line 222, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 25: -File: time-tracker-flask/app/views/api.py - > User input at line 232, trigger word "get(": - result = self.api.get('/api/v1/timesheets.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 234: result = self.api.get('/api/v1/timesheets/' + str(timesheet_id) + '.json') -File: time-tracker-flask/app/views/api.py - > reaches line 236, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 26: -File: time-tracker-flask/app/views/api.py - > User input at line 234, trigger word "get(": - result = self.api.get('/api/v1/timesheets/' + str(timesheet_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 232: result = self.api.get('/api/v1/timesheets.json', request.args.to_dict()) -File: time-tracker-flask/app/views/api.py - > reaches line 236, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 27: -File: time-tracker-flask/app/views/api.py - > User input at line 240, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 242: result = self.api.post('/api/v1/timesheets.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 244, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 28: -File: time-tracker-flask/app/views/api.py - > User input at line 254, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 256: result = self.api.put('/api/v1/timesheets/' + str(timesheet_id) + '.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 258, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 29: -File: time-tracker-flask/app/views/api.py - > User input at line 279, trigger word "get(": - result = self.api.get('/api/v1/users.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 281: result = self.api.get('/api/v1/users/' + str(user_id) + '.json') -File: time-tracker-flask/app/views/api.py - > reaches line 283, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 30: -File: time-tracker-flask/app/views/api.py - > User input at line 281, trigger word "get(": - result = self.api.get('/api/v1/users/' + str(user_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 279: result = self.api.get('/api/v1/users.json', request.args.to_dict()) -File: time-tracker-flask/app/views/api.py - > reaches line 283, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 31: -File: time-tracker-flask/app/views/api.py - > User input at line 287, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 289: result = self.api.post('/api/v1/users.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 291, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 32: -File: time-tracker-flask/app/views/api.py - > User input at line 301, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 303: result = self.api.put('/api/v1/users/' + str(user_id) + '.json', data) -File: time-tracker-flask/app/views/api.py - > reaches line 305, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 33: -File: time-tracker-flask/app/views/api.py - > User input at line 315, trigger word "get(": - result = self.api.get('/api/v1/vats.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 317: result = self.api.get('/api/v1/vats/' + str(vat_id) + '.json') -File: time-tracker-flask/app/views/api.py - > reaches line 319, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 34: -File: time-tracker-flask/app/views/api.py - > User input at line 317, trigger word "get(": - result = self.api.get('/api/v1/vats/' + str(vat_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/api.py - > Line 315: result = self.api.get('/api/v1/vats.json', request.args.to_dict()) -File: time-tracker-flask/app/views/api.py - > reaches line 319, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 35: -File: time-tracker-flask/app/views/client.py - > User input at line 16, trigger word "get(": - result = self.api.get('/api/v1/clients.json', request.args.to_dict()) -Reassigned in: - File: time-tracker-flask/app/views/client.py - > Line 18: result = self.api.get('/api/v1/clients/' + str(client_id) + '.json') -File: time-tracker-flask/app/views/client.py - > reaches line 20, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 36: -File: time-tracker-flask/app/views/client.py - > User input at line 18, trigger word "get(": - result = self.api.get('/api/v1/clients/' + str(client_id) + '.json') -Reassigned in: - File: time-tracker-flask/app/views/client.py - > Line 16: result = self.api.get('/api/v1/clients.json', request.args.to_dict()) -File: time-tracker-flask/app/views/client.py - > reaches line 20, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 37: -File: time-tracker-flask/app/views/client.py - > User input at line 24, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/client.py - > Line 26: result = self.api.post('/api/v1/clients.json', data) -File: time-tracker-flask/app/views/client.py - > reaches line 28, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 38: -File: time-tracker-flask/app/views/client.py - > User input at line 38, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/client.py - > Line 40: result = self.api.put('/api/v1/clients/' + str(client_id) + '.json', data) -File: time-tracker-flask/app/views/client.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 39: -File: time-tracker-flask/app/views/client.py - > User input at line 51, trigger word "get(": - result = self.api.get('/api/v1/clients/%d/addresses.json' % client_id, request.args.to_dict()) -File: time-tracker-flask/app/views/client.py - > reaches line 53, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 40: -File: time-tracker-flask/app/views/client.py - > User input at line 57, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/client.py - > Line 59: result = self.api.post('/api/v1/clients/%d/addresses.json' % client_id, data) -File: time-tracker-flask/app/views/client.py - > reaches line 61, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 41: -File: time-tracker-flask/app/views/client.py - > User input at line 70, trigger word "get(": - result = self.api.get('/api/v1/clients/%d/contact-persons.json' % client_id, request.args.to_dict()) -File: time-tracker-flask/app/views/client.py - > reaches line 72, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 42: -File: time-tracker-flask/app/views/client.py - > User input at line 76, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/client.py - > Line 78: result = self.api.post('/api/v1/clients/%d/contact-persons.json' % client_id, data) -File: time-tracker-flask/app/views/client.py - > reaches line 80, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 43: -File: time-tracker-flask/app/views/client.py - > User input at line 89, trigger word "get(": - result = self.api.get('/api/v1/clients/%d/projects.json' % client_id, request.args.to_dict()) -File: time-tracker-flask/app/views/client.py - > reaches line 91, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 44: -File: time-tracker-flask/app/views/client.py - > User input at line 95, trigger word ".data": - data = load_json(request.data) -Reassigned in: - File: time-tracker-flask/app/views/client.py - > Line 97: result = self.api.post('/api/v1/clients/%d/projects.json' % client_id, data) -File: time-tracker-flask/app/views/client.py - > reaches line 99, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - - - -koverda/Flask-Survey-API -https://github.com/koverda/Flask-Survey-API -Entry file: Flask-Survey-API/app/__init__.py -Scanned: 2016-10-19 10:00:20.228629 -No vulnerabilities found. - - -toumorokoshi/flask-transmute-swagger -https://github.com/toumorokoshi/flask-transmute-swagger -Entry file: flask-transmute-swagger/examples/deck.py -Scanned: 2016-10-19 10:00:24.599188 -No vulnerabilities found. - - -vatsal13/flask_heroku_seed -https://github.com/vatsal13/flask_heroku_seed -Entry file: flask_heroku_seed/app.py -Scanned: 2016-10-19 10:00:25.872314 -No vulnerabilities found. - - -xiaochenzhuo03/Flask-API-Basic -https://github.com/xiaochenzhuo03/Flask-API-Basic -Entry file: Flask-API-Basic/app_Xiaochen_Zhuo.py -Scanned: 2016-10-19 10:00:28.584479 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nmaltais/python_flask_project -https://github.com/nmaltais/python_flask_project -Entry file: python_flask_project/hello.py -Scanned: 2016-10-19 10:00:29.900090 -Vulnerability 1: -File: python_flask_project/hello.py - > User input at line 101, trigger word "get(": - name = request.form.get('name', '') -File: python_flask_project/hello.py - > reaches line 104, trigger word "set_cookie(": - resp.set_cookie('name', name) - - - -trendsetter37/flask-by-example -https://github.com/trendsetter37/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 10:00:50.851870 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -m-andara/TheFlaskProject -https://github.com/m-andara/TheFlaskProject -Entry file: TheFlaskProject/hello.py -Scanned: 2016-10-19 10:00:52.164639 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hwong/heroku_flask_boilerplate -https://github.com/hwong/heroku_flask_boilerplate -Entry file: heroku_flask_boilerplate/server.py -Scanned: 2016-10-19 10:00:53.517948 -No vulnerabilities found. - - -OstrichProjects/Simple-Flask-User-DB -https://github.com/OstrichProjects/Simple-Flask-User-DB -Entry file: Simple-Flask-User-DB/app.py -Scanned: 2016-10-19 10:00:54.791751 -No vulnerabilities found. - - -jstacoder/sa-flask-restful-resource -https://github.com/jstacoder/sa-flask-restful-resource -Entry file: sa-flask-restful-resource/demo/todo.py -Scanned: 2016-10-19 10:00:56.033540 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -jon-xavier/flask_hello_world -https://github.com/jon-xavier/flask_hello_world -Entry file: None -Scanned: 2016-10-19 10:00:56.563429 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jon-xavier/flask_hello_world. - -api-samples/countries-python-flask -https://github.com/api-samples/countries-python-flask -Entry file: countries-python-flask/countries.py -Scanned: 2016-10-19 10:00:58.041399 -No vulnerabilities found. - - -bharbron/flask_hello_world -https://github.com/bharbron/flask_hello_world -Entry file: None -Scanned: 2016-10-19 10:00:58.529238 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bharbron/flask_hello_world. - -Azzssss/awesome-flask-todo -https://github.com/Azzssss/awesome-flask-todo -Entry file: None -Scanned: 2016-10-19 10:00:59.067335 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Azzssss/awesome-flask-todo. - -flask-admin/flask-admin-profiler -https://github.com/flask-admin/flask-admin-profiler -Entry file: None -Scanned: 2016-10-19 10:00:59.577436 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/flask-admin/flask-admin-profiler. - -SCDevy/flask-api-sandbox -https://github.com/SCDevy/flask-api-sandbox -Entry file: flask-api-sandbox/app/__init__.py -Scanned: 2016-10-19 10:01:07.112894 -No vulnerabilities found. - - -playgoods/tutoril_flask_migul -https://github.com/playgoods/tutoril_flask_migul -Entry file: tutoril_flask_migul/hello.py -Scanned: 2016-10-19 10:01:09.045367 -No vulnerabilities found. - - -achiku/sample-flask-docker-eb -https://github.com/achiku/sample-flask-docker-eb -Entry file: sample-flask-docker-eb/apps.py -Scanned: 2016-10-19 10:01:10.299212 -No vulnerabilities found. - - -kanishkt/ChatClient-Flask -https://github.com/kanishkt/ChatClient-Flask -Entry file: ChatClient-Flask/setup.py -Scanned: 2016-10-19 10:01:29.323993 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -alex-marmot/awesome-flask-todo -https://github.com/alex-marmot/awesome-flask-todo -Entry file: None -Scanned: 2016-10-19 10:01:29.878961 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/alex-marmot/awesome-flask-todo. - -llambiel/flask-pgsql-demo -https://github.com/llambiel/flask-pgsql-demo -Entry file: flask-pgsql-demo/app.py -Scanned: 2016-10-19 10:01:31.595780 -No vulnerabilities found. - - -gosequential/flask-boilerplate-with-login -https://github.com/gosequential/flask-boilerplate-with-login -Entry file: flask-boilerplate-with-login/app/__init__.py -Scanned: 2016-10-19 10:01:33.932082 -No vulnerabilities found. - - -nrm176/flask-cpi-service -https://github.com/nrm176/flask-cpi-service -Entry file: flask-cpi-service/init3.py -Scanned: 2016-10-19 10:01:35.417409 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrlevitas/Flask-Restaurant-App -https://github.com/mrlevitas/Flask-Restaurant-App -Entry file: Flask-Restaurant-App/restaurant_app.py -Scanned: 2016-10-19 10:01:36.829972 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -FlaskUniverse/UnFlasked -https://github.com/FlaskUniverse/UnFlasked -Entry file: UnFlasked/index.py -Scanned: 2016-10-19 10:01:38.111888 -No vulnerabilities found. - - -JerryLeooo/codebase -https://github.com/JerryLeooo/codebase -Entry file: codebase/main/app.py -Scanned: 2016-10-19 10:01:39.379647 -No vulnerabilities found. - - -marthaberner/my-first-python-app -https://github.com/marthaberner/my-first-python-app -Entry file: my-first-python-app/models.py -Scanned: 2016-10-19 10:01:40.643622 -No vulnerabilities found. - - -marcusbusby/python_blog -https://github.com/marcusbusby/python_blog -Entry file: None -Scanned: 2016-10-19 10:01:44.748200 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -puras/moofa -https://github.com/puras/moofa -Entry file: None -Scanned: 2016-10-19 10:01:46.136885 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/puras/moofa. - -ShermanMorrison/taskapp -https://github.com/ShermanMorrison/taskapp -Entry file: taskapp/project/__init__.py -Scanned: 2016-10-19 10:01:47.677467 -Vulnerability 1: -File: taskapp/project/users/views.py - > User input at line 56, trigger word ".data": - user = db.session.query(User).filter_by(name=form.name.data).first() -Reassigned in: - File: taskapp/project/users/views.py - > Line 61: session['user_id'] = user.id - File: taskapp/project/users/views.py - > Line 60: session['logged_in'] = True -File: taskapp/project/users/views.py - > reaches line 62, trigger word "flash(": - flash('Welcome ' + user.name + '!') - - - -trevor-snow/microblog -https://github.com/trevor-snow/microblog -Entry file: None -Scanned: 2016-10-19 10:01:48.183822 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pkulev/mblog -https://github.com/pkulev/mblog -Entry file: mblog/mblog/__init__.py -Scanned: 2016-10-19 10:01:50.100290 -Vulnerability 1: -File: mblog/mblog/views.py - > User input at line 20, trigger word ".data": - login = form.login.data -Reassigned in: - File: mblog/mblog/views.py - > Line 22: user = User(db).validate_login(login, password) -File: mblog/mblog/views.py - > reaches line 23, trigger word "flash(": - flash(str(user)) - -Vulnerability 2: -File: mblog/mblog/views.py - > User input at line 21, trigger word ".data": - password = form.password.data -Reassigned in: - File: mblog/mblog/views.py - > Line 22: user = User(db).validate_login(login, password) -File: mblog/mblog/views.py - > reaches line 23, trigger word "flash(": - flash(str(user)) - - - -iancmason/microblog -https://github.com/iancmason/microblog -Entry file: None -Scanned: 2016-10-19 10:01:50.628606 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -IE-NITK/ComicsAPI -https://github.com/IE-NITK/ComicsAPI -Entry file: ComicsAPI/app.py -Scanned: 2016-10-19 10:01:54.839300 -No vulnerabilities found. - - -AhnSeongHyun/Arale -https://github.com/AhnSeongHyun/Arale -Entry file: None -Scanned: 2016-10-19 10:01:58.312689 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AhnSeongHyun/Arale. - -faylau/microblog -https://github.com/faylau/microblog -Entry file: None -Scanned: 2016-10-19 10:01:58.807438 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Jogn/shitty-booter-rce-protection -https://github.com/Jogn/shitty-booter-rce-protection -Entry file: shitty-booter-rce-protection/pybooter-webint.py -Scanned: 2016-10-19 10:02:00.176077 -No vulnerabilities found. - - -VicarEscaped/xlsgen_service -https://github.com/VicarEscaped/xlsgen_service -Entry file: xlsgen_service/app/__init__.py -Scanned: 2016-10-19 10:02:01.670869 -Vulnerability 1: -File: xlsgen_service/app/__init__.py - > User input at line 48, trigger word ".data": - d = 'data''name''logo''filename'form.data.dataform.name.dataform.logo.dataform.filename.data -Reassigned in: - File: xlsgen_service/app/__init__.py - > Line 52: xls = convert_to_xls(d) - File: xlsgen_service/app/__init__.py - > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('xls_conv.html',form=form) -File: xlsgen_service/app/__init__.py - > reaches line 62, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(xls,as_attachment=True, attachment_filename=ff + '.xlsx') - - - -dheerajgopi/paint-app -https://github.com/dheerajgopi/paint-app -Entry file: paint-app/paint_app.py -Scanned: 2016-10-19 10:02:05.087590 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: paint-app/flask/lib/python2.7/genericpath.py - -shubhamgupta2021/linux-user -https://github.com/shubhamgupta2021/linux-user -Entry file: linux-user/src/app.py -Scanned: 2016-10-19 10:02:06.345518 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -manishbalyan/flask -https://github.com/manishbalyan/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:02:08.608145 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -Lemon23/Flask -https://github.com/Lemon23/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:02:09.105998 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sagestar/Flask -https://github.com/sagestar/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:02:09.610644 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lp1995/flask -https://github.com/lp1995/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:02:11.501676 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -cfschlierman/Flask -https://github.com/cfschlierman/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:02:12.003045 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thegeorgeous/flask-cqlalchemy -https://github.com/thegeorgeous/flask-cqlalchemy -Entry file: flask-cqlalchemy/examples/example_app_udt.py -Scanned: 2016-10-19 10:02:33.296974 -No vulnerabilities found. - - -viniciuschiele/flask-io -https://github.com/viniciuschiele/flask-io -Entry file: flask-io/tests/test_response.py -Scanned: 2016-10-19 10:02:34.998867 -No vulnerabilities found. - - -prashannth/flask-cassandra -https://github.com/prashannth/flask-cassandra -Entry file: flask-cassandra/app/__init__.py -Scanned: 2016-10-19 10:02:36.894779 -Vulnerability 1: -File: flask-cassandra/app/api/user.py - > User input at line 28, trigger word ".data": - data = json.loads(request.data) -Reassigned in: - File: flask-cassandra/app/api/user.py - > Line 31: handle = str(data['handle']) - File: flask-cassandra/app/api/user.py - > Line 32: password = hash_password(str(data['password'])) - File: flask-cassandra/app/api/user.py - > Line 34: email = ''.join((str(e) for e in data['email'])) - File: flask-cassandra/app/api/user.py - > Line 39: phone = int(data['phone']) - File: flask-cassandra/app/api/user.py - > Line 44: ret_MAYBE_FUNCTION_NAME = make_response(jsonify('success''result'False'Incomplete parameters'), 400) -File: flask-cassandra/app/api/user.py - > reaches line 36, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = make_response(jsonify('success''result'True'Signup Successful for {}'.format(handle)), 201) - -Vulnerability 2: -File: flask-cassandra/app/api/user.py - > User input at line 28, trigger word ".data": - data = json.loads(request.data) -Reassigned in: - File: flask-cassandra/app/api/user.py - > Line 31: handle = str(data['handle']) - File: flask-cassandra/app/api/user.py - > Line 32: password = hash_password(str(data['password'])) - File: flask-cassandra/app/api/user.py - > Line 34: email = ''.join((str(e) for e in data['email'])) - File: flask-cassandra/app/api/user.py - > Line 39: phone = int(data['phone']) - File: flask-cassandra/app/api/user.py - > Line 44: ret_MAYBE_FUNCTION_NAME = make_response(jsonify('success''result'False'Incomplete parameters'), 400) -File: flask-cassandra/app/api/user.py - > reaches line 41, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = make_response(jsonify('success''result'True'Signup Successful for {}'.format(handle)), 201) - - - -nickyzheng/flasky -https://github.com/nickyzheng/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:02:37.399921 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joymove/flasktaskr -https://github.com/joymove/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:02:38.911469 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -scofield1991/flaskproj -https://github.com/scofield1991/flaskproj -Entry file: None -Scanned: 2016-10-19 10:02:41.449880 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/scofield1991/flaskproj. - -thaifdotme/flaskbyexample -https://github.com/thaifdotme/flaskbyexample -Entry file: flaskbyexample/app.py -Scanned: 2016-10-19 10:02:42.746092 -No vulnerabilities found. - - -yuetingqian/flaskr -https://github.com/yuetingqian/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:02:43.247379 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ohmuraken/flaskr -https://github.com/ohmuraken/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:02:46.752042 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wuhuixiong/flasky -https://github.com/wuhuixiong/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:02:48.255816 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aabdulwahed/Flask-Redis-Docker-Compose -https://github.com/aabdulwahed/Flask-Redis-Docker-Compose -Entry file: Flask-Redis-Docker-Compose/app.py -Scanned: 2016-10-19 10:02:50.495348 -No vulnerabilities found. - - -bawey/FlaskStart -https://github.com/bawey/FlaskStart -Entry file: FlaskStart/app/__init__.py -Scanned: 2016-10-19 10:02:54.231315 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gmccaw/FlaskSocial -https://github.com/gmccaw/FlaskSocial -Entry file: FlaskSocial/app.py -Scanned: 2016-10-19 10:02:55.598341 -No vulnerabilities found. - - -wihoho/FlaskDownload -https://github.com/wihoho/FlaskDownload -Entry file: FlaskDownload/FlaskDownload.py -Scanned: 2016-10-19 10:02:56.890549 -No vulnerabilities found. - - -eon01/flask_restful_sample -https://github.com/eon01/flask_restful_sample -Entry file: flask_restful_sample/apirest.py -Scanned: 2016-10-19 10:03:00.819819 -Vulnerability 1: -File: flask_restful_sample/apirest.py - > User input at line 53, trigger word "get(": - genre = 'id''name''bands'genres[-1]['id'] + 1request.json['name']request.json.get('bands', '') -File: flask_restful_sample/apirest.py - > reaches line 59, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('genre'genre), 201) - - - -yan-egorov/flask_bro -https://github.com/yan-egorov/flask_bro -Entry file: flask_bro/Flask/Lib/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 10:03:07.321937 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -00willo/flask-intro -https://github.com/00willo/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:03:07.822191 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kevlab/discover_flask -https://github.com/kevlab/discover_flask -Entry file: discover_flask/project/__init__.py -Scanned: 2016-10-19 10:03:09.344547 -No vulnerabilities found. - - -haydarmiftahul/flask-microblogging -https://github.com/haydarmiftahul/flask-microblogging -Entry file: flask-microblogging/app.py -Scanned: 2016-10-19 10:03:10.930631 -Vulnerability 1: -File: flask-microblogging/app.py - > User input at line 94, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flask-microblogging/app.py - > Line 100: user = User(username=username) -File: flask-microblogging/app.py - > reaches line 99, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('taken'username), 400) - -Vulnerability 2: -File: flask-microblogging/app.py - > User input at line 94, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flask-microblogging/app.py - > Line 100: user = User(username=username) -File: flask-microblogging/app.py - > reaches line 104, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201) - -Vulnerability 3: -File: flask-microblogging/app.py - > User input at line 119, trigger word "get(": - user = User.query.get(id) -File: flask-microblogging/app.py - > reaches line 122, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username) - -Vulnerability 4: -File: flask-microblogging/app.py - > User input at line 153, trigger word "get(": - tweet = Tweet.query.get(id) -Reassigned in: - File: flask-microblogging/app.py - > Line 156: tweet = tweet.serialize() -File: flask-microblogging/app.py - > reaches line 157, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('tweet'tweet) - -Vulnerability 5: -File: flask-microblogging/app.py - > User input at line 162, trigger word "get(": - tweet = request.json.get('tweet') -Reassigned in: - File: flask-microblogging/app.py - > Line 166: tw = Tweet(user_id=g.user.id, tweet=tweet, time=time) - File: flask-microblogging/app.py - > Line 169: tw = tw.serialize() -File: flask-microblogging/app.py - > reaches line 170, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('tweet'tw), 201) - - - -ipeacocks/discover-flask -https://github.com/ipeacocks/discover-flask -Entry file: discover-flask/project/__init__.py -Scanned: 2016-10-19 10:03:12.433517 -No vulnerabilities found. - - -fereidoon/flask-blog -https://github.com/fereidoon/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:03:12.988792 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -cjemison/flask_example -https://github.com/cjemison/flask_example -Entry file: flask_example/flask_example.py -Scanned: 2016-10-19 10:03:14.259555 -No vulnerabilities found. - - -mnickey/Flask_Taskr -https://github.com/mnickey/Flask_Taskr -Entry file: Flask_Taskr/project/__init__.py -Scanned: 2016-10-19 10:03:15.756506 -No vulnerabilities found. - - -KunstencentrumVooruit/flask-deploy -https://github.com/KunstencentrumVooruit/flask-deploy -Entry file: flask-deploy/template.py -Scanned: 2016-10-19 10:03:17.031167 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JungHun/flask-api -https://github.com/JungHun/flask-api -Entry file: flask-api/api/controllers.py -Scanned: 2016-10-19 10:03:20.802293 -No vulnerabilities found. - - -laideolams/flask-blog -https://github.com/laideolams/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:03:21.399761 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -oyilmaz/flask-tut -https://github.com/oyilmaz/flask-tut -Entry file: flask-tut/app.py -Scanned: 2016-10-19 10:03:22.667588 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aboutaaron/flask-newsadmin -https://github.com/aboutaaron/flask-newsadmin -Entry file: flask-newsadmin/app.py -Scanned: 2016-10-19 10:03:25.830453 -No vulnerabilities found. - - -tssutha/microblog-flask -https://github.com/tssutha/microblog-flask -Entry file: None -Scanned: 2016-10-19 10:03:37.685423 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -catskul/flask_api -https://github.com/catskul/flask_api -Entry file: flask_api/api.py -Scanned: 2016-10-19 10:03:38.990428 -No vulnerabilities found. - - -antoinemiquel/tuto_flask -https://github.com/antoinemiquel/tuto_flask -Entry file: tuto_flask/flaskr/flaskr.py -Scanned: 2016-10-19 10:03:40.646884 -No vulnerabilities found. - - -joywolves/flask-wechat -https://github.com/joywolves/flask-wechat -Entry file: flask-wechat/fenghuang/__init__.py -Scanned: 2016-10-19 10:03:42.216757 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -astromitts/flask-skeleton -https://github.com/astromitts/flask-skeleton -Entry file: None -Scanned: 2016-10-19 10:03:42.775411 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/astromitts/flask-skeleton. - -manishbalyan/flask_taskmgmtapp -https://github.com/manishbalyan/flask_taskmgmtapp -Entry file: None -Scanned: 2016-10-19 10:03:47.088573 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dhamaniasad/flask-elasticsearch -https://github.com/dhamaniasad/flask-elasticsearch -Entry file: flask-elasticsearch/app.py -Scanned: 2016-10-19 10:03:48.361479 -No vulnerabilities found. - - -joymove/flask-blog -https://github.com/joymove/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:03:48.890935 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -sure15/flask-intro -https://github.com/sure15/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:03:49.390725 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bevensteven/flask_microblog -https://github.com/bevensteven/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 10:03:49.895544 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ziegl3r/flask-stuff -https://github.com/ziegl3r/flask-stuff -Entry file: flask-stuff/env/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 10:03:53.897173 -No vulnerabilities found. - - -zachcalvert/backstage_flask -https://github.com/zachcalvert/backstage_flask -Entry file: backstage_flask/app.py -Scanned: 2016-10-19 10:03:55.316834 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bitmotive/flask-template -https://github.com/bitmotive/flask-template -Entry file: None -Scanned: 2016-10-19 10:03:55.832198 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bitmotive/flask-template. - -521xueweihan/LearnFlask -https://github.com/521xueweihan/LearnFlask -Entry file: LearnFlask/ex1_URL解析.py -Scanned: 2016-10-19 10:03:57.361818 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -icasdri/tuhi-flask -https://github.com/icasdri/tuhi-flask -Entry file: tuhi-flask/tuhi_flask/app.py -Scanned: 2016-10-19 10:03:58.886513 -No vulnerabilities found. - - -joker946/dip_flask -https://github.com/joker946/dip_flask -Entry file: dip_flask/flask_my.py -Scanned: 2016-10-19 10:04:00.137407 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -patriciachunk/python_flask -https://github.com/patriciachunk/python_flask -Entry file: None -Scanned: 2016-10-19 10:04:02.653654 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/patriciachunk/python_flask. - -ericso/flask-angular -https://github.com/ericso/flask-angular -Entry file: flask-angular/server/app/server.py -Scanned: 2016-10-19 10:04:10.128580 -No vulnerabilities found. - - -doomzhou/gae-flask -https://github.com/doomzhou/gae-flask -Entry file: gae-flask/main.py -Scanned: 2016-10-19 10:04:12.272607 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -chadduffey/social_Flask -https://github.com/chadduffey/social_Flask -Entry file: social_Flask/app.py -Scanned: 2016-10-19 10:04:15.252758 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: social_Flask/venv/lib/python2.7/genericpath.py - -josh-mcq/flask-api -https://github.com/josh-mcq/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-19 10:04:16.651689 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jdunnaway/flask_ws -https://github.com/jdunnaway/flask_ws -Entry file: flask_ws/app.py -Scanned: 2016-10-19 10:04:33.038856 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benallen18/flask-hello-world -https://github.com/benallen18/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:04:33.618497 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -remijouannet/trojandroid_server -https://github.com/remijouannet/trojandroid_server -Entry file: trojandroid_server/app/app.py -Scanned: 2016-10-19 10:04:35.080414 -No vulnerabilities found. - - -dmerson/FlaskToDo -https://github.com/dmerson/FlaskToDo -Entry file: FlaskToDo/FlaskToDo.py -Scanned: 2016-10-19 10:04:36.388889 -No vulnerabilities found. - - -kryptn/FlaskBareAuth -https://github.com/kryptn/FlaskBareAuth -Entry file: FlaskBareAuth/app.py -Scanned: 2016-10-19 10:04:37.785260 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rbarkerappen/test_FlaskVersioned -https://github.com/rbarkerappen/test_FlaskVersioned -Entry file: test_FlaskVersioned/app.py -Scanned: 2016-10-19 10:04:39.107330 -No vulnerabilities found. - - -tecstack/opback -https://github.com/tecstack/opback -Entry file: None -Scanned: 2016-10-19 10:04:49.493347 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tecstack/opback. - -eriktaubeneck/flask-ext-test -https://github.com/eriktaubeneck/flask-ext-test -Entry file: flask-ext-test/app.py -Scanned: 2016-10-19 10:04:51.758140 -No vulnerabilities found. - - -martin-appcito/demo-flask-app -https://github.com/martin-appcito/demo-flask-app -Entry file: demo-flask-app/app.py -Scanned: 2016-10-19 10:04:53.074868 -No vulnerabilities found. - - -laideolams/flask-hello-world -https://github.com/laideolams/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:04:53.656076 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -teitei-tk/Flask-REST-Controller -https://github.com/teitei-tk/Flask-REST-Controller -Entry file: Flask-REST-Controller/setup.py -Scanned: 2016-10-19 10:04:55.103529 -No vulnerabilities found. - - -nubianMONK/suitor_python_flask -https://github.com/nubianMONK/suitor_python_flask -Entry file: suitor_python_flask/suitor_flask.py -Scanned: 2016-10-19 10:04:56.461093 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ananda-chintalapati/weather-report-python-flask -https://github.com/ananda-chintalapati/weather-report-python-flask -Entry file: weather-report-python-flask/report/reportResource.py -Scanned: 2016-10-19 10:04:57.715755 -No vulnerabilities found. - - -Turbo87/flask-oauth2-test -https://github.com/Turbo87/flask-oauth2-test -Entry file: flask-oauth2-test/server.py -Scanned: 2016-10-19 10:04:59.196628 -Vulnerability 1: -File: flask-oauth2-test/server.py - > User input at line 41, trigger word "get(": - refresh_token = request.form.get('refresh_token') -Reassigned in: - File: flask-oauth2-test/server.py - > Line 37: refresh_token = binascii.hexlify(os.urandom(16)) - File: flask-oauth2-test/server.py - > Line 32: ret_MAYBE_FUNCTION_NAME = (jsonify('error''invalid_request'), 400) - File: flask-oauth2-test/server.py - > Line 35: ret_MAYBE_FUNCTION_NAME = (jsonify('error''invalid_grant'), 400) - File: flask-oauth2-test/server.py - > Line 43: ret_MAYBE_FUNCTION_NAME = (jsonify('error''invalid_request'), 400) - File: flask-oauth2-test/server.py - > Line 46: ret_MAYBE_FUNCTION_NAME = (jsonify('error''invalid_grant'), 401) - File: flask-oauth2-test/server.py - > Line 49: ret_MAYBE_FUNCTION_NAME = (jsonify('error''unsupported_grant_type'), 400) -File: flask-oauth2-test/server.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('access_token''expires_in''token_type''refresh_token'jwt.encode('user''exp'USER_IDtime.time() + EXPIRE, SECRET,algorithm='HS256')EXPIRE'bearer'refresh_token) - - - -kaushikraj/flask-login-sample -https://github.com/kaushikraj/flask-login-sample -Entry file: flask-login-sample/app/__init__.py -Scanned: 2016-10-19 10:05:00.479975 -No vulnerabilities found. - - -dhamaniasad/flask-whooshalchemy-example -https://github.com/dhamaniasad/flask-whooshalchemy-example -Entry file: flask-whooshalchemy-example/app.py -Scanned: 2016-10-19 10:05:01.760342 -No vulnerabilities found. - - -anglinb/flask-docker-setup -https://github.com/anglinb/flask-docker-setup -Entry file: flask-docker-setup/app.py -Scanned: 2016-10-19 10:05:03.037275 -No vulnerabilities found. - - -OstrichProjects/Simple-Flask-User-DB -https://github.com/OstrichProjects/Simple-Flask-User-DB -Entry file: Simple-Flask-User-DB/app.py -Scanned: 2016-10-19 10:05:04.330419 -No vulnerabilities found. - - -hwong/heroku_flask_boilerplate -https://github.com/hwong/heroku_flask_boilerplate -Entry file: heroku_flask_boilerplate/server.py -Scanned: 2016-10-19 10:05:06.103106 -No vulnerabilities found. - - -llambiel/flask-pgsql-demo -https://github.com/llambiel/flask-pgsql-demo -Entry file: flask-pgsql-demo/app.py -Scanned: 2016-10-19 10:05:07.409335 -No vulnerabilities found. - - -nthock/socialNetworkFlask -https://github.com/nthock/socialNetworkFlask -Entry file: socialNetworkFlask/app.py -Scanned: 2016-10-19 10:05:08.839948 -No vulnerabilities found. - - -pechatny/basic-flask-app -https://github.com/pechatny/basic-flask-app -Entry file: basic-flask-app/src/app.py -Scanned: 2016-10-19 10:05:11.963729 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -srahul07/flask-by-example -https://github.com/srahul07/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 10:05:12.700988 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SleipRecx/Flask-Python-Website -https://github.com/SleipRecx/Flask-Python-Website -Entry file: Flask-Python-Website/app.py -Scanned: 2016-10-19 10:05:14.414360 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tanderegg/flask-test-app -https://github.com/tanderegg/flask-test-app -Entry file: flask-test-app/app/__init__.py -Scanned: 2016-10-19 10:05:15.669663 -No vulnerabilities found. - - -marcusbusby/python_blog -https://github.com/marcusbusby/python_blog -Entry file: None -Scanned: 2016-10-19 10:05:16.186439 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vestrobaa/flaskr-gogo -https://github.com/vestrobaa/flaskr-gogo -Entry file: flaskr-gogo/flaskr.py -Scanned: 2016-10-19 10:05:18.496824 -No vulnerabilities found. - - -pkulev/mblog -https://github.com/pkulev/mblog -Entry file: mblog/mblog/__init__.py -Scanned: 2016-10-19 10:05:19.896268 -Vulnerability 1: -File: mblog/mblog/views.py - > User input at line 20, trigger word ".data": - login = form.login.data -Reassigned in: - File: mblog/mblog/views.py - > Line 22: user = User(db).validate_login(login, password) -File: mblog/mblog/views.py - > reaches line 23, trigger word "flash(": - flash(str(user)) - -Vulnerability 2: -File: mblog/mblog/views.py - > User input at line 21, trigger word ".data": - password = form.password.data -Reassigned in: - File: mblog/mblog/views.py - > Line 22: user = User(db).validate_login(login, password) -File: mblog/mblog/views.py - > reaches line 23, trigger word "flash(": - flash(str(user)) - - - -nathanbreitsch/sports -https://github.com/nathanbreitsch/sports -Entry file: sports/sports.py -Scanned: 2016-10-19 10:05:39.162303 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -IE-NITK/ComicsAPI -https://github.com/IE-NITK/ComicsAPI -Entry file: ComicsAPI/app.py -Scanned: 2016-10-19 10:05:45.009894 -No vulnerabilities found. - - -khrogos/fatracker -https://github.com/khrogos/fatracker -Entry file: fatracker/fatracker.py -Scanned: 2016-10-19 10:05:46.348154 -No vulnerabilities found. - - -zhaozengguang/payment_manager -https://github.com/zhaozengguang/payment_manager -Entry file: payment_manager/models.py -Scanned: 2016-10-19 10:05:48.152910 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -jankowskip/AudioPydub-methods-with-FlaskServer -https://github.com/jankowskip/AudioPydub-methods-with-FlaskServer -Entry file: AudioPydub-methods-with-FlaskServer/MusicServer.py -Scanned: 2016-10-19 10:06:05.048637 -No vulnerabilities found. - - -manhtai/vietbus -https://github.com/manhtai/vietbus -Entry file: vietbus/app/__init__.py -Scanned: 2016-10-19 10:06:06.914361 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ei-grad/geocoder -https://github.com/ei-grad/geocoder -Entry file: geocoder/api.py -Scanned: 2016-10-19 10:06:08.153574 -No vulnerabilities found. - - -smithellis/scratch -https://github.com/smithellis/scratch -Entry file: scratch/pm.py -Scanned: 2016-10-19 10:06:09.392452 -No vulnerabilities found. - - -AhnSeongHyun/Arale -https://github.com/AhnSeongHyun/Arale -Entry file: None -Scanned: 2016-10-19 10:06:09.967181 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AhnSeongHyun/Arale. - -nickyfoto/restaurtant -https://github.com/nickyfoto/restaurtant -Entry file: restaurtant/project.py -Scanned: 2016-10-19 10:06:11.417266 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -titov-max/microblog -https://github.com/titov-max/microblog -Entry file: None -Scanned: 2016-10-19 10:06:12.400239 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Burning-Chai/Flask -https://github.com/Burning-Chai/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:06:14.188134 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -justanr/Flask-Transfer -https://github.com/justanr/Flask-Transfer -Entry file: Flask-Transfer/examples/JPEGr/JPEGr/app.py -Scanned: 2016-10-19 10:06:15.666234 -No vulnerabilities found. - - -weyj4/flask -https://github.com/weyj4/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:06:16.591027 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jasmin19/Flask -https://github.com/jasmin19/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:06:17.078698 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Lemon23/Flask -https://github.com/Lemon23/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:06:17.560181 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pawel22729/flask -https://github.com/Pawel22729/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:06:18.440896 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -Norli/flask -https://github.com/Norli/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:06:22.688519 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -thegeorgeous/flask-cqlalchemy -https://github.com/thegeorgeous/flask-cqlalchemy -Entry file: flask-cqlalchemy/examples/example_app_udt.py -Scanned: 2016-10-19 10:06:24.260654 -No vulnerabilities found. - - -viniciuschiele/flask-apidoc -https://github.com/viniciuschiele/flask-apidoc -Entry file: flask-apidoc/example/views.py -Scanned: 2016-10-19 10:06:25.616492 -No vulnerabilities found. - - -calderonroberto/flask-redis-microservice -https://github.com/calderonroberto/flask-redis-microservice -Entry file: flask-redis-microservice/app.py -Scanned: 2016-10-19 10:06:26.880637 -No vulnerabilities found. - - -ZarinPal-Lab/SampleCode-Python-Flask -https://github.com/ZarinPal-Lab/SampleCode-Python-Flask -Entry file: SampleCode-Python-Flask/zarinpal.py -Scanned: 2016-10-19 10:06:28.231571 -No vulnerabilities found. - - -b00000001/flaskr -https://github.com/b00000001/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:06:28.742800 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Zegoverno/flaskr -https://github.com/Zegoverno/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:06:29.289358 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kevlab/flasky -https://github.com/kevlab/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:06:29.792745 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laideolams/flasktaskr -https://github.com/laideolams/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:06:30.346914 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bidhan-a/flasknotes -https://github.com/bidhan-a/flasknotes -Entry file: flasknotes/api.py -Scanned: 2016-10-19 10:06:32.399463 -Vulnerability 1: -File: flasknotes/api.py - > User input at line 27, trigger word "get(": - page = request.args.get('page') -Reassigned in: - File: flasknotes/api.py - > Line 30: page = int(request.args.get('page')) - File: flasknotes/api.py - > Line 34: page = 1 - File: flasknotes/api.py - > Line 35: notes = models.Note.newest().paginate(page, 10, True) - File: flasknotes/api.py - > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('result''Invalid parameter') -File: flasknotes/api.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('notes''next'json_notesnotes.has_next) - -Vulnerability 2: -File: flasknotes/api.py - > User input at line 30, trigger word "get(": - page = int(request.args.get('page')) -Reassigned in: - File: flasknotes/api.py - > Line 27: page = request.args.get('page') - File: flasknotes/api.py - > Line 34: page = 1 - File: flasknotes/api.py - > Line 35: notes = models.Note.newest().paginate(page, 10, True) - File: flasknotes/api.py - > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('result''Invalid parameter') -File: flasknotes/api.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('notes''next'json_notesnotes.has_next) - - - -wuhuixiong/flasky -https://github.com/wuhuixiong/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:06:36.901569 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jpmaldonado/flasktaskr -https://github.com/jpmaldonado/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:06:37.475103 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -grogs84/flasktaskr -https://github.com/grogs84/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:06:40.984710 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -xingzhipeng/flaskr -https://github.com/xingzhipeng/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:06:47.542105 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ltoshea/flaskr -https://github.com/ltoshea/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:06:48.042415 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -caitpower/flaskStarter -https://github.com/caitpower/flaskStarter -Entry file: flaskStarter/app.py -Scanned: 2016-10-19 10:06:51.322306 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nthock/microblogFlask -https://github.com/nthock/microblogFlask -Entry file: microblogFlask/app/__init__.py -Scanned: 2016-10-19 10:07:07.855243 -No vulnerabilities found. - - -chrhsmt/flask_sample -https://github.com/chrhsmt/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-19 10:07:09.368582 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aouyang1/Cassandra-Flask -https://github.com/aouyang1/Cassandra-Flask -Entry file: Cassandra-Flask/app.py -Scanned: 2016-10-19 10:07:10.766064 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Norli/FirstFlask -https://github.com/Norli/FirstFlask -Entry file: FirstFlask/app.py -Scanned: 2016-10-19 10:07:13.404489 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py - -woz24416/flask_project -https://github.com/woz24416/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-19 10:07:14.180900 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EvilDmitri/flask-megatut -https://github.com/EvilDmitri/flask-megatut -Entry file: flask-megatut/app/__init__.py -Scanned: 2016-10-19 10:07:15.422133 -No vulnerabilities found. - - -Lepozepo/flask-python -https://github.com/Lepozepo/flask-python -Entry file: flask-python/init.py -Scanned: 2016-10-19 10:07:18.307638 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-python/venv/lib/python2.7/genericpath.py - -1016601657/flask-blog -https://github.com/1016601657/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:07:18.834787 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -KunstencentrumVooruit/flask-deploy -https://github.com/KunstencentrumVooruit/flask-deploy -Entry file: flask-deploy/template.py -Scanned: 2016-10-19 10:07:19.347490 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shenaishiren/flask-example -https://github.com/shenaishiren/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-19 10:07:19.852778 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laideolams/flask-blog -https://github.com/laideolams/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:07:20.374179 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -BlaiseGratton/which_flask -https://github.com/BlaiseGratton/which_flask -Entry file: which_flask/app.py -Scanned: 2016-10-19 10:07:21.743971 -Vulnerability 1: -File: which_flask/app.py - > User input at line 58, trigger word "get(": - user = models.User.verify_auth_token(request.headers.get('x-session-token')) -Reassigned in: - File: which_flask/app.py - > Line 61: ret_MAYBE_FUNCTION_NAME = (jsonify('message''Missing or incorrect token'), 400) -File: which_flask/app.py - > reaches line 59, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username) - -Vulnerability 2: -File: which_flask/app.py - > User input at line 72, trigger word "get(": - photo = request.json.get('image') -Reassigned in: - File: which_flask/app.py - > Line 79: ret_MAYBE_FUNCTION_NAME = (jsonify('message''Saving photo failed'), 400) - File: which_flask/app.py - > Line 83: ret_MAYBE_FUNCTION_NAME = jsonify(photos=[photo.serialize for photo in photos]) - File: which_flask/app.py - > Line 85: ret_MAYBE_FUNCTION_NAME = (jsonify('message''No photos to return'), 400) -File: which_flask/app.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('base64_photo'photo), 200) - - - -jreiher2003/Flask_mega -https://github.com/jreiher2003/Flask_mega -Entry file: Flask_mega/Lib/site-packages/flask_openid.py -Scanned: 2016-10-19 10:07:25.189588 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -weienwong/flask-app -https://github.com/weienwong/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-19 10:07:25.685058 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fmoezinia/flask_files -https://github.com/fmoezinia/flask_files -Entry file: flask_files/call.py -Scanned: 2016-10-19 10:07:27.066196 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luckyharryji/Order-Flask -https://github.com/luckyharryji/Order-Flask -Entry file: Order-Flask/run.py -Scanned: 2016-10-19 10:07:28.317675 -No vulnerabilities found. - - -seanclark84/flask-gameweb -https://github.com/seanclark84/flask-gameweb -Entry file: flask-gameweb/gameweb/__init__.py -Scanned: 2016-10-19 10:07:30.173075 -No vulnerabilities found. - - -murphyky/flask-app -https://github.com/murphyky/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-19 10:07:30.678597 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -masterp4dev/flask-crawler -https://github.com/masterp4dev/flask-crawler -Entry file: flask-crawler/app/__init__.py -Scanned: 2016-10-19 10:07:32.645434 -No vulnerabilities found. - - -mjhea0/flask_flow -https://github.com/mjhea0/flask_flow -Entry file: flask_flow/flask_flow_project/__init__.py -Scanned: 2016-10-19 10:07:33.901956 -No vulnerabilities found. - - -nishworks/Flask-starter -https://github.com/nishworks/Flask-starter -Entry file: Flask-starter/flask_app/__init__.py -Scanned: 2016-10-19 10:07:35.528948 -No vulnerabilities found. - - -wangzhe330/flask_test -https://github.com/wangzhe330/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 10:07:36.134477 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cfschlierman/Flask.py -https://github.com/cfschlierman/Flask.py -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:07:36.626926 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -doubledherin/flask_tutorial -https://github.com/doubledherin/flask_tutorial -Entry file: None -Scanned: 2016-10-19 10:07:38.125705 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -josh-mcq/flask-api -https://github.com/josh-mcq/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-19 10:07:38.614550 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jdunnaway/flask_ws -https://github.com/jdunnaway/flask_ws -Entry file: flask_ws/app.py -Scanned: 2016-10-19 10:07:42.309619 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -raphaelncampos/flask-microblog -https://github.com/raphaelncampos/flask-microblog -Entry file: None -Scanned: 2016-10-19 10:07:48.804570 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Twotiger/flask-weather -https://github.com/Twotiger/flask-weather -Entry file: flask-weather/app.py -Scanned: 2016-10-19 10:07:49.307313 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thinkocapo/flask-HelloWorld -https://github.com/thinkocapo/flask-HelloWorld -Entry file: flask-HelloWorld/hello_world_jinja.py -Scanned: 2016-10-19 10:08:10.103465 -No vulnerabilities found. - - -vasanthsarathy/flatfreeze -https://github.com/vasanthsarathy/flatfreeze -Entry file: flatfreeze/app.py -Scanned: 2016-10-19 10:08:11.564702 -No vulnerabilities found. - - -tecstack/opback -https://github.com/tecstack/opback -Entry file: None -Scanned: 2016-10-19 10:08:12.125259 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tecstack/opback. - -wyj2046/awesome-flask-todo -https://github.com/wyj2046/awesome-flask-todo -Entry file: None -Scanned: 2016-10-19 10:08:12.640357 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wyj2046/awesome-flask-todo. - -SsureyMoon/Simple-Python-Flask -https://github.com/SsureyMoon/Simple-Python-Flask -Entry file: Simple-Python-Flask/catalog_app/__init__.py -Scanned: 2016-10-19 10:08:16.023305 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomburrows/flask-by-example -https://github.com/tomburrows/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 10:08:16.663726 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jennielees/flask-api-mashup -https://github.com/jennielees/flask-api-mashup -Entry file: flask-api-mashup/app.py -Scanned: 2016-10-19 10:08:21.386043 -No vulnerabilities found. - - -swifthorseman/flask-peewee-heroku-setup -https://github.com/swifthorseman/flask-peewee-heroku-setup -Entry file: flask-peewee-heroku-setup/server.py -Scanned: 2016-10-19 10:08:22.652223 -No vulnerabilities found. - - -AboorvaDevarajan/Machine-Learning-Services-Flask -https://github.com/AboorvaDevarajan/Machine-Learning-Services-Flask -Entry file: None -Scanned: 2016-10-19 10:08:29.175354 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -grogs84/flask-hello-world -https://github.com/grogs84/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:08:29.703973 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -BetsyRTR/flask_hello_world -https://github.com/BetsyRTR/flask_hello_world -Entry file: None -Scanned: 2016-10-19 10:08:30.340421 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/BetsyRTR/flask_hello_world. - -hakimu/flask_uwsgi_tech_support -https://github.com/hakimu/flask_uwsgi_tech_support -Entry file: flask_uwsgi_tech_support/app.py -Scanned: 2016-10-19 10:08:32.911668 -No vulnerabilities found. - - -arosenberg01/python-flask-server -https://github.com/arosenberg01/python-flask-server -Entry file: python-flask-server/app.py -Scanned: 2016-10-19 10:08:34.824888 -No vulnerabilities found. - - -Yanze/restau_management_flask -https://github.com/Yanze/restau_management_flask -Entry file: restau_management_flask/restau_management_flask/__init__.py -Scanned: 2016-10-19 10:08:42.649907 -Vulnerability 1: -File: restau_management_flask/restau_management_flask/views.py - > User input at line 34, trigger word ".data": - customer_nb = form.customer_nb.data -Reassigned in: - File: restau_management_flask/restau_management_flask/views.py - > Line 35: table_nb = r.new_customer_group(customer_nb) -File: restau_management_flask/restau_management_flask/views.py - > reaches line 39, trigger word "flash(": - flash('Table {} are available for this customer group.'.format(', '.join(map(str, table_nb)))) - -Vulnerability 2: -File: restau_management_flask/restau_management_flask/views.py - > User input at line 48, trigger word ".data": - customer_id = form2.customer_id.data -File: restau_management_flask/restau_management_flask/views.py - > reaches line 58, trigger word "flash(": - flash('Group {} removed.'.format(customer_id)) - - - -anglinb/flask-docker-setup -https://github.com/anglinb/flask-docker-setup -Entry file: flask-docker-setup/app.py -Scanned: 2016-10-19 10:08:43.958518 -No vulnerabilities found. - - -fangcode/annotated_flask_source -https://github.com/fangcode/annotated_flask_source -Entry file: annotated_flask_source/setup.py -Scanned: 2016-10-19 10:08:45.927877 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pampipampupampa/Flask-Taskr6 -https://github.com/Pampipampupampa/Flask-Taskr6 -Entry file: Flask-Taskr6/project/__init__.py -Scanned: 2016-10-19 10:08:49.622012 -No vulnerabilities found. - - -intuinno/flask-by-example -https://github.com/intuinno/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 10:08:50.719720 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -WillMayger/python-flask-helloworld -https://github.com/WillMayger/python-flask-helloworld -Entry file: python-flask-helloworld/server.py -Scanned: 2016-10-19 10:08:51.248987 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brenttaylor/flask-microblog-tutorial -https://github.com/brenttaylor/flask-microblog-tutorial -Entry file: flask-microblog-tutorial/microblog/__init__.py -Scanned: 2016-10-19 10:08:52.503565 -No vulnerabilities found. - - -shrey-rajvanshi/practo -https://github.com/shrey-rajvanshi/practo -Entry file: practo/hello.py -Scanned: 2016-10-19 10:08:54.206853 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marcom04/whose-is-this-box-flask -https://github.com/marcom04/whose-is-this-box-flask -Entry file: None -Scanned: 2016-10-19 10:08:56.259754 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/marcom04/whose-is-this-box-flask. - -johnthachil/NoteNote -https://github.com/johnthachil/NoteNote -Entry file: NoteNote/app/__init__.py -Scanned: 2016-10-19 10:08:59.069259 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smellycats/SX-UploadSystem -https://github.com/smellycats/SX-UploadSystem -Entry file: SX-UploadSystem/upload/app.py -Scanned: 2016-10-19 10:09:00.528754 -No vulnerabilities found. - - -nickyfoto/restaurtant -https://github.com/nickyfoto/restaurtant -Entry file: restaurtant/project.py -Scanned: 2016-10-19 10:09:01.012282 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tclain/wikimedia-texts -https://github.com/tclain/wikimedia-texts -Entry file: wikimedia-texts/web/index.py -Scanned: 2016-10-19 10:09:04.096396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -parthppanchal/blogger -https://github.com/parthppanchal/blogger -Entry file: blogger/generator.py -Scanned: 2016-10-19 10:09:10.470742 -No vulnerabilities found. - - -michaelbae/simipleSocialNetwork -https://github.com/michaelbae/simipleSocialNetwork -Entry file: simipleSocialNetwork/app.py -Scanned: 2016-10-19 10:09:15.356084 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: simipleSocialNetwork/venv/lib/python2.7/genericpath.py - -rblack42/GithubEd -https://github.com/rblack42/GithubEd -Entry file: GithubEd/app.py -Scanned: 2016-10-19 10:09:16.629037 -No vulnerabilities found. - - -sebpearce/money -https://github.com/sebpearce/money -Entry file: money/views.py -Scanned: 2016-10-19 10:09:18.891413 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BetsyRTR/Betsy-Blog -https://github.com/BetsyRTR/Betsy-Blog -Entry file: Betsy-Blog/blog/__init__.py -Scanned: 2016-10-19 10:09:20.254194 -No vulnerabilities found. - - -neodd70/Python-Server- -https://github.com/neodd70/Python-Server- -Entry file: Python-Server-/mcp.py -Scanned: 2016-10-19 10:09:21.485607 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dragonfi/noticeboard -https://github.com/dragonfi/noticeboard -Entry file: noticeboard/noticeboard/noticeboard.py -Scanned: 2016-10-19 10:09:23.303911 -No vulnerabilities found. - - -knowsuchagency/tbdemo -https://github.com/knowsuchagency/tbdemo -Entry file: tbdemo/flaskapp.py -Scanned: 2016-10-19 10:09:24.664213 -No vulnerabilities found. - - -OpenPixel/blocky -https://github.com/OpenPixel/blocky -Entry file: blocky/tests/blocky_flask.py -Scanned: 2016-10-19 10:09:26.019042 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -sambev/starterflask -https://github.com/sambev/starterflask -Entry file: starterflask/app/__init__.py -Scanned: 2016-10-19 10:09:33.120399 -No vulnerabilities found. - - -undeadops/overhear -https://github.com/undeadops/overhear -Entry file: overhear/api/api.py -Scanned: 2016-10-19 10:09:34.468068 -No vulnerabilities found. - - -ivanalejandro0/reload-on-change -https://github.com/ivanalejandro0/reload-on-change -Entry file: reload-on-change/server/server.py -Scanned: 2016-10-19 10:09:35.822668 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kumaya/PinCodeDirectory -https://github.com/kumaya/PinCodeDirectory -Entry file: PinCodeDirectory/app/__init__.py -Scanned: 2016-10-19 10:09:38.037950 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stitchfix/pyxley -https://github.com/stitchfix/pyxley -Entry file: pyxley/examples/metricsgraphics/project/app.py -Scanned: 2016-10-19 10:09:49.478956 -No vulnerabilities found. - - -Burning-Chai/Flask -https://github.com/Burning-Chai/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:09:49.966983 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fgken/flask -https://github.com/fgken/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:09:51.872242 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -zpalaskas/Flask -https://github.com/zpalaskas/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:09:52.365767 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leah/hello-flask-heroku -https://github.com/leah/hello-flask-heroku -Entry file: hello-flask-heroku/hello.py -Scanned: 2016-10-19 10:09:53.592309 -No vulnerabilities found. - - -gratimax/almost_flask -https://github.com/gratimax/almost_flask -Entry file: almost_flask/example.py -Scanned: 2016-10-19 10:09:54.827374 -No vulnerabilities found. - - -ryanss/flask-tornado -https://github.com/ryanss/flask-tornado -Entry file: flask-tornado/examples/sockjs.py -Scanned: 2016-10-19 10:09:57.142146 -No vulnerabilities found. - - -myang321/kandedan-flask -https://github.com/myang321/kandedan-flask -Entry file: kandedan-flask/main.py -Scanned: 2016-10-19 10:10:00.689968 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EricQAQ/Flask-RedisSession -https://github.com/EricQAQ/Flask-RedisSession -Entry file: Flask-RedisSession/test.py -Scanned: 2016-10-19 10:10:01.942638 -No vulnerabilities found. - - -JoshYuJump/flasky -https://github.com/JoshYuJump/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:10:02.439122 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sirfilip/flaskhemy -https://github.com/sirfilip/flaskhemy -Entry file: flaskhemy/app.py -Scanned: 2016-10-19 10:10:03.672900 -No vulnerabilities found. - - -TarCode/flaskr -https://github.com/TarCode/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:10:04.174848 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adamdaum/flaskr -https://github.com/adamdaum/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:10:10.677089 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bennovack/flaskr -https://github.com/bennovack/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:10:13.170966 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laideolams/flasktaskr -https://github.com/laideolams/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:10:17.717426 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kafey/flaskr -https://github.com/kafey/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:10:18.213320 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seanbehan/flaskblog -https://github.com/seanbehan/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 10:10:20.739694 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -kurohai/flasky -https://github.com/kurohai/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:10:22.247462 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bidhan-a/flasknotes -https://github.com/bidhan-a/flasknotes -Entry file: flasknotes/api.py -Scanned: 2016-10-19 10:10:24.515600 -Vulnerability 1: -File: flasknotes/api.py - > User input at line 27, trigger word "get(": - page = request.args.get('page') -Reassigned in: - File: flasknotes/api.py - > Line 30: page = int(request.args.get('page')) - File: flasknotes/api.py - > Line 34: page = 1 - File: flasknotes/api.py - > Line 35: notes = models.Note.newest().paginate(page, 10, True) - File: flasknotes/api.py - > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('result''Invalid parameter') -File: flasknotes/api.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('notes''next'json_notesnotes.has_next) - -Vulnerability 2: -File: flasknotes/api.py - > User input at line 30, trigger word "get(": - page = int(request.args.get('page')) -Reassigned in: - File: flasknotes/api.py - > Line 27: page = request.args.get('page') - File: flasknotes/api.py - > Line 34: page = 1 - File: flasknotes/api.py - > Line 35: notes = models.Note.newest().paginate(page, 10, True) - File: flasknotes/api.py - > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('result''Invalid parameter') -File: flasknotes/api.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('notes''next'json_notesnotes.has_next) - - - -GonzaloLeyton/flaskin -https://github.com/GonzaloLeyton/flaskin -Entry file: flaskin/start.py -Scanned: 2016-10-19 10:10:25.828449 -No vulnerabilities found. - - -hubinary/flasky -https://github.com/hubinary/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:10:26.338600 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nahrinrs/flaskr -https://github.com/nahrinrs/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:10:26.830037 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nthock/flasky -https://github.com/nthock/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:10:33.378880 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pkennedy89/flasktaskr -https://github.com/pkennedy89/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:10:34.904810 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ashutoshsaboo/flaskr -https://github.com/ashutoshsaboo/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:10:36.430620 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cymoo/flasky -https://github.com/cymoo/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:10:37.929966 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ltoshea/flaskr -https://github.com/ltoshea/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:10:40.437679 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bh45k4r/flask -https://github.com/bh45k4r/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:11:39.646177 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -llh335/flask -https://github.com/llh335/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:11:40.644499 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -gd452/flask -https://github.com/gd452/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:11:41.623916 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -paulmin55/flask -https://github.com/paulmin55/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:11:42.635503 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -CarlEkerot/flask-orm -https://github.com/CarlEkerot/flask-orm -Entry file: flask-orm/webapp/__init__.py -Scanned: 2016-10-19 10:11:44.164516 -No vulnerabilities found. - - -ibininja/upload_file_python -https://github.com/ibininja/upload_file_python -Entry file: upload_file_python/src/app.py -Scanned: 2016-10-19 10:11:45.420422 -No vulnerabilities found. - - -fraoustin/flaskserver -https://github.com/fraoustin/flaskserver -Entry file: None -Scanned: 2016-10-19 10:11:46.797530 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fraoustin/flaskserver. - -ecerami/hello_flask -https://github.com/ecerami/hello_flask -Entry file: hello_flask/app.py -Scanned: 2016-10-19 10:11:48.059514 -No vulnerabilities found. - - -milinbhakta/flaskmaterialdesign -https://github.com/milinbhakta/flaskmaterialdesign -Entry file: flaskmaterialdesign/venv/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 10:11:52.681018 -No vulnerabilities found. - - -Hellemos/flaskapp -https://github.com/Hellemos/flaskapp -Entry file: flaskapp/flaskapp/application.py -Scanned: 2016-10-19 10:11:54.233290 -No vulnerabilities found. - - -ssssergey/flaskengine -https://github.com/ssssergey/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-19 10:11:54.754258 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kai1/flasktest -https://github.com/kai1/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 10:11:55.266188 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -StuartChristie/Flasky -https://github.com/StuartChristie/Flasky -Entry file: Flasky/untitled.py -Scanned: 2016-10-19 10:11:56.506110 -No vulnerabilities found. - - -willianribeiro/flaskr -https://github.com/willianribeiro/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:11:57.029718 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -saucecode/flaskcat -https://github.com/saucecode/flaskcat -Entry file: flaskcat/flaskcat.py -Scanned: 2016-10-19 10:11:58.269119 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wiggitywalt/flasktaskr -https://github.com/wiggitywalt/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:11:58.788579 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -milinbhakta/flaskjinja -https://github.com/milinbhakta/flaskjinja -Entry file: flaskjinja/hello.py -Scanned: 2016-10-19 10:12:05.416441 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ashishkx/Flaskr -https://github.com/ashishkx/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 10:12:05.941396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jward1/flasktaskr -https://github.com/jward1/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:12:06.435370 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -schoolofcode-me/web_blog -https://github.com/schoolofcode-me/web_blog -Entry file: web_blog/src/app.py -Scanned: 2016-10-19 10:12:07.732445 -No vulnerabilities found. - - -iKalin/flask1 -https://github.com/iKalin/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-19 10:12:08.468733 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -iamrajhans/FlaskPYDemo -https://github.com/iamrajhans/FlaskPYDemo -Entry file: None -Scanned: 2016-10-19 10:12:09.710468 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/iamrajhans/FlaskPYDemo. - -arpm/FlaskTaskr -https://github.com/arpm/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-19 10:12:10.349975 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -MortalCatalyst/flaskTR -https://github.com/MortalCatalyst/flaskTR -Entry file: flaskTR/flasktaskr/views.py -Scanned: 2016-10-19 10:12:11.576434 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -QuadPiece/Quad-Devices-Two -https://github.com/QuadPiece/Quad-Devices-Two -Entry file: Quad-Devices-Two/run.py -Scanned: 2016-10-19 10:12:12.817395 -No vulnerabilities found. - - -arvelt/hello-flask -https://github.com/arvelt/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 10:12:13.406477 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -dbunker/Flask-Tread -https://github.com/dbunker/Flask-Tread -Entry file: Flask-Tread/examples/blog/app/mainapp/__init__.py -Scanned: 2016-10-19 10:12:14.720327 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -martincalvert/GAE-Flask -https://github.com/martincalvert/GAE-Flask -Entry file: GAE-Flask/routes.py -Scanned: 2016-10-19 10:12:41.751992 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fergyfresh/flask-staysafe -https://github.com/fergyfresh/flask-staysafe -Entry file: None -Scanned: 2016-10-19 10:12:46.525263 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -andrewheekin/flask-metatag -https://github.com/andrewheekin/flask-metatag -Entry file: flask-metatag/app.py -Scanned: 2016-10-19 10:12:47.809925 -No vulnerabilities found. - - -Seneckiy/workwithFlask -https://github.com/Seneckiy/workwithFlask -Entry file: workwithFlask/hello.py -Scanned: 2016-10-19 10:12:49.996682 -No vulnerabilities found. - - -xuefeng-huang/flask_task -https://github.com/xuefeng-huang/flask_task -Entry file: flask_task/__init__.py -Scanned: 2016-10-19 10:12:51.231423 -No vulnerabilities found. - - -ichy-wayland/flask-temp -https://github.com/ichy-wayland/flask-temp -Entry file: flask-temp/main.py -Scanned: 2016-10-19 10:12:52.436517 -No vulnerabilities found. - - -RodrigoVillatoro/flask_blog -https://github.com/RodrigoVillatoro/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:12:52.943445 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -patrickyoung/simple-flask -https://github.com/patrickyoung/simple-flask -Entry file: simple-flask/hello.py -Scanned: 2016-10-19 10:12:54.132844 -No vulnerabilities found. - - -sancarbar/flask-auth -https://github.com/sancarbar/flask-auth -Entry file: flask-auth/example.py -Scanned: 2016-10-19 10:12:54.638070 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lifayi2008/my_flask -https://github.com/lifayi2008/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-19 10:12:55.241366 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -staticor/learnFlask -https://github.com/staticor/learnFlask -Entry file: None -Scanned: 2016-10-19 10:12:56.439211 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/staticor/learnFlask. - -arpm/flask-blog -https://github.com/arpm/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:12:57.006768 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -raejoon/lype-flask -https://github.com/raejoon/lype-flask -Entry file: lype-flask/lyre.py -Scanned: 2016-10-19 10:12:58.323261 -No vulnerabilities found. - - -ayusharma/flask-mysql -https://github.com/ayusharma/flask-mysql -Entry file: flask-mysql/app.py -Scanned: 2016-10-19 10:13:01.088234 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-mysql/venv/lib/python2.7/genericpath.py - -zonzpoo/blog-flask -https://github.com/zonzpoo/blog-flask -Entry file: blog-flask/project/views.py -Scanned: 2016-10-19 10:13:01.764131 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mehmettaskiner/flask-skeleton -https://github.com/mehmettaskiner/flask-skeleton -Entry file: None -Scanned: 2016-10-19 10:13:02.281868 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mehmettaskiner/flask-skeleton. - -zolaneta/hello_flask -https://github.com/zolaneta/hello_flask -Entry file: hello_flask/Flask.py -Scanned: 2016-10-19 10:13:03.490437 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -robin-lee/flask-tutorial -https://github.com/robin-lee/flask-tutorial -Entry file: None -Scanned: 2016-10-19 10:13:03.990652 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mrasband/flask-seed -https://github.com/mrasband/flask-seed -Entry file: None -Scanned: 2016-10-19 10:13:07.500218 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrasband/flask-seed. - -zhaojf85/docker-flask -https://github.com/zhaojf85/docker-flask -Entry file: docker-flask/hello-flask/app.py -Scanned: 2016-10-19 10:13:08.747218 -No vulnerabilities found. - - -higoreduardo/flask-blog -https://github.com/higoreduardo/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:13:09.312817 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -sholsapp/flask-science -https://github.com/sholsapp/flask-science -Entry file: flask-science/flaskscience/__init__.py -Scanned: 2016-10-19 10:13:10.665648 -No vulnerabilities found. - - -luoluohang/flask_blog -https://github.com/luoluohang/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:13:11.170522 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mnzr/MegaFlask -https://github.com/mnzr/MegaFlask -Entry file: MegaFlask/app/__init__.py -Scanned: 2016-10-19 10:13:12.472162 -No vulnerabilities found. - - -damstrom/flask-hello-world -https://github.com/damstrom/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:13:13.020113 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -rchibana/MicroBlog -https://github.com/rchibana/MicroBlog -Entry file: None -Scanned: 2016-10-19 10:13:13.510859 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -atf1999/Flask-Mega-Tutorial -https://github.com/atf1999/Flask-Mega-Tutorial -Entry file: Flask-Mega-Tutorial/app/__init__.py -Scanned: 2016-10-19 10:13:15.021382 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ThukralAman/flaskApp2 -https://github.com/ThukralAman/flaskApp2 -Entry file: flaskApp2/app.py -Scanned: 2016-10-19 10:13:16.225885 -No vulnerabilities found. - - -apeete/flaskHelloWorld -https://github.com/apeete/flaskHelloWorld -Entry file: flaskHelloWorld/app.py -Scanned: 2016-10-19 10:13:43.724777 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lucidfrontier45/FlaskRethinkDBProject -https://github.com/lucidfrontier45/FlaskRethinkDBProject -Entry file: FlaskRethinkDBProject/webapp/factory.py -Scanned: 2016-10-19 10:13:45.031039 -No vulnerabilities found. - - -jwnwilson/flask_gae_example -https://github.com/jwnwilson/flask_gae_example -Entry file: flask_gae_example/hello_world.py -Scanned: 2016-10-19 10:13:51.880018 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -Hyvjan/flask-hello-world -https://github.com/Hyvjan/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:13:52.408461 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -BugisDev/AppSurvey-Flask -https://github.com/BugisDev/AppSurvey-Flask -Entry file: AppSurvey-Flask/app.py -Scanned: 2016-10-19 10:13:53.723290 -No vulnerabilities found. - - -auslander70/flask_hello_world -https://github.com/auslander70/flask_hello_world -Entry file: None -Scanned: 2016-10-19 10:13:54.232503 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/auslander70/flask_hello_world. - -saichandra286/BlogSpot-using-flask -https://github.com/saichandra286/BlogSpot-using-flask -Entry file: BlogSpot-using-flask/BlogSpot/app/__init__.py -Scanned: 2016-10-19 10:13:55.617131 -No vulnerabilities found. - - -purpleP/flask_alchemy_rest -https://github.com/purpleP/flask_alchemy_rest -Entry file: flask_alchemy_rest/tests/test_endpoints.py -Scanned: 2016-10-19 10:13:57.189217 -No vulnerabilities found. - - -yueyehm/flask_hello_world -https://github.com/yueyehm/flask_hello_world -Entry file: None -Scanned: 2016-10-19 10:13:57.684907 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yueyehm/flask_hello_world. - -lhr0916/flask_redis_task_q -https://github.com/lhr0916/flask_redis_task_q -Entry file: flask_redis_task_q/web/app.py -Scanned: 2016-10-19 10:13:58.905640 -No vulnerabilities found. - - -PrettyPrinted/flask-request-decorators -https://github.com/PrettyPrinted/flask-request-decorators -Entry file: flask-request-decorators/request_decorators.py -Scanned: 2016-10-19 10:14:00.095481 -No vulnerabilities found. - - -ics/Flask-GnuPG -https://github.com/ics/Flask-GnuPG -Entry file: Flask-GnuPG/test_flask_gnupg.py -Scanned: 2016-10-19 10:14:01.294492 -No vulnerabilities found. - - -johnkabler/flask_dash_learn -https://github.com/johnkabler/flask_dash_learn -Entry file: flask_dash_learn/first_app.py -Scanned: 2016-10-19 10:14:02.493937 -No vulnerabilities found. - - -leitu/netscaler-flask-api -https://github.com/leitu/netscaler-flask-api -Entry file: netscaler-flask-api/netscaler_api/__init__.py -Scanned: 2016-10-19 10:14:03.815306 -No vulnerabilities found. - - -shilpasanthosh/flask-user-login-app -https://github.com/shilpasanthosh/flask-user-login-app -Entry file: flask-user-login-app/loginapp/__init__.py -Scanned: 2016-10-19 10:14:07.090924 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rasselpratomo/simple_flask_restful -https://github.com/rasselpratomo/simple_flask_restful -Entry file: simple_flask_restful/app/__init__.py -Scanned: 2016-10-19 10:14:08.335483 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joe8767/flask-restful-example -https://github.com/joe8767/flask-restful-example -Entry file: flask-restful-example/api.py -Scanned: 2016-10-19 10:14:09.531050 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PrettyPrinted/flask-uploads-intro -https://github.com/PrettyPrinted/flask-uploads-intro -Entry file: flask-uploads-intro/upload.py -Scanned: 2016-10-19 10:14:10.890012 -No vulnerabilities found. - - -mrkewen/flask-hello-world -https://github.com/mrkewen/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:14:11.405299 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -kojoidrissa/flask_intro_video -https://github.com/kojoidrissa/flask_intro_video -Entry file: flask_intro_video/8c/app/__init__.py -Scanned: 2016-10-19 10:14:12.846673 -No vulnerabilities found. - - -jmsalcido/python-flask-microblog -https://github.com/jmsalcido/python-flask-microblog -Entry file: python-flask-microblog/microblog/app/__init__.py -Scanned: 2016-10-19 10:14:14.347849 -No vulnerabilities found. - - -ettanany/flask-angular-contact-manager -https://github.com/ettanany/flask-angular-contact-manager -Entry file: flask-angular-contact-manager/server/app/__init__.py -Scanned: 2016-10-19 10:14:16.042518 -No vulnerabilities found. - - -nausheenfatma/WebAppWithFlask -https://github.com/nausheenfatma/WebAppWithFlask -Entry file: WebAppWithFlask/model.py -Scanned: 2016-10-19 10:14:17.284569 -Vulnerability 1: -File: WebAppWithFlask/controller.py - > User input at line 21, trigger word "form[": - post = Post(request.form['author'], request.form['title'], request.form['content'], request.form['published']) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 22: post_add = post.add(post) - File: WebAppWithFlask/controller.py - > Line 27: error = post_add -File: WebAppWithFlask/controller.py - > reaches line 28, trigger word "flash(": - flash(error) - -Vulnerability 2: -File: WebAppWithFlask/controller.py - > User input at line 57, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 62: post_delete = post.delete(post) - File: WebAppWithFlask/controller.py - > Line 66: error = post_delete -File: WebAppWithFlask/controller.py - > reaches line 67, trigger word "flash(": - flash(error) - - - -marcfilba/videoStreamingFlask -https://github.com/marcfilba/videoStreamingFlask -Entry file: videoStreamingFlask/main.py -Scanned: 2016-10-19 10:14:18.554298 -No vulnerabilities found. - - -Jacob234/Flask-hello-world -https://github.com/Jacob234/Flask-hello-world -Entry file: Flask-hello-world/hello_world.py -Scanned: 2016-10-19 10:14:19.790680 -No vulnerabilities found. - - -PrettyPrinted/flask-restless-post -https://github.com/PrettyPrinted/flask-restless-post -Entry file: flask-restless-post/restless.py -Scanned: 2016-10-19 10:14:21.078971 -No vulnerabilities found. - - -austindavid/flasktaskr-cont -https://github.com/austindavid/flasktaskr-cont -Entry file: flasktaskr-cont/project/__init__.py -Scanned: 2016-10-19 10:14:22.499329 -No vulnerabilities found. - - -RicoChou/MyFlasky -https://github.com/RicoChou/MyFlasky -Entry file: MyFlasky/app/__init__.py -Scanned: 2016-10-19 10:14:24.074288 -Vulnerability 1: -File: MyFlasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: MyFlasky/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: MyFlasky/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 23: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: MyFlasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: MyFlasky/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: MyFlasky/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 45: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: MyFlasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlasky/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: MyFlasky/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: MyFlasky/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlasky/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlasky/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: MyFlasky/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: MyFlasky/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: MyFlasky/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: MyFlasky/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -alexwilkerson/microblog -https://github.com/alexwilkerson/microblog -Entry file: None -Scanned: 2016-10-19 10:14:24.578582 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tdvtoan/scorecard-recognition -https://github.com/tdvtoan/scorecard-recognition -Entry file: scorecard-recognition/project/__init__.py -Scanned: 2016-10-19 10:14:46.331527 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -quiqua/docker-flask-celery-redis-example -https://github.com/quiqua/docker-flask-celery-redis-example -Entry file: docker-flask-celery-redis-example/src/myapp/app.py -Scanned: 2016-10-19 10:14:47.601473 -No vulnerabilities found. - - -saichandra286/Complete-Angularjs-Flask-Todo-App -https://github.com/saichandra286/Complete-Angularjs-Flask-Todo-App -Entry file: None -Scanned: 2016-10-19 10:14:50.941196 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saichandra286/Complete-Angularjs-Flask-Todo-App. - -MakeSchool-17/trip-planner-flask-backend-thetopplayer -https://github.com/MakeSchool-17/trip-planner-flask-backend-thetopplayer -Entry file: trip-planner-flask-backend-thetopplayer/server.py -Scanned: 2016-10-19 10:14:54.766835 -No vulnerabilities found. - - -MacHu-GWU/flask-restless-api-client-project -https://github.com/MacHu-GWU/flask-restless-api-client-project -Entry file: flask-restless-api-client-project/tests/CustomizeSerialization/run_server.py -Scanned: 2016-10-19 10:14:56.114861 -No vulnerabilities found. - - -whiskeyromeo/bucketlist -https://github.com/whiskeyromeo/bucketlist -Entry file: None -Scanned: 2016-10-19 10:14:58.824689 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CHHLeo/foruV1home_flask_pycharm_practice -https://github.com/CHHLeo/foruV1home_flask_pycharm_practice -Entry file: foruV1home_flask_pycharm_practice/flask_pycharm_practice.py -Scanned: 2016-10-19 10:15:17.460890 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -heamon7/learn-restful -https://github.com/heamon7/learn-restful -Entry file: learn-restful/app.py -Scanned: 2016-10-19 10:15:19.162976 -Vulnerability 1: -File: learn-restful/app.py - > User input at line 82, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: learn-restful/app.py - > reaches line 89, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -goodyvn/flask -https://github.com/goodyvn/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:15:22.719386 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -stevebannon/flask -https://github.com/stevebannon/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:15:23.748179 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -sebkouba/dynamic-flask-form -https://github.com/sebkouba/dynamic-flask-form -Entry file: dynamic-flask-form/multimodel.py -Scanned: 2016-10-19 10:15:25.093187 -No vulnerabilities found. - - -solutionspecialist/flaskr -https://github.com/solutionspecialist/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:15:25.593580 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -XingxinLi/flaskr -https://github.com/XingxinLi/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:15:26.099730 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -willianribeiro/flaskr -https://github.com/willianribeiro/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:15:26.599656 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wiggitywalt/flasktaskr -https://github.com/wiggitywalt/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:15:27.101843 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mg6/flaskr -https://github.com/mg6/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:15:27.601432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sourHobbes/flaskdemo -https://github.com/sourHobbes/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 10:15:28.121633 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Bayaz/flasktaskr -https://github.com/Bayaz/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:15:28.616110 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kewsie/flasky -https://github.com/kewsie/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:15:29.140221 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -metakermit/resin-home-automator -https://github.com/metakermit/resin-home-automator -Entry file: resin-home-automator/src/main.py -Scanned: 2016-10-19 10:15:31.180341 -No vulnerabilities found. - - -zerodaemon/flask1 -https://github.com/zerodaemon/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-19 10:15:31.872871 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -guiti1/FlaskAp -https://github.com/guiti1/FlaskAp -Entry file: FlaskAp/FlaskApp/__init__.py -Scanned: 2016-10-19 10:15:35.635075 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskAp/FlaskApp/venv/lib/python2.7/genericpath.py - -Bayaz/FlaskBlog -https://github.com/Bayaz/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 10:15:36.280648 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JoshLandry/FlaskBlog -https://github.com/JoshLandry/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 10:15:36.874664 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -colindjk/flaskTest -https://github.com/colindjk/flaskTest -Entry file: flaskTest/url.py -Scanned: 2016-10-19 10:15:37.395143 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Arsh23/random-crossword-generater -https://github.com/Arsh23/random-crossword-generater -Entry file: random-crossword-generater/app.py -Scanned: 2016-10-19 10:15:39.877745 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pkrolikowski/flask_api -https://github.com/pkrolikowski/flask_api -Entry file: flask_api/api.py -Scanned: 2016-10-19 10:15:48.721038 -No vulnerabilities found. - - -zengyifa/flask-starter -https://github.com/zengyifa/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-19 10:15:51.257212 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mauriciorey/learning_flask -https://github.com/mauriciorey/learning_flask -Entry file: learning_flask/routes.py -Scanned: 2016-10-19 10:15:55.988883 -No vulnerabilities found. - - -petrgru/flask-remenarna -https://github.com/petrgru/flask-remenarna -Entry file: flask-remenarna/app/__init__.py -Scanned: 2016-10-19 10:15:58.426519 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spark0128/flask-intro -https://github.com/spark0128/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:15:58.941680 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bcb/flask-uploads -https://github.com/bcb/flask-uploads -Entry file: flask-uploads/tests/test-uploads.py -Scanned: 2016-10-19 10:16:00.304776 -No vulnerabilities found. - - -kumaraswins/flask-angular -https://github.com/kumaraswins/flask-angular -Entry file: flask-angular/flask/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 10:16:05.399251 -No vulnerabilities found. - - -rookiebulls/flask-learn -https://github.com/rookiebulls/flask-learn -Entry file: flask-learn/app/__init__.py -Scanned: 2016-10-19 10:16:24.815042 -No vulnerabilities found. - - -climberwb/flask-blog -https://github.com/climberwb/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:16:25.429121 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Hyvjan/flask-blog -https://github.com/Hyvjan/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:16:25.972715 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -xingyz/flask_thebutton -https://github.com/xingyz/flask_thebutton -Entry file: flask_thebutton/app/__init__.py -Scanned: 2016-10-19 10:16:27.542053 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brittanymcgarr/learningFlask -https://github.com/brittanymcgarr/learningFlask -Entry file: learningFlask/FlaskPractice/app/app.py -Scanned: 2016-10-19 10:16:29.456780 -Vulnerability 1: -File: learningFlask/FlaskPractice/app/entries/blueprint.py - > User input at line 65, trigger word "files[": - image_file = request.files['file'] -Reassigned in: - File: learningFlask/FlaskPractice/app/entries/blueprint.py - > Line 66: filename = os.path.join(app.config['IMAGES_DIR'], secure_filename(image_file.filename)) -File: learningFlask/FlaskPractice/app/entries/blueprint.py - > reaches line 69, trigger word "flash(": - flash('Saved %s' % os.path.basename(filename), 'success') - - - -PrettyPrinted/flask-sessions -https://github.com/PrettyPrinted/flask-sessions -Entry file: flask-sessions/web.py -Scanned: 2016-10-19 10:16:30.128989 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pfig/flask-elasticsearch -https://github.com/pfig/flask-elasticsearch -Entry file: flask-elasticsearch/flask_elasticsearch.py -Scanned: 2016-10-19 10:16:32.372596 -No vulnerabilities found. - - -nimeshkverma/Ideal_Flask -https://github.com/nimeshkverma/Ideal_Flask -Entry file: None -Scanned: 2016-10-19 10:16:35.823157 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tholsapp/flask_framework -https://github.com/tholsapp/flask_framework -Entry file: flask_framework/app/__init__.py -Scanned: 2016-10-19 10:16:37.056974 -No vulnerabilities found. - - -Kajvdh/nao-flask -https://github.com/Kajvdh/nao-flask -Entry file: nao-flask/app.py -Scanned: 2016-10-19 10:16:38.305313 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -evansa/flask-sqlalchemy -https://github.com/evansa/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-19 10:16:38.811937 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -anbasile/flask_sample -https://github.com/anbasile/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-19 10:16:39.333358 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vrokida/demo-flask -https://github.com/vrokida/demo-flask -Entry file: demo-flask/demo-flask.py -Scanned: 2016-10-19 10:16:40.690299 -No vulnerabilities found. - - -androidzhibinw/Flask-reg -https://github.com/androidzhibinw/Flask-reg -Entry file: Flask-reg/app.py -Scanned: 2016-10-19 10:16:42.388465 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrasband/flask-seed -https://github.com/mrasband/flask-seed -Entry file: None -Scanned: 2016-10-19 10:16:42.887455 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrasband/flask-seed. - -Clarity-89/server_flask -https://github.com/Clarity-89/server_flask -Entry file: server_flask/Flask Test.py -Scanned: 2016-10-19 10:16:44.628603 -No vulnerabilities found. - - -jcmflenso/flask-udemy -https://github.com/jcmflenso/flask-udemy -Entry file: flask-udemy/hello.py -Scanned: 2016-10-19 10:16:45.843314 -No vulnerabilities found. - - -schakalakka/flask-project -https://github.com/schakalakka/flask-project -Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py -Scanned: 2016-10-19 10:17:01.143251 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -simongareste/flask-dummy -https://github.com/simongareste/flask-dummy -Entry file: flask-dummy/flask_dummy/__init__.py -Scanned: 2016-10-19 10:17:02.570780 -No vulnerabilities found. - - -liu1020269358/learn-flask -https://github.com/liu1020269358/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 10:17:03.344366 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -foobaar/flask-expt -https://github.com/foobaar/flask-expt -Entry file: flask-expt/flask-experiment.py -Scanned: 2016-10-19 10:17:04.611337 -No vulnerabilities found. - - -lucafaggianelli/flask-skeleton -https://github.com/lucafaggianelli/flask-skeleton -Entry file: None -Scanned: 2016-10-19 10:17:05.122419 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lucafaggianelli/flask-skeleton. - -econne01/flask_blog -https://github.com/econne01/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:17:05.624258 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mdeamon/flask_app -https://github.com/mdeamon/flask_app -Entry file: None -Scanned: 2016-10-19 10:17:06.133124 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mdeamon/flask_app. - -dlrice/hello-flask -https://github.com/dlrice/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 10:17:06.714894 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -euler1337/flask_tutorial -https://github.com/euler1337/flask_tutorial -Entry file: None -Scanned: 2016-10-19 10:17:07.224975 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -devyash/Intelligent-Public-Grievance-System -https://github.com/devyash/Intelligent-Public-Grievance-System -Entry file: Intelligent-Public-Grievance-System/app.py -Scanned: 2016-10-19 10:17:13.006408 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elphinkuo/ji_python_flask -https://github.com/elphinkuo/ji_python_flask -Entry file: ji_python_flask/app/__init__.py -Scanned: 2016-10-19 10:17:14.408142 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -afaki077/minitweet -https://github.com/afaki077/minitweet -Entry file: None -Scanned: 2016-10-19 10:17:16.284709 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/afaki077/minitweet. - -ThukralAman/flaskApp2 -https://github.com/ThukralAman/flaskApp2 -Entry file: flaskApp2/app.py -Scanned: 2016-10-19 10:17:22.564906 -No vulnerabilities found. - - -sbm367/flaskTest2 -https://github.com/sbm367/flaskTest2 -Entry file: flaskTest2/flaskTest.py -Scanned: 2016-10-19 10:17:27.849761 -No vulnerabilities found. - - -emil-k/climate-compare_FlaskApp -https://github.com/emil-k/climate-compare_FlaskApp -Entry file: climate-compare_FlaskApp/__init__.py -Scanned: 2016-10-19 10:17:30.632933 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: climate-compare_FlaskApp/venv/lib/python2.7/genericpath.py - -daytonight/Flask-Web-Development-code -https://github.com/daytonight/Flask-Web-Development-code -Entry file: Flask-Web-Development-code/venv/lib/python2.7/site-packages/flask/sessions.py -Scanned: 2016-10-19 10:17:36.128459 -No vulnerabilities found. - - -lkpanganiban/flask-mega-tutorial -https://github.com/lkpanganiban/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 10:17:36.704989 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Cosaquee/flask-weather-app -https://github.com/Cosaquee/flask-weather-app -Entry file: flask-weather-app/main.py -Scanned: 2016-10-19 10:17:39.749246 -No vulnerabilities found. - - -saichandra286/BlogSpot-using-flask -https://github.com/saichandra286/BlogSpot-using-flask -Entry file: BlogSpot-using-flask/BlogSpot/app/__init__.py -Scanned: 2016-10-19 10:17:41.224931 -No vulnerabilities found. - - -afborodin/simple-mysql-flask-app -https://github.com/afborodin/simple-mysql-flask-app -Entry file: simple-mysql-flask-app/app/__init__.py -Scanned: 2016-10-19 10:18:22.858406 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dternyak/my-react-flask-blog -https://github.com/dternyak/my-react-flask-blog -Entry file: my-react-flask-blog/index.py -Scanned: 2016-10-19 10:18:33.399215 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -skriems/flask-cherrypy-dockerized -https://github.com/skriems/flask-cherrypy-dockerized -Entry file: flask-cherrypy-dockerized/app.py -Scanned: 2016-10-19 10:18:34.808806 -No vulnerabilities found. - - -johnkabler/flask_dash_learn -https://github.com/johnkabler/flask_dash_learn -Entry file: flask_dash_learn/first_app.py -Scanned: 2016-10-19 10:18:36.132560 -No vulnerabilities found. - - -broak/flask-hello-world -https://github.com/broak/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:18:36.689389 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ABaldwinHunter/flask-clone-classic -https://github.com/ABaldwinHunter/flask-clone-classic -Entry file: flask-clone-classic/setup.py -Scanned: 2016-10-19 10:18:41.759334 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ldrunner100/flask_hello_world -https://github.com/ldrunner100/flask_hello_world -Entry file: None -Scanned: 2016-10-19 10:18:42.274919 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ldrunner100/flask_hello_world. - -FinleySmile/flask_blog_demo -https://github.com/FinleySmile/flask_blog_demo -Entry file: flask_blog_demo/flask_blog_demo.py -Scanned: 2016-10-19 10:18:44.018059 -No vulnerabilities found. - - -quandrei/godzilla-foxfire-flask -https://github.com/quandrei/godzilla-foxfire-flask -Entry file: godzilla-foxfire-flask/app/__init__.py -Scanned: 2016-10-19 10:18:45.828768 -No vulnerabilities found. - - -ArTrics/Flask_Angular_Project -https://github.com/ArTrics/Flask_Angular_Project -Entry file: Flask_Angular_Project/index.py -Scanned: 2016-10-19 10:18:49.434767 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Angular_Project/venv/lib/python2.7/genericpath.py - -mdublin/Flask-CRUD-template -https://github.com/mdublin/Flask-CRUD-template -Entry file: Flask-CRUD-template/blog/__init__.py -Scanned: 2016-10-19 10:18:53.823677 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -RodrigoVillatoro/flask_social_network -https://github.com/RodrigoVillatoro/flask_social_network -Entry file: flask_social_network/app/__init__.py -Scanned: 2016-10-19 10:18:56.080434 -Vulnerability 1: -File: flask_social_network/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 21: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 24: prev_page = url_for('api.get_posts',page=page - 1, _external=True) - File: flask_social_network/app/api_1_0/users.py - > Line 27: next_page = url_for('api.get_posts',page=page + 1, _external=True) - File: flask_social_network/app/api_1_0/users.py - > Line 22: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 25: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 28, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 2: -File: flask_social_network/app/api_1_0/users.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 48: prev_page = url_for('api.get_posts',page=page - 1, _external=True) - File: flask_social_network/app/api_1_0/users.py - > Line 51: next_page = url_for('api.get_posts',page=page + 1, _external=True) - File: flask_social_network/app/api_1_0/users.py - > Line 46: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 49: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 52, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 3: -File: flask_social_network/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/posts.py - > Line 17: posts = pagination.items - File: flask_social_network/app/api_1_0/posts.py - > Line 20: prev_page = url_for('api.get_posts',page=page - 1, _external=True) - File: flask_social_network/app/api_1_0/posts.py - > Line 23: next_page = url_for('api.get_posts',page=page + 1, _external=True) - File: flask_social_network/app/api_1_0/posts.py - > Line 18: prev_page = None - File: flask_social_network/app/api_1_0/posts.py - > Line 21: next_page = None -File: flask_social_network/app/api_1_0/posts.py - > reaches line 24, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 4: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 16: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 19: prev_page = url_for('api.get_comments',page=page - 1, _external=True) - File: flask_social_network/app/api_1_0/comments.py - > Line 22: next_page = url_for('api.get_comments',page=page + 1, _external=True) - File: flask_social_network/app/api_1_0/comments.py - > Line 17: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 20: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prev_pagenext_pagepagination.total) - -Vulnerability 5: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 44: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 47: prev_page = url_for('api.get_comments',page=page - 1, _external=True) - File: flask_social_network/app/api_1_0/comments.py - > Line 50: next_page = url_for('api.get_comments',page=page + 1, _external=True) - File: flask_social_network/app/api_1_0/comments.py - > Line 45: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 48: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prev_pagenext_pagepagination.total) - - - -p00gz/flask-imdbratings-app-backend -https://github.com/p00gz/flask-imdbratings-app-backend -Entry file: flask-imdbratings-app-backend/imdbRatings/__init__.py -Scanned: 2016-10-19 10:18:59.147795 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -moonlitesolutions/flask_rest_template -https://github.com/moonlitesolutions/flask_rest_template -Entry file: flask_rest_template/flask_rest/api/api.py -Scanned: 2016-10-19 10:19:01.305640 -No vulnerabilities found. - - -alexwilkerson/flask-hello-world -https://github.com/alexwilkerson/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:19:01.840982 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -artisanofcode/flask-generic-views -https://github.com/artisanofcode/flask-generic-views -Entry file: flask-generic-views/tests/__init__.py -Scanned: 2016-10-19 10:19:02.345444 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -wasw100/flask-sqlalchemy-demo2 -https://github.com/wasw100/flask-sqlalchemy-demo2 -Entry file: flask-sqlalchemy-demo2/hello.py -Scanned: 2016-10-19 10:19:03.582882 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mekanix/flask-bootstrap-sql-rest -https://github.com/mekanix/flask-bootstrap-sql-rest -Entry file: flask-bootstrap-sql-rest/manage.py -Scanned: 2016-10-19 10:19:05.681129 -No vulnerabilities found. - - -ayesandarmoe/microblog_flask_tutorial -https://github.com/ayesandarmoe/microblog_flask_tutorial -Entry file: microblog_flask_tutorial/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 10:19:15.022383 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrkewen/flask-hello-world -https://github.com/mrkewen/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:19:15.589322 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -nausheenfatma/WebAppWithFlask -https://github.com/nausheenfatma/WebAppWithFlask -Entry file: WebAppWithFlask/model.py -Scanned: 2016-10-19 10:19:16.855368 -Vulnerability 1: -File: WebAppWithFlask/controller.py - > User input at line 21, trigger word "form[": - post = Post(request.form['author'], request.form['title'], request.form['content'], request.form['published']) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 22: post_add = post.add(post) - File: WebAppWithFlask/controller.py - > Line 27: error = post_add -File: WebAppWithFlask/controller.py - > reaches line 28, trigger word "flash(": - flash(error) - -Vulnerability 2: -File: WebAppWithFlask/controller.py - > User input at line 57, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 62: post_delete = post.delete(post) - File: WebAppWithFlask/controller.py - > Line 66: error = post_delete -File: WebAppWithFlask/controller.py - > reaches line 67, trigger word "flash(": - flash(error) - - - -yaoelvon/flask-uwsgi-demo -https://github.com/yaoelvon/flask-uwsgi-demo -Entry file: flask-uwsgi-demo/DeployingFlask/myflaskapp.py -Scanned: 2016-10-19 10:19:18.072846 -No vulnerabilities found. - - -Owen-Gillespie/FeatureLabsFlaskDemo -https://github.com/Owen-Gillespie/FeatureLabsFlaskDemo -Entry file: FeatureLabsFlaskDemo/main.py -Scanned: 2016-10-19 10:19:21.941011 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sheldonsmickley/flaskemail_app -https://github.com/sheldonsmickley/flaskemail_app -Entry file: flaskemail_app/emails.py -Scanned: 2016-10-19 10:19:23.309405 -Vulnerability 1: -File: flaskemail_app/emails.py - > User input at line 57, trigger word "form[": - url = c.execute('select url from emails where company_name like ?', (request.form['existing_company'])) -Reassigned in: - File: flaskemail_app/emails.py - > Line 58: url = url.fetchall()[0][0] -File: flaskemail_app/emails.py - > reaches line 59, trigger word "execute(": - c.execute('INSERT into emails (company_name, email, url) values (?, ?, ?)', (request.form['existing_company'], request.form['email'], url)) - - - -tianxie/my_flasky -https://github.com/tianxie/my_flasky -Entry file: None -Scanned: 2016-10-19 10:19:23.818218 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tianxie/my_flasky. - -shas15/Betting-Chips -https://github.com/shas15/Betting-Chips -Entry file: Betting-Chips/test.py -Scanned: 2016-10-19 10:19:25.216520 -Vulnerability 1: -File: Betting-Chips/Models/User.py - > User input at line 20, trigger word "form[": - login_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 32, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats'login_idlogin_password'success') - -Vulnerability 2: -File: Betting-Chips/Models/User.py - > User input at line 21, trigger word "form[": - login_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 32, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats'login_idlogin_password'success') - -Vulnerability 3: -File: Betting-Chips/Models/User.py - > User input at line 45, trigger word "form[": - signup_name = request.form['name'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 49: user.name = signup_name -File: Betting-Chips/Models/User.py - > reaches line 60, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success') - -Vulnerability 4: -File: Betting-Chips/Models/User.py - > User input at line 46, trigger word "form[": - signup_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 50: user.id = signup_id -File: Betting-Chips/Models/User.py - > reaches line 60, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success') - -Vulnerability 5: -File: Betting-Chips/Models/User.py - > User input at line 47, trigger word "form[": - signup_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 51: user.password = signup_password -File: Betting-Chips/Models/User.py - > reaches line 60, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success') - - - -malong5219/SampleBlog -https://github.com/malong5219/SampleBlog -Entry file: SampleBlog/app/__init__.py -Scanned: 2016-10-19 10:19:32.020586 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alexwilkerson/microblog -https://github.com/alexwilkerson/microblog -Entry file: None -Scanned: 2016-10-19 10:19:32.512583 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -richardsop/REST-API -https://github.com/richardsop/REST-API -Entry file: REST-API/app.py -Scanned: 2016-10-19 10:19:47.242243 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tusharpawar/Agrostar_Flaskr -https://github.com/tusharpawar/Agrostar_Flaskr -Entry file: None -Scanned: 2016-10-19 10:19:52.245368 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -eunseo9808/fakeArtist -https://github.com/eunseo9808/fakeArtist -Entry file: fakeArtist/test.py -Scanned: 2016-10-19 10:19:53.656880 -No vulnerabilities found. - - -semonalbertyeah/quickflask -https://github.com/semonalbertyeah/quickflask -Entry file: quickflask/app.py -Scanned: 2016-10-19 10:19:55.061683 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jyang22/Flasky_blog -https://github.com/jyang22/Flasky_blog -Entry file: Flasky_blog/app/__init__.py -Scanned: 2016-10-19 10:19:59.501458 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aceokay/microblog -https://github.com/aceokay/microblog -Entry file: None -Scanned: 2016-10-19 10:20:00.022044 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -buntyke/Flask -https://github.com/buntyke/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:20:02.382002 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nowaja/flask -https://github.com/nowaja/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:20:03.409941 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -suzf/Flask -https://github.com/suzf/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:20:03.910065 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -b-e/flask -https://github.com/b-e/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:20:05.918467 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -psuong/FlaskWorkshop -https://github.com/psuong/FlaskWorkshop -Entry file: FlaskWorkshop/jinja-templating/app.py -Scanned: 2016-10-19 10:20:07.650996 -No vulnerabilities found. - - -BLKStone/flask_image_search -https://github.com/BLKStone/flask_image_search -Entry file: flask_image_search/app/app.py -Scanned: 2016-10-19 10:20:10.948372 -No vulnerabilities found. - - -yj0914/flask- -https://github.com/yj0914/flask- -Entry file: flask-/num1.py -Scanned: 2016-10-19 10:20:12.191975 -No vulnerabilities found. - - -Bleezworld/flask_skeleton -https://github.com/Bleezworld/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-19 10:20:12.688468 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -TwilioDevEd/lead-alerts-flask -https://github.com/TwilioDevEd/lead-alerts-flask -Entry file: None -Scanned: 2016-10-19 10:20:14.728304 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/TwilioDevEd/lead-alerts-flask. - -soasme/flask-perm -https://github.com/soasme/flask-perm -Entry file: flask-perm/example.py -Scanned: 2016-10-19 10:20:16.833585 -No vulnerabilities found. - - -rishipuri/flasktodo -https://github.com/rishipuri/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-19 10:20:17.532409 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Hyvjan/flasktaskr -https://github.com/Hyvjan/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:20:18.058566 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zachary-russell/Flaskr -https://github.com/zachary-russell/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 10:20:18.731585 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -storress/Flaskserver -https://github.com/storress/Flaskserver -Entry file: Flaskserver/main.py -Scanned: 2016-10-19 10:20:19.978076 -No vulnerabilities found. - - -dadasoz-cuelogic/flaskapp -https://github.com/dadasoz-cuelogic/flaskapp -Entry file: None -Scanned: 2016-10-19 10:20:21.327999 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dadasoz-cuelogic/flaskapp. - -expersso/flaskr -https://github.com/expersso/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:20:23.833692 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gileez/flasker -https://github.com/gileez/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-19 10:20:26.204234 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sindhus/flaskr -https://github.com/sindhus/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:20:26.714034 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nickaustinlee/flasktaskr -https://github.com/nickaustinlee/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:20:27.345497 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Bayaz/flasktaskr -https://github.com/Bayaz/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:20:33.842617 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -xavinso/flasktaskr -https://github.com/xavinso/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:20:34.348579 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CharlieWinters/flaskapi -https://github.com/CharlieWinters/flaskapi -Entry file: flaskapi/aydaapi3.py -Scanned: 2016-10-19 10:20:55.094213 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapi/flaskenv/lib/python2.7/genericpath.py - -kewsie/flasky -https://github.com/kewsie/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:20:55.608668 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -land-pack/flaskBlog -https://github.com/land-pack/flaskBlog -Entry file: flaskBlog/flaskr.py -Scanned: 2016-10-19 10:20:56.855032 -No vulnerabilities found. - - -apeete/flaskBlog -https://github.com/apeete/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-19 10:21:00.855085 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py - -OscarMelin/learning-flask-bootstrap -https://github.com/OscarMelin/learning-flask-bootstrap -Entry file: learning-flask-bootstrap/__init__.py -Scanned: 2016-10-19 10:21:05.862755 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/genericpath.py - -cyan-blue/my_flask -https://github.com/cyan-blue/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-19 10:21:06.518774 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -zachary-russell/Flask-Microblog -https://github.com/zachary-russell/Flask-Microblog -Entry file: Flask-Microblog/microblog/app/__init__.py -Scanned: 2016-10-19 10:21:07.766883 -No vulnerabilities found. - - -samwuu/flask_demo -https://github.com/samwuu/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-19 10:21:08.281503 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hnb2/flask-customers -https://github.com/hnb2/flask-customers -Entry file: flask-customers/customers/__init__.py -Scanned: 2016-10-19 10:21:09.649275 -No vulnerabilities found. - - -LeonNie52/Learn_Flask -https://github.com/LeonNie52/Learn_Flask -Entry file: Learn_Flask/hello.py -Scanned: 2016-10-19 10:21:11.447045 -No vulnerabilities found. - - -penguin-penpen/learnFlask -https://github.com/penguin-penpen/learnFlask -Entry file: None -Scanned: 2016-10-19 10:21:11.973810 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/penguin-penpen/learnFlask. - -raindrop4steven/tornadoFlask -https://github.com/raindrop4steven/tornadoFlask -Entry file: tornadoFlask/hello.py -Scanned: 2016-10-19 10:21:13.198528 -No vulnerabilities found. - - -mauriciorey/learning_flask -https://github.com/mauriciorey/learning_flask -Entry file: learning_flask/routes.py -Scanned: 2016-10-19 10:21:14.956263 -No vulnerabilities found. - - -cjmochrie/Flask-Demo -https://github.com/cjmochrie/Flask-Demo -Entry file: None -Scanned: 2016-10-19 10:21:16.357114 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cjmochrie/Flask-Demo. - -zengyifa/flask-starter -https://github.com/zengyifa/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-19 10:21:16.885835 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pkrolikowski/flask_api -https://github.com/pkrolikowski/flask_api -Entry file: flask_api/api.py -Scanned: 2016-10-19 10:21:18.224780 -No vulnerabilities found. - - -pfig/flask-elasticsearch -https://github.com/pfig/flask-elasticsearch -Entry file: flask-elasticsearch/flask_elasticsearch.py -Scanned: 2016-10-19 10:21:19.599144 -No vulnerabilities found. - - -olive42/moz-flask -https://github.com/olive42/moz-flask -Entry file: moz-flask/hello.py -Scanned: 2016-10-19 10:21:20.840975 -No vulnerabilities found. - - -nimeshkverma/Ideal_Flask -https://github.com/nimeshkverma/Ideal_Flask -Entry file: None -Scanned: 2016-10-19 10:21:21.348185 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tholsapp/flask_framework -https://github.com/tholsapp/flask_framework -Entry file: flask_framework/app/__init__.py -Scanned: 2016-10-19 10:21:22.695375 -No vulnerabilities found. - - -nivanko/flask-catalog -https://github.com/nivanko/flask-catalog -Entry file: flask-catalog/application.py -Scanned: 2016-10-19 10:21:26.271981 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jaramago/flask-basic -https://github.com/jaramago/flask-basic -Entry file: flask-basic/app/__init__.py -Scanned: 2016-10-19 10:21:27.691088 -No vulnerabilities found. - - -valdemarpereira/flask_tutorial -https://github.com/valdemarpereira/flask_tutorial -Entry file: None -Scanned: 2016-10-19 10:21:28.670748 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jit-1/flask-microblog -https://github.com/jit-1/flask-microblog -Entry file: None -Scanned: 2016-10-19 10:21:29.156596 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nof4444/Flask-mongodb -https://github.com/nof4444/Flask-mongodb -Entry file: Flask-mongodb/app.py -Scanned: 2016-10-19 10:21:32.065949 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-mongodb/env/lib/python2.7/genericpath.py - -anbasile/flask_sample -https://github.com/anbasile/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-19 10:21:32.617595 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -VictorDMor/flask-app -https://github.com/VictorDMor/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-19 10:21:33.118954 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sunway1988/MyFlask -https://github.com/sunway1988/MyFlask -Entry file: MyFlask/app/__init__.py -Scanned: 2016-10-19 10:21:36.378168 -No vulnerabilities found. - - -setiaji/learn_flask -https://github.com/setiaji/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-19 10:21:36.890572 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -catcoderphp/flask-test -https://github.com/catcoderphp/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 10:21:50.419575 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -ottoman91/flask_tutorial -https://github.com/ottoman91/flask_tutorial -Entry file: None -Scanned: 2016-10-19 10:21:57.402160 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -HiagoMayk/projetoFlask -https://github.com/HiagoMayk/projetoFlask -Entry file: projetoFlask/routes.py -Scanned: 2016-10-19 10:21:59.647714 -No vulnerabilities found. - - -nimeshkverma/Versioned_Flask -https://github.com/nimeshkverma/Versioned_Flask -Entry file: Versioned_Flask/app/__init__.py -Scanned: 2016-10-19 10:22:08.394516 -No vulnerabilities found. - - -huyquyet/flask-demo -https://github.com/huyquyet/flask-demo -Entry file: None -Scanned: 2016-10-19 10:22:09.374521 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/huyquyet/flask-demo. - -seonhyeshin/flask-mysql -https://github.com/seonhyeshin/flask-mysql -Entry file: flask-mysql/app.py -Scanned: 2016-10-19 10:22:11.514729 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-mysql/venv/lib/python2.7/genericpath.py - -euler1337/flask_tutorial -https://github.com/euler1337/flask_tutorial -Entry file: None -Scanned: 2016-10-19 10:22:13.004434 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -PhilipGough/flask_api -https://github.com/PhilipGough/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-19 10:22:14.866952 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lauradebella/treinamentoFlask -https://github.com/lauradebella/treinamentoFlask -Entry file: treinamentoFlask/tutorialPythonClub/app.py -Scanned: 2016-10-19 10:22:21.359195 -No vulnerabilities found. - - -seanbehan/flask_websockets -https://github.com/seanbehan/flask_websockets -Entry file: flask_websockets/app.py -Scanned: 2016-10-19 10:22:22.630172 -No vulnerabilities found. - - -mburke05/flask_tutorial -https://github.com/mburke05/flask_tutorial -Entry file: None -Scanned: 2016-10-19 10:22:23.128002 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -elphinkuo/ji_python_flask -https://github.com/elphinkuo/ji_python_flask -Entry file: ji_python_flask/app/__init__.py -Scanned: 2016-10-19 10:22:23.634168 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rjuppa/microblog -https://github.com/rjuppa/microblog -Entry file: None -Scanned: 2016-10-19 10:22:24.134683 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -depaoli/FlaskAppSample -https://github.com/depaoli/FlaskAppSample -Entry file: FlaskAppSample/flask_app_sample/__init__.py -Scanned: 2016-10-19 10:22:25.365691 -No vulnerabilities found. - - -webon100/ross_flask01 -https://github.com/webon100/ross_flask01 -Entry file: None -Scanned: 2016-10-19 10:22:28.381292 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AlexProv/flaskRestApiSkeleton -https://github.com/AlexProv/flaskRestApiSkeleton -Entry file: flaskRestApiSkeleton/flaskServer.py -Scanned: 2016-10-19 10:22:30.235704 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xavinso/flask_hello_world -https://github.com/xavinso/flask_hello_world -Entry file: None -Scanned: 2016-10-19 10:22:30.750521 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xavinso/flask_hello_world. - -aetherwu/Flask-Docker-Template -https://github.com/aetherwu/Flask-Docker-Template -Entry file: Flask-Docker-Template/flask/web/__init__.py -Scanned: 2016-10-19 10:22:40.227262 -Vulnerability 1: -File: Flask-Docker-Template/flask/web/views.py - > User input at line 549, trigger word "get(": - user_email = request.cookies.get('user_email') -File: Flask-Docker-Template/flask/web/views.py - > reaches line 554, trigger word "set_cookie(": - response.set_cookie('user_email', str(user.email),expires=time.time() + 6000 * 60) - - - -tommyblue/flask-react-blog -https://github.com/tommyblue/flask-react-blog -Entry file: flask-react-blog/initializer.py -Scanned: 2016-10-19 10:22:41.665314 -No vulnerabilities found. - - -MikeHannon/python_flask_teams -https://github.com/MikeHannon/python_flask_teams -Entry file: python_flask_teams/server.py -Scanned: 2016-10-19 10:22:42.901660 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomquirk/js-flavoured-flask -https://github.com/tomquirk/js-flavoured-flask -Entry file: js-flavoured-flask/app/__init__.py -Scanned: 2016-10-19 10:22:44.520353 -No vulnerabilities found. - - -gtlambert/first_flask_app -https://github.com/gtlambert/first_flask_app -Entry file: first_flask_app/project.py -Scanned: 2016-10-19 10:22:45.055776 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AngelMunoz/Flask-Blueprints-Template -https://github.com/AngelMunoz/Flask-Blueprints-Template -Entry file: Flask-Blueprints-Template/app/__init__.py -Scanned: 2016-10-19 10:22:46.420219 -Vulnerability 1: -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > User input at line 15, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > Line 17: session['user_id'] = user.id -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > reaches line 18, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -Cosaquee/flask-weather-app -https://github.com/Cosaquee/flask-weather-app -Entry file: flask-weather-app/main.py -Scanned: 2016-10-19 10:22:49.210043 -No vulnerabilities found. - - -Ryanglambert/playing_with_flask -https://github.com/Ryanglambert/playing_with_flask -Entry file: playing_with_flask/hello.py -Scanned: 2016-10-19 10:22:50.484044 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ArTrics/Flask_Angular_Project -https://github.com/ArTrics/Flask_Angular_Project -Entry file: Flask_Angular_Project/index.py -Scanned: 2016-10-19 10:22:52.082327 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Angular_Project/venv/lib/python2.7/genericpath.py - -orjanv/ESVtoLeetFlaskApp -https://github.com/orjanv/ESVtoLeetFlaskApp -Entry file: ESVtoLeetFlaskApp/app.py -Scanned: 2016-10-19 10:22:59.457939 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ptmccarthy/flask-microblog-tutorial -https://github.com/ptmccarthy/flask-microblog-tutorial -Entry file: flask-microblog-tutorial/app/__init__.py -Scanned: 2016-10-19 10:23:00.827848 -No vulnerabilities found. - - -bronka/flask-hello-world -https://github.com/bronka/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:23:01.384151 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -sidthakur/docker-single-nginx-flask -https://github.com/sidthakur/docker-single-nginx-flask -Entry file: docker-single-nginx-flask/app/app.py -Scanned: 2016-10-19 10:23:05.765559 -No vulnerabilities found. - - -mbreisch/flask-hello-world -https://github.com/mbreisch/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:23:09.359898 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -zxqwerxz/test_flask_deploy -https://github.com/zxqwerxz/test_flask_deploy -Entry file: test_flask_deploy/hello.py -Scanned: 2016-10-19 10:23:11.610551 -No vulnerabilities found. - - -mdublin/Flask-CRUD-template -https://github.com/mdublin/Flask-CRUD-template -Entry file: Flask-CRUD-template/blog/__init__.py -Scanned: 2016-10-19 10:23:12.134149 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lwjones/flask-hello-world -https://github.com/lwjones/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:23:12.660412 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -Pensu/flask-ppc64le -https://github.com/Pensu/flask-ppc64le -Entry file: flask-ppc64le/app.py -Scanned: 2016-10-19 10:23:14.041254 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leonidas/flask-spa-routing-example -https://github.com/leonidas/flask-spa-routing-example -Entry file: None -Scanned: 2016-10-19 10:23:15.305168 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/leonidas/flask-spa-routing-example. - -renmmotp/Ren_Learns_Flask -https://github.com/renmmotp/Ren_Learns_Flask -Entry file: Ren_Learns_Flask/flaskr/flaskr.py -Scanned: 2016-10-19 10:23:16.698452 -No vulnerabilities found. - - -posenberg/Flask-Kickstarter-Clone -https://github.com/posenberg/Flask-Kickstarter-Clone -Entry file: Flask-Kickstarter-Clone/punchstarter/__init__.py -Scanned: 2016-10-19 10:23:24.726871 -No vulnerabilities found. - - -pythonvietnam/meetup01-flask -https://github.com/pythonvietnam/meetup01-flask -Entry file: meetup01-flask/hello_world.py -Scanned: 2016-10-19 10:23:26.209922 -No vulnerabilities found. - - -palden/flask-hello-world -https://github.com/palden/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:23:26.733151 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -poxstone/flask -https://github.com/poxstone/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:23:30.328892 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -FlaskTutorial/Flask -https://github.com/FlaskTutorial/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:23:30.880334 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -charanjp/flask -https://github.com/charanjp/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:23:31.916498 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -yasskh/flask -https://github.com/yasskh/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:23:32.977296 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -OnlySHI/flask -https://github.com/OnlySHI/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:23:35.052346 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jvuori/flask-uwsgi-nginx-haproxy-docker -https://github.com/jvuori/flask-uwsgi-nginx-haproxy-docker -Entry file: flask-uwsgi-nginx-haproxy-docker/web/app.py -Scanned: 2016-10-19 10:23:36.328235 -No vulnerabilities found. - - -akupara/flask_inspector -https://github.com/akupara/flask_inspector -Entry file: flask_inspector/example/app.py -Scanned: 2016-10-19 10:23:43.007137 -No vulnerabilities found. - - -soasme/flask-personal-access-token -https://github.com/soasme/flask-personal-access-token -Entry file: flask-personal-access-token/example.py -Scanned: 2016-10-19 10:23:45.390845 -No vulnerabilities found. - - -shinycoo/flaskmvcsample -https://github.com/shinycoo/flaskmvcsample -Entry file: flaskmvcsample/app.py -Scanned: 2016-10-19 10:23:46.673744 -No vulnerabilities found. - - -alexwilkerson/flasktaskr -https://github.com/alexwilkerson/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:23:47.178910 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gileez/flasker -https://github.com/gileez/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-19 10:23:47.663494 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sindhus/flaskr -https://github.com/sindhus/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:23:48.147380 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apeete/flasktaskr -https://github.com/apeete/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:23:51.666258 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -slippers/flasksec -https://github.com/slippers/flasksec -Entry file: flasksec/main/__init__.py -Scanned: 2016-10-19 10:23:53.954502 -No vulnerabilities found. - - -rui7157/Flask-NvRay-Blog -https://github.com/rui7157/Flask-NvRay-Blog -Entry file: Flask-NvRay-Blog/vendor/flask/sessions.py -Scanned: 2016-10-19 10:24:04.195609 -No vulnerabilities found. - - -Ineeza/FlaskAppBuilder -https://github.com/Ineeza/FlaskAppBuilder -Entry file: FlaskAppBuilder/src/classes/__init__.py -Scanned: 2016-10-19 10:24:05.672689 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yasskh/FlaskProject -https://github.com/yasskh/FlaskProject -Entry file: FlaskProject/views.py -Scanned: 2016-10-19 10:24:10.137601 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DamithaPerera/FlaskApp -https://github.com/DamithaPerera/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 10:24:10.725299 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dreammis/Flask02 -https://github.com/dreammis/Flask02 -Entry file: Flask02/app/__init__.py -Scanned: 2016-10-19 10:24:11.996221 -No vulnerabilities found. - - -YoungGer/FlaskApps -https://github.com/YoungGer/FlaskApps -Entry file: FlaskApps/pdClassifier/app.py -Scanned: 2016-10-19 10:24:13.597159 -No vulnerabilities found. - - -junniepat/FlaskApp -https://github.com/junniepat/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 10:24:14.163785 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -land-pack/flaskBlog -https://github.com/land-pack/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-19 10:24:14.726945 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py - -deyoppe/FlaskFire -https://github.com/deyoppe/FlaskFire -Entry file: FlaskFire/core/system/app.py -Scanned: 2016-10-19 10:24:15.961196 -No vulnerabilities found. - - -Njsao/FlaskServer -https://github.com/Njsao/FlaskServer -Entry file: FlaskServer/untitled.py -Scanned: 2016-10-19 10:24:17.361416 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -OscarMelin/learning-flask-bootstrap -https://github.com/OscarMelin/learning-flask-bootstrap -Entry file: learning-flask-bootstrap/__init__.py -Scanned: 2016-10-19 10:24:17.954280 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/genericpath.py - -ztomazin/flask_exp -https://github.com/ztomazin/flask_exp -Entry file: None -Scanned: 2016-10-19 10:24:24.760490 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hunt3ri/temp-flask -https://github.com/hunt3ri/temp-flask -Entry file: temp-flask/app/__init__.py -Scanned: 2016-10-19 10:24:26.138868 -No vulnerabilities found. - - -arkenidar/flask-example -https://github.com/arkenidar/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-19 10:24:26.679183 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -noamoss/flask-blog -https://github.com/noamoss/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:24:28.245077 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -allianRoman/flask-intro -https://github.com/allianRoman/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:24:28.753664 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amybethx/flask-intro -https://github.com/amybethx/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:24:30.355199 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -terriwong/flask-intro -https://github.com/terriwong/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:24:31.864469 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -szhjia/flask-blog -https://github.com/szhjia/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:24:33.395633 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Jiezhi/HelloFlask -https://github.com/Jiezhi/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-19 10:24:33.906930 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ltaziri/Flask-Intro -https://github.com/ltaziri/Flask-Intro -Entry file: Flask-Intro/nice.py -Scanned: 2016-10-19 10:24:36.212970 -No vulnerabilities found. - - -alitsiya/flask-intro -https://github.com/alitsiya/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:24:36.718702 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -taisa007/timeliner-flask -https://github.com/taisa007/timeliner-flask -Entry file: timeliner-flask/timeliner/timeliner/__init__.py -Scanned: 2016-10-19 10:24:44.164145 -No vulnerabilities found. - - -sandiego206/flask_microblog -https://github.com/sandiego206/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 10:24:44.696073 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Odava/flask-jwt -https://github.com/Odava/flask-jwt -Entry file: flask-jwt/tests/conftest.py -Scanned: 2016-10-19 10:24:48.243093 -No vulnerabilities found. - - -nivanko/flask-catalog -https://github.com/nivanko/flask-catalog -Entry file: flask-catalog/application.py -Scanned: 2016-10-19 10:24:48.776989 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ajoshdee/flask-test -https://github.com/ajoshdee/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 10:24:53.258096 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -palden/flask-blog -https://github.com/palden/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:24:54.781113 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -humaneu/flask_app -https://github.com/humaneu/flask_app -Entry file: None -Scanned: 2016-10-19 10:25:02.318872 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/humaneu/flask_app. - -cclittle13/flask-intro -https://github.com/cclittle13/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:06.825369 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -emlam/flask-intro -https://github.com/emlam/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:07.317080 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spyapali/Flask-intro -https://github.com/spyapali/Flask-intro -Entry file: Flask-intro/nice.py -Scanned: 2016-10-19 10:25:12.596940 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -celiawaggoner/flask-intro -https://github.com/celiawaggoner/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:13.113659 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cachar/flask-intro -https://github.com/cachar/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:13.623913 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KTAtkinson/flask-intro -https://github.com/KTAtkinson/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:15.116299 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pasysxa/flask-mall -https://github.com/pasysxa/flask-mall -Entry file: flask-mall/myapp/__init__.py -Scanned: 2016-10-19 10:25:17.371608 -No vulnerabilities found. - - -fendouai/venv_flask -https://github.com/fendouai/venv_flask -Entry file: venv_flask/cookie.py -Scanned: 2016-10-19 10:25:20.831557 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: venv_flask/venv/lib/python2.7/genericpath.py - -leiyue/learning_flask -https://github.com/leiyue/learning_flask -Entry file: learning_flask/miniblog/miniblog.py -Scanned: 2016-10-19 10:25:22.087895 -No vulnerabilities found. - - -florenceloi/flask-intro -https://github.com/florenceloi/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:22.586565 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DoriRunyon/flask-intro -https://github.com/DoriRunyon/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:23.087153 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qistchan/WebhookFlask -https://github.com/qistchan/WebhookFlask -Entry file: WebhookFlask/WebHook_Listener.py -Scanned: 2016-10-19 10:25:27.362791 -No vulnerabilities found. - - -GeetikaBatra/Flask_intro -https://github.com/GeetikaBatra/Flask_intro -Entry file: Flask_intro/flask_app/__init__.py -Scanned: 2016-10-19 10:25:32.466457 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kooder18/flask_Ecommerce -https://github.com/kooder18/flask_Ecommerce -Entry file: flask_Ecommerce/project.py -Scanned: 2016-10-19 10:25:33.843338 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alenakruchkova/flask-intro -https://github.com/alenakruchkova/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:34.363090 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bekkam/flask-intro -https://github.com/bekkam/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:34.854073 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -anniehe/flask-intro -https://github.com/anniehe/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:35.382265 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Vianey81/flask-intro -https://github.com/Vianey81/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:35.870618 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mcbishop/flask-intro -https://github.com/mcbishop/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:25:36.364829 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Bandurin/Test-flask -https://github.com/Bandurin/Test-flask -Entry file: Test-flask/db_app.py -Scanned: 2016-10-19 10:25:45.714077 -No vulnerabilities found. - - -0phelia/flask-app -https://github.com/0phelia/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-19 10:25:46.227041 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lauradebella/treinamentoFlask -https://github.com/lauradebella/treinamentoFlask -Entry file: treinamentoFlask/tutorialPythonClub/app.py -Scanned: 2016-10-19 10:26:00.867946 -No vulnerabilities found. - - -seanbehan/flask_websockets -https://github.com/seanbehan/flask_websockets -Entry file: flask_websockets/app.py -Scanned: 2016-10-19 10:26:02.137431 -No vulnerabilities found. - - -ssam123/flask-tutorial -https://github.com/ssam123/flask-tutorial -Entry file: None -Scanned: 2016-10-19 10:26:02.637817 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ziyoung/learningFlask -https://github.com/ziyoung/learningFlask -Entry file: learningFlask/hello.py -Scanned: 2016-10-19 10:26:08.097542 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py - -karayount/flask-intro -https://github.com/karayount/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:26:08.594161 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -go-bears/flask-intro -https://github.com/go-bears/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:26:09.080797 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mlpeters12/flask-intro -https://github.com/mlpeters12/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:26:09.584309 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arbonap/flask-intro -https://github.com/arbonap/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:26:10.078692 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nimeshkverma/SolrFlask -https://github.com/nimeshkverma/SolrFlask -Entry file: SolrFlask/app/app_config.py -Scanned: 2016-10-19 10:26:14.436252 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gaozhidf/flask_websocket -https://github.com/gaozhidf/flask_websocket -Entry file: flask_websocket/websocket_py3/manage.py -Scanned: 2016-10-19 10:26:22.243480 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hilyas/flask-blog -https://github.com/hilyas/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:26:22.823469 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -dimy407/NBC_Flask -https://github.com/dimy407/NBC_Flask -Entry file: NBC_Flask/flask_app.py -Scanned: 2016-10-19 10:26:25.141973 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ltaziri/Flask-Shopping -https://github.com/ltaziri/Flask-Shopping -Entry file: Flask-Shopping/shoppingsite.py -Scanned: 2016-10-19 10:26:26.714097 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jefersondaniel/notebook-api -https://github.com/jefersondaniel/notebook-api -Entry file: notebook-api/app/__init__.py -Scanned: 2016-10-19 10:26:28.168659 -No vulnerabilities found. - - -ddrsmile/flask-hello-world -https://github.com/ddrsmile/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:26:28.728942 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -saviour123/flaskStudentData -https://github.com/saviour123/flaskStudentData -Entry file: flaskStudentData/app.py -Scanned: 2016-10-19 10:26:29.991212 -Vulnerability 1: -File: flaskStudentData/app.py - > User input at line 29, trigger word "form[": - name = request.form['nm'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - -Vulnerability 2: -File: flaskStudentData/app.py - > User input at line 30, trigger word "form[": - addr = request.form['add'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - -Vulnerability 3: -File: flaskStudentData/app.py - > User input at line 31, trigger word "form[": - city = request.form['city'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - -Vulnerability 4: -File: flaskStudentData/app.py - > User input at line 32, trigger word "form[": - pin = request.form['pin'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - - - -webon100/ross_flask01 -https://github.com/webon100/ross_flask01 -Entry file: None -Scanned: 2016-10-19 10:26:30.528149 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -QLGu/flask-zhihu-demo -https://github.com/QLGu/flask-zhihu-demo -Entry file: flask-zhihu-demo/www/__init__.py -Scanned: 2016-10-19 10:26:33.617048 -No vulnerabilities found. - - -yalove/flask-nginx-gunicorn -https://github.com/yalove/flask-nginx-gunicorn -Entry file: flask-nginx-gunicorn/app/hello.py -Scanned: 2016-10-19 10:26:34.945640 -No vulnerabilities found. - - -AngelMunoz/Flask-Blueprints-Template -https://github.com/AngelMunoz/Flask-Blueprints-Template -Entry file: Flask-Blueprints-Template/app/__init__.py -Scanned: 2016-10-19 10:26:36.319409 -Vulnerability 1: -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > User input at line 15, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > Line 17: session['user_id'] = user.id -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > reaches line 18, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -AndyMcLEOD/PythonFlaskApp -https://github.com/AndyMcLEOD/PythonFlaskApp -Entry file: PythonFlaskApp/app.py -Scanned: 2016-10-19 10:26:40.502691 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tjhakseth/Nice-Flask-Intro -https://github.com/tjhakseth/Nice-Flask-Intro -Entry file: Nice-Flask-Intro/nice.py -Scanned: 2016-10-19 10:26:41.765536 -No vulnerabilities found. - - -mlsh2387/Ex_20160119_Flask-Intro -https://github.com/mlsh2387/Ex_20160119_Flask-Intro -Entry file: Ex_20160119_Flask-Intro/nice.py -Scanned: 2016-10-19 10:26:43.020322 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adamphillips/pi-flask-video-streaming -https://github.com/adamphillips/pi-flask-video-streaming -Entry file: pi-flask-video-streaming/app/main.py -Scanned: 2016-10-19 10:26:44.422559 -No vulnerabilities found. - - -Michotastico/NetworkInformationFlaskServer -https://github.com/Michotastico/NetworkInformationFlaskServer -Entry file: NetworkInformationFlaskServer/main.py -Scanned: 2016-10-19 10:26:45.669191 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jkravanja/paypal_flask_payment -https://github.com/jkravanja/paypal_flask_payment -Entry file: paypal_flask_payment/payment.py -Scanned: 2016-10-19 10:26:46.908632 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -tolmun/flask-ng-sample -https://github.com/tolmun/flask-ng-sample -Entry file: flask-ng-sample/project/__init__.py -Scanned: 2016-10-19 10:26:48.478506 -Vulnerability 1: -File: flask-ng-sample/project/api/views.py - > User input at line 132, trigger word ".data": - users = schema.dump(results,many=True).data -File: flask-ng-sample/project/api/views.py - > reaches line 133, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users'users) - -Vulnerability 2: -File: flask-ng-sample/project/api/views.py - > User input at line 154, trigger word ".data": - user = schema.dump(results).data -File: flask-ng-sample/project/api/views.py - > reaches line 155, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('user'user) - - - -SeventhResolve/Flask-Intro-Nice-File -https://github.com/SeventhResolve/Flask-Intro-Nice-File -Entry file: Flask-Intro-Nice-File/nice.py -Scanned: 2016-10-19 10:26:49.731878 -No vulnerabilities found. - - -torykit/docker-flask-console -https://github.com/torykit/docker-flask-console -Entry file: docker-flask-console/start.py -Scanned: 2016-10-19 10:26:51.100733 -No vulnerabilities found. - - -koulanurag/Simple-Flask-Application -https://github.com/koulanurag/Simple-Flask-Application -Entry file: Simple-Flask-Application/app.py -Scanned: 2016-10-19 10:26:52.364768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -graphql-python/flask-graphql -https://github.com/graphql-python/flask-graphql -Entry file: flask-graphql/tests/app.py -Scanned: 2016-10-19 10:27:07.022281 -No vulnerabilities found. - - -hhstore/flask-annotated -https://github.com/hhstore/flask-annotated -Entry file: flask-annotated/flask-0.5/flask/app.py -Scanned: 2016-10-19 10:27:08.830264 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prakxys/flask -https://github.com/prakxys/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:27:10.896515 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -galacticpy/flask -https://github.com/galacticpy/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:27:11.997091 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -zhiliang729/flask -https://github.com/zhiliang729/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:27:13.007110 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -iFe1er/flask -https://github.com/iFe1er/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:27:14.035650 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -jarogers095/flask-hello-world -https://github.com/jarogers095/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:27:15.576415 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -alex-paterson/Barebones-Flask-and-Caffe-Classifier -https://github.com/alex-paterson/Barebones-Flask-and-Caffe-Classifier -Entry file: Barebones-Flask-and-Caffe-Classifier/app.py -Scanned: 2016-10-19 10:27:18.652699 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -drone-demos/drone-with-python -https://github.com/drone-demos/drone-with-python -Entry file: drone-with-python/dronedemo/main.py -Scanned: 2016-10-19 10:27:24.939747 -No vulnerabilities found. - - -amirziai/sklearnflask -https://github.com/amirziai/sklearnflask -Entry file: sklearnflask/main.py -Scanned: 2016-10-19 10:27:26.387137 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fengyc/flasky -https://github.com/fengyc/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:27:26.885586 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sshimp/flasktaskr -https://github.com/sshimp/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:27:28.395175 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sharma-abhi/flaskr -https://github.com/sharma-abhi/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:27:29.936593 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kwikiel/flaskr -https://github.com/kwikiel/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:27:30.444188 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tehasdf/flaskexample -https://github.com/tehasdf/flaskexample -Entry file: flaskexample/flaskexample/app.py -Scanned: 2016-10-19 10:27:33.313690 -No vulnerabilities found. - - -sanghyunjooPurdue/flaskr -https://github.com/sanghyunjooPurdue/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:27:33.847371 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -becsully/flasktest -https://github.com/becsully/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 10:27:35.363614 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SFurnace/flaskr -https://github.com/SFurnace/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:27:36.860204 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -noamoss/flasktaskr -https://github.com/noamoss/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:27:38.382336 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AxoSal/GAE-Flask-React-skeleton -https://github.com/AxoSal/GAE-Flask-React-skeleton -Entry file: GAE-Flask-React-skeleton/main.py -Scanned: 2016-10-19 10:27:46.719248 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -yasskh/FlaskProject -https://github.com/yasskh/FlaskProject -Entry file: FlaskProject/views.py -Scanned: 2016-10-19 10:27:47.331079 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jrballot/FlaskTaskr -https://github.com/jrballot/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-19 10:27:47.984052 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -AnshuOnGit/FlaskServices -https://github.com/AnshuOnGit/FlaskServices -Entry file: FlaskServices/read_file.py -Scanned: 2016-10-19 10:27:51.277015 -No vulnerabilities found. - - -ftanevski4/FlaskPycharm -https://github.com/ftanevski4/FlaskPycharm -Entry file: FlaskPycharm/FlaskPycharm.py -Scanned: 2016-10-19 10:27:52.550782 -No vulnerabilities found. - - -yukoga/flasksample1 -https://github.com/yukoga/flasksample1 -Entry file: flasksample1/hello.py -Scanned: 2016-10-19 10:27:53.803689 -No vulnerabilities found. - - -Njsao/FlaskServer -https://github.com/Njsao/FlaskServer -Entry file: FlaskServer/untitled.py -Scanned: 2016-10-19 10:27:54.316001 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -noamoss/flask-blog -https://github.com/noamoss/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:27:54.840471 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -ddrsmile/flask-blog -https://github.com/ddrsmile/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:27:55.410146 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -dasdachs/flask-blog -https://github.com/dasdachs/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:28:03.976375 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -yuz989/uwsgi-flask -https://github.com/yuz989/uwsgi-flask -Entry file: uwsgi-flask/main.py -Scanned: 2016-10-19 10:28:06.308591 -No vulnerabilities found. - - -hugoren/flask_login -https://github.com/hugoren/flask_login -Entry file: None -Scanned: 2016-10-19 10:28:07.544504 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hugoren/flask_login. - -jlents/discover-flask -https://github.com/jlents/discover-flask -Entry file: discover-flask/project/__init__.py -Scanned: 2016-10-19 10:28:10.007387 -No vulnerabilities found. - - -jaleskinen/PythonFlask -https://github.com/jaleskinen/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:28:25.921063 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -mhgit1/PythonFlask -https://github.com/mhgit1/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:28:35.967054 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -maukka76/PythonFlask -https://github.com/maukka76/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:28:44.636073 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -Namelessi/PythonFlask -https://github.com/Namelessi/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:28:55.922446 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -nimeshkverma/BootstrapFlask -https://github.com/nimeshkverma/BootstrapFlask -Entry file: BootstrapFlask/chehra/test_server/driver.py -Scanned: 2016-10-19 10:28:58.597049 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -feeman1989/backstage_flask -https://github.com/feeman1989/backstage_flask -Entry file: backstage_flask/app.py -Scanned: 2016-10-19 10:28:59.218924 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -charanjp/flask_blog -https://github.com/charanjp/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:28:59.747424 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -taisa007/timeliner-flask -https://github.com/taisa007/timeliner-flask -Entry file: timeliner-flask/timeliner/timeliner/__init__.py -Scanned: 2016-10-19 10:29:01.155490 -No vulnerabilities found. - - -ddrsmile/flask-taskr -https://github.com/ddrsmile/flask-taskr -Entry file: flask-taskr/views.py -Scanned: 2016-10-19 10:29:01.951424 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-taskr/env/lib/python2.7/genericpath.py - -Roconda/flask-bootstrap -https://github.com/Roconda/flask-bootstrap -Entry file: flask-bootstrap/src/api/__init__.py -Scanned: 2016-10-19 10:29:04.209285 -No vulnerabilities found. - - -maxcell/flask-workshop -https://github.com/maxcell/flask-workshop -Entry file: flask-workshop/hello_world/hello.py -Scanned: 2016-10-19 10:29:05.983935 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sshimp/flask-blog -https://github.com/sshimp/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:29:06.565216 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -PavelMPD/flask_auth -https://github.com/PavelMPD/flask_auth -Entry file: flask_auth/web/server.py -Scanned: 2016-10-19 10:29:08.253500 -No vulnerabilities found. - - -seanwbarry/thinkful_flask -https://github.com/seanwbarry/thinkful_flask -Entry file: thinkful_flask/hello_world_original.py -Scanned: 2016-10-19 10:29:11.038509 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -OrionsSuspenders/flask-blog -https://github.com/OrionsSuspenders/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:29:11.591229 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -DaTimsta/flask-test -https://github.com/DaTimsta/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 10:29:12.116327 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -sstriatlon/PyFlask -https://github.com/sstriatlon/PyFlask -Entry file: PyFlask/app.py -Scanned: 2016-10-19 10:29:15.135847 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: PyFlask/venv/lib/python2.7/genericpath.py - -Vianey81/Flask-sql -https://github.com/Vianey81/Flask-sql -Entry file: Flask-sql/hackbright.py -Scanned: 2016-10-19 10:29:16.883931 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -timoparv65/PythonFlask -https://github.com/timoparv65/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:29:25.105226 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -JRaisala/PythonFlask -https://github.com/JRaisala/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:29:34.982527 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -jraappan/PythonFlask -https://github.com/jraappan/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:29:45.142020 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -hannu78/PythonFlask -https://github.com/hannu78/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:29:54.744198 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -marcosf63/flask_app -https://github.com/marcosf63/flask_app -Entry file: None -Scanned: 2016-10-19 10:29:55.242505 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/marcosf63/flask_app. - -maratkanov-a/flask_project -https://github.com/maratkanov-a/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-19 10:29:58.614092 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bellcliff/practice-flask -https://github.com/bellcliff/practice-flask -Entry file: practice-flask/hello.py -Scanned: 2016-10-19 10:30:00.426810 -No vulnerabilities found. - - -GeetikaBatra/Flask_intro -https://github.com/GeetikaBatra/Flask_intro -Entry file: Flask_intro/flask_app/__init__.py -Scanned: 2016-10-19 10:30:00.941325 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -changddcn/dd-flask -https://github.com/changddcn/dd-flask -Entry file: None -Scanned: 2016-10-19 10:30:02.652265 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/changddcn/dd-flask. - -Decus12/PythonFlask -https://github.com/Decus12/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:30:12.307582 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -thiltunen78/PythonFlask -https://github.com/thiltunen78/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:30:20.821618 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -tere15/PythonFlask -https://github.com/tere15/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:30:30.947176 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -ttakkula/flask_example -https://github.com/ttakkula/flask_example -Entry file: None -Scanned: 2016-10-19 10:30:38.410922 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -satyadevi-nyros/werckers_flask -https://github.com/satyadevi-nyros/werckers_flask -Entry file: werckers_flask/app.py -Scanned: 2016-10-19 10:30:39.708302 -No vulnerabilities found. - - -ltaziri/SQL-Flask -https://github.com/ltaziri/SQL-Flask -Entry file: SQL-Flask/hackbright.py -Scanned: 2016-10-19 10:30:40.971201 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -psavela/PythonFlask -https://github.com/psavela/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:30:50.731258 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -KariR61/PythonFlask -https://github.com/KariR61/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:31:00.680776 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -dhruvsrivastava/flask-intro -https://github.com/dhruvsrivastava/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:31:01.240503 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cjohns38/flask-intro -https://github.com/cjohns38/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:31:01.753892 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -notaweelos/openshift_flask -https://github.com/notaweelos/openshift_flask -Entry file: openshift_flask/helloflask.py -Scanned: 2016-10-19 10:31:03.072552 -No vulnerabilities found. - - -jkeung/flask_microblog -https://github.com/jkeung/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 10:31:03.594183 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shank7485/Flask-APIs -https://github.com/shank7485/Flask-APIs -Entry file: Flask-APIs/APIs/__init__.py -Scanned: 2016-10-19 10:31:04.989781 -No vulnerabilities found. - - -mattyait/Flask_webapp -https://github.com/mattyait/Flask_webapp -Entry file: Flask_webapp/routes.py -Scanned: 2016-10-19 10:31:06.415003 -No vulnerabilities found. - - -nntndfrk/untitled -https://github.com/nntndfrk/untitled -Entry file: untitled/untitled.py -Scanned: 2016-10-19 10:31:07.671156 -No vulnerabilities found. - - -jrballot/FlaskBlogApp -https://github.com/jrballot/FlaskBlogApp -Entry file: FlaskBlogApp/blog.py -Scanned: 2016-10-19 10:31:08.928996 -No vulnerabilities found. - - -jgabrielfreitas/FlaskAndParse -https://github.com/jgabrielfreitas/FlaskAndParse -Entry file: FlaskAndParse/hello_flask.py -Scanned: 2016-10-19 10:31:10.204633 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -Buuntu/TicTacToe-Flask -https://github.com/Buuntu/TicTacToe-Flask -Entry file: TicTacToe-Flask/tictactoe.py -Scanned: 2016-10-19 10:31:11.575161 -No vulnerabilities found. - - -emlam/project-tracker-flask -https://github.com/emlam/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 10:31:12.092211 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bernaerdik/Flask_on_CF -https://github.com/bernaerdik/Flask_on_CF -Entry file: Flask_on_CF/hello.py -Scanned: 2016-10-19 10:31:13.339961 -No vulnerabilities found. - - -knoxilla/web-flask-dockerized -https://github.com/knoxilla/web-flask-dockerized -Entry file: web-flask-dockerized/app.py -Scanned: 2016-10-19 10:31:14.648453 -No vulnerabilities found. - - -julyano/MiniCursoFlaskPETCC -https://github.com/julyano/MiniCursoFlaskPETCC -Entry file: MiniCursoFlaskPETCC/routes.py -Scanned: 2016-10-19 10:31:15.934692 -No vulnerabilities found. - - -go-bears/sql-with-flask -https://github.com/go-bears/sql-with-flask -Entry file: sql-with-flask/hackbright.py -Scanned: 2016-10-19 10:31:17.182375 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -anniehe/project-tracker-flask -https://github.com/anniehe/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 10:31:17.684115 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neonbadger/project-tracker-flask -https://github.com/neonbadger/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 10:31:18.185162 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DoriRunyon/Project-tracker-flask -https://github.com/DoriRunyon/Project-tracker-flask -Entry file: Project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 10:31:19.420560 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EdilvoLima/CursoPythonFlask -https://github.com/EdilvoLima/CursoPythonFlask -Entry file: CursoPythonFlask/routes.py -Scanned: 2016-10-19 10:31:20.672173 -No vulnerabilities found. - - -dternyak/Flask-Postgres-Docker -https://github.com/dternyak/Flask-Postgres-Docker -Entry file: Flask-Postgres-Docker/web/index.py -Scanned: 2016-10-19 10:31:22.461836 -No vulnerabilities found. - - -info3180/python-flask-example -https://github.com/info3180/python-flask-example -Entry file: python-flask-example/hello.py -Scanned: 2016-10-19 10:31:23.694784 -No vulnerabilities found. - - -janeygak/Hackbright--SQL-with-Flask -https://github.com/janeygak/Hackbright--SQL-with-Flask -Entry file: Hackbright--SQL-with-Flask/hackbright-web.py -Scanned: 2016-10-19 10:31:25.040642 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SeventhResolve/Project-Tracker-Flask -https://github.com/SeventhResolve/Project-Tracker-Flask -Entry file: Project-Tracker-Flask/hackbright-web.py -Scanned: 2016-10-19 10:31:26.293087 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alitsiya/project-tracker-flask -https://github.com/alitsiya/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 10:31:26.793376 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ThomasMarcel/gae-tomalcala-flask -https://github.com/ThomasMarcel/gae-tomalcala-flask -Entry file: gae-tomalcala-flask/main.py -Scanned: 2016-10-19 10:31:28.228539 -No vulnerabilities found. - - -ContinuumIO/flask-kerberos-login -https://github.com/ContinuumIO/flask-kerberos-login -Entry file: flask-kerberos-login/examples/simple.py -Scanned: 2016-10-19 10:31:33.857160 -No vulnerabilities found. - - -badspelr/flask-hello-world -https://github.com/badspelr/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:31:40.468577 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -yoophi/flask-appointment-peewee -https://github.com/yoophi/flask-appointment-peewee -Entry file: flask-appointment-peewee/sched/app.py -Scanned: 2016-10-19 10:31:42.849700 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -c1rno/Flask_auth_example -https://github.com/c1rno/Flask_auth_example -Entry file: Flask_auth_example/app/__init__.py -Scanned: 2016-10-19 10:31:53.766447 -No vulnerabilities found. - - -prakxys/flask -https://github.com/prakxys/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:32:04.784734 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -galacticpy/flask -https://github.com/galacticpy/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:32:05.969995 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -billdwalters/Flask -https://github.com/billdwalters/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:32:06.484377 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -OneBitSoftware/Office365-SharePoint-Python-Flask-Sample -https://github.com/OneBitSoftware/Office365-SharePoint-Python-Flask-Sample -Entry file: Office365-SharePoint-Python-Flask-Sample/src/Python.Office365.AppAuthentication/app.py -Scanned: 2016-10-19 10:32:08.126611 -No vulnerabilities found. - - -NJIT-SIG-WEBDEV/flask-intro -https://github.com/NJIT-SIG-WEBDEV/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:32:08.640474 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -imperio-wxm/flask-learn -https://github.com/imperio-wxm/flask-learn -Entry file: flask-learn/app/myapp/__init__.py -Scanned: 2016-10-19 10:32:11.170998 -No vulnerabilities found. - - -ptrierweiler/myblog -https://github.com/ptrierweiler/myblog -Entry file: None -Scanned: 2016-10-19 10:32:15.186175 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -drone-demos/drone-with-python -https://github.com/drone-demos/drone-with-python -Entry file: drone-with-python/dronedemo/main.py -Scanned: 2016-10-19 10:32:16.600668 -No vulnerabilities found. - - -msopentechcn/aad-graphapi-flask-demo -https://github.com/msopentechcn/aad-graphapi-flask-demo -Entry file: aad-graphapi-flask-demo/app.py -Scanned: 2016-10-19 10:32:17.879166 -No vulnerabilities found. - - -amirziai/sklearnflask -https://github.com/amirziai/sklearnflask -Entry file: sklearnflask/main.py -Scanned: 2016-10-19 10:32:18.363411 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -menglong81/flaskr -https://github.com/menglong81/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:32:18.867991 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chadelder/flasktaskr -https://github.com/chadelder/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:32:19.369002 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kmosho/flaskr -https://github.com/kmosho/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:32:19.865432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SticksInHand/flaskr -https://github.com/SticksInHand/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:32:20.375619 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jayShepard/Flasky -https://github.com/jayShepard/Flasky -Entry file: Flasky/Vagrant/hello.py -Scanned: 2016-10-19 10:32:21.650942 -No vulnerabilities found. - - -vineethtw/flaskexamples -https://github.com/vineethtw/flaskexamples -Entry file: flaskexamples/api/simulation.py -Scanned: 2016-10-19 10:32:22.909485 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Duncodes/flasky -https://github.com/Duncodes/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:32:23.404531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -diegogslomp/flaskr -https://github.com/diegogslomp/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:32:24.398436 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xu00wei/flasky -https://github.com/xu00wei/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:32:25.890043 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -playgrdstar/flasktaskr -https://github.com/playgrdstar/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:32:27.425206 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -toricor/flaskr -https://github.com/toricor/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:32:27.926071 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Lazyppl/Flaskblog -https://github.com/Lazyppl/Flaskblog -Entry file: Flaskblog/app/__init__.py -Scanned: 2016-10-19 10:32:29.190943 -No vulnerabilities found. - - -zeratullich/flaskr -https://github.com/zeratullich/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:32:34.704558 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -noamoss/flasktaskr -https://github.com/noamoss/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:32:42.217353 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -arose13/HerokuCondaScipyFlaskApp -https://github.com/arose13/HerokuCondaScipyFlaskApp -Entry file: HerokuCondaScipyFlaskApp/Web/app.py -Scanned: 2016-10-19 10:32:44.621184 -No vulnerabilities found. - - -awind/FlaskRestful -https://github.com/awind/FlaskRestful -Entry file: FlaskRestful/app/__init__.py -Scanned: 2016-10-19 10:32:46.003141 -Vulnerability 1: -File: FlaskRestful/app/apis.py - > User input at line 48, trigger word "get(": - user = User.query.get(userid) -File: FlaskRestful/app/apis.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = user_schema.jsonify(user) - - - -jrballot/FlaskTaskr -https://github.com/jrballot/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-19 10:32:54.645383 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -jgabrielfreitas/FlaskFirebase -https://github.com/jgabrielfreitas/FlaskFirebase -Entry file: FlaskFirebase/runner.py -Scanned: 2016-10-19 10:33:04.970525 -No vulnerabilities found. - - -scarabcoder/FlaskSite -https://github.com/scarabcoder/FlaskSite -Entry file: FlaskSite/runServer.py -Scanned: 2016-10-19 10:33:05.837301 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aetherwu/FlaskDocker -https://github.com/aetherwu/FlaskDocker -Entry file: FlaskDocker/app/app.py -Scanned: 2016-10-19 10:33:07.096562 -No vulnerabilities found. - - -anniee/flask-intro -https://github.com/anniee/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:33:07.602199 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -angeloski/flask-sandbox -https://github.com/angeloski/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-19 10:33:08.116096 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jonnybazookatone/flask-watchman -https://github.com/jonnybazookatone/flask-watchman -Entry file: None -Scanned: 2016-10-19 10:33:09.401896 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jonnybazookatone/flask-watchman. - -dritux/flask-spark -https://github.com/dritux/flask-spark -Entry file: flask-spark/spark/__init__.py -Scanned: 2016-10-19 10:33:10.672387 -No vulnerabilities found. - - -arvind-iyer/flask-101 -https://github.com/arvind-iyer/flask-101 -Entry file: flask-101/app/__init__.py -Scanned: 2016-10-19 10:33:11.993022 -No vulnerabilities found. - - -vbalien/flask-skeleton -https://github.com/vbalien/flask-skeleton -Entry file: None -Scanned: 2016-10-19 10:33:13.512126 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vbalien/flask-skeleton. - -robbintt/flask-template -https://github.com/robbintt/flask-template -Entry file: None -Scanned: 2016-10-19 10:33:17.023403 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/robbintt/flask-template. - -Lucky0604/flask-blog -https://github.com/Lucky0604/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:33:18.562868 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -felipemfp/flask-microblog -https://github.com/felipemfp/flask-microblog -Entry file: None -Scanned: 2016-10-19 10:33:20.060390 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bronka/flask-blog -https://github.com/bronka/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:33:20.596072 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -genagain/learning-flask -https://github.com/genagain/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-19 10:33:22.139811 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -acknowledge/flask-api -https://github.com/acknowledge/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-19 10:33:24.167192 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunQian-Andy/flask_mail -https://github.com/JunQian-Andy/flask_mail -Entry file: flask_mail/app/__init__.py -Scanned: 2016-10-19 10:33:25.475188 -No vulnerabilities found. - - -fabricekwizera/flask_intro -https://github.com/fabricekwizera/flask_intro -Entry file: flask_intro/first_app.py -Scanned: 2016-10-19 10:33:26.821652 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py - -relman/flask-srv -https://github.com/relman/flask-srv -Entry file: flask-srv/service.py -Scanned: 2016-10-19 10:33:28.316151 -No vulnerabilities found. - - -volgoweb/flask_api -https://github.com/volgoweb/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-19 10:33:28.841944 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leiyue/tutorial_flask -https://github.com/leiyue/tutorial_flask -Entry file: tutorial_flask/base/app.py -Scanned: 2016-10-19 10:33:30.410835 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sharma-mohit/flask-mongo -https://github.com/sharma-mohit/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-19 10:33:33.331105 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samgclarke/flask-starter -https://github.com/samgclarke/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-19 10:33:35.850814 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hbldh/flask-pybankid -https://github.com/hbldh/flask-pybankid -Entry file: flask-pybankid/flask_pybankid.py -Scanned: 2016-10-19 10:33:44.357520 -No vulnerabilities found. - - -krlex/flask-resume -https://github.com/krlex/flask-resume -Entry file: flask-resume/manage.py -Scanned: 2016-10-19 10:33:45.766042 -No vulnerabilities found. - - -doobeh/flask-lister -https://github.com/doobeh/flask-lister -Entry file: flask-lister/app/core.py -Scanned: 2016-10-19 10:33:47.106882 -No vulnerabilities found. - - -dfitzgerald3/sg_flask -https://github.com/dfitzgerald3/sg_flask -Entry file: sg_flask/__init__.py -Scanned: 2016-10-19 10:34:08.356772 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: sg_flask/venv/lib/python2.7/genericpath.py - -Tmingh/learn_flask -https://github.com/Tmingh/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-19 10:34:08.860192 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qiuhaoling/my_flask -https://github.com/qiuhaoling/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-19 10:34:09.510300 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -ahsanwtc/flask-project -https://github.com/ahsanwtc/flask-project -Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py -Scanned: 2016-10-19 10:34:22.387505 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -chadelder/flask-blog -https://github.com/chadelder/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:34:22.954863 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rdrsh/flask-hello -https://github.com/rdrsh/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-19 10:34:23.473469 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Forumouth/flask-simple -https://github.com/Forumouth/flask-simple -Entry file: flask-simple/tests/data/testapp.py -Scanned: 2016-10-19 10:34:24.901681 -No vulnerabilities found. - - -mattyait/Flask_webapp -https://github.com/mattyait/Flask_webapp -Entry file: Flask_webapp/routes.py -Scanned: 2016-10-19 10:34:26.289224 -No vulnerabilities found. - - -playgrdstar/flask-blog -https://github.com/playgrdstar/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:34:26.864462 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rx3bp/flask-freeze -https://github.com/rx3bp/flask-freeze -Entry file: flask-freeze/app.py -Scanned: 2016-10-19 10:34:28.730233 -No vulnerabilities found. - - -worthlesspenny7/tumblelogFlask -https://github.com/worthlesspenny7/tumblelogFlask -Entry file: tumblelogFlask/__init__.py -Scanned: 2016-10-19 10:34:31.007569 -No vulnerabilities found. - - -NaoYamaguchi/flask_login -https://github.com/NaoYamaguchi/flask_login -Entry file: None -Scanned: 2016-10-19 10:34:31.533023 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/NaoYamaguchi/flask_login. - -njnr/onece -https://github.com/njnr/onece -Entry file: onece/app/__init__.py -Scanned: 2016-10-19 10:34:33.508644 -No vulnerabilities found. - - -rmaheshkumarblr/FlaskTestingApp -https://github.com/rmaheshkumarblr/FlaskTestingApp -Entry file: FlaskTestingApp/testingFlaskScript.py -Scanned: 2016-10-19 10:34:38.814447 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jrballot/FlaskBlogApp -https://github.com/jrballot/FlaskBlogApp -Entry file: FlaskBlogApp/blog.py -Scanned: 2016-10-19 10:34:40.102548 -No vulnerabilities found. - - -worthlesspenny7/FlaskYoutubeTutorial -https://github.com/worthlesspenny7/FlaskYoutubeTutorial -Entry file: FlaskYoutubeTutorial/application.py -Scanned: 2016-10-19 10:34:43.224209 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskYoutubeTutorial/lib/python2.7/genericpath.py - -joyzhaoyang/FlaskDirectUploader -https://github.com/joyzhaoyang/FlaskDirectUploader -Entry file: FlaskDirectUploader/application.py -Scanned: 2016-10-19 10:34:44.820734 -No vulnerabilities found. - - -astianseb/flask-simple-distributed-applicaiton -https://github.com/astianseb/flask-simple-distributed-applicaiton -Entry file: flask-simple-distributed-applicaiton/Flasktest/__init__.py -Scanned: 2016-10-19 10:34:46.083652 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bernaerdik/Flask_on_CF -https://github.com/bernaerdik/Flask_on_CF -Entry file: Flask_on_CF/hello.py -Scanned: 2016-10-19 10:34:47.307240 -No vulnerabilities found. - - -knoxilla/web-flask-dockerized -https://github.com/knoxilla/web-flask-dockerized -Entry file: web-flask-dockerized/app.py -Scanned: 2016-10-19 10:34:48.634548 -No vulnerabilities found. - - -mhgit1/PythonFlask_oma -https://github.com/mhgit1/PythonFlask_oma -Entry file: PythonFlask_oma/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 10:34:59.851560 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -IvanBodnar/fromzero_flask_blog -https://github.com/IvanBodnar/fromzero_flask_blog -Entry file: fromzero_flask_blog/__init__.py -Scanned: 2016-10-19 10:35:01.343767 -Vulnerability 1: -File: fromzero_flask_blog/author/views.py - > User input at line 27, trigger word "get(": - next = session.get('next') -Reassigned in: - File: fromzero_flask_blog/author/views.py - > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: fromzero_flask_blog/author/views.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error) -File: fromzero_flask_blog/author/views.py - > reaches line 29, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - - - -alexarnautu/simple-flask-blog -https://github.com/alexarnautu/simple-flask-blog -Entry file: simple-flask-blog/blog.py -Scanned: 2016-10-19 10:35:02.964297 -No vulnerabilities found. - - -apiarian/RPi-GPIO-flask -https://github.com/apiarian/RPi-GPIO-flask -Entry file: RPi-GPIO-flask/server.py -Scanned: 2016-10-19 10:35:04.263543 -No vulnerabilities found. - - -tomov/flask-heroku-backend -https://github.com/tomov/flask-heroku-backend -Entry file: flask-heroku-backend/app/__init__.py -Scanned: 2016-10-19 10:35:05.498132 -No vulnerabilities found. - - -MuriloFerraz/intel_edison_flask -https://github.com/MuriloFerraz/intel_edison_flask -Entry file: intel_edison_flask/flask_example/contole.py -Scanned: 2016-10-19 10:35:06.892232 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akaak/flask-mega-tutorial -https://github.com/akaak/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 10:35:07.408649 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thechad12/Flask-Item-Catalog -https://github.com/thechad12/Flask-Item-Catalog -Entry file: Flask-Item-Catalog/application.py -Scanned: 2016-10-19 10:35:09.225765 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -javicacheiro/rest_api_flask -https://github.com/javicacheiro/rest_api_flask -Entry file: rest_api_flask/rest/app/__init__.py -Scanned: 2016-10-19 10:35:10.955168 -No vulnerabilities found. - - -florenceloi/flask-intro-redo -https://github.com/florenceloi/flask-intro-redo -Entry file: flask-intro-redo/nice.py -Scanned: 2016-10-19 10:35:12.664083 -No vulnerabilities found. - - -eric-boone/python-flask-round1 -https://github.com/eric-boone/python-flask-round1 -Entry file: python-flask-round1/app/__init__.py -Scanned: 2016-10-19 10:35:13.915308 -No vulnerabilities found. - - -playgrdstar/flask-hello-world -https://github.com/playgrdstar/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:35:24.955629 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -iceskel/flask-restful-api -https://github.com/iceskel/flask-restful-api -Entry file: flask-restful-api/restful/api.py -Scanned: 2016-10-19 10:35:25.464550 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apiaas/gae-flask-base -https://github.com/apiaas/gae-flask-base -Entry file: gae-flask-base/src/main.py -Scanned: 2016-10-19 10:35:29.323491 -No vulnerabilities found. - - -ddrsmile/flask-taskr-with-blueprint -https://github.com/ddrsmile/flask-taskr-with-blueprint -Entry file: flask-taskr-with-blueprint/project/__init__.py -Scanned: 2016-10-19 10:35:31.226101 -No vulnerabilities found. - - -austinbrovick/flask-book_review_website -https://github.com/austinbrovick/flask-book_review_website -Entry file: flask-book_review_website/app/models/User.py -Scanned: 2016-10-19 10:35:33.066268 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -oscarvazquez/flask_mysql_migrations -https://github.com/oscarvazquez/flask_mysql_migrations -Entry file: None -Scanned: 2016-10-19 10:35:37.727233 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bethesdamd/python_flask_pharma -https://github.com/bethesdamd/python_flask_pharma -Entry file: python_flask_pharma/app.py -Scanned: 2016-10-19 10:35:39.599625 -No vulnerabilities found. - - -billdwalters/Flask -https://github.com/billdwalters/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:35:41.897706 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rlsharpton/flask -https://github.com/rlsharpton/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:35:45.180806 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ccapudev/flask -https://github.com/ccapudev/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:35:46.245435 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -hezx/flask -https://github.com/hezx/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:35:47.325882 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -its-dirg/Flask-pyoidc -https://github.com/its-dirg/Flask-pyoidc -Entry file: Flask-pyoidc/tests/test_flask_pyoidc.py -Scanned: 2016-10-19 10:35:48.723559 -No vulnerabilities found. - - -NJIT-SIG-WEBDEV/flask-intro -https://github.com/NJIT-SIG-WEBDEV/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:35:49.241852 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -karanj112294/flasktutorial -https://github.com/karanj112294/flasktutorial -Entry file: None -Scanned: 2016-10-19 10:35:50.745232 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chadelder/flasktaskr -https://github.com/chadelder/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:36:02.255675 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jocelynaladin/flaskworkspace -https://github.com/jocelynaladin/flaskworkspace -Entry file: flaskworkspace/__init__.py -Scanned: 2016-10-19 10:36:06.817384 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KDmytro/flasktaskr -https://github.com/KDmytro/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:36:07.336624 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dreamtiger2016/flaskr -https://github.com/dreamtiger2016/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:36:07.829060 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davetromp/flasksqlapi -https://github.com/davetromp/flasksqlapi -Entry file: flasksqlapi/runapi.py -Scanned: 2016-10-19 10:36:09.305214 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xu00wei/flasky -https://github.com/xu00wei/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:36:09.801625 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zzclynn/flaskr -https://github.com/zzclynn/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:36:10.290980 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -psykos/flaskloginskeleton -https://github.com/psykos/flaskloginskeleton -Entry file: flaskloginskeleton/app/__init__.py -Scanned: 2016-10-19 10:36:11.544225 -No vulnerabilities found. - - -AndrewGoldstein/flaskapp -https://github.com/AndrewGoldstein/flaskapp -Entry file: None -Scanned: 2016-10-19 10:36:12.062752 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AndrewGoldstein/flaskapp. - -JamesMilnerUK/Loxo -https://github.com/JamesMilnerUK/Loxo -Entry file: Loxo/loxoapi.py -Scanned: 2016-10-19 10:36:14.908944 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nescode/punchstarter -https://github.com/nescode/punchstarter -Entry file: punchstarter/punchstarter/__init__.py -Scanned: 2016-10-19 10:36:16.297120 -No vulnerabilities found. - - -edwardszczepanski/FlaskApplication -https://github.com/edwardszczepanski/FlaskApplication -Entry file: FlaskApplication/app.py -Scanned: 2016-10-19 10:36:19.412445 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskApplication/venv/lib/python2.7/genericpath.py - -AllyW/flaskyDeb -https://github.com/AllyW/flaskyDeb -Entry file: flaskyDeb/app/__init__.py -Scanned: 2016-10-19 10:36:26.983642 -Vulnerability 1: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flaskyDeb/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flaskyDeb/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flaskyDeb/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flaskyDeb/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flaskyDeb/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -jgabrielfreitas/FlaskFirebase -https://github.com/jgabrielfreitas/FlaskFirebase -Entry file: FlaskFirebase/runner.py -Scanned: 2016-10-19 10:36:28.218955 -No vulnerabilities found. - - -chrismontone/flasktaskr2 -https://github.com/chrismontone/flasktaskr2 -Entry file: flasktaskr2/project/__init__.py -Scanned: 2016-10-19 10:36:29.913851 -No vulnerabilities found. - - -scarabcoder/FlaskSite -https://github.com/scarabcoder/FlaskSite -Entry file: FlaskSite/runServer.py -Scanned: 2016-10-19 10:36:30.658551 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -musicalfish/FlaskApp -https://github.com/musicalfish/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 10:36:31.254573 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -oscarmeanwell/FlaskMusic -https://github.com/oscarmeanwell/FlaskMusic -Entry file: FlaskMusic/app/routesun.py -Scanned: 2016-10-19 10:36:34.435965 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TwilioDevEd/eta-notifications-flask -https://github.com/TwilioDevEd/eta-notifications-flask -Entry file: eta-notifications-flask/eta_notifications_flask/__init__.py -Scanned: 2016-10-19 10:36:38.843810 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -johnsliao/flask-sqlite3-chartjs-toy -https://github.com/johnsliao/flask-sqlite3-chartjs-toy -Entry file: flask-sqlite3-chartjs-toy/flaskr/flaskr.py -Scanned: 2016-10-19 10:36:40.201330 -No vulnerabilities found. - - -pedrocarvalhodev/flask-intro -https://github.com/pedrocarvalhodev/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:36:40.714118 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lawrencexia/flask_notecards -https://github.com/lawrencexia/flask_notecards -Entry file: flask_notecards/app/__init__.py -Scanned: 2016-10-19 10:36:41.962259 -No vulnerabilities found. - - -drmalex07/flask-helloworld -https://github.com/drmalex07/flask-helloworld -Entry file: flask-helloworld/helloworld/app.py -Scanned: 2016-10-19 10:36:43.469869 -No vulnerabilities found. - - -ameya0909/Flask-Blog -https://github.com/ameya0909/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-19 10:36:43.991280 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Oracleli/flask-try -https://github.com/Oracleli/flask-try -Entry file: None -Scanned: 2016-10-19 10:36:46.803837 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Oracleli/flask-try. - -QsBBQ/flask_test -https://github.com/QsBBQ/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 10:36:47.421854 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ziggear/wechat-flask -https://github.com/ziggear/wechat-flask -Entry file: wechat-flask/src/myapp.py -Scanned: 2016-10-19 10:36:48.765054 -No vulnerabilities found. - - -chrismontone/flask-blog -https://github.com/chrismontone/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:36:49.313664 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -yetship/flask-usages -https://github.com/yetship/flask-usages -Entry file: flask-usages/application/__init__.py -Scanned: 2016-10-19 10:36:51.688977 -No vulnerabilities found. - - -al4/flask-tokenauth -https://github.com/al4/flask-tokenauth -Entry file: flask-tokenauth/test_tokenauth.py -Scanned: 2016-10-19 10:36:52.992963 -No vulnerabilities found. - - -marcosomma/first_flask -https://github.com/marcosomma/first_flask -Entry file: first_flask/app/__init__.py -Scanned: 2016-10-19 10:37:09.374897 -No vulnerabilities found. - - -miracleluchen/blog-flask -https://github.com/miracleluchen/blog-flask -Entry file: blog-flask/project/views.py -Scanned: 2016-10-19 10:37:10.047580 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -meyersj/bootstrap-flask -https://github.com/meyersj/bootstrap-flask -Entry file: bootstrap-flask/app/__init__.py -Scanned: 2016-10-19 10:37:11.279276 -No vulnerabilities found. - - -sharma-mohit/flask-mongo -https://github.com/sharma-mohit/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-19 10:37:12.255256 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jarogers095/flask-blog -https://github.com/jarogers095/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:37:12.778686 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Jelly-Yu/learningFlask -https://github.com/Jelly-Yu/learningFlask -Entry file: learningFlask/hello.py -Scanned: 2016-10-19 10:37:13.424105 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py - -ratherbsurfing/flask-cms -https://github.com/ratherbsurfing/flask-cms -Entry file: flask-cms/flaskCMS/flaskCMS/__init__.py -Scanned: 2016-10-19 10:37:18.310738 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -philtrep/Flask-Skeleton -https://github.com/philtrep/Flask-Skeleton -Entry file: None -Scanned: 2016-10-19 10:37:20.053398 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/philtrep/Flask-Skeleton. - -cynrick/kickstarter-flask -https://github.com/cynrick/kickstarter-flask -Entry file: kickstarter-flask/kickstarter/__init__.py -Scanned: 2016-10-19 10:37:21.464389 -No vulnerabilities found. - - -kessiacastro/flask-blog -https://github.com/kessiacastro/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:37:27.000632 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -doobeh/flask-lister -https://github.com/doobeh/flask-lister -Entry file: flask-lister/app/core.py -Scanned: 2016-10-19 10:37:29.297738 -No vulnerabilities found. - - -rjturek/flask-etf -https://github.com/rjturek/flask-etf -Entry file: flask-etf/flask_etf_main.py -Scanned: 2016-10-19 10:37:31.317560 -No vulnerabilities found. - - -worthlesspenny7/tumblelogFlask -https://github.com/worthlesspenny7/tumblelogFlask -Entry file: tumblelogFlask/__init__.py -Scanned: 2016-10-19 10:37:33.159750 -No vulnerabilities found. - - -axontrust/alexa-flask -https://github.com/axontrust/alexa-flask -Entry file: alexa-flask/app/__init__.py -Scanned: 2016-10-19 10:37:34.574388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asjedh/flask_tutorial -https://github.com/asjedh/flask_tutorial -Entry file: None -Scanned: 2016-10-19 10:37:35.099237 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -robb216/MyFlask -https://github.com/robb216/MyFlask -Entry file: MyFlask/MyFlask.py -Scanned: 2016-10-19 10:37:37.504318 -No vulnerabilities found. - - -rogerpence/flask-blueprint -https://github.com/rogerpence/flask-blueprint -Entry file: flask-blueprint/application/__init__.py -Scanned: 2016-10-19 10:37:41.884221 -No vulnerabilities found. - - -androidzhibinw/flask-bootstrap -https://github.com/androidzhibinw/flask-bootstrap -Entry file: flask-bootstrap/app/__init__.py -Scanned: 2016-10-19 10:37:43.496444 -No vulnerabilities found. - - -ytanno/PlotFlask -https://github.com/ytanno/PlotFlask -Entry file: PlotFlask/FlaskTest1/FlaskTest1/__init__.py -Scanned: 2016-10-19 10:37:47.491401 -No vulnerabilities found. - - -psykos/psilex-flask -https://github.com/psykos/psilex-flask -Entry file: psilex-flask/app/__init__.py -Scanned: 2016-10-19 10:37:48.976105 -No vulnerabilities found. - - -Hank02/flask_example -https://github.com/Hank02/flask_example -Entry file: None -Scanned: 2016-10-19 10:37:49.503360 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -VerdigrisReader/flask-workshop -https://github.com/VerdigrisReader/flask-workshop -Entry file: flask-workshop/hello_world/hello.py -Scanned: 2016-10-19 10:37:50.012662 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rogerpence/flask-skeleton -https://github.com/rogerpence/flask-skeleton -Entry file: None -Scanned: 2016-10-19 10:37:50.523334 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rogerpence/flask-skeleton. - -rodcox89/FlaskDynamoStarterKit -https://github.com/rodcox89/FlaskDynamoStarterKit -Entry file: FlaskDynamoStarterKit/main.py -Scanned: 2016-10-19 10:37:54.780630 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskDynamoStarterKit/venv/lib/python2.7/genericpath.py - -pulysak/FlaskServer-Tests -https://github.com/pulysak/FlaskServer-Tests -Entry file: FlaskServer-Tests/server.py -Scanned: 2016-10-19 10:37:59.017357 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskServer-Tests/flask_env/lib/python2.7/genericpath.py - -rbtoner/FlaskWebApp -https://github.com/rbtoner/FlaskWebApp -Entry file: FlaskWebApp/FanGuardFlask/__init__.py -Scanned: 2016-10-19 10:38:01.233324 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -worthlesspenny7/FlaskYoutubeTutorial -https://github.com/worthlesspenny7/FlaskYoutubeTutorial -Entry file: FlaskYoutubeTutorial/application.py -Scanned: 2016-10-19 10:38:05.337851 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskYoutubeTutorial/lib/python2.7/genericpath.py - -MGago/flaskBasicApp1 -https://github.com/MGago/flaskBasicApp1 -Entry file: None -Scanned: 2016-10-19 10:38:11.358242 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MuriloFerraz/intel_edison_flask -https://github.com/MuriloFerraz/intel_edison_flask -Entry file: intel_edison_flask/flask_example/contole.py -Scanned: 2016-10-19 10:38:11.858761 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -skpdvidby0/Flask-Python-App -https://github.com/skpdvidby0/Flask-Python-App -Entry file: Flask-Python-App/flaskapp.py -Scanned: 2016-10-19 10:38:14.827656 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Python-App/virtenv/lib/python2.7/genericpath.py - -mbreisch/real-python-flask-bdd -https://github.com/mbreisch/real-python-flask-bdd -Entry file: real-python-flask-bdd/flaskr.py -Scanned: 2016-10-19 10:38:16.093248 -No vulnerabilities found. - - -sindhus/flask-mega-tutorial -https://github.com/sindhus/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 10:38:17.580695 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PiyushGoyal443/studentLogin_API_Flask -https://github.com/PiyushGoyal443/studentLogin_API_Flask -Entry file: studentLogin_API_Flask/server.py -Scanned: 2016-10-19 10:38:19.083281 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GertjanvanhetHof/helloworld_with_flask -https://github.com/GertjanvanhetHof/helloworld_with_flask -Entry file: helloworld_with_flask/mypython.py -Scanned: 2016-10-19 10:38:20.351604 -No vulnerabilities found. - - -taromurao/flask-python-logger-experiment -https://github.com/taromurao/flask-python-logger-experiment -Entry file: flask-python-logger-experiment/app.py -Scanned: 2016-10-19 10:38:21.589279 -No vulnerabilities found. - - -mikicaivosevic/flask-simple-todo -https://github.com/mikicaivosevic/flask-simple-todo -Entry file: flask-simple-todo/app.py -Scanned: 2016-10-19 10:38:22.843379 -No vulnerabilities found. - - -KDmytro/flask-hello-world -https://github.com/KDmytro/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:38:28.421803 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -bepetersn/flask-permissions-ex -https://github.com/bepetersn/flask-permissions-ex -Entry file: flask-permissions-ex/ex/__init__.py -Scanned: 2016-10-19 10:38:33.138552 -No vulnerabilities found. - - -EricSchles/db_migrations_flask -https://github.com/EricSchles/db_migrations_flask -Entry file: db_migrations_flask/app/__init__.py -Scanned: 2016-10-19 10:38:35.906191 -No vulnerabilities found. - - -yyssjj33/flask-menu-application -https://github.com/yyssjj33/flask-menu-application -Entry file: flask-menu-application/project.py -Scanned: 2016-10-19 10:38:37.306616 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kessiacastro/flask-hello-world -https://github.com/kessiacastro/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:38:37.844826 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -androidzhibinw/flask-app-builder-example -https://github.com/androidzhibinw/flask-app-builder-example -Entry file: flask-app-builder-example/myapp/app/__init__.py -Scanned: 2016-10-19 10:38:43.106805 -No vulnerabilities found. - - -tim1978/flask-hello-world -https://github.com/tim1978/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:38:43.657999 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -jmcevoy1984/Flask-Restful-Tutorial -https://github.com/jmcevoy1984/Flask-Restful-Tutorial -Entry file: Flask-Restful-Tutorial/app.py -Scanned: 2016-10-19 10:38:45.918736 -No vulnerabilities found. - - -jigen7/python_flask_tutorial -https://github.com/jigen7/python_flask_tutorial -Entry file: python_flask_tutorial/flask/lib/python3.5/site-packages/flask_openid.py -Scanned: 2016-10-19 10:39:04.411893 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -danieltl/python_flask_final -https://github.com/danieltl/python_flask_final -Entry file: python_flask_final/application.py -Scanned: 2016-10-19 10:39:06.216699 -No vulnerabilities found. - - -devizier/flask-hello-world -https://github.com/devizier/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:39:06.822200 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -tomov/flask-location-survey-psych -https://github.com/tomov/flask-location-survey-psych -Entry file: flask-location-survey-psych/app/__init__.py -Scanned: 2016-10-19 10:39:08.250813 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rakou1986/flask-mvt-min -https://github.com/rakou1986/flask-mvt-min -Entry file: flask-mvt-min/webapp/app.py -Scanned: 2016-10-19 10:39:09.536731 -No vulnerabilities found. - - -mbreisch/real-python-reverse-flask -https://github.com/mbreisch/real-python-reverse-flask -Entry file: None -Scanned: 2016-10-19 10:39:10.806591 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mbreisch/real-python-reverse-flask. - -jeet4320/PythonFlask-IBMBluemix -https://github.com/jeet4320/PythonFlask-IBMBluemix -Entry file: PythonFlask-IBMBluemix/welcome.py -Scanned: 2016-10-19 10:39:15.230365 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -junniepat/Python-flask-app -https://github.com/junniepat/Python-flask-app -Entry file: Python-flask-app/app.py -Scanned: 2016-10-19 10:39:16.476913 -No vulnerabilities found. - - -Kwpolska/flask-demo-app -https://github.com/Kwpolska/flask-demo-app -Entry file: flask-demo-app/flaskapp.py -Scanned: 2016-10-19 10:39:17.828586 -No vulnerabilities found. - - -tiangolo/uwsgi-nginx-flask-docker -https://github.com/tiangolo/uwsgi-nginx-flask-docker -Entry file: uwsgi-nginx-flask-docker/example-flask-python3.5-upload/app/main.py -Scanned: 2016-10-19 10:39:20.894716 -No vulnerabilities found. - - -bobdorff/flask -https://github.com/bobdorff/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:39:22.296807 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -chrisvasey/flask -https://github.com/chrisvasey/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:39:25.368778 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -wildjan/Flask -https://github.com/wildjan/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:39:25.992032 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smltc/Flask -https://github.com/smltc/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:39:26.490709 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rlsharpton/flask -https://github.com/rlsharpton/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:39:27.529798 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -mikelkl/flasky -https://github.com/mikelkl/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:39:28.029052 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -besimaltnok/Flask-Examples -https://github.com/besimaltnok/Flask-Examples -Entry file: Flask-Examples/helloworld.py -Scanned: 2016-10-19 10:39:31.593644 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luo-jialin/flask- -https://github.com/luo-jialin/flask- -Entry file: flask-/flaskr.py -Scanned: 2016-10-19 10:39:33.334022 -No vulnerabilities found. - - -ubbochum/hb2_flask -https://github.com/ubbochum/hb2_flask -Entry file: hb2_flask/hb2_flask.py -Scanned: 2016-10-19 10:39:37.075337 -Vulnerability 1: -File: hb2_flask/hb2_flask.py - > User input at line 742, trigger word "get(": - bio = requests.get('https://pub.orcid.org/%s/orcid-bio/' % orcid_id,headers='Accept''application/json').json() -File: hb2_flask/hb2_flask.py - > reaches line 744, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''%s, %s' % (bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('family-name').get('value'), bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('given-names').get('value'))) - -Vulnerability 2: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1141: ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), action='https://github.com/create', pubtype=pubtype) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1160: ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), pubtype=pubtype, action='https://github.com/create', record_id=form.id.data) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1110, trigger word "replace(": - solr_data.setdefault('recordCreationDate', form.data.get(field).strip().replace(' ', 'T') + 'Z') - -Vulnerability 3: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1141: ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), action='https://github.com/create', pubtype=pubtype) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1160: ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), pubtype=pubtype, action='https://github.com/create', record_id=form.id.data) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1112, trigger word "replace(": - solr_data.setdefault('recordChangeDate', form.data.get(field).strip().replace(' ', 'T') + 'Z') - -Vulnerability 4: -File: hb2_flask/hb2_flask.py - > User input at line 1286, trigger word "get(": - thedata = json.loads(edit_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1310: ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1321: ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 5: -File: hb2_flask/hb2_flask.py - > User input at line 1289, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1310: ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1321: ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 6: -File: hb2_flask/hb2_flask.py - > User input at line 1291, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() - File: hb2_flask/hb2_flask.py - > Line 1310: ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1321: ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 7: -File: hb2_flask/hb2_flask.py - > User input at line 1491, trigger word "form[": - target = request.form['next'] -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1493: target = url_for(endpoint,values) -File: hb2_flask/hb2_flask.py - > reaches line 1494, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(target) - -Vulnerability 8: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1573: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 9: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1573: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 10: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1573: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 11: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1573: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 12: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1573: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 13: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1573: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 14: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1573: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 15: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1573: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 16: -File: hb2_flask/hb2_flask.py - > User input at line 1652, trigger word "get(": - thedata = json.loads(import_solr.results[0].get('dump')[0]) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1645: thedata = '' - File: hb2_flask/hb2_flask.py - > Line 1656: thedata = json.loads(form.file.data.stream.read()) -File: hb2_flask/hb2_flask.py - > reaches line 1665, trigger word "flash(": - flash('%s records imported!' % len(thedata), 'success') - -Vulnerability 17: -File: hb2_flask/hb2_flask.py - > User input at line 1656, trigger word ".data": - thedata = json.loads(form.file.data.stream.read()) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1645: thedata = '' - File: hb2_flask/hb2_flask.py - > Line 1652: thedata = json.loads(import_solr.results[0].get('dump')[0]) -File: hb2_flask/hb2_flask.py - > reaches line 1665, trigger word "flash(": - flash('%s records imported!' % len(thedata), 'success') - - - -Vertabelo/flask-oauth-demo-app -https://github.com/Vertabelo/flask-oauth-demo-app -Entry file: flask-oauth-demo-app/models.py -Scanned: 2016-10-19 10:39:39.131767 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -waharnum/inlibraries.com -https://github.com/waharnum/inlibraries.com -Entry file: None -Scanned: 2016-10-19 10:39:41.352526 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/waharnum/inlibraries.com. - -billyfung/flask_shortener -https://github.com/billyfung/flask_shortener -Entry file: flask_shortener/app.py -Scanned: 2016-10-19 10:39:42.619773 -Vulnerability 1: -File: flask_shortener/app.py - > User input at line 52, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(link_target) - - - -MLH/my-mlh-flask-example -https://github.com/MLH/my-mlh-flask-example -Entry file: my-mlh-flask-example/app.py -Scanned: 2016-10-19 10:39:46.405922 -No vulnerabilities found. - - -hammygoonan/Flaskify -https://github.com/hammygoonan/Flaskify -Entry file: Flaskify/project/__init__.py -Scanned: 2016-10-19 10:39:47.902973 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -anujspatel/flaskr -https://github.com/anujspatel/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:39:51.445933 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -williamcaban/flaskrcloud -https://github.com/williamcaban/flaskrcloud -Entry file: flaskrcloud/flaskr.py -Scanned: 2016-10-19 10:40:06.835205 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crazyqipython/flaskdemo -https://github.com/crazyqipython/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 10:40:07.338518 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pythondude325/flaskr -https://github.com/pythondude325/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:40:07.853475 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fenske/flasky -https://github.com/fenske/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:40:08.345906 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fakegit/flasky -https://github.com/fakegit/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:40:09.849293 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Anddor/flaskr -https://github.com/Anddor/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:40:17.326426 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jarogers095/flasktaskr -https://github.com/jarogers095/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:40:18.846992 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zzclynn/flaskr -https://github.com/zzclynn/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:40:19.337033 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -johnpwillman/flasktest -https://github.com/johnpwillman/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 10:40:21.863685 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottmarinoff/Flasky -https://github.com/scottmarinoff/Flasky -Entry file: Flasky/Projects/Flasky/app/__init__.py -Scanned: 2016-10-19 10:40:24.252049 -No vulnerabilities found. - - -JamesMilnerUK/Loxo -https://github.com/JamesMilnerUK/Loxo -Entry file: Loxo/loxoapi.py -Scanned: 2016-10-19 10:40:24.753383 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rkholoniuk/FlaskAPI -https://github.com/rkholoniuk/FlaskAPI -Entry file: None -Scanned: 2016-10-19 10:40:25.986699 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rkholoniuk/FlaskAPI. - -AllyW/flaskyDeb -https://github.com/AllyW/flaskyDeb -Entry file: flaskyDeb/app/__init__.py -Scanned: 2016-10-19 10:40:28.502113 -Vulnerability 1: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flaskyDeb/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flaskyDeb/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flaskyDeb/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flaskyDeb/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flaskyDeb/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -jmcerv/FlaskTutorial -https://github.com/jmcerv/FlaskTutorial -Entry file: None -Scanned: 2016-10-19 10:40:29.030763 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -LaRueGT/FlaskBlog -https://github.com/LaRueGT/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 10:40:29.672818 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhou18520786640/FlaskWeb -https://github.com/zhou18520786640/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-19 10:40:35.174430 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -ethanphunter/FlaskExperiment -https://github.com/ethanphunter/FlaskExperiment -Entry file: FlaskExperiment/main.py -Scanned: 2016-10-19 10:40:36.763424 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -asimonia/FlaskJeopardy -https://github.com/asimonia/FlaskJeopardy -Entry file: FlaskJeopardy/app/__init__.py -Scanned: 2016-10-19 10:40:43.784932 -No vulnerabilities found. - - -motleytech/flaskPlate -https://github.com/motleytech/flaskPlate -Entry file: flaskPlate/app/app.py -Scanned: 2016-10-19 10:40:45.541794 -No vulnerabilities found. - - -ciricihq/wkhtmltopdf-flask-aas -https://github.com/ciricihq/wkhtmltopdf-flask-aas -Entry file: wkhtmltopdf-flask-aas/app.py -Scanned: 2016-10-19 10:40:47.052879 -No vulnerabilities found. - - -cr8ivecodesmith/save22-flask-course-src -https://github.com/cr8ivecodesmith/save22-flask-course-src -Entry file: save22-flask-course-src/01-hello/app2_1.py -Scanned: 2016-10-19 10:40:48.505860 -No vulnerabilities found. - - -johnsliao/flask-sqlite3-chartjs-toy -https://github.com/johnsliao/flask-sqlite3-chartjs-toy -Entry file: flask-sqlite3-chartjs-toy/flaskr/flaskr.py -Scanned: 2016-10-19 10:40:49.766407 -No vulnerabilities found. - - -swkaen/Flask_LED -https://github.com/swkaen/Flask_LED -Entry file: Flask_LED/hello.py -Scanned: 2016-10-19 10:40:51.024931 -No vulnerabilities found. - - -johnsliao/flask-bp -https://github.com/johnsliao/flask-bp -Entry file: flask-bp/flaskApp.py -Scanned: 2016-10-19 10:40:52.391028 -No vulnerabilities found. - - -MaximeGir/flask_skeleton -https://github.com/MaximeGir/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-19 10:40:52.894501 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -devmtnaing/python_flask -https://github.com/devmtnaing/python_flask -Entry file: None -Scanned: 2016-10-19 10:40:53.388402 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/devmtnaing/python_flask. - -josepablob/flask-blog -https://github.com/josepablob/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:40:54.007647 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -faraday-effect/spectacle-flask -https://github.com/faraday-effect/spectacle-flask -Entry file: spectacle-flask/app/__init__.py -Scanned: 2016-10-19 10:40:55.402375 -No vulnerabilities found. - - -yetship/flask-usages -https://github.com/yetship/flask-usages -Entry file: flask-usages/application/__init__.py -Scanned: 2016-10-19 10:41:08.764989 -No vulnerabilities found. - - -raticate/flask-tutorial -https://github.com/raticate/flask-tutorial -Entry file: None -Scanned: 2016-10-19 10:41:09.271137 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cnds/flask_web -https://github.com/cnds/flask_web -Entry file: flask_web/helloflask.py -Scanned: 2016-10-19 10:41:09.851229 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py - -al4/flask-tokenauth -https://github.com/al4/flask-tokenauth -Entry file: flask-tokenauth/test_tokenauth.py -Scanned: 2016-10-19 10:41:11.091285 -No vulnerabilities found. - - -jgoret/flask-dataset -https://github.com/jgoret/flask-dataset -Entry file: flask-dataset/flask_dataset/__init__.py -Scanned: 2016-10-19 10:41:12.783118 -No vulnerabilities found. - - -fenfir/flask_test -https://github.com/fenfir/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 10:41:13.373220 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjamin/flask-guide -https://github.com/danjamin/flask-guide -Entry file: flask-guide/app/server.py -Scanned: 2016-10-19 10:41:14.587824 -No vulnerabilities found. - - -stevejgoodman/flask-app -https://github.com/stevejgoodman/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-19 10:41:19.099066 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -devizier/flask-blog -https://github.com/devizier/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:41:20.621926 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rafaelgotts/flask_rest -https://github.com/rafaelgotts/flask_rest -Entry file: flask_rest/flask_rest/app.py -Scanned: 2016-10-19 10:41:21.930594 -No vulnerabilities found. - - -Orlandohub/flask-tutorial -https://github.com/Orlandohub/flask-tutorial -Entry file: None -Scanned: 2016-10-19 10:41:23.426799 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -python-0/flask_blog -https://github.com/python-0/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:41:24.931128 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bdero/flask-sleep -https://github.com/bdero/flask-sleep -Entry file: flask-sleep/flasksleep.py -Scanned: 2016-10-19 10:41:27.156751 -No vulnerabilities found. - - -miracleluchen/blog-flask -https://github.com/miracleluchen/blog-flask -Entry file: blog-flask/project/views.py -Scanned: 2016-10-19 10:41:27.795088 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -IvanBodnar/flask_relevamientos -https://github.com/IvanBodnar/flask_relevamientos -Entry file: flask_relevamientos/app.py -Scanned: 2016-10-19 10:41:30.590913 -No vulnerabilities found. - - -ravivooda/flask-server -https://github.com/ravivooda/flask-server -Entry file: None -Scanned: 2016-10-19 10:41:32.668664 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ravivooda/flask-server. - -wipatrick/flask-restapi -https://github.com/wipatrick/flask-restapi -Entry file: flask-restapi/api.py -Scanned: 2016-10-19 10:41:33.996874 -No vulnerabilities found. - - -yogeshralhan/flask_1 -https://github.com/yogeshralhan/flask_1 -Entry file: flask_1/2.py -Scanned: 2016-10-19 10:41:37.822599 -No vulnerabilities found. - - -YeWang0/Flask_Blog -https://github.com/YeWang0/Flask_Blog -Entry file: Flask_Blog/Blog/blog.py -Scanned: 2016-10-19 10:41:38.784316 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -windery/flask-blog -https://github.com/windery/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:41:46.331529 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -chuan137/flask_bess -https://github.com/chuan137/flask_bess -Entry file: flask_bess/main.py -Scanned: 2016-10-19 10:41:50.370658 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kgandhi37/flask_blog -https://github.com/kgandhi37/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:41:50.936745 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -krol3/python-flask -https://github.com/krol3/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-19 10:41:51.439467 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ramhiser/flask-docker -https://github.com/ramhiser/flask-docker -Entry file: flask-docker/app.py -Scanned: 2016-10-19 10:41:53.657674 -No vulnerabilities found. - - -ialamin/flask_hello -https://github.com/ialamin/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-19 10:41:56.517937 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Vasiliy-tech/flask_httpserver -https://github.com/Vasiliy-tech/flask_httpserver -Entry file: flask_httpserver/simple_http.py -Scanned: 2016-10-19 10:41:58.253639 -No vulnerabilities found. - - -jyameo/Flask-Blog -https://github.com/jyameo/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-19 10:41:58.781267 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Yuhuishishishi/Flask_toy -https://github.com/Yuhuishishishi/Flask_toy -Entry file: Flask_toy/MenuApp.py -Scanned: 2016-10-19 10:42:10.057896 -No vulnerabilities found. - - -heyericnelson/flask_apps -https://github.com/heyericnelson/flask_apps -Entry file: flask_apps/flaskr/flaskr.py -Scanned: 2016-10-19 10:42:11.320679 -No vulnerabilities found. - - -datakiss/flask-miguel -https://github.com/datakiss/flask-miguel -Entry file: flask-miguel/app/__init__.py -Scanned: 2016-10-19 10:42:12.729933 -No vulnerabilities found. - - -timotk/flask-login -https://github.com/timotk/flask-login -Entry file: flask-login/app/__init__.py -Scanned: 2016-10-19 10:42:13.992862 -No vulnerabilities found. - - -johnsliao/flask-toy -https://github.com/johnsliao/flask-toy -Entry file: flask-toy/flaskr/flaskr.py -Scanned: 2016-10-19 10:42:15.343768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jan26th/flask_test -https://github.com/jan26th/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 10:42:15.923295 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dawran6/flask-blog -https://github.com/dawran6/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:42:16.446527 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -msapkota/Flask_Blog -https://github.com/msapkota/Flask_Blog -Entry file: Flask_Blog/Blog/blog.py -Scanned: 2016-10-19 10:42:21.414059 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wish007/MyFlask -https://github.com/wish007/MyFlask -Entry file: MyFlask/app/__init__.py -Scanned: 2016-10-19 10:42:22.784413 -No vulnerabilities found. - - -rogerpence/flask-skeleton -https://github.com/rogerpence/flask-skeleton -Entry file: None -Scanned: 2016-10-19 10:42:23.302209 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rogerpence/flask-skeleton. - -chungsquared/flask-introduction -https://github.com/chungsquared/flask-introduction -Entry file: flask-introduction/app.py -Scanned: 2016-10-19 10:42:26.064855 -No vulnerabilities found. - - -zachbpd/microblog -https://github.com/zachbpd/microblog -Entry file: None -Scanned: 2016-10-19 10:42:26.607263 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -josepablob/flask-hello-world -https://github.com/josepablob/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:42:28.166991 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ipsha21/My-flask-application -https://github.com/ipsha21/My-flask-application -Entry file: My-flask-application/app.py -Scanned: 2016-10-19 10:42:29.465198 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tribe216/microblog -https://github.com/Tribe216/microblog -Entry file: None -Scanned: 2016-10-19 10:42:30.967672 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DonBeck69/FlaskWebProject2 -https://github.com/DonBeck69/FlaskWebProject2 -Entry file: FlaskWebProject2/FlaskWebProject2/FlaskWebProject2/__init__.py -Scanned: 2016-10-19 10:42:34.907916 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laaroussiBadr/FlaskWebProject -https://github.com/laaroussiBadr/FlaskWebProject -Entry file: FlaskWebProject/FlaskWebProject2/FlaskWebProject2/__init__.py -Scanned: 2016-10-19 10:42:36.648229 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Mad1331/FlaskMessageBoard -https://github.com/Mad1331/FlaskMessageBoard -Entry file: FlaskMessageBoard/server.py -Scanned: 2016-10-19 10:42:39.553055 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sasha-ruby/flask2spark -https://github.com/sasha-ruby/flask2spark -Entry file: flask2spark/flask2spark.py -Scanned: 2016-10-19 10:42:40.874929 -No vulnerabilities found. - - -rakeshhegishte/Flask -https://github.com/rakeshhegishte/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:42:48.832142 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -damionlowers/flask -https://github.com/damionlowers/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:42:53.353794 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -smltc/Flask -https://github.com/smltc/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:42:53.864755 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -embasa/FLASK -https://github.com/embasa/FLASK -Entry file: FLASK/app.py -Scanned: 2016-10-19 10:42:55.165100 -No vulnerabilities found. - - -RayneHwang/Flask -https://github.com/RayneHwang/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:42:55.670378 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -RoseOu/flasky -https://github.com/RoseOu/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:42:56.195941 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -materialsvirtuallab/flamyngo -https://github.com/materialsvirtuallab/flamyngo -Entry file: flamyngo/flamyngo/app.py -Scanned: 2016-10-19 10:43:00.082792 -No vulnerabilities found. - - -jonafato/Flask-Copilot -https://github.com/jonafato/Flask-Copilot -Entry file: Flask-Copilot/example/app.py -Scanned: 2016-10-19 10:43:01.480413 -No vulnerabilities found. - - -Upflask/Upflask -https://github.com/Upflask/Upflask -Entry file: Upflask/server.py -Scanned: 2016-10-19 10:43:03.079327 -No vulnerabilities found. - - -PrettyPrinted/flask-wtforms -https://github.com/PrettyPrinted/flask-wtforms -Entry file: flask-wtforms/main.py -Scanned: 2016-10-19 10:43:11.391578 -No vulnerabilities found. - - -billyfung/flask_shortener -https://github.com/billyfung/flask_shortener -Entry file: flask_shortener/app.py -Scanned: 2016-10-19 10:43:12.654874 -Vulnerability 1: -File: flask_shortener/app.py - > User input at line 52, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(link_target) - - - -MLH/my-mlh-flask-example -https://github.com/MLH/my-mlh-flask-example -Entry file: my-mlh-flask-example/app.py -Scanned: 2016-10-19 10:43:13.967203 -No vulnerabilities found. - - -boydjohnson/flasktwilio -https://github.com/boydjohnson/flasktwilio -Entry file: flasktwilio/app.py -Scanned: 2016-10-19 10:43:15.252429 -No vulnerabilities found. - - -yizhianiu/flasky -https://github.com/yizhianiu/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:43:15.774195 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ifcheung2012/flaskanalysis -https://github.com/ifcheung2012/flaskanalysis -Entry file: flaskanalysis/manage.py -Scanned: 2016-10-19 10:43:18.177635 -No vulnerabilities found. - - -wdxfairy/flaskblog -https://github.com/wdxfairy/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 10:43:18.710261 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -Narcissist1/flasktest -https://github.com/Narcissist1/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 10:43:22.223239 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -msapkota/flasktaskr -https://github.com/msapkota/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:43:23.765609 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -super452/flasky -https://github.com/super452/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:43:25.252056 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wish007/flasktest -https://github.com/wish007/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 10:43:26.753100 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wildjan/Flaskr -https://github.com/wildjan/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 10:43:28.268113 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pnilan/flaskr -https://github.com/pnilan/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:43:29.822047 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottmarinoff/Flasky -https://github.com/scottmarinoff/Flasky -Entry file: Flasky/Projects/Flasky/app/__init__.py -Scanned: 2016-10-19 10:43:32.257405 -No vulnerabilities found. - - -cutedogspark/Flask-SocketIO -https://github.com/cutedogspark/Flask-SocketIO -Entry file: None -Scanned: 2016-10-19 10:43:35.772995 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rkholoniuk/FlaskAPI -https://github.com/rkholoniuk/FlaskAPI -Entry file: None -Scanned: 2016-10-19 10:43:36.274671 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rkholoniuk/FlaskAPI. - -VitPN/FlaskRPi -https://github.com/VitPN/FlaskRPi -Entry file: FlaskRPi/go.py -Scanned: 2016-10-19 10:43:37.550128 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EvenYan/FlaskTest -https://github.com/EvenYan/FlaskTest -Entry file: None -Scanned: 2016-10-19 10:43:39.046622 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/EvenYan/FlaskTest. - -jll90/flaskAng -https://github.com/jll90/flaskAng -Entry file: flaskAng/app.py -Scanned: 2016-10-19 10:43:44.332680 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskAng/lib/python2.7/genericpath.py - -edgewood/webfaction-flask0.10-boilerplate -https://github.com/edgewood/webfaction-flask0.10-boilerplate -Entry file: None -Scanned: 2016-10-19 10:43:51.637063 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/edgewood/webfaction-flask0.10-boilerplate. - -garderobin/HelloFlask -https://github.com/garderobin/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-19 10:43:52.136840 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shidante/notes-flask -https://github.com/shidante/notes-flask -Entry file: notes-flask/hello.py -Scanned: 2016-10-19 10:43:56.522270 -No vulnerabilities found. - - -maixianyu/flask_tennis -https://github.com/maixianyu/flask_tennis -Entry file: flask_tennis/app/__init__.py -Scanned: 2016-10-19 10:44:02.809034 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -saalmerol/cds-flask -https://github.com/saalmerol/cds-flask -Entry file: None -Scanned: 2016-10-19 10:44:07.408192 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -trileg/HelloFlask -https://github.com/trileg/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-19 10:44:07.899731 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -M1lan/flask_helloworld -https://github.com/M1lan/flask_helloworld -Entry file: flask_helloworld/flask_helloworld.py -Scanned: 2016-10-19 10:44:09.148769 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -codybousc/flask_practice- -https://github.com/codybousc/flask_practice- -Entry file: flask_practice-/app.py -Scanned: 2016-10-19 10:44:12.624597 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_practice-/venv/lib/python2.7/genericpath.py - -s-kovacevic/elearning-flask -https://github.com/s-kovacevic/elearning-flask -Entry file: elearning-flask/main.py -Scanned: 2016-10-19 10:44:14.058328 -Vulnerability 1: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 71, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'user.to_jsonapi()) - -Vulnerability 2: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[user.to_jsonapi() for user in user.get_many()]) - -Vulnerability 3: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 99, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'question.to_jsonapi()) - -Vulnerability 4: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 102, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[question.to_jsonapi() for question in question.get_many()]) - -Vulnerability 5: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 131, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'category.to_jsonapi()) - -Vulnerability 6: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 134, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[category.to_jsonapi() for category in category.get_many()]) - -Vulnerability 7: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 163, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'answer.to_jsonapi()) - -Vulnerability 8: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 166, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[answer.to_jsonapi() for answer in answer.get_many()]) - -Vulnerability 9: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 195, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'score.to_jsonapi()) - -Vulnerability 10: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 198, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[score.to_jsonapi() for score in score.get_many()]) - - - -xpleaf/flask_catalog -https://github.com/xpleaf/flask_catalog -Entry file: flask_catalog/my_app/__init__.py -Scanned: 2016-10-19 10:44:15.875578 -Vulnerability 1: -File: flask_catalog/my_app/catalog/views.py - > User input at line 41, trigger word "get(": - products = [redis.get(k) for k in keys_alive] -File: flask_catalog/my_app/catalog/views.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('products'products) - -Vulnerability 2: -File: flask_catalog/my_app/catalog/views.py - > User input at line 66, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 80: ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 79, trigger word "flash(": - flash('The product %s has been created' % name, 'success') - -Vulnerability 3: -File: flask_catalog/my_app/catalog/views.py - > User input at line 93, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 94: category = Category(name) - File: flask_catalog/my_app/catalog/views.py - > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.create_category',id=category.id)) - File: flask_catalog/my_app/catalog/views.py - > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 97, trigger word "flash(": - flash('The category %s has been created' % name, 'success') - -Vulnerability 4: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 144: products = products.filter(Product.price == price) - File: flask_catalog/my_app/catalog/views.py - > Line 146: products = products.filter(Product.company.like('%' + company + '%')) - File: flask_catalog/my_app/catalog/views.py - > Line 148: products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 142, trigger word "filter(": - products = products.filter(Product.name.like('%' + name + '%')) - -Vulnerability 5: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 146: products = products.filter(Product.company.like('%' + company + '%')) - File: flask_catalog/my_app/catalog/views.py - > Line 148: products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query - File: flask_catalog/my_app/catalog/views.py - > Line 142: products = products.filter(Product.name.like('%' + name + '%')) -File: flask_catalog/my_app/catalog/views.py - > reaches line 144, trigger word "filter(": - products = products.filter(Product.price == price) - -Vulnerability 6: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 148: products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query - File: flask_catalog/my_app/catalog/views.py - > Line 142: products = products.filter(Product.name.like('%' + name + '%')) - File: flask_catalog/my_app/catalog/views.py - > Line 144: products = products.filter(Product.price == price) -File: flask_catalog/my_app/catalog/views.py - > reaches line 146, trigger word "filter(": - products = products.filter(Product.company.like('%' + company + '%')) - -Vulnerability 7: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query - File: flask_catalog/my_app/catalog/views.py - > Line 142: products = products.filter(Product.name.like('%' + name + '%')) - File: flask_catalog/my_app/catalog/views.py - > Line 144: products = products.filter(Product.price == price) - File: flask_catalog/my_app/catalog/views.py - > Line 146: products = products.filter(Product.company.like('%' + company + '%')) -File: flask_catalog/my_app/catalog/views.py - > reaches line 148, trigger word "filter(": - products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - - - -yizhianiu/flask-blog -https://github.com/yizhianiu/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:44:16.422220 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -zhuwei05/flask-blog -https://github.com/zhuwei05/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:44:16.967826 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -fenfir/flask_test -https://github.com/fenfir/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 10:44:17.521414 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tim1978/flask-blog -https://github.com/tim1978/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:44:18.060214 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -junhl/Flask_Test -https://github.com/junhl/Flask_Test -Entry file: None -Scanned: 2016-10-19 10:44:20.499763 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -anupam0601/flask_off -https://github.com/anupam0601/flask_off -Entry file: flask_off/app.py -Scanned: 2016-10-19 10:44:28.650456 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cdhop/flask_exercises -https://github.com/cdhop/flask_exercises -Entry file: flask_exercises/hello.py -Scanned: 2016-10-19 10:44:29.250938 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_exercises/venv/lib/python2.7/genericpath.py - -AmeetSM/AngularFlask -https://github.com/AmeetSM/AngularFlask -Entry file: AngularFlask/app.py -Scanned: 2016-10-19 10:44:32.264792 -No vulnerabilities found. - - -a358003542/flask-examples -https://github.com/a358003542/flask-examples -Entry file: flask-examples/minitwit/minitwit.py -Scanned: 2016-10-19 10:44:32.862936 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -slacksec/flask_blog -https://github.com/slacksec/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:44:33.364501 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seabrookmx/flask-demo -https://github.com/seabrookmx/flask-demo -Entry file: None -Scanned: 2016-10-19 10:44:33.881063 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/seabrookmx/flask-demo. - -Desmonddai583/flask-blog -https://github.com/Desmonddai583/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:44:34.393474 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -GreenDragonSoft/refundmytrain-flask -https://github.com/GreenDragonSoft/refundmytrain-flask -Entry file: refundmytrain-flask/app.py -Scanned: 2016-10-19 10:44:35.757747 -No vulnerabilities found. - - -zhiweicai/flask-hello -https://github.com/zhiweicai/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-19 10:44:38.277826 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Yuhuishishishi/Flask_toy -https://github.com/Yuhuishishishi/Flask_toy -Entry file: Flask_toy/MenuApp.py -Scanned: 2016-10-19 10:44:39.505755 -No vulnerabilities found. - - -heyericnelson/flask_apps -https://github.com/heyericnelson/flask_apps -Entry file: flask_apps/flaskr/flaskr.py -Scanned: 2016-10-19 10:44:41.760983 -No vulnerabilities found. - - -abunuwas/flask_experiments -https://github.com/abunuwas/flask_experiments -Entry file: flask_experiments/main.py -Scanned: 2016-10-19 10:44:42.302954 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ykchat/gundam-flask -https://github.com/ykchat/gundam-flask -Entry file: gundam-flask/server.py -Scanned: 2016-10-19 10:44:47.548723 -No vulnerabilities found. - - -datakiss/flask-miguel -https://github.com/datakiss/flask-miguel -Entry file: flask-miguel/app/__init__.py -Scanned: 2016-10-19 10:44:51.894194 -No vulnerabilities found. - - -eltonto187/learn_flask -https://github.com/eltonto187/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-19 10:44:52.406221 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NickyThreeNames/flask_blog -https://github.com/NickyThreeNames/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:44:53.935621 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -netkicorp/flask-jwe -https://github.com/netkicorp/flask-jwe -Entry file: flask-jwe/server.py -Scanned: 2016-10-19 10:44:58.292464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chungsquared/flask-introduction -https://github.com/chungsquared/flask-introduction -Entry file: flask-introduction/app.py -Scanned: 2016-10-19 10:45:00.090989 -No vulnerabilities found. - - -dengshilong/flask_example -https://github.com/dengshilong/flask_example -Entry file: None -Scanned: 2016-10-19 10:45:04.607663 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nathanielcompton/flask-tutorial -https://github.com/nathanielcompton/flask-tutorial -Entry file: None -Scanned: 2016-10-19 10:45:09.118802 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -JesseLabruyere/flask_api -https://github.com/JesseLabruyere/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-19 10:45:09.650512 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leon740gk/flask_quick_start -https://github.com/leon740gk/flask_quick_start -Entry file: flask_quick_start/hello.py -Scanned: 2016-10-19 10:45:11.906867 -No vulnerabilities found. - - -dommert/test.dommert.xyz -https://github.com/dommert/test.dommert.xyz -Entry file: None -Scanned: 2016-10-19 10:45:15.272697 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dommert/test.dommert.xyz. - -DonBeck69/FlaskWebProject2 -https://github.com/DonBeck69/FlaskWebProject2 -Entry file: FlaskWebProject2/FlaskWebProject2/FlaskWebProject2/__init__.py -Scanned: 2016-10-19 10:45:15.758480 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -poppuyo/FlaskUrlShortener -https://github.com/poppuyo/FlaskUrlShortener -Entry file: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py -Scanned: 2016-10-19 10:45:19.445554 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -j1wu/wechat-enterprise-bot -https://github.com/j1wu/wechat-enterprise-bot -Entry file: None -Scanned: 2016-10-19 10:45:21.186362 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/j1wu/wechat-enterprise-bot. - -chamambom/flask_sqlalchemy_crud -https://github.com/chamambom/flask_sqlalchemy_crud -Entry file: flask_sqlalchemy_crud/sqlcrud.py -Scanned: 2016-10-19 10:45:22.546400 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pyd-testing/flask-docker-workflow -https://github.com/pyd-testing/flask-docker-workflow -Entry file: flask-docker-workflow/app/app.py -Scanned: 2016-10-19 10:45:23.883893 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EsmondMoe/flask-globalcache-http-api -https://github.com/EsmondMoe/flask-globalcache-http-api -Entry file: flask-globalcache-http-api/app.py -Scanned: 2016-10-19 10:45:25.254432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gr8shivam/Flask---Handling-File-Uploads -https://github.com/gr8shivam/Flask---Handling-File-Uploads -Entry file: Flask---Handling-File-Uploads/app/__init__.py -Scanned: 2016-10-19 10:45:32.285907 -No vulnerabilities found. - - -pbsugg/flask_testbed_server -https://github.com/pbsugg/flask_testbed_server -Entry file: flask_testbed_server/main.py -Scanned: 2016-10-19 10:45:34.022680 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -HYL13/flask_project_0 -https://github.com/HYL13/flask_project_0 -Entry file: flask_project_0/app/__init__.py -Scanned: 2016-10-19 10:45:35.528742 -Vulnerability 1: -File: flask_project_0/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flask_project_0/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flask_project_0/app/api_1_0/users.py - > Line 20: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 23: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: flask_project_0/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flask_project_0/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flask_project_0/app/api_1_0/users.py - > Line 42: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 45: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: flask_project_0/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask_project_0/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flask_project_0/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flask_project_0/app/api_1_0/posts.py - > Line 16: prev = None - File: flask_project_0/app/api_1_0/posts.py - > Line 19: next = None -File: flask_project_0/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flask_project_0/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flask_project_0/app/api_1_0/comments.py - > Line 15: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 18: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flask_project_0/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flask_project_0/app/api_1_0/comments.py - > Line 43: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 46: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -anthonybrown/Flask-web-API-demo -https://github.com/anthonybrown/Flask-web-API-demo -Entry file: Flask-web-API-demo/app.py -Scanned: 2016-10-19 10:45:39.136076 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-web-API-demo/venv/lib/python2.7/genericpath.py - -myCSprojects/PythonFlask-IBMBluemix -https://github.com/myCSprojects/PythonFlask-IBMBluemix -Entry file: PythonFlask-IBMBluemix/welcome.py -Scanned: 2016-10-19 10:45:39.645530 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Kriordan/flask-hello-world -https://github.com/Kriordan/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:45:40.180090 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -mdublin/Flask-SPA-API-Template -https://github.com/mdublin/Flask-SPA-API-Template -Entry file: None -Scanned: 2016-10-19 10:45:45.497947 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dwisulfahnur/My-flask-app -https://github.com/dwisulfahnur/My-flask-app -Entry file: None -Scanned: 2016-10-19 10:45:46.769146 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dwisulfahnur/My-flask-app. - -andreffs18/flask-template-project -https://github.com/andreffs18/flask-template-project -Entry file: flask-template-project/project/__init__.py -Scanned: 2016-10-19 10:45:48.231105 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -valexandersaulys/flask_microblog_tutorial -https://github.com/valexandersaulys/flask_microblog_tutorial -Entry file: flask_microblog_tutorial/app/__init__.py -Scanned: 2016-10-19 10:45:49.575100 -No vulnerabilities found. - - -wenzhihong2003/awesome-flask-todo -https://github.com/wenzhihong2003/awesome-flask-todo -Entry file: None -Scanned: 2016-10-19 10:45:50.082605 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wenzhihong2003/awesome-flask-todo. - -kfiras/cloudfoundry-flask-webservice -https://github.com/kfiras/cloudfoundry-flask-webservice -Entry file: cloudfoundry-flask-webservice/app.py -Scanned: 2016-10-19 10:45:51.441727 -Vulnerability 1: -File: cloudfoundry-flask-webservice/app.py - > User input at line 80, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: cloudfoundry-flask-webservice/app.py - > reaches line 87, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201) - - - -ssam123/flask-blog-tutorial -https://github.com/ssam123/flask-blog-tutorial -Entry file: flask-blog-tutorial/__init__.py -Scanned: 2016-10-19 10:45:53.927947 -Vulnerability 1: -File: flask-blog-tutorial/author/views.py - > User input at line 31, trigger word "get(": - next = session.get('next') -Reassigned in: - File: flask-blog-tutorial/author/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: flask-blog-tutorial/author/views.py - > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error) -File: flask-blog-tutorial/author/views.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - - - -MrLeeh/flask-mega-tutorial -https://github.com/MrLeeh/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 10:45:54.450635 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MatthewHodgson/flask-by-example -https://github.com/MatthewHodgson/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 10:45:55.175137 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yun70/flask-rest-api -https://github.com/yun70/flask-rest-api -Entry file: flask-rest-api/app/__init__.py -Scanned: 2016-10-19 10:46:00.910502 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kevinlondon/flask-hello-world -https://github.com/kevinlondon/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:46:01.468681 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -viney-shih/Flask_App_Template -https://github.com/viney-shih/Flask_App_Template -Entry file: Flask_App_Template/app/__init__.py -Scanned: 2016-10-19 10:46:06.748407 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davehalladay/openr-flask-api -https://github.com/davehalladay/openr-flask-api -Entry file: openr-flask-api/main.py -Scanned: 2016-10-19 10:46:11.103379 -No vulnerabilities found. - - -momotaro98/flask-for-test -https://github.com/momotaro98/flask-for-test -Entry file: flask-for-test/app.py -Scanned: 2016-10-19 10:46:12.376368 -No vulnerabilities found. - - -andela-mochieng/flask-practice-tutorial -https://github.com/andela-mochieng/flask-practice-tutorial -Entry file: flask-practice-tutorial/app/__init__.py -Scanned: 2016-10-19 10:46:13.768959 -No vulnerabilities found. - - -GreenDragonSoft/flask-heroku-template -https://github.com/GreenDragonSoft/flask-heroku-template -Entry file: flask-heroku-template/app.py -Scanned: 2016-10-19 10:46:17.180788 -No vulnerabilities found. - - -mahfuzsust/flask-heroku-intro -https://github.com/mahfuzsust/flask-heroku-intro -Entry file: flask-heroku-intro/app.py -Scanned: 2016-10-19 10:46:18.553782 -No vulnerabilities found. - - -MoodyLyrics/flask -https://github.com/MoodyLyrics/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:46:22.127244 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -sunshine-sjd/Flask -https://github.com/sunshine-sjd/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:46:22.611221 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unikatsieben/flask -https://github.com/unikatsieben/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:46:23.622516 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -Mei-Lin-Chen/Flask -https://github.com/Mei-Lin-Chen/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:46:24.126340 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dannyec/flask -https://github.com/dannyec/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:46:26.246501 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -kakshi3242/Flask -https://github.com/kakshi3242/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:46:32.763036 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Abirdcfly/flask-blog -https://github.com/Abirdcfly/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:46:34.816187 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rainyear/MathModeBot -https://github.com/rainyear/MathModeBot -Entry file: MathModeBot/main.py -Scanned: 2016-10-19 10:46:37.202281 -No vulnerabilities found. - - -jrhuerta/flask-api -https://github.com/jrhuerta/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-19 10:46:37.724066 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -huachen0216/flaskdemo -https://github.com/huachen0216/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 10:46:41.238958 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -MrLokans/flaskr -https://github.com/MrLokans/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:46:41.752908 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -citizen-stig/flaskone -https://github.com/citizen-stig/flaskone -Entry file: flaskone/flask_one.py -Scanned: 2016-10-19 10:46:43.057757 -No vulnerabilities found. - - -ifcheung2012/flaskanalysis -https://github.com/ifcheung2012/flaskanalysis -Entry file: flaskanalysis/manage.py -Scanned: 2016-10-19 10:46:48.462580 -No vulnerabilities found. - - -Robotwing/flaskweb -https://github.com/Robotwing/flaskweb -Entry file: None -Scanned: 2016-10-19 10:46:50.299813 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -super452/flasky -https://github.com/super452/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:46:50.798343 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -srbhtest/flaskwebsite -https://github.com/srbhtest/flaskwebsite -Entry file: flaskwebsite/__init__.py -Scanned: 2016-10-19 10:46:52.081971 -No vulnerabilities found. - - -josepablob/flasktaskr -https://github.com/josepablob/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:46:52.619884 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wangduanyang/flasky -https://github.com/wangduanyang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:46:55.625723 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neo1218/m2m -https://github.com/neo1218/m2m -Entry file: m2m/m2m/app/__init__.py -Scanned: 2016-10-19 10:46:56.969453 -No vulnerabilities found. - - -fhamami/flaskone -https://github.com/fhamami/flaskone -Entry file: flaskone/app/__init__.py -Scanned: 2016-10-19 10:47:01.467651 -No vulnerabilities found. - - -windery/flasky -https://github.com/windery/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:47:02.968821 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kcunning/flask-class-c9 -https://github.com/kcunning/flask-class-c9 -Entry file: flask-class-c9/flaskclass/app/__init__.py -Scanned: 2016-10-19 10:47:08.331606 -No vulnerabilities found. - - -tangza/FlaskAPP -https://github.com/tangza/FlaskAPP -Entry file: FlaskAPP/myblog/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 10:47:15.006697 -No vulnerabilities found. - - -MarHelen/FlaskLogin -https://github.com/MarHelen/FlaskLogin -Entry file: FlaskLogin/sql_declarative.py -Scanned: 2016-10-19 10:47:19.033644 -No vulnerabilities found. - - -louiskun/flaskGIT -https://github.com/louiskun/flaskGIT -Entry file: flaskGIT/sessionmail.py -Scanned: 2016-10-19 10:47:23.343212 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskGIT/venv/lib/python2.7/genericpath.py - -narakai/FlaskDemo -https://github.com/narakai/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 10:47:23.845900 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sethblack/python-flask-pixel-tracking -https://github.com/sethblack/python-flask-pixel-tracking -Entry file: python-flask-pixel-tracking/pfpt/main.py -Scanned: 2016-10-19 10:47:25.230635 -No vulnerabilities found. - - -kloudsec/py-webkit2png-flask-api -https://github.com/kloudsec/py-webkit2png-flask-api -Entry file: py-webkit2png-flask-api/api/app.py -Scanned: 2016-10-19 10:47:26.617124 -Vulnerability 1: -File: py-webkit2png-flask-api/api/web.py - > User input at line 25, trigger word "get(": - url = request.args.get('url', None) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 2: -File: py-webkit2png-flask-api/api/web.py - > User input at line 26, trigger word "get(": - width = int(request.args.get('width', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 3: -File: py-webkit2png-flask-api/api/web.py - > User input at line 27, trigger word "get(": - height = int(request.args.get('height', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 4: -File: py-webkit2png-flask-api/api/web.py - > User input at line 28, trigger word "get(": - scale = float(request.args.get('scale', 0.5)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 5: -File: py-webkit2png-flask-api/api/web.py - > User input at line 25, trigger word "get(": - url = request.args.get('url', None) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 6: -File: py-webkit2png-flask-api/api/web.py - > User input at line 26, trigger word "get(": - width = int(request.args.get('width', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 7: -File: py-webkit2png-flask-api/api/web.py - > User input at line 27, trigger word "get(": - height = int(request.args.get('height', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 8: -File: py-webkit2png-flask-api/api/web.py - > User input at line 28, trigger word "get(": - scale = float(request.args.get('scale', 0.5)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - - - -Karambir-K/Flask-Intro -https://github.com/Karambir-K/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-19 10:47:28.052959 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -s-kovacevic/elearning-flask -https://github.com/s-kovacevic/elearning-flask -Entry file: elearning-flask/main.py -Scanned: 2016-10-19 10:47:29.465814 -Vulnerability 1: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 71, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'user.to_jsonapi()) - -Vulnerability 2: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[user.to_jsonapi() for user in user.get_many()]) - -Vulnerability 3: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 99, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'question.to_jsonapi()) - -Vulnerability 4: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 102, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[question.to_jsonapi() for question in question.get_many()]) - -Vulnerability 5: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 131, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'category.to_jsonapi()) - -Vulnerability 6: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 134, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[category.to_jsonapi() for category in category.get_many()]) - -Vulnerability 7: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 163, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'answer.to_jsonapi()) - -Vulnerability 8: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 166, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[answer.to_jsonapi() for answer in answer.get_many()]) - -Vulnerability 9: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 195, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'score.to_jsonapi()) - -Vulnerability 10: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 198, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[score.to_jsonapi() for score in score.get_many()]) - - - -logicalicy/flask_boostrap -https://github.com/logicalicy/flask_boostrap -Entry file: flask_boostrap/app/__init__.py -Scanned: 2016-10-19 10:47:31.448129 -No vulnerabilities found. - - -jeffreybergman/flask-blog -https://github.com/jeffreybergman/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:47:31.999940 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -MrLokans/discover_flask -https://github.com/MrLokans/discover_flask -Entry file: discover_flask/app.py -Scanned: 2016-10-19 10:47:33.758123 -No vulnerabilities found. - - -xiazhe/flask-demo -https://github.com/xiazhe/flask-demo -Entry file: None -Scanned: 2016-10-19 10:47:34.273883 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiazhe/flask-demo. - -nikoheikkila/flask-blog -https://github.com/nikoheikkila/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:47:35.791398 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Vatsalgame/flask-try -https://github.com/Vatsalgame/flask-try -Entry file: None -Scanned: 2016-10-19 10:47:36.307502 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Vatsalgame/flask-try. - -bbozhev/flask-test -https://github.com/bbozhev/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 10:47:37.867205 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -tim1978/flask-blog -https://github.com/tim1978/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:47:42.888588 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -danielcodes/flask-practice -https://github.com/danielcodes/flask-practice -Entry file: None -Scanned: 2016-10-19 10:47:43.402249 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danielcodes/flask-practice. - -zhiweicai/flask-hello -https://github.com/zhiweicai/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-19 10:47:43.905766 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GreenDragonSoft/refundmytrain-flask -https://github.com/GreenDragonSoft/refundmytrain-flask -Entry file: refundmytrain-flask/app.py -Scanned: 2016-10-19 10:47:50.274713 -No vulnerabilities found. - - -keithleit/flask-demo -https://github.com/keithleit/flask-demo -Entry file: None -Scanned: 2016-10-19 10:47:50.771899 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/keithleit/flask-demo. - -wstcpyt/flask-demo -https://github.com/wstcpyt/flask-demo -Entry file: None -Scanned: 2016-10-19 10:47:52.265654 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wstcpyt/flask-demo. - -geraldmc/flask-template -https://github.com/geraldmc/flask-template -Entry file: None -Scanned: 2016-10-19 10:47:52.784662 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/geraldmc/flask-template. - -jordo1ken/flask-fibonacci -https://github.com/jordo1ken/flask-fibonacci -Entry file: flask-fibonacci/Fibonacci.py -Scanned: 2016-10-19 10:47:55.163806 -No vulnerabilities found. - - -bodzio2k/flask-blueprint -https://github.com/bodzio2k/flask-blueprint -Entry file: flask-blueprint/run.py -Scanned: 2016-10-19 10:47:56.423525 -No vulnerabilities found. - - -PeachDew/flask_tutorialwebapp -https://github.com/PeachDew/flask_tutorialwebapp -Entry file: flask_tutorialwebapp/app.py -Scanned: 2016-10-19 10:48:03.039719 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -ktomlee/flask_init -https://github.com/ktomlee/flask_init -Entry file: flask_init/hello.py -Scanned: 2016-10-19 10:48:04.296506 -No vulnerabilities found. - - -abunuwas/flask_experiments -https://github.com/abunuwas/flask_experiments -Entry file: flask_experiments/main.py -Scanned: 2016-10-19 10:48:05.301187 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Joryang/flask_videos -https://github.com/Joryang/flask_videos -Entry file: flask_videos/videos.py -Scanned: 2016-10-19 10:48:09.917912 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AvijitGhosh82/appengine_flask -https://github.com/AvijitGhosh82/appengine_flask -Entry file: appengine_flask/main.py -Scanned: 2016-10-19 10:48:15.370308 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sadev1/flask-demo -https://github.com/sadev1/flask-demo -Entry file: None -Scanned: 2016-10-19 10:48:16.865852 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sadev1/flask-demo. - -markleung1969/flask-base -https://github.com/markleung1969/flask-base -Entry file: None -Scanned: 2016-10-19 10:48:21.381200 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/markleung1969/flask-base. - -NickyThreeNames/flask_blog -https://github.com/NickyThreeNames/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:48:24.868286 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zmrfzn/Flask_Sample -https://github.com/zmrfzn/Flask_Sample -Entry file: Flask_Sample/app.py -Scanned: 2016-10-19 10:48:28.560244 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JesseLabruyere/flask_api -https://github.com/JesseLabruyere/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-19 10:48:29.086277 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -butovichev/flask-blog -https://github.com/butovichev/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:48:29.603152 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -pyx/flask-simplemde -https://github.com/pyx/flask-simplemde -Entry file: flask-simplemde/examples/simple/app.py -Scanned: 2016-10-19 10:48:32.126335 -No vulnerabilities found. - - -rholmes69/flasky2_1 -https://github.com/rholmes69/flasky2_1 -Entry file: flasky2_1/app/__init__.py -Scanned: 2016-10-19 10:48:34.650027 -Vulnerability 1: -File: flasky2_1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 22: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky2_1/app/api_1_0/users.py - > Line 25: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky2_1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 23: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 2: -File: flasky2_1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 44: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky2_1/app/api_1_0/users.py - > Line 47: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky2_1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 45: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 3: -File: flasky2_1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky2_1/app/api_1_0/posts.py - > Line 18: prev = url_for('api.get_posts',page=page - 1, _external=True) - File: flasky2_1/app/api_1_0/posts.py - > Line 21: next = url_for('api.get_posts',page=page + 1, _external=True) - File: flasky2_1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky2_1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky2_1/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 17: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky2_1/app/api_1_0/comments.py - > Line 20: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky2_1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 5: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 45: prev = url_for('api.get_comments',page=page - 1, _external=True) - File: flasky2_1/app/api_1_0/comments.py - > Line 48: next = url_for('api.get_comments',page=page + 1, _external=True) - File: flasky2_1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -ChellsChen/FlaskSocketIOChart -https://github.com/ChellsChen/FlaskSocketIOChart -Entry file: FlaskSocketIOChart/app/__init__.py -Scanned: 2016-10-19 10:48:36.118148 -No vulnerabilities found. - - -jcerise/openspacesboard-python -https://github.com/jcerise/openspacesboard-python -Entry file: openspacesboard-python/osbp_app/__init__.py -Scanned: 2016-10-19 10:48:38.526278 -Vulnerability 1: -File: openspacesboard-python/osbp_app/mod_spaces/controllers.py - > User input at line 29, trigger word "get(": - space = ConferenceSpace.query.get(space_id) -Reassigned in: - File: openspacesboard-python/osbp_app/mod_spaces/controllers.py - > Line 32: space = dict(id=space.id, space_name=space.space_name, location_id=space.location_id, event_date=space.event_date, start_time=space.start_time, end_time=space.end_time) -File: openspacesboard-python/osbp_app/mod_spaces/controllers.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('space'space) - -Vulnerability 2: -File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > User input at line 39, trigger word "get(": - session = ConferenceSession.query.get(session_id) -Reassigned in: - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 42: session_space = session.space - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 43: session_location = session_space.location - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 44: timespan = 'start_time''end_time'session_space.start_timesession_space.end_time - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 45: session = dict(id=session.id, title=session.title, description=session.description, convener=session.convener, space_name=session_space.space_name, location=session_location.name, date=session_space.event_date, timespan=timespan) -File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('session'session) - -Vulnerability 3: -File: openspacesboard-python/osbp_app/mod_locations/controllers.py - > User input at line 27, trigger word "get(": - location = ConferenceLocation.query.get(location_id) -Reassigned in: - File: openspacesboard-python/osbp_app/mod_locations/controllers.py - > Line 30: location = dict(id=location.id, name=location.name) -File: openspacesboard-python/osbp_app/mod_locations/controllers.py - > reaches line 31, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('location'location) - - - -icecraft/ZhiHuDaemon -https://github.com/icecraft/ZhiHuDaemon -Entry file: ZhiHuDaemon/app/__init__.py -Scanned: 2016-10-19 10:48:40.085832 -Vulnerability 1: -File: ZhiHuDaemon/app/main/views.py - > User input at line 29, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 33: questions = pagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('search.html',questions=questions, pagination=pagination, keyword=keyword[1-1]) - File: ZhiHuDaemon/app/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html') - File: ZhiHuDaemon/app/main/views.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html') -File: ZhiHuDaemon/app/main/views.py - > reaches line 30, trigger word "filter(": - pagination = Question.query.filter(Question.title.like(keyword)).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False) - - - -AntonisFK/Login_registration_Flask -https://github.com/AntonisFK/Login_registration_Flask -Entry file: None -Scanned: 2016-10-19 10:48:44.815834 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AntonisFK/Login_registration_Flask. - -jeseon/flask-by-example -https://github.com/jeseon/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 10:48:45.924540 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liuenyan/micro-flask-blog -https://github.com/liuenyan/micro-flask-blog -Entry file: micro-flask-blog/app/__init__.py -Scanned: 2016-10-19 10:48:51.331574 -No vulnerabilities found. - - -maxidrum/Flask_and_Mongo -https://github.com/maxidrum/Flask_and_Mongo -Entry file: Flask_and_Mongo/application/__init__.py -Scanned: 2016-10-19 10:48:52.664500 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mdublin/Flask-SPA-API-Template -https://github.com/mdublin/Flask-SPA-API-Template -Entry file: None -Scanned: 2016-10-19 10:48:54.188279 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -keimos/flask-rest-sql -https://github.com/keimos/flask-rest-sql -Entry file: flask-rest-sql/app.py -Scanned: 2016-10-19 10:48:55.431338 -No vulnerabilities found. - - -jeffreybergman/flask-hello-world -https://github.com/jeffreybergman/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:48:55.973459 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -zolaneta/todo_flask_application -https://github.com/zolaneta/todo_flask_application -Entry file: None -Scanned: 2016-10-19 10:48:58.661765 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zolaneta/todo_flask_application. - -baskervilski/flask-hello-world -https://github.com/baskervilski/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:48:59.199697 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -Bbouley/flask-by-example -https://github.com/Bbouley/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 10:49:04.864826 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilbert-abreu/realtime_slack_flask_app -https://github.com/wilbert-abreu/realtime_slack_flask_app -Entry file: None -Scanned: 2016-10-19 10:49:10.659262 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ellachao/Flask_GmailAPI_Example -https://github.com/ellachao/Flask_GmailAPI_Example -Entry file: Flask_GmailAPI_Example/main.py -Scanned: 2016-10-19 10:49:11.959127 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NJIT-SIG-WEBDEV/Flask-URL-Shortner -https://github.com/NJIT-SIG-WEBDEV/Flask-URL-Shortner -Entry file: Flask-URL-Shortner/app.py -Scanned: 2016-10-19 10:49:13.450285 -Vulnerability 1: -File: Flask-URL-Shortner/app.py - > User input at line 30, trigger word ".data": - site_id = mongo.db.links.find_one_or_404('url'form.url.data)['site_id'] -Reassigned in: - File: Flask-URL-Shortner/app.py - > Line 33: site_id = '' - File: Flask-URL-Shortner/app.py - > Line 35: site_id += random.choice(string.ascii_letters) - File: Flask-URL-Shortner/app.py - > Line 37: data = 'site_id''url'site_idform.url.data -File: Flask-URL-Shortner/app.py - > reaches line 43, trigger word "url_for(": - flash('URL created! {0} redirects to {1}.'.format(url_for('homepage',_external=True) + site_id, form.url.data)) - -Vulnerability 2: -File: Flask-URL-Shortner/app.py - > User input at line 30, trigger word ".data": - site_id = mongo.db.links.find_one_or_404('url'form.url.data)['site_id'] -Reassigned in: - File: Flask-URL-Shortner/app.py - > Line 33: site_id = '' - File: Flask-URL-Shortner/app.py - > Line 35: site_id += random.choice(string.ascii_letters) - File: Flask-URL-Shortner/app.py - > Line 37: data = 'site_id''url'site_idform.url.data -File: Flask-URL-Shortner/app.py - > reaches line 43, trigger word "flash(": - flash('URL created! {0} redirects to {1}.'.format(url_for('homepage',_external=True) + site_id, form.url.data)) - - - -hilmarh/island-python-flask-example -https://github.com/hilmarh/island-python-flask-example -Entry file: island-python-flask-example/app/__init__.py -Scanned: 2016-10-19 10:49:15.822192 -No vulnerabilities found. - - -dv3/sample-Flask-Application -https://github.com/dv3/sample-Flask-Application -Entry file: None -Scanned: 2016-10-19 10:49:19.108231 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dv3/sample-Flask-Application. - -mml1/flask_multiple_forms -https://github.com/mml1/flask_multiple_forms -Entry file: flask_multiple_forms/server.py -Scanned: 2016-10-19 10:49:23.379060 -No vulnerabilities found. - - -jideobs/flask-gae-ndb-starter -https://github.com/jideobs/flask-gae-ndb-starter -Entry file: flask-gae-ndb-starter/server/main.py -Scanned: 2016-10-19 10:49:28.256484 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marcabomb/flask_hello_world -https://github.com/marcabomb/flask_hello_world -Entry file: None -Scanned: 2016-10-19 10:49:30.285508 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/marcabomb/flask_hello_world. - -kevin-js/azure-flask-tutorial -https://github.com/kevin-js/azure-flask-tutorial -Entry file: azure-flask-tutorial/run.py -Scanned: 2016-10-19 10:49:32.131929 -No vulnerabilities found. - - -ShawnPengxy/Flask-madeBlog -https://github.com/ShawnPengxy/Flask-madeBlog -Entry file: Flask-madeBlog/site-packages/flask/sessions.py -Scanned: 2016-10-19 10:49:39.494923 -No vulnerabilities found. - - -vinayraghavan/pyacacemy-flask-workshop -https://github.com/vinayraghavan/pyacacemy-flask-workshop -Entry file: pyacacemy-flask-workshop/bookmarks.py -Scanned: 2016-10-19 10:49:40.883652 -No vulnerabilities found. - - -drbrightside/first-flask-app -https://github.com/drbrightside/first-flask-app -Entry file: None -Scanned: 2016-10-19 10:49:41.392146 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -D10221/gae_flask_ndb_test -https://github.com/D10221/gae_flask_ndb_test -Entry file: gae_flask_ndb_test/main.py -Scanned: 2016-10-19 10:49:43.665683 -No vulnerabilities found. - - -micahcourey/FirstFlaskApp -https://github.com/micahcourey/FirstFlaskApp -Entry file: FirstFlaskApp/flask_app.py -Scanned: 2016-10-19 10:49:44.922707 -No vulnerabilities found. - - -commandknight/cs125-fooddy-flask -https://github.com/commandknight/cs125-fooddy-flask -Entry file: cs125-fooddy-flask/fooddy2.py -Scanned: 2016-10-19 10:49:48.578557 -No vulnerabilities found. - - -GreenDragonSoft/flask-heroku-template -https://github.com/GreenDragonSoft/flask-heroku-template -Entry file: flask-heroku-template/app.py -Scanned: 2016-10-19 10:49:49.922956 -No vulnerabilities found. - - -rfmapp/TheFlaskMegaTutorial -https://github.com/rfmapp/TheFlaskMegaTutorial -Entry file: None -Scanned: 2016-10-19 10:49:56.563370 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -scripterkaran/flask -https://github.com/scripterkaran/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:49:59.126826 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -JadyLiu/flask -https://github.com/JadyLiu/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:50:00.128296 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -candyer/Flask -https://github.com/candyer/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:50:00.640535 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -itsrifat/flask-celery-docker-scale -https://github.com/itsrifat/flask-celery-docker-scale -Entry file: flask-celery-docker-scale/flask-app/app.py -Scanned: 2016-10-19 10:50:01.940756 -No vulnerabilities found. - - -sinscary/Flask-Social-Networking -https://github.com/sinscary/Flask-Social-Networking -Entry file: Flask-Social-Networking/app.py -Scanned: 2016-10-19 10:50:03.324321 -No vulnerabilities found. - - -osuosl/timesync-frontend-flask -https://github.com/osuosl/timesync-frontend-flask -Entry file: None -Scanned: 2016-10-19 10:50:05.987378 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/osuosl/timesync-frontend-flask. - -CBR09/flaskapp -https://github.com/CBR09/flaskapp -Entry file: None -Scanned: 2016-10-19 10:50:06.489061 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/CBR09/flaskapp. - -narakai/flaskblog -https://github.com/narakai/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 10:50:07.024197 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -josepablob/flasktaskr -https://github.com/josepablob/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:50:07.538190 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -adrianneperedo/flaskr -https://github.com/adrianneperedo/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:50:08.045995 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mirukushake/flaskr -https://github.com/mirukushake/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:50:12.548566 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wangduanyang/flasky -https://github.com/wangduanyang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:50:14.047294 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -darrenhankins/flaskr -https://github.com/darrenhankins/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:50:16.553548 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Looncall/Flaskr -https://github.com/Looncall/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 10:50:20.067887 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jeffreybergman/flasktaskr -https://github.com/jeffreybergman/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:50:24.564980 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -marcabomb/flasktaskr -https://github.com/marcabomb/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:50:28.067943 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -czy1238677/flasky -https://github.com/czy1238677/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:50:30.573259 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pink-Moon/flaskr -https://github.com/Pink-Moon/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:50:32.066723 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AlexGrek/FlaskLib -https://github.com/AlexGrek/FlaskLib -Entry file: None -Scanned: 2016-10-19 10:50:34.499150 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -daveweber/FlaskBar -https://github.com/daveweber/FlaskBar -Entry file: FlaskBar/index.py -Scanned: 2016-10-19 10:50:35.755163 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danleyb2/flaskMe -https://github.com/danleyb2/flaskMe -Entry file: flaskMe/flaskREST.py -Scanned: 2016-10-19 10:50:42.021549 -Vulnerability 1: -File: flaskMe/flaskREST.py - > User input at line 73, trigger word "get(": - name = data.get('name') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color)) - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 76, trigger word "execute(": - db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color]) - -Vulnerability 2: -File: flaskMe/flaskREST.py - > User input at line 74, trigger word "get(": - color = data.get('color') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color)) - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 76, trigger word "execute(": - db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color]) - - - -Rikka-chan/flaskCharts -https://github.com/Rikka-chan/flaskCharts -Entry file: None -Scanned: 2016-10-19 10:50:47.015266 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mcmcgonagle/flasktaskr2 -https://github.com/mcmcgonagle/flasktaskr2 -Entry file: flasktaskr2/project/views.py -Scanned: 2016-10-19 10:50:48.406454 -No vulnerabilities found. - - -AlexFransis/FlaskyProject -https://github.com/AlexFransis/FlaskyProject -Entry file: FlaskyProject/app/__init__.py -Scanned: 2016-10-19 10:50:49.957801 -No vulnerabilities found. - - -bunkdeath/FlaskTemplate -https://github.com/bunkdeath/FlaskTemplate -Entry file: FlaskTemplate/application.py -Scanned: 2016-10-19 10:50:51.210224 -No vulnerabilities found. - - -zding5/FlaskDemo -https://github.com/zding5/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 10:50:51.713336 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -diggzhang/flaskMaze -https://github.com/diggzhang/flaskMaze -Entry file: None -Scanned: 2016-10-19 10:50:53.609416 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/diggzhang/flaskMaze. - -narakai/FlaskDemo -https://github.com/narakai/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 10:50:54.095312 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -deanmax/FlaskAPP -https://github.com/deanmax/FlaskAPP -Entry file: FlaskAPP/app/__init__.py -Scanned: 2016-10-19 10:51:01.441975 -No vulnerabilities found. - - -hugoantunes/base-flask -https://github.com/hugoantunes/base-flask -Entry file: base-flask/service/__init__.py -Scanned: 2016-10-19 10:51:02.695096 -No vulnerabilities found. - - -haburibe/docker-flask -https://github.com/haburibe/docker-flask -Entry file: docker-flask/main.py -Scanned: 2016-10-19 10:51:03.945655 -No vulnerabilities found. - - -krisekenes/flask_deployment -https://github.com/krisekenes/flask_deployment -Entry file: flask_deployment/server.py -Scanned: 2016-10-19 10:51:05.193997 -No vulnerabilities found. - - -namickey/hello-flask -https://github.com/namickey/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 10:51:05.770546 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -mmingle/flask-blog -https://github.com/mmingle/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:51:06.340179 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -justinwp/flask-urs -https://github.com/justinwp/flask-urs -Entry file: flask-urs/tests/conftest.py -Scanned: 2016-10-19 10:51:07.675671 -No vulnerabilities found. - - -timyi1212/flask-demo -https://github.com/timyi1212/flask-demo -Entry file: None -Scanned: 2016-10-19 10:51:08.182660 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/timyi1212/flask-demo. - -SawHigh/flask_cdn -https://github.com/SawHigh/flask_cdn -Entry file: flask_cdn/cdn.py -Scanned: 2016-10-19 10:51:09.892989 -No vulnerabilities found. - - -crq/flask-scaffold -https://github.com/crq/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-19 10:51:10.409396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asielen/Woodles_Flask -https://github.com/asielen/Woodles_Flask -Entry file: Woodles_Flask/app/__init__.py -Scanned: 2016-10-19 10:51:12.181066 -No vulnerabilities found. - - -honmaple/flask-word -https://github.com/honmaple/flask-word -Entry file: flask-word/app/__init__.py -Scanned: 2016-10-19 10:51:14.932341 -Vulnerability 1: -File: flask-word/app/count/views.py - > User input at line 17, trigger word "cookies[": - count = int(request.cookies['count']) + 1 -Reassigned in: - File: flask-word/app/count/views.py - > Line 19: count = 0 - File: flask-word/app/count/views.py - > Line 20: response = make_response(str(count)) - File: flask-word/app/count/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = response -File: flask-word/app/count/views.py - > reaches line 21, trigger word "set_cookie(": - response.set_cookie('count',value=str(count), max_age=1800) - - - -marcabomb/flask-blog -https://github.com/marcabomb/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:51:15.457518 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -studiomezklador/flask_api -https://github.com/studiomezklador/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-19 10:51:17.969790 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rinechran/flask-tutorial -https://github.com/rinechran/flask-tutorial -Entry file: None -Scanned: 2016-10-19 10:51:21.464259 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Savvis/flask-phonebook -https://github.com/Savvis/flask-phonebook -Entry file: flask-phonebook/app/__init__.py -Scanned: 2016-10-19 10:51:30.544415 -No vulnerabilities found. - - -a-r-g-v/flask-template -https://github.com/a-r-g-v/flask-template -Entry file: None -Scanned: 2016-10-19 10:51:32.061234 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/a-r-g-v/flask-template. - -aksareen/Flask-learn -https://github.com/aksareen/Flask-learn -Entry file: Flask-learn/app.py -Scanned: 2016-10-19 10:51:34.785169 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aqisnotliquid/flask_rpg -https://github.com/aqisnotliquid/flask_rpg -Entry file: flask_rpg/app/__init__.py -Scanned: 2016-10-19 10:51:36.221024 -No vulnerabilities found. - - -jordo1ken/flask-fibonacci -https://github.com/jordo1ken/flask-fibonacci -Entry file: flask-fibonacci/Fibonacci.py -Scanned: 2016-10-19 10:51:37.602244 -No vulnerabilities found. - - -bodzio2k/flask-blueprint -https://github.com/bodzio2k/flask-blueprint -Entry file: flask-blueprint/run.py -Scanned: 2016-10-19 10:51:43.847772 -No vulnerabilities found. - - -PeachDew/flask_tutorialwebapp -https://github.com/PeachDew/flask_tutorialwebapp -Entry file: flask_tutorialwebapp/app.py -Scanned: 2016-10-19 10:51:47.978382 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -Kriordan/flask-blog -https://github.com/Kriordan/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:51:49.509317 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -textbook/flask-forecaster -https://github.com/textbook/flask-forecaster -Entry file: flask-forecaster/flask_forecaster/flask_app.py -Scanned: 2016-10-19 10:51:51.013622 -No vulnerabilities found. - - -nava45/flask-routelogger -https://github.com/nava45/flask-routelogger -Entry file: flask-routelogger/flask_app_example.py -Scanned: 2016-10-19 10:51:52.347270 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MattHealy/flask-skeleton -https://github.com/MattHealy/flask-skeleton -Entry file: None -Scanned: 2016-10-19 10:51:52.888484 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MattHealy/flask-skeleton. - -Xavier-Lam/flask-wechat -https://github.com/Xavier-Lam/flask-wechat -Entry file: flask-wechat/fenghuang/__init__.py -Scanned: 2016-10-19 10:51:53.401544 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Ty-WDFW/Flask-Tickets -https://github.com/Ty-WDFW/Flask-Tickets -Entry file: Flask-Tickets/main.py -Scanned: 2016-10-19 10:51:56.627705 -No vulnerabilities found. - - -makudesu/flask-thesis -https://github.com/makudesu/flask-thesis -Entry file: flask-thesis/bnhs.py -Scanned: 2016-10-19 10:52:01.473152 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ivanenko/flask-webcrawler -https://github.com/ivanenko/flask-webcrawler -Entry file: flask-webcrawler/ww2.py -Scanned: 2016-10-19 10:52:03.958443 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pyx/flask-simplemde -https://github.com/pyx/flask-simplemde -Entry file: flask-simplemde/examples/simple/app.py -Scanned: 2016-10-19 10:52:05.496254 -No vulnerabilities found. - - -kubabu/flask_blog -https://github.com/kubabu/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:52:07.514373 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MichaelDaniello/LearnFlask -https://github.com/MichaelDaniello/LearnFlask -Entry file: LearnFlask/ex1_URL解析.py -Scanned: 2016-10-19 10:52:08.043045 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bplabombarda/fdr -https://github.com/bplabombarda/fdr -Entry file: fdr/server/__init__.py -Scanned: 2016-10-19 10:52:09.876904 -No vulnerabilities found. - - -gzxultra/FlaskLoginManagement -https://github.com/gzxultra/FlaskLoginManagement -Entry file: FlaskLoginManagement/app/__init__.py -Scanned: 2016-10-19 10:52:11.678798 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -metajemo/testapp -https://github.com/metajemo/testapp -Entry file: testapp/testapp.py -Scanned: 2016-10-19 10:52:12.941563 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -victorcuervo/FlaskMongoDB -https://github.com/victorcuervo/FlaskMongoDB -Entry file: FlaskMongoDB/welcome.py -Scanned: 2016-10-19 10:52:14.309753 -No vulnerabilities found. - - -ChellsChen/FlaskSocketIOChart -https://github.com/ChellsChen/FlaskSocketIOChart -Entry file: FlaskSocketIOChart/app/__init__.py -Scanned: 2016-10-19 10:52:15.769710 -No vulnerabilities found. - - -sasha42/Mailchimp-utility -https://github.com/sasha42/Mailchimp-utility -Entry file: None -Scanned: 2016-10-19 10:52:17.010636 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sasha42/Mailchimp-utility. - -auliude/flask_hello_world -https://github.com/auliude/flask_hello_world -Entry file: None -Scanned: 2016-10-19 10:52:17.524810 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/auliude/flask_hello_world. - -yogeshdixit41/PyFlaskWebApp -https://github.com/yogeshdixit41/PyFlaskWebApp -Entry file: PyFlaskWebApp/hello.py -Scanned: 2016-10-19 10:52:20.826439 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -znss1989/flask_blog_ex -https://github.com/znss1989/flask_blog_ex -Entry file: flask_blog_ex/blog.py -Scanned: 2016-10-19 10:52:22.191756 -No vulnerabilities found. - - -liuenyan/micro-flask-blog -https://github.com/liuenyan/micro-flask-blog -Entry file: micro-flask-blog/app/__init__.py -Scanned: 2016-10-19 10:52:23.604673 -No vulnerabilities found. - - -rtorres90/rest-flask-tutorial -https://github.com/rtorres90/rest-flask-tutorial -Entry file: rest-flask-tutorial/rest_flask/endpoints_project2sol.py -Scanned: 2016-10-19 10:52:30.918890 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jz314/flask-demo-copy -https://github.com/jz314/flask-demo-copy -Entry file: None -Scanned: 2016-10-19 10:52:33.068937 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jz314/flask-demo-copy. - -willelson/flask-app-template -https://github.com/willelson/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-19 10:52:33.636784 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -acbart/lti-flask-skeleton -https://github.com/acbart/lti-flask-skeleton -Entry file: lti-flask-skeleton/main.py -Scanned: 2016-10-19 10:52:36.013314 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GreatBedAwake/flask_lab_web -https://github.com/GreatBedAwake/flask_lab_web -Entry file: flask_lab_web/app/__init__.py -Scanned: 2016-10-19 10:52:37.374155 -No vulnerabilities found. - - -Derfirm/hello-docker-flask -https://github.com/Derfirm/hello-docker-flask -Entry file: hello-docker-flask/app.py -Scanned: 2016-10-19 10:52:38.644090 -No vulnerabilities found. - - -arvvvs/Flask-Practice-Metis-Delivery -https://github.com/arvvvs/Flask-Practice-Metis-Delivery -Entry file: Flask-Practice-Metis-Delivery/app.py -Scanned: 2016-10-19 10:52:46.757670 -Vulnerability 1: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 57, trigger word "get(": - address = request.args.get('address', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 65, trigger word "execute(": - cur.execute('INSERT INTO tbl_deliveries (customer_name, delivery_status, customer_address, delivery_person) VALUES("' + name + '", "' + status + '","' + address + '","' + driver + '");') - -Vulnerability 2: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 59, trigger word "get(": - name = request.args.get('name', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 65, trigger word "execute(": - cur.execute('INSERT INTO tbl_deliveries (customer_name, delivery_status, customer_address, delivery_person) VALUES("' + name + '", "' + status + '","' + address + '","' + driver + '");') - -Vulnerability 3: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 148, trigger word "get(": - phone = request.args.get('phone', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - -Vulnerability 4: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 149, trigger word "get(": - name = request.args.get('name', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - -Vulnerability 5: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 150, trigger word "get(": - address = request.args.get('address', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - -Vulnerability 6: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 151, trigger word "get(": - phone_value = request.args.get('phone_value', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - - - -nosuchip/flask-video-streaming -https://github.com/nosuchip/flask-video-streaming -Entry file: flask-video-streaming/main.py -Scanned: 2016-10-19 10:52:52.602823 -No vulnerabilities found. - - -VistaarJ/REST-API-Using-Flask- -https://github.com/VistaarJ/REST-API-Using-Flask- -Entry file: REST-API-Using-Flask-/app.py -Scanned: 2016-10-19 10:52:58.350540 -No vulnerabilities found. - - -n-batalha/flask-api-template -https://github.com/n-batalha/flask-api-template -Entry file: flask-api-template/web/journey_predict/__init__.py -Scanned: 2016-10-19 10:52:59.747861 -No vulnerabilities found. - - -knight-zhou/Web.py_Flask -https://github.com/knight-zhou/Web.py_Flask -Entry file: None -Scanned: 2016-10-19 10:53:01.770558 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/knight-zhou/Web.py_Flask. - -dv3/sample-Flask-Application -https://github.com/dv3/sample-Flask-Application -Entry file: None -Scanned: 2016-10-19 10:53:02.297055 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dv3/sample-Flask-Application. - -blackmad/flask-google-login-example -https://github.com/blackmad/flask-google-login-example -Entry file: flask-google-login-example/main.py -Scanned: 2016-10-19 10:53:03.627678 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DEV3L/openshift-python-flask-example -https://github.com/DEV3L/openshift-python-flask-example -Entry file: openshift-python-flask-example/wsgi/run.py -Scanned: 2016-10-19 10:53:04.995388 -No vulnerabilities found. - - -mml1/flask_multiple_forms -https://github.com/mml1/flask_multiple_forms -Entry file: flask_multiple_forms/server.py -Scanned: 2016-10-19 10:53:06.279252 -No vulnerabilities found. - - -jideobs/flask-gae-ndb-starter -https://github.com/jideobs/flask-gae-ndb-starter -Entry file: flask-gae-ndb-starter/server/main.py -Scanned: 2016-10-19 10:53:06.782413 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tim9Liu9/Flask_Bootstrap_Blog -https://github.com/Tim9Liu9/Flask_Bootstrap_Blog -Entry file: Flask_Bootstrap_Blog/doc/app.py -Scanned: 2016-10-19 10:53:08.358352 -No vulnerabilities found. - - -cerealcake/flask-ldap3 -https://github.com/cerealcake/flask-ldap3 -Entry file: flask-ldap3/app.py -Scanned: 2016-10-19 10:53:09.596754 -No vulnerabilities found. - - -willelson/flask-login-template -https://github.com/willelson/flask-login-template -Entry file: None -Scanned: 2016-10-19 10:53:14.134563 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zolaneta/books_flask_app -https://github.com/zolaneta/books_flask_app -Entry file: None -Scanned: 2016-10-19 10:53:15.868704 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zolaneta/books_flask_app. - -Anivarth/quiz-python-flask -https://github.com/Anivarth/quiz-python-flask -Entry file: quiz-python-flask/quiz.py -Scanned: 2016-10-19 10:53:17.114463 -No vulnerabilities found. - - -richyvk/flask-url-shortener -https://github.com/richyvk/flask-url-shortener -Entry file: flask-url-shortener/app.py -Scanned: 2016-10-19 10:53:18.716824 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -susantshrestha/flask -https://github.com/susantshrestha/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:53:21.536612 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -cobra0914/flask -https://github.com/cobra0914/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:53:22.572239 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -zbc/Flask -https://github.com/zbc/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:53:23.062632 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SunchunZhou/flask -https://github.com/SunchunZhou/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:53:25.007544 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -k-hung/FlaskApp -https://github.com/k-hung/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 10:53:33.083748 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -w84miracle/flask-sb-admin2 -https://github.com/w84miracle/flask-sb-admin2 -Entry file: flask-sb-admin2/sbadmin.py -Scanned: 2016-10-19 10:53:36.706698 -No vulnerabilities found. - - -yoshiya0503/Flask-Best-Practices -https://github.com/yoshiya0503/Flask-Best-Practices -Entry file: Flask-Best-Practices/methodview.py -Scanned: 2016-10-19 10:53:38.019034 -No vulnerabilities found. - - -ThunderousFigs/Genomes -https://github.com/ThunderousFigs/Genomes -Entry file: Genomes/server.py -Scanned: 2016-10-19 10:53:50.367562 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Python-Project-Simple/flask-blog -https://github.com/Python-Project-Simple/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:53:51.863742 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -keer2345/flasky -https://github.com/keer2345/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:53:52.390956 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PansFortress/flasktasker -https://github.com/PansFortress/flasktasker -Entry file: flasktasker/views.py -Scanned: 2016-10-19 10:53:55.842541 -No vulnerabilities found. - - -olegzhoglo/flasktaskr -https://github.com/olegzhoglo/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:54:00.359226 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -adrianneperedo/flaskr -https://github.com/adrianneperedo/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:54:01.871653 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mirukushake/flaskr -https://github.com/mirukushake/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:54:03.361770 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tim1978/flasktaskr -https://github.com/tim1978/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:54:03.855892 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DXZ/flaskr -https://github.com/DXZ/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:54:05.340436 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -schen2011/flaskandazure -https://github.com/schen2011/flaskandazure -Entry file: None -Scanned: 2016-10-19 10:54:08.326521 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kriordan/flasktaskr -https://github.com/Kriordan/flasktaskr -Entry file: None -Scanned: 2016-10-19 10:54:08.831681 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -haoweibo1987/flasker -https://github.com/haoweibo1987/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-19 10:54:09.367076 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -egonvb/flaskplayground -https://github.com/egonvb/flaskplayground -Entry file: flaskplayground/api.py -Scanned: 2016-10-19 10:54:12.072476 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liteng123/flaskr -https://github.com/liteng123/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:54:12.566698 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pchartrand/FlaskTemp -https://github.com/pchartrand/FlaskTemp -Entry file: FlaskTemp/tempreport.py -Scanned: 2016-10-19 10:54:17.750391 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -salazar35/FlaskWeb -https://github.com/salazar35/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-19 10:54:18.335482 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -hattwick/flask2 -https://github.com/hattwick/flask2 -Entry file: flask2/app.py -Scanned: 2016-10-19 10:54:18.843780 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -narakai/FlaskServer -https://github.com/narakai/FlaskServer -Entry file: FlaskServer/untitled.py -Scanned: 2016-10-19 10:54:20.426246 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paoloo1995/FlaskBlog -https://github.com/paoloo1995/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 10:54:21.069861 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -julywoo/flaskWeb -https://github.com/julywoo/flaskWeb -Entry file: flaskWeb/flaskWeb.py -Scanned: 2016-10-19 10:54:23.945086 -No vulnerabilities found. - - -mmingle/flask-blog -https://github.com/mmingle/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:54:24.475532 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -justinwp/flask-urs -https://github.com/justinwp/flask-urs -Entry file: flask-urs/tests/conftest.py -Scanned: 2016-10-19 10:54:25.960690 -No vulnerabilities found. - - -sourcelair-blueprints/flask-mongo -https://github.com/sourcelair-blueprints/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-19 10:54:26.540308 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tmlima/flask-intro -https://github.com/tmlima/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 10:54:30.054992 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SawHigh/flask_cdn -https://github.com/SawHigh/flask_cdn -Entry file: flask_cdn/cdn.py -Scanned: 2016-10-19 10:54:35.292946 -No vulnerabilities found. - - -crq/flask-scaffold -https://github.com/crq/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-19 10:54:35.811978 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asielen/Woodles_Flask -https://github.com/asielen/Woodles_Flask -Entry file: Woodles_Flask/app/__init__.py -Scanned: 2016-10-19 10:54:39.298999 -No vulnerabilities found. - - -amitbn/flask-docker -https://github.com/amitbn/flask-docker -Entry file: flask-docker/app.py -Scanned: 2016-10-19 10:54:53.072987 -No vulnerabilities found. - - -julywoo/flask_login -https://github.com/julywoo/flask_login -Entry file: None -Scanned: 2016-10-19 10:54:54.053320 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/julywoo/flask_login. - -LovroM/Flask-test -https://github.com/LovroM/Flask-test -Entry file: Flask-test/webserver.py -Scanned: 2016-10-19 10:54:56.936406 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danleyb2/flask-cloudinary -https://github.com/danleyb2/flask-cloudinary -Entry file: None -Scanned: 2016-10-19 10:55:02.182427 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danleyb2/flask-cloudinary. - -OpenTrons/labsuite_flask -https://github.com/OpenTrons/labsuite_flask -Entry file: labsuite_flask/app.py -Scanned: 2016-10-19 10:55:04.653555 -No vulnerabilities found. - - -brandonfujii/flask-microblog -https://github.com/brandonfujii/flask-microblog -Entry file: None -Scanned: 2016-10-19 10:55:05.164726 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cherry-hyx/flask_t -https://github.com/cherry-hyx/flask_t -Entry file: None -Scanned: 2016-10-19 10:55:06.526662 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cherry-hyx/flask_t. - -YaGiNA/study-flask -https://github.com/YaGiNA/study-flask -Entry file: study-flask/flaskr/__init__.py -Scanned: 2016-10-19 10:55:08.615757 -No vulnerabilities found. - - -Viredery/python_flask -https://github.com/Viredery/python_flask -Entry file: None -Scanned: 2016-10-19 10:55:09.129201 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Viredery/python_flask. - -josanabr/flask-vbox -https://github.com/josanabr/flask-vbox -Entry file: flask-vbox/flask-vbox.py -Scanned: 2016-10-19 10:55:11.396786 -No vulnerabilities found. - - -tanzhixu/Flask-oauth -https://github.com/tanzhixu/Flask-oauth -Entry file: Flask-oauth/app/__init__.py -Scanned: 2016-10-19 10:55:12.729694 -Vulnerability 1: -File: Flask-oauth/app/user_manager_views.py - > User input at line 32, trigger word "get(": - password = request.json.get('password', None) -Reassigned in: - File: Flask-oauth/app/user_manager_views.py - > Line 38: newpasswd = pwd_context.encrypt(password) -File: Flask-oauth/app/user_manager_views.py - > reaches line 41, trigger word "filter(": - query.filter(User.id == userid).update(User.password_hashnewpasswd) - - - -abcsds/flask-tests -https://github.com/abcsds/flask-tests -Entry file: flask-tests/streaming/stream.py -Scanned: 2016-10-19 10:55:14.250630 -No vulnerabilities found. - - -simeon-xx/simeon-flask -https://github.com/simeon-xx/simeon-flask -Entry file: simeon-flask/app/init.py -Scanned: 2016-10-19 10:55:15.669955 -No vulnerabilities found. - - -seanhelm/flask-test -https://github.com/seanhelm/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 10:55:16.192465 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -dylannnnn/flask_study -https://github.com/dylannnnn/flask_study -Entry file: flask_study/views.py -Scanned: 2016-10-19 10:55:18.489696 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -huasu/InstantFlask -https://github.com/huasu/InstantFlask -Entry file: InstantFlask/app_return_values.py -Scanned: 2016-10-19 10:55:21.092419 -No vulnerabilities found. - - -maricante/flask-blog -https://github.com/maricante/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:55:21.665918 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -christopherL91/pythonflask -https://github.com/christopherL91/pythonflask -Entry file: pythonflask/app/main.py -Scanned: 2016-10-19 10:55:22.917024 -No vulnerabilities found. - - -ysicing/Pangu -https://github.com/ysicing/Pangu -Entry file: Pangu/Pangu.py -Scanned: 2016-10-19 10:55:34.140246 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -rbcolson9/flask4kids -https://github.com/rbcolson9/flask4kids -Entry file: flask4kids/hello.py -Scanned: 2016-10-19 10:55:35.465022 -No vulnerabilities found. - - -charlestondance/FlaskStartUp -https://github.com/charlestondance/FlaskStartUp -Entry file: FlaskStartUp/app/__init__.py -Scanned: 2016-10-19 10:55:36.869804 -No vulnerabilities found. - - -znss1989/flask_blog_ex -https://github.com/znss1989/flask_blog_ex -Entry file: flask_blog_ex/blog.py -Scanned: 2016-10-19 10:55:38.254501 -No vulnerabilities found. - - -duncan60/flask-github-api -https://github.com/duncan60/flask-github-api -Entry file: flask-github-api/app/__init__.py -Scanned: 2016-10-19 10:55:39.658138 -No vulnerabilities found. - - -erik-farmer/flask-auth-wysiwyg-blog -https://github.com/erik-farmer/flask-auth-wysiwyg-blog -Entry file: flask-auth-wysiwyg-blog/app.py -Scanned: 2016-10-19 10:55:40.954415 -No vulnerabilities found. - - -dongheelee1/simple_flask_wall -https://github.com/dongheelee1/simple_flask_wall -Entry file: simple_flask_wall/server.py -Scanned: 2016-10-19 10:55:42.351404 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PeggyZWY/blog-with-flask -https://github.com/PeggyZWY/blog-with-flask -Entry file: blog-with-flask/app/__init__.py -Scanned: 2016-10-19 10:55:44.291532 -No vulnerabilities found. - - -mnzr/Flask-Blueprint-test -https://github.com/mnzr/Flask-Blueprint-test -Entry file: Flask-Blueprint-test/app/__init__.py -Scanned: 2016-10-19 10:55:45.578278 -Vulnerability 1: -File: Flask-Blueprint-test/app/users/views.py - > User input at line 33, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Blueprint-test/app/users/views.py - > Line 38: session['user_id'] = user.id -File: Flask-Blueprint-test/app/users/views.py - > reaches line 39, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -guilleJB/flask-web-book -https://github.com/guilleJB/flask-web-book -Entry file: flask-web-book/hello.py -Scanned: 2016-10-19 10:55:46.967296 -No vulnerabilities found. - - -aquang9124/flask_semi_restful_routes -https://github.com/aquang9124/flask_semi_restful_routes -Entry file: flask_semi_restful_routes/server.py -Scanned: 2016-10-19 10:55:54.406586 -No vulnerabilities found. - - -ynifamily3/CRUD-with-Flask-MVC -https://github.com/ynifamily3/CRUD-with-Flask-MVC -Entry file: CRUD-with-Flask-MVC/test.py -Scanned: 2016-10-19 10:55:55.860740 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TwilioDevEd/browser-calls-flask -https://github.com/TwilioDevEd/browser-calls-flask -Entry file: browser-calls-flask/browser_calls_flask/__init__.py -Scanned: 2016-10-19 10:55:58.052491 -No vulnerabilities found. - - -terryllowery/flask-hello-world -https://github.com/terryllowery/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:55:59.131439 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -aquang9124/flask_wall_test -https://github.com/aquang9124/flask_wall_test -Entry file: flask_wall_test/server.py -Scanned: 2016-10-19 10:56:03.576753 -No vulnerabilities found. - - -ynejati/MyFlaskApp -https://github.com/ynejati/MyFlaskApp -Entry file: MyFlaskApp/MyFlaskWebApp.py -Scanned: 2016-10-19 10:56:05.985941 -No vulnerabilities found. - - -TheCypher/flask-boiler-plate -https://github.com/TheCypher/flask-boiler-plate -Entry file: flask-boiler-plate/app/__init__.py -Scanned: 2016-10-19 10:56:07.390268 -Vulnerability 1: -File: flask-boiler-plate/app/module_one/views.py - > User input at line 30, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-boiler-plate/app/module_one/views.py - > Line 34: session['user_id'] = user.id -File: flask-boiler-plate/app/module_one/views.py - > reaches line 36, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -TheCypher/flask-api-test -https://github.com/TheCypher/flask-api-test -Entry file: flask-api-test/api.py -Scanned: 2016-10-19 10:56:10.638272 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-api-test/lib/python2.7/genericpath.py - -vstanev1/heroku-flask-app -https://github.com/vstanev1/heroku-flask-app -Entry file: heroku-flask-app/app.py -Scanned: 2016-10-19 10:56:12.488251 -No vulnerabilities found. - - -bellcodo/bellcodo-flask-microblog -https://github.com/bellcodo/bellcodo-flask-microblog -Entry file: bellcodo-flask-microblog/app/__init__.py -Scanned: 2016-10-19 10:56:14.246311 -No vulnerabilities found. - - -knight-zhou/Web.py_Flask -https://github.com/knight-zhou/Web.py_Flask -Entry file: None -Scanned: 2016-10-19 10:56:14.863499 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Journo-App/flask-by-example -https://github.com/Journo-App/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 10:56:15.703897 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liuer99cn/awesome-flask-todo -https://github.com/liuer99cn/awesome-flask-todo -Entry file: None -Scanned: 2016-10-19 10:56:16.209861 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/liuer99cn/awesome-flask-todo. - -megrela/python-flask-skeleton -https://github.com/megrela/python-flask-skeleton -Entry file: None -Scanned: 2016-10-19 10:56:17.573425 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/megrela/python-flask-skeleton. - -shyba/browser-calls-flask -https://github.com/shyba/browser-calls-flask -Entry file: browser-calls-flask/browser_calls_flask/__init__.py -Scanned: 2016-10-19 10:56:18.850058 -No vulnerabilities found. - - -seiya-tsukada/instant_flask_server -https://github.com/seiya-tsukada/instant_flask_server -Entry file: instant_flask_server/main.py -Scanned: 2016-10-19 10:56:20.137424 -No vulnerabilities found. - - -jdgramajo/LearningFlaskFramework -https://github.com/jdgramajo/LearningFlaskFramework -Entry file: LearningFlaskFramework/blog/app/app.py -Scanned: 2016-10-19 10:56:22.552628 -No vulnerabilities found. - - -plablo09/minimal-flask-dev -https://github.com/plablo09/minimal-flask-dev -Entry file: minimal-flask-dev/hello.py -Scanned: 2016-10-19 10:56:23.954275 -No vulnerabilities found. - - -bobquest33/testRestFlask -https://github.com/bobquest33/testRestFlask -Entry file: testRestFlask/testRestFlask/testRestFlask/apps/testRest/models.py -Scanned: 2016-10-19 10:56:25.801655 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jjapp/flask-hello-world -https://github.com/jjapp/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 10:56:36.394955 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -snehasankavaram/donorRegistryFlask -https://github.com/snehasankavaram/donorRegistryFlask -Entry file: donorRegistryFlask/run.py -Scanned: 2016-10-19 10:56:38.784606 -No vulnerabilities found. - - -ayusharma/Drug-discovery-flask -https://github.com/ayusharma/Drug-discovery-flask -Entry file: Drug-discovery-flask/app.py -Scanned: 2016-10-19 10:56:40.173135 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vishaljain3991/flask_oauth_example_template -https://github.com/vishaljain3991/flask_oauth_example_template -Entry file: flask_oauth_example_template/app/__init__.py -Scanned: 2016-10-19 10:56:42.993045 -No vulnerabilities found. - - -F483/flask-data-migration-example -https://github.com/F483/flask-data-migration-example -Entry file: flask-data-migration-example/app.py -Scanned: 2016-10-19 10:56:44.279291 -No vulnerabilities found. - - -studiomezklador/flask_api_2 -https://github.com/studiomezklador/flask_api_2 -Entry file: flask_api_2/__init__.py -Scanned: 2016-10-19 10:56:45.976393 -No vulnerabilities found. - - -SarthakS93/Flask-WebApp -https://github.com/SarthakS93/Flask-WebApp -Entry file: Flask-WebApp/app/__init__.py -Scanned: 2016-10-19 10:56:47.383133 -No vulnerabilities found. - - -dorneanu/flask-app-template -https://github.com/dorneanu/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-19 10:56:47.901145 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aquang9124/flask_friends_full -https://github.com/aquang9124/flask_friends_full -Entry file: flask_friends_full/server.py -Scanned: 2016-10-19 10:56:49.190882 -No vulnerabilities found. - - -huasu/LearningFlaskFramework -https://github.com/huasu/LearningFlaskFramework -Entry file: LearningFlaskFramework/hello.py -Scanned: 2016-10-19 10:56:55.532452 -No vulnerabilities found. - - -sd16spring/Toolbox-Flask -https://github.com/sd16spring/Toolbox-Flask -Entry file: Toolbox-Flask/hello.py -Scanned: 2016-10-19 10:56:58.426771 -No vulnerabilities found. - - -pavelrib/flask -https://github.com/pavelrib/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:57:00.467757 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ZhenghaoZhu/Flask -https://github.com/ZhenghaoZhu/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:57:00.987836 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -octt/flask -https://github.com/octt/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:57:05.203306 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -Bwooklyn/flask -https://github.com/Bwooklyn/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:57:07.193363 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -HRKpython/flask -https://github.com/HRKpython/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:57:12.181466 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -SeanVaysburd/flask -https://github.com/SeanVaysburd/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 10:57:13.201337 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -kartheek3011/Flask -https://github.com/kartheek3011/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 10:57:13.731003 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TerbiumLabs/flask-developer-challenge -https://github.com/TerbiumLabs/flask-developer-challenge -Entry file: flask-developer-challenge/gistapi/gistapi.py -Scanned: 2016-10-19 10:57:15.149416 -No vulnerabilities found. - - -sunscrapers/flask-boilerplate -https://github.com/sunscrapers/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 10:57:16.678985 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sunscrapers/flask-boilerplate. - -jabbalaci/DigitalOceanFlask -https://github.com/jabbalaci/DigitalOceanFlask -Entry file: DigitalOceanFlask/home/demo/projects/ave_caesar/main.py -Scanned: 2016-10-19 10:57:18.081237 -No vulnerabilities found. - - -w84miracle/flask-sb-admin2 -https://github.com/w84miracle/flask-sb-admin2 -Entry file: flask-sb-admin2/sbadmin.py -Scanned: 2016-10-19 10:57:19.969761 -No vulnerabilities found. - - -pyx/flask-diced -https://github.com/pyx/flask-diced -Entry file: flask-diced/examples/simple/app.py -Scanned: 2016-10-19 10:57:21.370353 -No vulnerabilities found. - - -basco-johnkevin/note-taking-app -https://github.com/basco-johnkevin/note-taking-app -Entry file: note-taking-app/part1/main.py -Scanned: 2016-10-19 10:57:22.632734 -No vulnerabilities found. - - -Miserlou/serverless-imagehost -https://github.com/Miserlou/serverless-imagehost -Entry file: serverless-imagehost/my_app.py -Scanned: 2016-10-19 10:57:23.954348 -No vulnerabilities found. - - -MRamakri/flaskworkshop -https://github.com/MRamakri/flaskworkshop -Entry file: flaskworkshop/app.py -Scanned: 2016-10-19 10:57:25.261990 -No vulnerabilities found. - - -imhuwq/flasky -https://github.com/imhuwq/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:57:25.805058 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhangyuhaomei/flasky -https://github.com/zhangyuhaomei/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 10:57:26.306952 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hellohuangjin/flaskblog -https://github.com/hellohuangjin/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 10:57:26.862436 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -coolmile23/flaskr -https://github.com/coolmile23/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:57:37.363324 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -antonsoroko/flaskapimongo -https://github.com/antonsoroko/flaskapimongo -Entry file: flaskapimongo/flaskapimongo/__init__.py -Scanned: 2016-10-19 10:57:40.819601 -No vulnerabilities found. - - -haoweibo1987/flasker -https://github.com/haoweibo1987/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-19 10:57:41.340931 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -egonvb/flaskplayground -https://github.com/egonvb/flaskplayground -Entry file: flaskplayground/api.py -Scanned: 2016-10-19 10:57:41.947043 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhkmxx9302013/flaskmysql -https://github.com/zhkmxx9302013/flaskmysql -Entry file: flaskmysql/flaskmysql.py -Scanned: 2016-10-19 10:57:46.349519 -No vulnerabilities found. - - -xiaomao361/flaskr -https://github.com/xiaomao361/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:57:47.050556 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alvaro893/flaskcinemaapp -https://github.com/alvaro893/flaskcinemaapp -Entry file: flaskcinemaapp/FlaskWebProject/__init__.py -Scanned: 2016-10-19 10:57:48.860333 -No vulnerabilities found. - - -yuyiwei305/flaskr -https://github.com/yuyiwei305/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 10:57:49.350333 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -retozero/FlaskDemo -https://github.com/retozero/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 10:57:56.391478 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -uklineale/flaskTut -https://github.com/uklineale/flaskTut -Entry file: None -Scanned: 2016-10-19 10:58:04.820949 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -saurabh1e/FlaskStructure -https://github.com/saurabh1e/FlaskStructure -Entry file: FlaskStructure/src/utils/__init__.py -Scanned: 2016-10-19 10:58:06.296283 -No vulnerabilities found. - - -zupeiza/FlaskTaskr -https://github.com/zupeiza/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-19 10:58:06.967898 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -yxun/FlaskSample -https://github.com/yxun/FlaskSample -Entry file: FlaskSample/hello.py -Scanned: 2016-10-19 10:58:08.281893 -No vulnerabilities found. - - -paoloo1995/FlaskBlog -https://github.com/paoloo1995/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 10:58:08.898252 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DearX-dlx/FlaskBlog -https://github.com/DearX-dlx/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 10:58:09.480595 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sourcelair-blueprints/flask-mongo -https://github.com/sourcelair-blueprints/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-19 10:58:10.088801 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sohje/__flask_psgr -https://github.com/sohje/__flask_psgr -Entry file: __flask_psgr/app.py -Scanned: 2016-10-19 10:58:15.403015 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -doubtingben/flask-mongo -https://github.com/doubtingben/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-19 10:58:15.912846 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -farridav/flask_friends -https://github.com/farridav/flask_friends -Entry file: flask_friends/src/friends/__init__.py -Scanned: 2016-10-19 10:58:17.312435 -No vulnerabilities found. - - -gh-tcbd/flask-test -https://github.com/gh-tcbd/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 10:58:17.849342 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -doubtingben/flask-jobs -https://github.com/doubtingben/flask-jobs -Entry file: flask-jobs/code/web.py -Scanned: 2016-10-19 10:58:19.146607 -No vulnerabilities found. - - -askewseth/StatsFlask -https://github.com/askewseth/StatsFlask -Entry file: StatsFlask/run.py -Scanned: 2016-10-19 10:58:20.883659 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BlackMud/flask_blog -https://github.com/BlackMud/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 10:58:22.384836 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bzerroug/flask_appbuilder -https://github.com/bzerroug/flask_appbuilder -Entry file: flask_appbuilder/meteo/__init__.py -Scanned: 2016-10-19 10:58:23.775894 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mkubaczyk/flask-structure -https://github.com/mkubaczyk/flask-structure -Entry file: flask-structure/apps/__init__.py -Scanned: 2016-10-19 10:58:25.039626 -No vulnerabilities found. - - -zhkmxx9302013/RPiFlask -https://github.com/zhkmxx9302013/RPiFlask -Entry file: RPiFlask/main.py -Scanned: 2016-10-19 10:58:26.373191 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tahoe/flask-restless -https://github.com/tahoe/flask-restless -Entry file: flask-restless/examples/clients/jquery/__main__.py -Scanned: 2016-10-19 10:58:28.263937 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PavelMPD/flask_oauth -https://github.com/PavelMPD/flask_oauth -Entry file: flask_oauth/server.py -Scanned: 2016-10-19 10:58:29.661803 -No vulnerabilities found. - - -hoikin-yiu/flask-blog -https://github.com/hoikin-yiu/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:58:30.343424 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Cloudwick-BT/flask_project -https://github.com/Cloudwick-BT/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-19 10:58:39.351257 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gyonghua/flask-blog -https://github.com/gyonghua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:58:41.879862 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -g-rich/flask-blog -https://github.com/g-rich/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:58:42.430453 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Zhgong/flask_microblog -https://github.com/Zhgong/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 10:58:43.022583 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chensdream/learn-flask -https://github.com/chensdream/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 10:58:46.796264 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coolmile23/flask_practice -https://github.com/coolmile23/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-19 10:58:54.280186 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -k9luo/Flask-Tutorial -https://github.com/k9luo/Flask-Tutorial -Entry file: Flask-Tutorial/microblog-version-0.2/app/__init__.py -Scanned: 2016-10-19 10:58:59.441581 -No vulnerabilities found. - - -Harry-Yao/learn-flask -https://github.com/Harry-Yao/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 10:59:00.259866 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danleyb2/flask-cloudinary -https://github.com/danleyb2/flask-cloudinary -Entry file: None -Scanned: 2016-10-19 10:59:00.769058 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danleyb2/flask-cloudinary. - -juan-castano/todo-flask -https://github.com/juan-castano/todo-flask -Entry file: None -Scanned: 2016-10-19 10:59:01.341182 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/juan-castano/todo-flask. - -mullaned/Flask-Test -https://github.com/mullaned/Flask-Test -Entry file: Flask-Test/flask_test.py -Scanned: 2016-10-19 10:59:02.647251 -No vulnerabilities found. - - -zupeiza/flask-blog -https://github.com/zupeiza/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 10:59:07.243662 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -shopetan/flask-api -https://github.com/shopetan/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-19 10:59:08.787106 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jungkoo/flask-dmango -https://github.com/jungkoo/flask-dmango -Entry file: flask-dmango/sample/blueprint_find.py -Scanned: 2016-10-19 10:59:10.189004 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -raghureddyram/flask-hello -https://github.com/raghureddyram/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-19 10:59:10.889597 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hrushikesh198/flask-server -https://github.com/hrushikesh198/flask-server -Entry file: None -Scanned: 2016-10-19 10:59:11.412541 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hrushikesh198/flask-server. - -omarkurt/flask-injection -https://github.com/omarkurt/flask-injection -Entry file: flask-injection/index.py -Scanned: 2016-10-19 10:59:17.717749 -No vulnerabilities found. - - -Datalker/Flask_sandbox -https://github.com/Datalker/Flask_sandbox -Entry file: Flask_sandbox/hello.py -Scanned: 2016-10-19 10:59:19.129341 -No vulnerabilities found. - - -getsentry/demo-flask -https://github.com/getsentry/demo-flask -Entry file: demo-flask/app.py -Scanned: 2016-10-19 10:59:22.409143 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -technocake/flask-eksempel -https://github.com/technocake/flask-eksempel -Entry file: flask-eksempel/webserver.py -Scanned: 2016-10-19 10:59:24.671452 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wkzhu/flask_example -https://github.com/wkzhu/flask_example -Entry file: None -Scanned: 2016-10-19 10:59:25.207700 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rgsingh/flask-timetrack -https://github.com/rgsingh/flask-timetrack -Entry file: flask-timetrack/app/__init__.py -Scanned: 2016-10-19 10:59:26.555283 -No vulnerabilities found. - - -pultitom/study-flask -https://github.com/pultitom/study-flask -Entry file: study-flask/microblog/app/__init__.py -Scanned: 2016-10-19 10:59:27.845386 -No vulnerabilities found. - - -StarsHu/ll-flask -https://github.com/StarsHu/ll-flask -Entry file: ll-flask/LikeLines/server.py -Scanned: 2016-10-19 10:59:29.279269 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -morphee31/flask_example -https://github.com/morphee31/flask_example -Entry file: None -Scanned: 2016-10-19 10:59:29.932597 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wumb0/flask-examples -https://github.com/wumb0/flask-examples -Entry file: flask-examples/minitwit/minitwit.py -Scanned: 2016-10-19 10:59:31.496452 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -vladimirdotk/flask-boilerplate -https://github.com/vladimirdotk/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 10:59:43.483600 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vladimirdotk/flask-boilerplate. - -zubairah/Flask_App -https://github.com/zubairah/Flask_App -Entry file: Flask_App/Flask_App/app.py -Scanned: 2016-10-19 10:59:44.882644 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ramwin/flask_tutorial -https://github.com/ramwin/flask_tutorial -Entry file: None -Scanned: 2016-10-19 10:59:47.912046 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kolapapa/blog_kola -https://github.com/kolapapa/blog_kola -Entry file: blog_kola/db.py -Scanned: 2016-10-19 10:59:53.113112 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: blog_kola/.venv/lib/python2.7/genericpath.py - -christopherL91/pythonflask -https://github.com/christopherL91/pythonflask -Entry file: pythonflask/app/main.py -Scanned: 2016-10-19 10:59:57.395512 -No vulnerabilities found. - - -f-guitart/progcoms3-flask -https://github.com/f-guitart/progcoms3-flask -Entry file: progcoms3-flask/app.py -Scanned: 2016-10-19 11:00:03.671563 -No vulnerabilities found. - - -jackeylu/microblog -https://github.com/jackeylu/microblog -Entry file: None -Scanned: 2016-10-19 11:00:04.177313 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -garaud/pyris -https://github.com/garaud/pyris -Entry file: pyris/pyris/api/__init__.py -Scanned: 2016-10-19 11:00:05.585197 -No vulnerabilities found. - - -nicc777/flask-webservice-wsgi-python3-demo -https://github.com/nicc777/flask-webservice-wsgi-python3-demo -Entry file: flask-webservice-wsgi-python3-demo/fwsdemo/app.py -Scanned: 2016-10-19 11:00:06.975225 -No vulnerabilities found. - - -atbaker/zero-to-production -https://github.com/atbaker/zero-to-production -Entry file: zero-to-production/app.py -Scanned: 2016-10-19 11:00:10.861562 -No vulnerabilities found. - - -MicahSteinbrecher/mini-blog -https://github.com/MicahSteinbrecher/mini-blog -Entry file: mini-blog/flaskr.py -Scanned: 2016-10-19 11:00:12.189337 -No vulnerabilities found. - - -remarcbalisi/rest-demo-flask- -https://github.com/remarcbalisi/rest-demo-flask- -Entry file: rest-demo-flask-/app.py -Scanned: 2016-10-19 11:00:13.941052 -No vulnerabilities found. - - -duncan60/flask-github-api -https://github.com/duncan60/flask-github-api -Entry file: flask-github-api/app/__init__.py -Scanned: 2016-10-19 11:00:15.320299 -No vulnerabilities found. - - -mattvisco/flask_test_2 -https://github.com/mattvisco/flask_test_2 -Entry file: flask_test_2/insta.py -Scanned: 2016-10-19 11:00:16.686196 -No vulnerabilities found. - - -pavelchalyk/blackjack_on_flask -https://github.com/pavelchalyk/blackjack_on_flask -Entry file: blackjack_on_flask/blackjack.py -Scanned: 2016-10-19 11:00:19.107608 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -merryHunter/chat-flask-socketio -https://github.com/merryHunter/chat-flask-socketio -Entry file: chat-flask-socketio/chat.py -Scanned: 2016-10-19 11:00:24.425705 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rjantos/flask-hello-world -https://github.com/rjantos/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 11:00:24.982548 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -sd16spring/Toolbox-Flask -https://github.com/sd16spring/Toolbox-Flask -Entry file: Toolbox-Flask/hello.py -Scanned: 2016-10-19 11:00:28.154919 -No vulnerabilities found. - - -bsteinberg/flask -https://github.com/bsteinberg/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 11:00:29.272662 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -HRKpython/flask -https://github.com/HRKpython/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 11:00:30.371990 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -ninadmhatre/zual -https://github.com/ninadmhatre/zual -Entry file: zual/local_mods/flask-blogging/test/__init__.py -Scanned: 2016-10-19 11:00:33.411932 -No vulnerabilities found. - - -taogeT/flask-celery -https://github.com/taogeT/flask-celery -Entry file: flask-celery/example/app/__init__.py -Scanned: 2016-10-19 11:00:34.817847 -No vulnerabilities found. - - -frankV/flask-sendgrid -https://github.com/frankV/flask-sendgrid -Entry file: flask-sendgrid/setup.py -Scanned: 2016-10-19 11:00:36.065308 -No vulnerabilities found. - - -islandev/flaskweb -https://github.com/islandev/flaskweb -Entry file: None -Scanned: 2016-10-19 11:00:36.595667 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gyonghua/flasktaskr -https://github.com/gyonghua/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:00:37.108426 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Rothschild0120/flaskyblog -https://github.com/Rothschild0120/flaskyblog -Entry file: flaskyblog/app/__init__.py -Scanned: 2016-10-19 11:00:42.961326 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zixuzhang/flasky -https://github.com/zixuzhang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:00:45.502295 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stalwart201/flaskimgupload -https://github.com/stalwart201/flaskimgupload -Entry file: flaskimgupload/upload.py -Scanned: 2016-10-19 11:00:46.776221 -No vulnerabilities found. - - -yuyiwei305/flaskr -https://github.com/yuyiwei305/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:00:47.297379 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoobalias/Flaskr -https://github.com/hoobalias/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 11:00:49.814210 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -azureappserviceoss/FlaskAzure -https://github.com/azureappserviceoss/FlaskAzure -Entry file: FlaskAzure/FlaskWebProject1/__init__.py -Scanned: 2016-10-19 11:01:00.126114 -No vulnerabilities found. - - -yhappy/FlaskProjects -https://github.com/yhappy/FlaskProjects -Entry file: FlaskProjects/FlaskProjects.py -Scanned: 2016-10-19 11:01:04.459001 -No vulnerabilities found. - - -tajihiro/FlaskBluemix -https://github.com/tajihiro/FlaskBluemix -Entry file: FlaskBluemix/index.py -Scanned: 2016-10-19 11:01:06.724642 -No vulnerabilities found. - - -Leyawiin/FlaskDemo -https://github.com/Leyawiin/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 11:01:07.287972 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KotiyaSenya/FlaskLearn -https://github.com/KotiyaSenya/FlaskLearn -Entry file: FlaskLearn/flask_learn/__init__.py -Scanned: 2016-10-19 11:01:08.729957 -No vulnerabilities found. - - -Patreon/cartographer -https://github.com/Patreon/cartographer -Entry file: cartographer/example/generic_social_network/app/__init__.py -Scanned: 2016-10-19 11:01:11.480339 -No vulnerabilities found. - - -Ketouem/flask-boto3 -https://github.com/Ketouem/flask-boto3 -Entry file: flask-boto3/example.py -Scanned: 2016-10-19 11:01:12.895901 -No vulnerabilities found. - - -Pushould/pushould-flask-sample -https://github.com/Pushould/pushould-flask-sample -Entry file: pushould-flask-sample/app.py -Scanned: 2016-10-19 11:01:14.244614 -No vulnerabilities found. - - -miaoihan/qulook_flask -https://github.com/miaoihan/qulook_flask -Entry file: qulook_flask/qulook.py -Scanned: 2016-10-19 11:01:17.546981 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: qulook_flask/ENV/lib/python2.7/genericpath.py - -rogerpence/Flask-App -https://github.com/rogerpence/Flask-App -Entry file: Flask-App/app/__init__.py -Scanned: 2016-10-19 11:01:19.210804 -No vulnerabilities found. - - -sandmarq/flask_test -https://github.com/sandmarq/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 11:01:19.812284 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -barcai/Flask_Megatutorial -https://github.com/barcai/Flask_Megatutorial -Entry file: Flask_Megatutorial/app/__init__.py -Scanned: 2016-10-19 11:01:21.167770 -No vulnerabilities found. - - -kessiacastro/flask-hello -https://github.com/kessiacastro/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-19 11:01:26.221167 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -renaldopringle/flask_heroku -https://github.com/renaldopringle/flask_heroku -Entry file: flask_heroku/app.py -Scanned: 2016-10-19 11:01:29.392036 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sunhughees/flask-blog -https://github.com/sunhughees/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:01:30.663727 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -AVandelay/flask_blog -https://github.com/AVandelay/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:01:31.243772 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -uyoaix/learn-flask -https://github.com/uyoaix/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 11:01:31.948396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -frenos/flask-sample -https://github.com/frenos/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-19 11:01:32.465408 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gyonghua/flask-blog -https://github.com/gyonghua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:01:35.008377 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Zhgong/flask_microblog -https://github.com/Zhgong/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 11:01:36.570275 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhangcheng/flask-example -https://github.com/zhangcheng/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-19 11:01:38.086221 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gemimarosier/flask_project -https://github.com/gemimarosier/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-19 11:01:38.889795 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gchange/flask_server -https://github.com/gchange/flask_server -Entry file: flask_server/flask_server/main.py -Scanned: 2016-10-19 11:01:47.212261 -No vulnerabilities found. - - -Nickyzj/flask-first -https://github.com/Nickyzj/flask-first -Entry file: flask-first/flask-first-notes.py -Scanned: 2016-10-19 11:01:48.758379 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Unicomcat/flask_test -https://github.com/Unicomcat/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 11:01:49.377115 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -testforvln/flask-learning -https://github.com/testforvln/flask-learning -Entry file: flask-learning/hello.py -Scanned: 2016-10-19 11:01:50.630189 -No vulnerabilities found. - - -m18664319351/Blog_Flask -https://github.com/m18664319351/Blog_Flask -Entry file: Blog_Flask/app/__init__.py -Scanned: 2016-10-19 11:01:51.933056 -No vulnerabilities found. - - -propupul/Flask_app -https://github.com/propupul/Flask_app -Entry file: Flask_app/test.py -Scanned: 2016-10-19 11:01:52.436490 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jidn/flask-obscure -https://github.com/jidn/flask-obscure -Entry file: flask-obscure/tests/test_url.py -Scanned: 2016-10-19 11:01:59.829989 -No vulnerabilities found. - - -cdaidone/small_flask -https://github.com/cdaidone/small_flask -Entry file: small_flask/small_flask.py -Scanned: 2016-10-19 11:02:08.531558 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -morphee31/flask_example -https://github.com/morphee31/flask_example -Entry file: None -Scanned: 2016-10-19 11:02:09.060730 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pedrogaudencio/refunite-flask -https://github.com/pedrogaudencio/refunite-flask -Entry file: refunite-flask/app.py -Scanned: 2016-10-19 11:02:10.593884 -No vulnerabilities found. - - -master105/flask_server -https://github.com/master105/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-19 11:02:13.415941 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -d3prof3t/flask-intro -https://github.com/d3prof3t/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:02:13.913706 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zubairah/Flask_App -https://github.com/zubairah/Flask_App -Entry file: Flask_App/Flask_App/app.py -Scanned: 2016-10-19 11:02:14.426794 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shinstev/flask_server -https://github.com/shinstev/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-19 11:02:14.947265 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vramakin/LearnFlask -https://github.com/vramakin/LearnFlask -Entry file: LearnFlask/ex1_URL解析.py -Scanned: 2016-10-19 11:02:16.467933 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nbeede/docker-flask -https://github.com/nbeede/docker-flask -Entry file: docker-flask/app.py -Scanned: 2016-10-19 11:02:20.733198 -No vulnerabilities found. - - -runningstrawberry/microblog -https://github.com/runningstrawberry/microblog -Entry file: None -Scanned: 2016-10-19 11:02:21.256209 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kolapapa/blog_kola -https://github.com/kolapapa/blog_kola -Entry file: blog_kola/db.py -Scanned: 2016-10-19 11:02:21.936319 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: blog_kola/.venv/lib/python2.7/genericpath.py - -B2Crypt/Random-Gamemode- -https://github.com/B2Crypt/Random-Gamemode- -Entry file: Random-Gamemode-/FLASK/__init__.py -Scanned: 2016-10-19 11:02:24.603930 -No vulnerabilities found. - - -Lich2013/learnflask -https://github.com/Lich2013/learnflask -Entry file: None -Scanned: 2016-10-19 11:02:29.230072 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Lich2013/learnflask. - -jbisasky/flaskProtoBuffer -https://github.com/jbisasky/flaskProtoBuffer -Entry file: flaskProtoBuffer/flaskHello.py -Scanned: 2016-10-19 11:02:34.398027 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -WangShengguang/FlaskWebDevelopment -https://github.com/WangShengguang/FlaskWebDevelopment -Entry file: FlaskWebDevelopment/Full_Stack_Foundations/finalproject.py -Scanned: 2016-10-19 11:02:34.976148 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunliuHub/FlaskWebDevelopment -https://github.com/JunliuHub/FlaskWebDevelopment -Entry file: FlaskWebDevelopment/Full_Stack_Foundations/finalproject.py -Scanned: 2016-10-19 11:02:35.473898 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adrianomaringolo/py-flask-tuts -https://github.com/adrianomaringolo/py-flask-tuts -Entry file: None -Scanned: 2016-10-19 11:02:40.653681 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rjantos/flask-hello-world -https://github.com/rjantos/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 11:02:41.659010 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ishwarya-iyer/nuage_proj_flask_app -https://github.com/ishwarya-iyer/nuage_proj_flask_app -Entry file: nuage_proj_flask_app/app.py -Scanned: 2016-10-19 11:02:43.649708 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SamirKanaan/PlantillaFlaskREST1 -https://github.com/SamirKanaan/PlantillaFlaskREST1 -Entry file: PlantillaFlaskREST1/plantilla1.py -Scanned: 2016-10-19 11:02:45.015821 -No vulnerabilities found. - - -remarcbalisi/flask-angular-auth -https://github.com/remarcbalisi/flask-angular-auth -Entry file: flask-angular-auth/project/__init__.py -Scanned: 2016-10-19 11:02:46.289063 -No vulnerabilities found. - - -jarosenb/flask_ionratio_V2 -https://github.com/jarosenb/flask_ionratio_V2 -Entry file: flask_ionratio_V2/hello.py -Scanned: 2016-10-19 11:02:47.630876 -No vulnerabilities found. - - -themuppet2/flask-hello-world -https://github.com/themuppet2/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 11:02:48.175842 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -kindoprec/Flask-SecureHeaders -https://github.com/kindoprec/Flask-SecureHeaders -Entry file: Flask-SecureHeaders/tests/core_test.py -Scanned: 2016-10-19 11:02:50.557106 -No vulnerabilities found. - - -ishwarya-iyer/nuage_flask_app -https://github.com/ishwarya-iyer/nuage_flask_app -Entry file: nuage_flask_app/app.py -Scanned: 2016-10-19 11:02:53.445042 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Christomas/flask_project_skeleton -https://github.com/Christomas/flask_project_skeleton -Entry file: flask_project_skeleton/app/__init__.py -Scanned: 2016-10-19 11:02:54.811138 -No vulnerabilities found. - - -pranavn-cuelogic/flask_video_conference_room -https://github.com/pranavn-cuelogic/flask_video_conference_room -Entry file: flask_video_conference_room/video_conf/main.py -Scanned: 2016-10-19 11:02:56.090514 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -llxxee/A-website-by-Flask -https://github.com/llxxee/A-website-by-Flask -Entry file: None -Scanned: 2016-10-19 11:02:57.448537 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/llxxee/A-website-by-Flask. - -micah-cal-sandbox/flask-heroku-sandbox -https://github.com/micah-cal-sandbox/flask-heroku-sandbox -Entry file: flask-heroku-sandbox/app.py -Scanned: 2016-10-19 11:03:00.829759 -No vulnerabilities found. - - -lkpanganiban/flask-rest-example -https://github.com/lkpanganiban/flask-rest-example -Entry file: flask-rest-example/app.py -Scanned: 2016-10-19 11:03:08.142701 -Vulnerability 1: -File: flask-rest-example/app.py - > User input at line 48, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flask-rest-example/app.py - > reaches line 55, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -rodcox89/flask-restful-blueprint-boilerplate -https://github.com/rodcox89/flask-restful-blueprint-boilerplate -Entry file: flask-restful-blueprint-boilerplate/main.py -Scanned: 2016-10-19 11:03:11.596331 -No vulnerabilities found. - - -bellkev/docker-flask-browserify -https://github.com/bellkev/docker-flask-browserify -Entry file: docker-flask-browserify/src/python/hello.py -Scanned: 2016-10-19 11:03:12.874611 -No vulnerabilities found. - - -braddmiller/flask-by-example -https://github.com/braddmiller/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 11:03:13.635998 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -technocake/flask-user-profiles-example -https://github.com/technocake/flask-user-profiles-example -Entry file: flask-user-profiles-example/pyhtml.py -Scanned: 2016-10-19 11:03:16.364752 -No vulnerabilities found. - - -dhiraka/flask_basic_app -https://github.com/dhiraka/flask_basic_app -Entry file: flask_basic_app/test_rest_app.py -Scanned: 2016-10-19 11:03:17.635367 -No vulnerabilities found. - - -udpcloud/flask-rest-api -https://github.com/udpcloud/flask-rest-api -Entry file: flask-rest-api/app/__init__.py -Scanned: 2016-10-19 11:03:18.139991 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AndersonQ/appengine-flask-contacts-api -https://github.com/AndersonQ/appengine-flask-contacts-api -Entry file: appengine-flask-contacts-api/application/__init__.py -Scanned: 2016-10-19 11:03:22.747598 -No vulnerabilities found. - - -tych0/flask-demo-app -https://github.com/tych0/flask-demo-app -Entry file: flask-demo-app/app/__init__.py -Scanned: 2016-10-19 11:03:24.021863 -No vulnerabilities found. - - -aaronja38/assignment10-flask -https://github.com/aaronja38/assignment10-flask -Entry file: assignment10-flask/winners.py -Scanned: 2016-10-19 11:03:27.017459 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: assignment10-flask/env/lib/python2.7/genericpath.py - -Christomas/i_dev_flask -https://github.com/Christomas/i_dev_flask -Entry file: i_dev_flask/app/__init__.py -Scanned: 2016-10-19 11:03:28.475901 -Vulnerability 1: -File: i_dev_flask/app/auth/views.py - > User input at line 66, trigger word ".data": - user.email = form.email.data -File: i_dev_flask/app/auth/views.py - > reaches line 72, trigger word "url_for(": - options.send_email(user.email, '验证邮箱', 'auth/mail/confirm',user=user, url=url_for('auth.confirm',token=token, _external=True)) - -Vulnerability 2: -File: i_dev_flask/app/auth/views.py - > User input at line 175, trigger word ".data": - current_user.email = form.email.data -File: i_dev_flask/app/auth/views.py - > reaches line 179, trigger word "url_for(": - options.send_email(current_user.email, '验证邮箱', 'auth/mail/confirm',user=current_user, url=url_for('auth.new_confirm',token=token, _external=True)) - - - -paulsavala/flask_aws_demo -https://github.com/paulsavala/flask_aws_demo -Entry file: None -Scanned: 2016-10-19 11:03:35.740597 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -avikantz/Flask-API-Demo -https://github.com/avikantz/Flask-API-Demo -Entry file: Flask-API-Demo/app/__init__.py -Scanned: 2016-10-19 11:03:37.441814 -No vulnerabilities found. - - -deenaacree/flask_app1 -https://github.com/deenaacree/flask_app1 -Entry file: flask_app1/songsapp.py -Scanned: 2016-10-19 11:03:40.541066 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_app1/env/lib/python2.7/genericpath.py - -AMontalva/flask_hello_world -https://github.com/AMontalva/flask_hello_world -Entry file: None -Scanned: 2016-10-19 11:03:41.050356 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AMontalva/flask_hello_world. - -xiewenlongs/Flask-CacheOBJ -https://github.com/xiewenlongs/Flask-CacheOBJ -Entry file: Flask-CacheOBJ/tests.py -Scanned: 2016-10-19 11:03:42.634962 -No vulnerabilities found. - - -thefunkjunky/python-flask-boilerplate -https://github.com/thefunkjunky/python-flask-boilerplate -Entry file: python-flask-boilerplate/mainapp/__init__.py -Scanned: 2016-10-19 11:03:44.018274 -No vulnerabilities found. - - -harryoh/flask-rest-api -https://github.com/harryoh/flask-rest-api -Entry file: flask-rest-api/app/__init__.py -Scanned: 2016-10-19 11:03:44.553541 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DanBlakeman/flask-deploy-practice -https://github.com/DanBlakeman/flask-deploy-practice -Entry file: flask-deploy-practice/src/app.py -Scanned: 2016-10-19 11:03:45.878044 -No vulnerabilities found. - - -MoxmiNu/flask-mongo-test -https://github.com/MoxmiNu/flask-mongo-test -Entry file: flask-mongo-test/provisioning/files/dr-app.py -Scanned: 2016-10-19 11:04:02.394369 -No vulnerabilities found. - - -medev21/Social-Network---Flask -https://github.com/medev21/Social-Network---Flask -Entry file: Social-Network---Flask/app.py -Scanned: 2016-10-19 11:04:03.674903 -No vulnerabilities found. - - -sealzjh/flask-celery-test -https://github.com/sealzjh/flask-celery-test -Entry file: None -Scanned: 2016-10-19 11:04:04.958258 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sealzjh/flask-celery-test. - -Glaun/flask-hello-world -https://github.com/Glaun/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 11:04:05.479746 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -PushpakPati/flask-by-example -https://github.com/PushpakPati/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 11:04:06.158789 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aintmetho/flask -https://github.com/aintmetho/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 11:04:08.363815 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -acouderc/flask -https://github.com/acouderc/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 11:04:09.265188 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -MapEntryManagement/flask -https://github.com/MapEntryManagement/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 11:04:10.242268 -No vulnerabilities found. -An Error occurred while scanning the repo: ('Unexpected node type:', ) - -klen/flask-pw -https://github.com/klen/flask-pw -Entry file: flask-pw/tests.py -Scanned: 2016-10-19 11:04:11.723342 -No vulnerabilities found. - - -KujiraProject/Flask-PAM -https://github.com/KujiraProject/Flask-PAM -Entry file: Flask-PAM/example/www.py -Scanned: 2016-10-19 11:04:13.125295 -No vulnerabilities found. - - -colingorrie/flask-boilerplate -https://github.com/colingorrie/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 11:04:13.641362 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/colingorrie/flask-boilerplate. - -TwilioDevEd/automated-survey-flask -https://github.com/TwilioDevEd/automated-survey-flask -Entry file: automated-survey-flask/automated_survey_flask/__init__.py -Scanned: 2016-10-19 11:04:17.061635 -No vulnerabilities found. - - -wangxuan007/flasky -https://github.com/wangxuan007/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:04:17.598083 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lambdaplus/flasko -https://github.com/lambdaplus/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-19 11:04:25.021466 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py - -xiaohu2015/Flasky -https://github.com/xiaohu2015/Flasky -Entry file: Flasky/Flasky.py -Scanned: 2016-10-19 11:04:27.013936 -No vulnerabilities found. - - -yu66s/flaskr -https://github.com/yu66s/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:04:27.524267 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cwywang/flasky -https://github.com/cwywang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:04:28.037651 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gene1wood/flaskoktaapp -https://github.com/gene1wood/flaskoktaapp -Entry file: flaskoktaapp/flaskoktaapp/__init__.py -Scanned: 2016-10-19 11:04:29.429131 -Vulnerability 1: -File: flaskoktaapp/flaskoktaapp/__init__.py - > User input at line 201, trigger word "form[": - url = request.form['RelayState'] -Reassigned in: - File: flaskoktaapp/flaskoktaapp/__init__.py - > Line 196: url = url_for('user') -File: flaskoktaapp/flaskoktaapp/__init__.py - > reaches line 204, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - - - -SSUHan/flasktutorial -https://github.com/SSUHan/flasktutorial -Entry file: None -Scanned: 2016-10-19 11:04:30.004151 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ma53192190/flaskwork -https://github.com/ma53192190/flaskwork -Entry file: flaskwork/flaskwork.py -Scanned: 2016-10-19 11:04:31.823423 -No vulnerabilities found. - - -hoobalias/Flaskr -https://github.com/hoobalias/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 11:04:32.333788 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NapoleonYoung/FlaskWeb -https://github.com/NapoleonYoung/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-19 11:04:32.952322 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -zhouyang2640/FlaskInit -https://github.com/zhouyang2640/FlaskInit -Entry file: FlaskInit/hello.py -Scanned: 2016-10-19 11:04:38.398992 -No vulnerabilities found. - - -s3c0nDD/FlaskTutorial -https://github.com/s3c0nDD/FlaskTutorial -Entry file: None -Scanned: 2016-10-19 11:04:39.926650 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ZaighumRajput/flaskPractice -https://github.com/ZaighumRajput/flaskPractice -Entry file: flaskPractice/chapter3/hello.py -Scanned: 2016-10-19 11:04:44.070581 -No vulnerabilities found. - - -rmotr/flask-api-example -https://github.com/rmotr/flask-api-example -Entry file: flask-api-example/api/_04_delete_method.py -Scanned: 2016-10-19 11:04:45.845582 -No vulnerabilities found. - - -frankpiva/mastering-flask -https://github.com/frankpiva/mastering-flask -Entry file: mastering-flask/main.py -Scanned: 2016-10-19 11:04:49.869709 -No vulnerabilities found. - - -sandmarq/flask_test -https://github.com/sandmarq/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 11:04:50.413409 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -barcai/Flask_Megatutorial -https://github.com/barcai/Flask_Megatutorial -Entry file: Flask_Megatutorial/app/__init__.py -Scanned: 2016-10-19 11:05:04.821018 -No vulnerabilities found. - - -kosen10spajam/f-flask -https://github.com/kosen10spajam/f-flask -Entry file: f-flask/main.py -Scanned: 2016-10-19 11:05:06.221657 -Vulnerability 1: -File: f-flask/main.py - > User input at line 132, trigger word "get(": - since = int(request.args.get('since')) -File: f-flask/main.py - > reaches line 134, trigger word "execute(": - sql.execute('SELECT time, animal, message FROM messages WHERE time >= %d' % since) - -Vulnerability 2: -File: f-flask/main.py - > User input at line 142, trigger word "get(": - animal = request.values.get('animal') -File: f-flask/main.py - > reaches line 146, trigger word "execute(": - sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message)) - -Vulnerability 3: -File: f-flask/main.py - > User input at line 143, trigger word "get(": - message = request.values.get('message') -File: f-flask/main.py - > reaches line 146, trigger word "execute(": - sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message)) - -Vulnerability 4: -File: f-flask/main.py - > User input at line 144, trigger word "get(": - time = int(request.values.get('time')) -File: f-flask/main.py - > reaches line 146, trigger word "execute(": - sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message)) - - - -jjapp/flask-blog -https://github.com/jjapp/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:05:06.769799 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -engfilipe/curso_flask -https://github.com/engfilipe/curso_flask -Entry file: curso_flask/photolog/__init__.py -Scanned: 2016-10-19 11:05:12.405549 -Vulnerability 1: -File: curso_flask/photolog/login_view.py - > User input at line 39, trigger word "get(": - next_ = request.args.get('next') -Reassigned in: - File: curso_flask/photolog/login_view.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect('/index') - File: curso_flask/photolog/login_view.py - > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Autenticação', form=form) - File: curso_flask/photolog/login_view.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: curso_flask/photolog/login_view.py - > reaches line 40, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_ or url_for('lista')) - -Vulnerability 2: -File: curso_flask/photolog/login_view.py - > User input at line 39, trigger word "get(": - next_ = request.args.get('next') -Reassigned in: - File: curso_flask/photolog/login_view.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect('/index') - File: curso_flask/photolog/login_view.py - > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Autenticação', form=form) - File: curso_flask/photolog/login_view.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: curso_flask/photolog/login_view.py - > reaches line 40, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next_ or url_for('lista')) - - - -zhang-zhang/learning-flask -https://github.com/zhang-zhang/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-19 11:05:13.065606 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mihai011/flask_server -https://github.com/mihai011/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-19 11:05:13.560284 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -morganvdavis/boilerplate-flask -https://github.com/morganvdavis/boilerplate-flask -Entry file: None -Scanned: 2016-10-19 11:05:14.824633 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/morganvdavis/boilerplate-flask. - -jwg4/flask_converter -https://github.com/jwg4/flask_converter -Entry file: flask_converter/examples/app_with_constructor.py -Scanned: 2016-10-19 11:05:16.124437 -No vulnerabilities found. - - -AVandelay/flask_blog -https://github.com/AVandelay/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:05:16.656362 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Riffstation/flaskutilsexample -https://github.com/Riffstation/flaskutilsexample -Entry file: flaskutilsexample/src/app/__init__.py -Scanned: 2016-10-19 11:20:16.571691 -No vulnerabilities found. - - -dolv/Flask -https://github.com/dolv/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:20:18.023365 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Mamun-dueee/flask -https://github.com/Mamun-dueee/flask -Entry file: flask/setup.py -Scanned: 2016-10-19 11:20:18.913468 -Vulnerability 1: -File: flask/examples/jqueryexample/jqueryexample.py - > User input at line 18, trigger word "get(": - a = request.args.get('a', 0,type=int) -File: flask/examples/jqueryexample/jqueryexample.py - > reaches line 20, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result=a + b) - -Vulnerability 2: -File: flask/examples/jqueryexample/jqueryexample.py - > User input at line 19, trigger word "get(": - b = request.args.get('b', 0,type=int) -File: flask/examples/jqueryexample/jqueryexample.py - > reaches line 20, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result=a + b) - - - -KyleSeem/Flask -https://github.com/KyleSeem/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:20:19.485423 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nppat/Flask -https://github.com/nppat/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:20:20.102473 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Kirade/Flask -https://github.com/Kirade/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:20:20.612424 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cloverstd/flask-wechatpy -https://github.com/cloverstd/flask-wechatpy -Entry file: flask-wechatpy/demo.py -Scanned: 2016-10-19 11:20:21.896967 -No vulnerabilities found. - - -13923858795/Tutorial -https://github.com/13923858795/Tutorial -Entry file: Tutorial/my/app/__init__.py -Scanned: 2016-10-19 11:20:25.911565 -Vulnerability 1: -File: Tutorial/my/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 33: posts = pagination.items - File: Tutorial/my/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Tutorial/my/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 23: show_followed = False - File: Tutorial/my/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Tutorial/my/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 44: posts = pagination.items -File: Tutorial/my/app/main/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Tutorial/my/app/main/views.py - > User input at line 109, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 111: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Tutorial/my/app/main/views.py - > Line 113: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 116: comments = pagination.items - File: Tutorial/my/app/main/views.py - > Line 108: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Tutorial/my/app/main/views.py - > reaches line 117, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Tutorial/my/app/main/views.py - > User input at line 176, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 177: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 180: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Tutorial/my/app/main/views.py - > Line 175: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 182, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Tutorial/my/app/main/views.py - > User input at line 193, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 194: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 197: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Tutorial/my/app/main/views.py - > Line 192: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 199, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Tutorial/my/app/main/views.py - > User input at line 231, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 232: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 235: comments = pagination.items -File: Tutorial/my/app/main/views.py - > reaches line 236, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -szparag3/flask-hello-world -https://github.com/szparag3/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 11:20:26.467926 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -QuentinMoss/reimagined-computing-machine -https://github.com/QuentinMoss/reimagined-computing-machine -Entry file: reimagined-computing-machine/app/__init__.py -Scanned: 2016-10-19 11:20:27.799820 -No vulnerabilities found. - - -IronFist16/flasky -https://github.com/IronFist16/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:20:28.303736 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bsdtux/flaskblog -https://github.com/bsdtux/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 11:20:28.822771 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -terryllowery/flasktaskr -https://github.com/terryllowery/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:20:29.323274 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -penglee87/flaskweb -https://github.com/penglee87/flaskweb -Entry file: None -Scanned: 2016-10-19 11:20:29.867660 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yuyanqiuqiu/flaskr -https://github.com/yuyanqiuqiu/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:20:30.374493 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -WayneChen1987/flasky -https://github.com/WayneChen1987/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:20:30.960431 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -playgrdstar/flaskapp -https://github.com/playgrdstar/flaskapp -Entry file: None -Scanned: 2016-10-19 11:20:31.556215 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/playgrdstar/flaskapp. - -LongstreetSolutions/flaskr -https://github.com/LongstreetSolutions/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:20:32.080132 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NathanJ4620/flasker -https://github.com/NathanJ4620/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-19 11:20:32.585772 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulmkumar/flaskapp -https://github.com/rahulmkumar/flaskapp -Entry file: None -Scanned: 2016-10-19 11:20:33.098819 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rahulmkumar/flaskapp. - -chenglinguang/flaskky -https://github.com/chenglinguang/flaskky -Entry file: flaskky/hello1.py -Scanned: 2016-10-19 11:20:34.553900 -No vulnerabilities found. - - -jutreras/flaskTest -https://github.com/jutreras/flaskTest -Entry file: flaskTest/url.py -Scanned: 2016-10-19 11:20:35.612640 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -feocco/flaskLab -https://github.com/feocco/flaskLab -Entry file: flaskLab/app.py -Scanned: 2016-10-19 11:20:36.832647 -Vulnerability 1: -File: flaskLab/auth.py - > User input at line 26, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flaskLab/auth.py - > Line 32: user = User(username=username) -File: flaskLab/auth.py - > reaches line 36, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 2: -File: flaskLab/auth.py - > User input at line 26, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flaskLab/auth.py - > Line 32: user = User(username=username) -File: flaskLab/auth.py - > reaches line 36, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: flaskLab/auth.py - > User input at line 42, trigger word "get(": - user = session.query(User).get(id) -File: flaskLab/auth.py - > reaches line 45, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username) - - - -sarahbees/FlaskHeroku -https://github.com/sarahbees/FlaskHeroku -Entry file: FlaskHeroku/hello.py -Scanned: 2016-10-19 11:20:38.051388 -No vulnerabilities found. - - -954324919/FlaskDemo -https://github.com/954324919/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 11:20:38.582509 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cdagli/flask-restful-example -https://github.com/cdagli/flask-restful-example -Entry file: flask-restful-example/api.py -Scanned: 2016-10-19 11:20:39.081201 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pavelzamyatin/flask-mega-tutorial -https://github.com/pavelzamyatin/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 11:21:15.620967 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -king100/flask-blog -https://github.com/king100/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:21:17.172017 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -yyoowwllgit/flask_server -https://github.com/yyoowwllgit/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-19 11:21:18.677744 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -m4ra/flask-stripe -https://github.com/m4ra/flask-stripe -Entry file: flask-stripe/app/__init__.py -Scanned: 2016-10-19 11:21:20.376003 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -skinnyal/flask_tutorial -https://github.com/skinnyal/flask_tutorial -Entry file: None -Scanned: 2016-10-19 11:21:20.875706 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rspears74/flask-intro -https://github.com/rspears74/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:21:21.373085 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Steve-Duncan/Learning-Flask -https://github.com/Steve-Duncan/Learning-Flask -Entry file: Learning-Flask/friends/server.py -Scanned: 2016-10-19 11:21:23.142320 -No vulnerabilities found. - - -jamesward/hello-flask -https://github.com/jamesward/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 11:21:23.712819 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -damyanbogoev/flask-cooking -https://github.com/damyanbogoev/flask-cooking -Entry file: flask-cooking/check.py -Scanned: 2016-10-19 11:21:25.106308 -No vulnerabilities found. - - -yyoowwllgit/flask_pro -https://github.com/yyoowwllgit/flask_pro -Entry file: flask_pro/he.py -Scanned: 2016-10-19 11:21:26.436710 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -egusahiroaki/flask_template -https://github.com/egusahiroaki/flask_template -Entry file: None -Scanned: 2016-10-19 11:21:26.942311 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/egusahiroaki/flask_template. - -ylto/learningFlask -https://github.com/ylto/learningFlask -Entry file: learningFlask/hello.py -Scanned: 2016-10-19 11:21:27.569730 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py - -frederickOtus/copypaste_flask -https://github.com/frederickOtus/copypaste_flask -Entry file: copypaste_flask/server.py -Scanned: 2016-10-19 11:21:28.929976 -No vulnerabilities found. - - -alexeib2014/Flask-Android -https://github.com/alexeib2014/Flask-Android -Entry file: Flask-Android/flask_sqlalchemy.py -Scanned: 2016-10-19 11:21:32.991808 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -richardtbell/flask-tutorial -https://github.com/richardtbell/flask-tutorial -Entry file: None -Scanned: 2016-10-19 11:21:33.550608 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -land-pack/flask-wordcounter -https://github.com/land-pack/flask-wordcounter -Entry file: flask-wordcounter/app.py -Scanned: 2016-10-19 11:21:36.800243 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-wordcounter/env/lib/python2.7/genericpath.py - -ibrahimirdem/flask-calisma -https://github.com/ibrahimirdem/flask-calisma -Entry file: flask-calisma/Hello.py -Scanned: 2016-10-19 11:21:37.993111 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prodicus/docker-flask -https://github.com/prodicus/docker-flask -Entry file: docker-flask/docker_flask/app.py -Scanned: 2016-10-19 11:21:39.271542 -No vulnerabilities found. - - -ItamarLevyOr/Flask_Tutorial -https://github.com/ItamarLevyOr/Flask_Tutorial -Entry file: Flask_Tutorial/flaskr.py -Scanned: 2016-10-19 11:21:43.158711 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Tutorial/venv/lib/python2.7/genericpath.py - -kcamenzind/flask_opentracing -https://github.com/kcamenzind/flask_opentracing -Entry file: flask_opentracing/tests/test_flask_opentracing.py -Scanned: 2016-10-19 11:21:44.846972 -No vulnerabilities found. - - -monburan/learn_flask -https://github.com/monburan/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-19 11:21:45.369639 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -plasx/flask-rest -https://github.com/plasx/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-19 11:21:46.370835 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChrisXiongWHU/flask_test -https://github.com/ChrisXiongWHU/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 11:21:46.930200 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kflavin/flask-tutorial -https://github.com/kflavin/flask-tutorial -Entry file: None -Scanned: 2016-10-19 11:21:47.420792 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MalhotraVijay/flask-boilerplate -https://github.com/MalhotraVijay/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 11:21:47.924908 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MalhotraVijay/flask-boilerplate. - -SIJP-ORG/flask-demo -https://github.com/SIJP-ORG/flask-demo -Entry file: None -Scanned: 2016-10-19 11:21:48.432975 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SIJP-ORG/flask-demo. - -KOREAN139/flask-blog -https://github.com/KOREAN139/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:21:48.964585 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -sumni-park/flask_blog -https://github.com/sumni-park/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:21:49.469449 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -novking/Flask_AWS -https://github.com/novking/Flask_AWS -Entry file: Flask_AWS/PlagiarismDefender/home.py -Scanned: 2016-10-19 11:21:50.804813 -Vulnerability 1: -File: Flask_AWS/PlagiarismDefender/home.py - > User input at line 26, trigger word "form[": - text_to_filter = request.form['text_to_check'] -Reassigned in: - File: Flask_AWS/PlagiarismDefender/home.py - > Line 31: sentences = sentence_splitter.tokenize(text_to_filter) - File: Flask_AWS/PlagiarismDefender/home.py - > Line 40: is_it_plagiarized = str(probability_of_plagiarism / len(sentences) * 100) + '%' - File: Flask_AWS/PlagiarismDefender/home.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('plagiarizer-submit.html') -File: Flask_AWS/PlagiarismDefender/home.py - > reaches line 41, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('plagiarizer-results.html',text_to_filter=text_to_filter, is_it_plagiarized=is_it_plagiarized) - - - -umutcoskun/flask-ready -https://github.com/umutcoskun/flask-ready -Entry file: flask-ready/src/app/__init__.py -Scanned: 2016-10-19 11:22:20.414016 -Vulnerability 1: -File: flask-ready/src/app/auth/validators.py - > User input at line 15, trigger word ".data": - entity = self.model.query.filter(self.field == field.data).first() -File: flask-ready/src/app/auth/validators.py - > reaches line 15, trigger word "filter(": - entity = self.model.query.filter(self.field == field.data).first() - -Vulnerability 2: -File: flask-ready/src/app/auth/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -File: flask-ready/src/app/auth/views.py - > reaches line 58, trigger word "flash(": - flash('Welcome {}'.format(user.name), 'info') - - - -Amertz08/flask-docker -https://github.com/Amertz08/flask-docker -Entry file: flask-docker/app/setup.py -Scanned: 2016-10-19 11:22:21.743206 -No vulnerabilities found. - - -viniciusramos91/flask-skeleton -https://github.com/viniciusramos91/flask-skeleton -Entry file: None -Scanned: 2016-10-19 11:22:22.257912 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/viniciusramos91/flask-skeleton. - -priteshgudge/django-flask -https://github.com/priteshgudge/django-flask -Entry file: django-flask/app.py -Scanned: 2016-10-19 11:22:23.462749 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lalvarezguillen/inmobiliaria_flask -https://github.com/lalvarezguillen/inmobiliaria_flask -Entry file: inmobiliaria_flask/web_stuff/web_app.py -Scanned: 2016-10-19 11:22:24.837494 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pythonadventurer/flask-blog -https://github.com/pythonadventurer/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:22:25.410664 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -JW275/flask_study -https://github.com/JW275/flask_study -Entry file: flask_study/views.py -Scanned: 2016-10-19 11:22:25.921434 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smeggingsmegger/flask-cookiecutter -https://github.com/smeggingsmegger/flask-cookiecutter -Entry file: flask-cookiecutter/{{cookiecutter.app_name}}/{{cookiecutter.app_name}}/__init__.py -Scanned: 2016-10-19 11:22:27.465359 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cdumay/flask-zookeeper -https://github.com/cdumay/flask-zookeeper -Entry file: flask-zookeeper/tests/test_blueprint.py -Scanned: 2016-10-19 11:22:28.853031 -No vulnerabilities found. - - -vaishakp9/flask-ask -https://github.com/vaishakp9/flask-ask -Entry file: flask-ask/server.py -Scanned: 2016-10-19 11:22:30.237397 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vesperalwall860/flask_blank -https://github.com/vesperalwall860/flask_blank -Entry file: flask_blank/project/__init__.py -Scanned: 2016-10-19 11:22:32.811160 -No vulnerabilities found. - - -natfoster82/flask-alcohol -https://github.com/natfoster82/flask-alcohol -Entry file: flask-alcohol/example/app.py -Scanned: 2016-10-19 11:22:34.213992 -Vulnerability 1: -File: flask-alcohol/example/app.py - > User input at line 138, trigger word "get(": - email = request.json.get('email') -File: flask-alcohol/example/app.py - > reaches line 139, trigger word "filter(": - user = cls.query.filter(db.func.lower(User.email) == db.func.lower(email)).first() - -Vulnerability 2: -File: flask-alcohol/example/app.py - > User input at line 279, trigger word "get(": - project_id = request.args.get('project_id') -Reassigned in: - File: flask-alcohol/example/app.py - > Line 282: ret_MAYBE_FUNCTION_NAME = query -File: flask-alcohol/example/app.py - > reaches line 278, trigger word "filter(": - query = query.filter(Post.last_published_at != None) - -Vulnerability 3: -File: flask-alcohol/example/app.py - > User input at line 279, trigger word "get(": - project_id = request.args.get('project_id') -Reassigned in: - File: flask-alcohol/example/app.py - > Line 282: ret_MAYBE_FUNCTION_NAME = query -File: flask-alcohol/example/app.py - > reaches line 281, trigger word "filter(": - query = query.filter(Post.project_id == project_id) - - - -liuzhangpei/myFlask -https://github.com/liuzhangpei/myFlask -Entry file: myFlask/project.py -Scanned: 2016-10-19 11:22:34.780833 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stevenzhang18/Indeed-Flask -https://github.com/stevenzhang18/Indeed-Flask -Entry file: Indeed-Flask/main.py -Scanned: 2016-10-19 11:22:47.817399 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -RAIRLab/Talos-Flask -https://github.com/RAIRLab/Talos-Flask -Entry file: None -Scanned: 2016-10-19 11:22:49.103864 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/RAIRLab/Talos-Flask. - -stewill/flask_web -https://github.com/stewill/flask_web -Entry file: flask_web/helloflask.py -Scanned: 2016-10-19 11:22:49.697779 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py - -bradkarels/restful-flask -https://github.com/bradkarels/restful-flask -Entry file: restful-flask/hello.py -Scanned: 2016-10-19 11:22:50.906756 -No vulnerabilities found. - - -linkcheng/flask_notes -https://github.com/linkcheng/flask_notes -Entry file: flask_notes/hello.py -Scanned: 2016-10-19 11:22:52.212222 -No vulnerabilities found. - - -Mamun-dueee/Flask-microblog -https://github.com/Mamun-dueee/Flask-microblog -Entry file: None -Scanned: 2016-10-19 11:22:59.986571 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -andrealmar/flask-microblog -https://github.com/andrealmar/flask-microblog -Entry file: None -Scanned: 2016-10-19 11:23:00.475137 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vdnhnguyen/flask-upload -https://github.com/vdnhnguyen/flask-upload -Entry file: flask-upload/index.py -Scanned: 2016-10-19 11:23:00.991896 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smrati/dockerize_flask -https://github.com/smrati/dockerize_flask -Entry file: dockerize_flask/app/__init__.py -Scanned: 2016-10-19 11:23:02.321767 -No vulnerabilities found. - - -cococohen/Microblog -https://github.com/cococohen/Microblog -Entry file: Microblog/flask/lib/python3.4/site-packages/flask_openid.py -Scanned: 2016-10-19 11:23:03.781188 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BeFunes/App-FlaskExercise -https://github.com/BeFunes/App-FlaskExercise -Entry file: App-FlaskExercise/app.py -Scanned: 2016-10-19 11:23:05.040284 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Nonja/FlaskArticleSearchNYT -https://github.com/Nonja/FlaskArticleSearchNYT -Entry file: FlaskArticleSearchNYT/app/__init__.py -Scanned: 2016-10-19 11:23:06.255628 -Vulnerability 1: -File: FlaskArticleSearchNYT/app/hummus.py - > User input at line 23, trigger word "get(": - begindate = request.args.get('begindate', '').replace('-', '') -Reassigned in: - File: FlaskArticleSearchNYT/app/hummus.py - > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage - File: FlaskArticleSearchNYT/app/hummus.py - > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params) -File: FlaskArticleSearchNYT/app/hummus.py - > reaches line 23, trigger word "replace(": - begindate = request.args.get('begindate', '').replace('-', '') - -Vulnerability 2: -File: FlaskArticleSearchNYT/app/hummus.py - > User input at line 24, trigger word "get(": - enddate = request.args.get('enddate', '').replace('-', '') -Reassigned in: - File: FlaskArticleSearchNYT/app/hummus.py - > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage - File: FlaskArticleSearchNYT/app/hummus.py - > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params) -File: FlaskArticleSearchNYT/app/hummus.py - > reaches line 24, trigger word "replace(": - enddate = request.args.get('enddate', '').replace('-', '') - -Vulnerability 3: -File: FlaskArticleSearchNYT/app/hummus.py - > User input at line 22, trigger word "get(": - searchquery = request.args.get('searchrequest', '') -Reassigned in: - File: FlaskArticleSearchNYT/app/hummus.py - > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage - File: FlaskArticleSearchNYT/app/hummus.py - > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params) -File: FlaskArticleSearchNYT/app/hummus.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(news=news, results=results, totalpages=totalpages, page=page, searchquery=searchquery) - -Vulnerability 4: -File: FlaskArticleSearchNYT/app/hummus.py - > User input at line 25, trigger word "get(": - page = request.args.get('page', '') -Reassigned in: - File: FlaskArticleSearchNYT/app/hummus.py - > Line 31: page = 0 - File: FlaskArticleSearchNYT/app/hummus.py - > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage - File: FlaskArticleSearchNYT/app/hummus.py - > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params) - File: FlaskArticleSearchNYT/app/hummus.py - > Line 41: page = data['response']['meta']['offset'] / 10 + 1 -File: FlaskArticleSearchNYT/app/hummus.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(news=news, results=results, totalpages=totalpages, page=page, searchquery=searchquery) - - - -mr1holmes/planup-backend -https://github.com/mr1holmes/planup-backend -Entry file: planup-backend/flaskapp/__init__.py -Scanned: 2016-10-19 11:23:07.570163 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tonuidavies/Discover -https://github.com/tonuidavies/Discover -Entry file: Discover/app.py -Scanned: 2016-10-19 11:23:15.916884 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Discover/venv/lib/python2.7/genericpath.py - -RydrDojo/Ridr_app -https://github.com/RydrDojo/Ridr_app -Entry file: None -Scanned: 2016-10-19 11:23:27.028933 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -thomasobrien99/flask-movie-crud -https://github.com/thomasobrien99/flask-movie-crud -Entry file: flask-movie-crud/app.py -Scanned: 2016-10-19 11:23:28.404940 -Vulnerability 1: -File: flask-movie-crud/app.py - > User input at line 47, trigger word "get(": - show_dir = Director.query.get(id) -File: flask-movie-crud/app.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/directors/show.html',dir=show_dir) - -Vulnerability 2: -File: flask-movie-crud/app.py - > User input at line 52, trigger word "get(": - edit_dir = Director.query.get(id) -File: flask-movie-crud/app.py - > reaches line 53, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/directors/edit.html',dir=edit_dir) - -Vulnerability 3: -File: flask-movie-crud/app.py - > User input at line 73, trigger word "get(": - director = Director.query.get(id) -File: flask-movie-crud/app.py - > reaches line 74, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('movies/index.html',director=director) - -Vulnerability 4: -File: flask-movie-crud/app.py - > User input at line 86, trigger word "get(": - director = Director.query.get(id) -File: flask-movie-crud/app.py - > reaches line 88, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('movies/new.html',director=director, tags=tags) - -Vulnerability 5: -File: flask-movie-crud/app.py - > User input at line 92, trigger word "get(": - movie = Movie.query.get(movie_id) -File: flask-movie-crud/app.py - > reaches line 94, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('movies/edit.html',movie=movie, tags=tags) - -Vulnerability 6: -File: flask-movie-crud/app.py - > User input at line 98, trigger word "get(": - movie = Movie.query.get(movie_id) -File: flask-movie-crud/app.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('movies/show.html',movie=movie) - -Vulnerability 7: -File: flask-movie-crud/app.py - > User input at line 136, trigger word "get(": - tag = Tag.query.get(id) -File: flask-movie-crud/app.py - > reaches line 137, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tags/show.html',tag=tag) - -Vulnerability 8: -File: flask-movie-crud/app.py - > User input at line 141, trigger word "get(": - tag = Tag.query.get(id) -File: flask-movie-crud/app.py - > reaches line 142, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tags/edit.html',tag=tag) - - - -thomasobrien99/flask_user_template -https://github.com/thomasobrien99/flask_user_template -Entry file: flask_user_template/app.py -Scanned: 2016-10-19 11:23:29.769390 -No vulnerabilities found. - - -krpeacock/flask_migrate_template -https://github.com/krpeacock/flask_migrate_template -Entry file: flask_migrate_template/app.py -Scanned: 2016-10-19 11:23:32.007516 -No vulnerabilities found. - - -thomasobrien99/flask-migrate-and-auth -https://github.com/thomasobrien99/flask-migrate-and-auth -Entry file: flask-migrate-and-auth/app.py -Scanned: 2016-10-19 11:23:33.834462 -No vulnerabilities found. - - -vmuguerzac/flask_by_example -https://github.com/vmuguerzac/flask_by_example -Entry file: flask_by_example/flask_by_example.py -Scanned: 2016-10-19 11:23:35.132673 -No vulnerabilities found. - - -Edubya77/hellow_world_flask -https://github.com/Edubya77/hellow_world_flask -Entry file: hellow_world_flask/hello_world.py -Scanned: 2016-10-19 11:23:36.394978 -No vulnerabilities found. - - -chavli/heroku-flask-start -https://github.com/chavli/heroku-flask-start -Entry file: heroku-flask-start/app.py -Scanned: 2016-10-19 11:23:37.763599 -No vulnerabilities found. - - -xilixjd/flask_project_blog -https://github.com/xilixjd/flask_project_blog -Entry file: flask_project_blog/models.py -Scanned: 2016-10-19 11:23:39.725199 -No vulnerabilities found. - - -kmalfatti/library-flask-app -https://github.com/kmalfatti/library-flask-app -Entry file: library-flask-app/app.py -Scanned: 2016-10-19 11:23:41.036482 -Vulnerability 1: -File: library-flask-app/app.py - > User input at line 63, trigger word "get(": - found_author = Author.query.get(id) -File: library-flask-app/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('books/index.html',author=found_author) - -Vulnerability 2: -File: library-flask-app/app.py - > User input at line 68, trigger word "get(": - found_author = Author.query.get(id) -File: library-flask-app/app.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('books/new.html',author=found_author) - - - -rbudzak/learnFlaskMigrate -https://github.com/rbudzak/learnFlaskMigrate -Entry file: learnFlaskMigrate/app.py -Scanned: 2016-10-19 11:23:42.367054 -No vulnerabilities found. - - -sh4nks/flask-caching -https://github.com/sh4nks/flask-caching -Entry file: flask-caching/setup.py -Scanned: 2016-10-19 11:23:46.002784 -No vulnerabilities found. - - -mani-python/flask -https://github.com/mani-python/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:23:49.816913 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -manikandaraj123ster/flask -https://github.com/manikandaraj123ster/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:23:50.371845 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Kirade/Flask -https://github.com/Kirade/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:23:50.886156 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -salhernandez/Flask -https://github.com/salhernandez/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:23:51.399992 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -murilobsd/zeus -https://github.com/murilobsd/zeus -Entry file: None -Scanned: 2016-10-19 11:23:53.005183 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/murilobsd/zeus. - -xuelangZF/NaHan -https://github.com/xuelangZF/NaHan -Entry file: NaHan/nahan/__init__.py -Scanned: 2016-10-19 11:23:55.828688 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -haklabrador/podatci-s-burza -https://github.com/haklabrador/podatci-s-burza -Entry file: podatci-s-burza/webserver.py -Scanned: 2016-10-19 11:23:57.253911 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -weinbergdavid/python-flask-security -https://github.com/weinbergdavid/python-flask-security -Entry file: python-flask-security/run.py -Scanned: 2016-10-19 11:24:19.890465 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -aaossa/flask-openshift -https://github.com/aaossa/flask-openshift -Entry file: flask-openshift/flask_openshift_template.py -Scanned: 2016-10-19 11:24:21.468402 -Vulnerability 1: -File: flask-openshift/flask_openshift_template.py - > User input at line 14, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: flask-openshift/flask_openshift_template.py - > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask-openshift/flask_openshift_template.py - > reaches line 15, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=username)) - -Vulnerability 2: -File: flask-openshift/flask_openshift_template.py - > User input at line 14, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: flask-openshift/flask_openshift_template.py - > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask-openshift/flask_openshift_template.py - > reaches line 15, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=username)) - - - -nsujan/flaskbot -https://github.com/nsujan/flaskbot -Entry file: flaskbot/wsgi/myflaskapp.py -Scanned: 2016-10-19 11:24:23.327150 -No vulnerabilities found. - - -davbrink/flaskblog -https://github.com/davbrink/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 11:24:24.338433 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -ToDolin/flaskgit -https://github.com/ToDolin/flaskgit -Entry file: flaskgit/flasky/app/__init__.py -Scanned: 2016-10-19 11:24:25.709021 -No vulnerabilities found. - - -yolandaz/flaskcars -https://github.com/yolandaz/flaskcars -Entry file: flaskcars/app.py -Scanned: 2016-10-19 11:24:31.857065 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskcars/venv/lib/python2.7/genericpath.py - -penglee87/flaskweb -https://github.com/penglee87/flaskweb -Entry file: None -Scanned: 2016-10-19 11:24:32.372315 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yuyanqiuqiu/flaskr -https://github.com/yuyanqiuqiu/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:24:32.867797 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Halcae/flaskapp -https://github.com/Halcae/flaskapp -Entry file: None -Scanned: 2016-10-19 11:24:33.417149 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Halcae/flaskapp. - -themuppet2/flasktaskr -https://github.com/themuppet2/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:24:33.944196 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -LongstreetSolutions/flaskr -https://github.com/LongstreetSolutions/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:24:34.459644 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stevehaigh/flasktest -https://github.com/stevehaigh/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 11:24:34.983195 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -juniorkrvl/flasky -https://github.com/juniorkrvl/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:24:35.485738 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NathanJ4620/flasker -https://github.com/NathanJ4620/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-19 11:24:37.038187 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SuZhiBai/flaskblog -https://github.com/SuZhiBai/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 11:24:38.552529 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -ncmadhu/FlaskDemo -https://github.com/ncmadhu/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 11:24:40.064633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AkshayBhagat/FlaskApp -https://github.com/AkshayBhagat/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 11:24:41.713254 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Qqlick/flaskRP -https://github.com/Qqlick/flaskRP -Entry file: flaskRP/flaskRP.py -Scanned: 2016-10-19 11:24:45.974856 -Vulnerability 1: -File: flaskRP/flaskRP.py - > User input at line 46, trigger word "form[": - title = request.form['title'] -File: flaskRP/flaskRP.py - > reaches line 53, trigger word "execute(": - g.db.execute('INSERT into posts (title, posts) VALUES (?,?)', [title, post]) - -Vulnerability 2: -File: flaskRP/flaskRP.py - > User input at line 47, trigger word "form[": - post = request.form['post'] -File: flaskRP/flaskRP.py - > reaches line 53, trigger word "execute(": - g.db.execute('INSERT into posts (title, posts) VALUES (?,?)', [title, post]) - - - -YoDaMa/FlaskApp -https://github.com/YoDaMa/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 11:24:46.623645 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -valasek/taekwondo-flask -https://github.com/valasek/taekwondo-flask -Entry file: None -Scanned: 2016-10-19 11:24:49.256765 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/valasek/taekwondo-flask. - -erose/tictactoe-flask -https://github.com/erose/tictactoe-flask -Entry file: tictactoe-flask/app.py -Scanned: 2016-10-19 11:24:52.518699 -No vulnerabilities found. - - -alexeib2014/Flask-Android -https://github.com/alexeib2014/Flask-Android -Entry file: Flask-Android/flask_sqlalchemy.py -Scanned: 2016-10-19 11:24:53.116920 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jdgwartney/flask-blueprint -https://github.com/jdgwartney/flask-blueprint -Entry file: flask-blueprint/application/__init__.py -Scanned: 2016-10-19 11:24:54.462117 -No vulnerabilities found. - - -stylianos-kampakis/flask-test -https://github.com/stylianos-kampakis/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 11:24:55.015753 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -rjantos/flask-blog -https://github.com/rjantos/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:24:57.525649 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -leofofeo/flask-stuff -https://github.com/leofofeo/flask-stuff -Entry file: flask-stuff/flask_test.py -Scanned: 2016-10-19 11:25:03.811257 -No vulnerabilities found. - - -greenapplepark/flask_docker -https://github.com/greenapplepark/flask_docker -Entry file: flask_docker/app/flaskEntry.py -Scanned: 2016-10-19 11:25:23.172187 -No vulnerabilities found. - - -karloku/beginners_flask -https://github.com/karloku/beginners_flask -Entry file: beginners_flask/application/__init__.py -Scanned: 2016-10-19 11:25:24.529480 -No vulnerabilities found. - - -s2tephen/flask-network -https://github.com/s2tephen/flask-network -Entry file: flask-network/app.py -Scanned: 2016-10-19 11:25:25.795089 -No vulnerabilities found. - - -julianparismorgan/flask_cellcounter -https://github.com/julianparismorgan/flask_cellcounter -Entry file: flask_cellcounter/cell-app.py -Scanned: 2016-10-19 11:25:30.221215 -No vulnerabilities found. - - -jdgwartney/hello-flask -https://github.com/jdgwartney/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 11:25:30.815264 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -rohanagrawal/flask_social -https://github.com/rohanagrawal/flask_social -Entry file: flask_social/app.py -Scanned: 2016-10-19 11:25:32.691334 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -monburan/learn_flask -https://github.com/monburan/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-19 11:25:33.201587 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChrisXiongWHU/flask_test -https://github.com/ChrisXiongWHU/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 11:25:33.760680 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -falterfriday/python-flask -https://github.com/falterfriday/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-19 11:25:34.301202 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lklacar/flask-api -https://github.com/lklacar/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-19 11:25:35.295544 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Amertz08/flask-docker -https://github.com/Amertz08/flask-docker -Entry file: flask-docker/app/setup.py -Scanned: 2016-10-19 11:25:36.677345 -No vulnerabilities found. - - -viniciusramos91/flask-skeleton -https://github.com/viniciusramos91/flask-skeleton -Entry file: None -Scanned: 2016-10-19 11:25:37.184146 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/viniciusramos91/flask-skeleton. - -jiaominlong/flask-web -https://github.com/jiaominlong/flask-web -Entry file: flask-web/app/__init__.py -Scanned: 2016-10-19 11:25:38.559587 -No vulnerabilities found. - - -jcue/flask-blog -https://github.com/jcue/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:25:39.097173 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -cdumay/flask-tat -https://github.com/cdumay/flask-tat -Entry file: flask-tat/examples/simple.py -Scanned: 2016-10-19 11:25:40.438714 -No vulnerabilities found. - - -metiago/flask-skeleton -https://github.com/metiago/flask-skeleton -Entry file: None -Scanned: 2016-10-19 11:25:41.956739 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/metiago/flask-skeleton. - -xubiaosunny/flask-blog -https://github.com/xubiaosunny/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:25:43.510810 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rodolfolottin/flask-sortingservice -https://github.com/rodolfolottin/flask-sortingservice -Entry file: flask-sortingservice/src/app.py -Scanned: 2016-10-19 11:25:49.343540 -No vulnerabilities found. - - -coder-zhuyu/flask-framework -https://github.com/coder-zhuyu/flask-framework -Entry file: flask-framework/app/__init__.py -Scanned: 2016-10-19 11:25:50.838296 -Vulnerability 1: -File: flask-framework/app/auth/views.py - > User input at line 71, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-framework/app/auth/views.py - > Line 73: pagination = query.paginate(page,per_page=current_app.config['FLASKY_USERS_PER_PAGE'], error_out=False) - File: flask-framework/app/auth/views.py - > Line 76: users = pagination.items -File: flask-framework/app/auth/views.py - > reaches line 77, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('auth/confirm.html',pagination=pagination, users=users) - - - -wizardbeard/demoservice_flask -https://github.com/wizardbeard/demoservice_flask -Entry file: demoservice_flask/env/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 11:25:58.969605 -No vulnerabilities found. - - -mvbn6789/flask-blog -https://github.com/mvbn6789/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:25:59.551853 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -andrew-j-price/python-flask -https://github.com/andrew-j-price/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-19 11:26:00.061985 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -VarmintWorks/VarmintFlask -https://github.com/VarmintWorks/VarmintFlask -Entry file: VarmintFlask/main.py -Scanned: 2016-10-19 11:26:01.537632 -No vulnerabilities found. - - -dqisme/Learn-Flask -https://github.com/dqisme/Learn-Flask -Entry file: Learn-Flask/hello.py -Scanned: 2016-10-19 11:26:02.801605 -No vulnerabilities found. - - -bakslash/flask_social -https://github.com/bakslash/flask_social -Entry file: flask_social/app.py -Scanned: 2016-10-19 11:26:03.296793 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jiri-fiala/flask-hellow -https://github.com/jiri-fiala/flask-hellow -Entry file: flask-hellow/app.py -Scanned: 2016-10-19 11:26:04.537136 -No vulnerabilities found. - - -fmlvn/quiz -https://github.com/fmlvn/quiz -Entry file: quiz/quiz/__init__.py -Scanned: 2016-10-19 11:26:06.019981 -No vulnerabilities found. - - -atelic/flask-react-skeleton -https://github.com/atelic/flask-react-skeleton -Entry file: None -Scanned: 2016-10-19 11:26:24.602291 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/atelic/flask-react-skeleton. - -maikeulb/flask-by-example -https://github.com/maikeulb/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 11:26:25.244112 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stephenjjones/flask-auth-service -https://github.com/stephenjjones/flask-auth-service -Entry file: flask-auth-service/app/__init__.py -Scanned: 2016-10-19 11:26:27.492853 -Vulnerability 1: -File: flask-auth-service/app/main/views.py - > User input at line 18, trigger word ".data": - email = result.data['email'] -Reassigned in: - File: flask-auth-service/app/main/views.py - > Line 22: user = User(email=email) -File: flask-auth-service/app/main/views.py - > reaches line 26, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 2: -File: flask-auth-service/app/main/views.py - > User input at line 18, trigger word ".data": - email = result.data['email'] -Reassigned in: - File: flask-auth-service/app/main/views.py - > Line 22: user = User(email=email) -File: flask-auth-service/app/main/views.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: flask-auth-service/app/main/views.py - > User input at line 31, trigger word "get(": - user = User.query.get(id) -File: flask-auth-service/app/main/views.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('email'user.email) - - - -cdumay/flask-graylog-bundle -https://github.com/cdumay/flask-graylog-bundle -Entry file: flask-graylog-bundle/examples/auth.py -Scanned: 2016-10-19 11:26:28.866683 -No vulnerabilities found. - - -kawilliams/new-db-Pronto-Flask -https://github.com/kawilliams/new-db-Pronto-Flask -Entry file: new-db-Pronto-Flask/syllabi_manager.py -Scanned: 2016-10-19 11:26:34.073369 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xufuou/flask-by-example -https://github.com/xufuou/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 11:26:35.253666 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Michael728/awesome-flask-todo -https://github.com/Michael728/awesome-flask-todo -Entry file: None -Scanned: 2016-10-19 11:26:35.749096 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Michael728/awesome-flask-todo. - -ayttew/flask-simple-app -https://github.com/ayttew/flask-simple-app -Entry file: flask-simple-app/app/src/app.py -Scanned: 2016-10-19 11:26:37.064589 -No vulnerabilities found. - - -chiefspace/flask_media_streaming_server -https://github.com/chiefspace/flask_media_streaming_server -Entry file: flask_media_streaming_server/run.py -Scanned: 2016-10-19 11:26:40.591141 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_media_streaming_server/flask/lib/python2.7/genericpath.py - -vigevenoj/flask-hue-sensors -https://github.com/vigevenoj/flask-hue-sensors -Entry file: flask-hue-sensors/app/__init__.py -Scanned: 2016-10-19 11:26:41.829111 -No vulnerabilities found. - - -kyouko-taiga/Flask-SocketAPI -https://github.com/kyouko-taiga/Flask-SocketAPI -Entry file: Flask-SocketAPI/test_socketapi.py -Scanned: 2016-10-19 11:26:43.275762 -No vulnerabilities found. - - -Athsheep/Flask_Web_Development -https://github.com/Athsheep/Flask_Web_Development -Entry file: Flask_Web_Development/app/__init__.py -Scanned: 2016-10-19 11:26:49.009746 -Vulnerability 1: -File: Flask_Web_Development/app/main/views.py - > User input at line 32, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 40: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/main/views.py - > Line 42: posts = pagination.items - File: Flask_Web_Development/app/main/views.py - > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask_Web_Development/app/main/views.py - > reaches line 43, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Flask_Web_Development/app/main/views.py - > User input at line 35, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 33: show_followed = False - File: Flask_Web_Development/app/main/views.py - > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask_Web_Development/app/main/views.py - > reaches line 43, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Flask_Web_Development/app/main/views.py - > User input at line 136, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 138: page = post.comments.count() - 1 / 10 + 1 - File: Flask_Web_Development/app/main/views.py - > Line 139: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/main/views.py - > Line 141: comments = pagination.items - File: Flask_Web_Development/app/main/views.py - > Line 135: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Flask_Web_Development/app/main/views.py - > reaches line 142, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: Flask_Web_Development/app/main/views.py - > User input at line 182, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 183: pagination = user.followers.paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/main/views.py - > Line 185: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Flask_Web_Development/app/main/views.py - > Line 181: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask_Web_Development/app/main/views.py - > reaches line 187, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: Flask_Web_Development/app/main/views.py - > User input at line 196, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 197: pagination = user.followed.paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/main/views.py - > Line 199: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Flask_Web_Development/app/main/views.py - > Line 195: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask_Web_Development/app/main/views.py - > reaches line 201, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Flask_Web_Development/app/main/views.py - > User input at line 223, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 225: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/main/views.py - > Line 227: comments = pagination.items -File: Flask_Web_Development/app/main/views.py - > reaches line 229, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 7: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 15: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 17: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 18: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 21: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 20, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 15: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 17: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 18: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 21: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 23, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 15: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 17: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 18: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 21: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 24, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 35: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 37: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 40, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 11: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 35: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 37: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 43, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 12: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 35: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 37: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 44, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 13: -File: Flask_Web_Development/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 18: next = None -File: Flask_Web_Development/app/api_1_0/posts.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 14: -File: Flask_Web_Development/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 18: next = None -File: Flask_Web_Development/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 15: -File: Flask_Web_Development/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 18: next = None -File: Flask_Web_Development/app/api_1_0/posts.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 16: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 13: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 16: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 15, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 17: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 13: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 16: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 18, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 18: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 13: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 16: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 19, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 19: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 40, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 20: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 43, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 21: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 44, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -Omrigan/flask-github-ci -https://github.com/Omrigan/flask-github-ci -Entry file: flask-github-ci/service.py -Scanned: 2016-10-19 11:26:50.418809 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -kukuhsain/learn-flask-python -https://github.com/kukuhsain/learn-flask-python -Entry file: learn-flask-python/helloworld.py -Scanned: 2016-10-19 11:26:51.665402 -No vulnerabilities found. - - -mikefromit/flask-jsonschema-example -https://github.com/mikefromit/flask-jsonschema-example -Entry file: flask-jsonschema-example/app.py -Scanned: 2016-10-19 11:26:54.006292 -No vulnerabilities found. - - -learningpython08/flask-file-sharing -https://github.com/learningpython08/flask-file-sharing -Entry file: flask-file-sharing/upload/handlers.py -Scanned: 2016-10-19 11:26:55.381770 -Vulnerability 1: -File: flask-file-sharing/upload/handlers.py - > User input at line 55, trigger word "get(": - file_obj = request.files.get('file') -Reassigned in: - File: flask-file-sharing/upload/handlers.py - > Line 66: fname = secure_filename(file_obj.filename) - File: flask-file-sharing/upload/handlers.py - > Line 68: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 70: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 79: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 80: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 91: ret_MAYBE_FUNCTION_NAME = (resp, 201) -File: flask-file-sharing/upload/handlers.py - > reaches line 86, trigger word "url_for(": - prv_url = url_for('preview',path=url_path, _external=True) - -Vulnerability 2: -File: flask-file-sharing/upload/handlers.py - > User input at line 55, trigger word "get(": - file_obj = request.files.get('file') -Reassigned in: - File: flask-file-sharing/upload/handlers.py - > Line 66: fname = secure_filename(file_obj.filename) - File: flask-file-sharing/upload/handlers.py - > Line 68: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 70: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 79: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 80: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 91: ret_MAYBE_FUNCTION_NAME = (resp, 201) -File: flask-file-sharing/upload/handlers.py - > reaches line 87, trigger word "url_for(": - dl_url = url_for('download',path=url_path, _external=True) - -Vulnerability 3: -File: flask-file-sharing/upload/handlers.py - > User input at line 55, trigger word "get(": - file_obj = request.files.get('file') -Reassigned in: - File: flask-file-sharing/upload/handlers.py - > Line 66: fname = secure_filename(file_obj.filename) - File: flask-file-sharing/upload/handlers.py - > Line 68: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 70: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 79: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 80: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 91: ret_MAYBE_FUNCTION_NAME = (resp, 201) -File: flask-file-sharing/upload/handlers.py - > reaches line 89, trigger word "jsonify(": - resp = jsonify(download=dl_url, preview=prv_url) - - - -bmd/flask-docker-cookiecutter -https://github.com/bmd/flask-docker-cookiecutter -Entry file: flask-docker-cookiecutter/{{ cookiecutter.app_name }}/{{ cookiecutter.app_name }}/{{ cookiecutter.app_name }}/app.py -Scanned: 2016-10-19 11:26:56.618423 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -StephenWeber/rundeck-sensu-flask -https://github.com/StephenWeber/rundeck-sensu-flask -Entry file: rundeck-sensu-flask/rsf/__init__.py -Scanned: 2016-10-19 11:26:58.009534 -No vulnerabilities found. - - -chiefspace/miguelgrinberg_flask_mega -https://github.com/chiefspace/miguelgrinberg_flask_mega -Entry file: None -Scanned: 2016-10-19 11:27:05.749218 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -krisekenes/productsDashFlask -https://github.com/krisekenes/productsDashFlask -Entry file: productsDashFlask/server.py -Scanned: 2016-10-19 11:27:07.149100 -No vulnerabilities found. - - -beibeiyang/cf-flask-bokeh-demo -https://github.com/beibeiyang/cf-flask-bokeh-demo -Entry file: cf-flask-bokeh-demo/stocks.py -Scanned: 2016-10-19 11:27:08.400735 -Vulnerability 1: -File: cf-flask-bokeh-demo/stocks.py - > User input at line 47, trigger word "get(": - symbol = request.args.get('symbol') -Reassigned in: - File: cf-flask-bokeh-demo/stocks.py - > Line 52: api_url = 'https://www.quandl.com/api/v1/datasets/WIKI/%s.json' % symbol - File: cf-flask-bokeh-demo/stocks.py - > Line 55: raw_data = session.get(api_url).text - File: cf-flask-bokeh-demo/stocks.py - > Line 56: json_data = json.loads(raw_data) - File: cf-flask-bokeh-demo/stocks.py - > Line 59: df = DataFrame(data=json_data['data'], columns=json_data['column_names']) - File: cf-flask-bokeh-demo/stocks.py - > Line 68: df['left'] = pd.DatetimeIndex(df.Date) - pd.DateOffset(days=0.5) - File: cf-flask-bokeh-demo/stocks.py - > Line 69: df['right'] = pd.DatetimeIndex(df.Date) + pd.DateOffset(days=0.5) - File: cf-flask-bokeh-demo/stocks.py - > Line 114: header = '

%s of %s

Name: %s

Description (from our data provider): %s

Zoom into the chart to see more detail.

' % (json_data['source_name'], json_data['code'], json_data['name'], json_data['description']) -File: cf-flask-bokeh-demo/stocks.py - > reaches line 122, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('graph.html',script=script, div=div, header=header) - -Vulnerability 2: -File: cf-flask-bokeh-demo/stocks.py - > User input at line 55, trigger word "get(": - raw_data = session.get(api_url).text -Reassigned in: - File: cf-flask-bokeh-demo/stocks.py - > Line 56: json_data = json.loads(raw_data) - File: cf-flask-bokeh-demo/stocks.py - > Line 59: df = DataFrame(data=json_data['data'], columns=json_data['column_names']) - File: cf-flask-bokeh-demo/stocks.py - > Line 68: df['left'] = pd.DatetimeIndex(df.Date) - pd.DateOffset(days=0.5) - File: cf-flask-bokeh-demo/stocks.py - > Line 69: df['right'] = pd.DatetimeIndex(df.Date) + pd.DateOffset(days=0.5) - File: cf-flask-bokeh-demo/stocks.py - > Line 114: header = '

%s of %s

Name: %s

Description (from our data provider): %s

Zoom into the chart to see more detail.

' % (json_data['source_name'], json_data['code'], json_data['name'], json_data['description']) -File: cf-flask-bokeh-demo/stocks.py - > reaches line 122, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('graph.html',script=script, div=div, header=header) - - - -Artadys/flask-by-example -https://github.com/Artadys/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 11:27:09.068190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gorogoro13/mFlask-TumbleLog -https://github.com/gorogoro13/mFlask-TumbleLog -Entry file: mFlask-TumbleLog/init.py -Scanned: 2016-10-19 11:27:10.266402 -No vulnerabilities found. - - -saileshpatnala/flask-by-example -https://github.com/saileshpatnala/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 11:27:10.882260 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Kontiomaa/flask-sqlalchemy-demo -https://github.com/Kontiomaa/flask-sqlalchemy-demo -Entry file: flask-sqlalchemy-demo/app.py -Scanned: 2016-10-19 11:27:12.658437 -Vulnerability 1: -File: flask-sqlalchemy-demo/app.py - > User input at line 76, trigger word "get(": - order = Order.query.get(order_id) -Reassigned in: - File: flask-sqlalchemy-demo/app.py - > Line 81: orderData = 'Orderer''status''Items'order.customer.usernameorder.status['Name''Amount'row.itemonrow.productNamerow.count for row in order.orderrow] -File: flask-sqlalchemy-demo/app.py - > reaches line 83, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(orderData) - - - -1131909224/flask -https://github.com/1131909224/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:27:26.255687 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -RangerColt/Flask -https://github.com/RangerColt/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:27:29.256755 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wangrenlearn/flask -https://github.com/wangrenlearn/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:27:33.817363 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -dongshuiquan/flasky -https://github.com/dongshuiquan/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:27:37.253716 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -caseydunham/flaskr -https://github.com/caseydunham/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:27:37.785323 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -francium/flaskr -https://github.com/francium/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:27:39.288374 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Qqlick/Flasktaskr -https://github.com/Qqlick/Flasktaskr -Entry file: Flasktaskr/flask_api.py -Scanned: 2016-10-19 11:27:42.820227 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yolandaz/flaskcars -https://github.com/yolandaz/flaskcars -Entry file: flaskcars/app.py -Scanned: 2016-10-19 11:27:44.462933 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskcars/venv/lib/python2.7/genericpath.py - -PansFortress/flaskr -https://github.com/PansFortress/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:27:44.973872 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -goodman1209/flaskrestserver -https://github.com/goodman1209/flaskrestserver -Entry file: flaskrestserver/hello.py -Scanned: 2016-10-19 11:27:52.269843 -No vulnerabilities found. - - -Ivicel/flasky -https://github.com/Ivicel/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:27:52.779673 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -atsk1618/flasko -https://github.com/atsk1618/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-19 11:27:53.373291 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py - -k0itsu/flasktaskr -https://github.com/k0itsu/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:27:53.874425 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -penglee87/flaskblog -https://github.com/penglee87/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 11:27:54.387535 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -davbrink/flasktaskr -https://github.com/davbrink/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:27:55.928843 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kermit95/Flaskr -https://github.com/Kermit95/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 11:27:57.421735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -juniorkrvl/flasky -https://github.com/juniorkrvl/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:27:58.911431 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Halcae/flaskapp -https://github.com/Halcae/flaskapp -Entry file: None -Scanned: 2016-10-19 11:28:00.404212 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Halcae/flaskapp. - -ptrees/flaskr -https://github.com/ptrees/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:28:07.896248 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -langlangago/Flasky -https://github.com/langlangago/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-19 11:28:10.428812 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jcue/flasktaskr -https://github.com/jcue/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:28:10.922366 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -qhdong/flaskr -https://github.com/qhdong/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:28:11.420906 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aksenovpb/flaskproject -https://github.com/aksenovpb/flaskproject -Entry file: None -Scanned: 2016-10-19 11:28:11.915154 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ncmadhu/FlaskDemo -https://github.com/ncmadhu/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 11:28:12.425194 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -LiKePAIN/FlaskStudy -https://github.com/LiKePAIN/FlaskStudy -Entry file: FlaskStudy/flaskr.py -Scanned: 2016-10-19 11:28:12.926257 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -playscforever/flaskProject -https://github.com/playscforever/flaskProject -Entry file: flaskProject/helloFlask/app.py -Scanned: 2016-10-19 11:28:29.426471 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MarkoArsenovic/FlaskAuth -https://github.com/MarkoArsenovic/FlaskAuth -Entry file: FlaskAuth/testapp/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 11:28:30.160676 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PythonWorkshop/TensorFlowFlask -https://github.com/PythonWorkshop/TensorFlowFlask -Entry file: TensorFlowFlask/main.py -Scanned: 2016-10-19 11:28:33.683886 -Vulnerability 1: -File: TensorFlowFlask/main.py - > User input at line 48, trigger word ".data": - filename = secure_filename(form.training_data.data.filename) -Reassigned in: - File: TensorFlowFlask/main.py - > Line 52: dataframe = pd.read_csv('wine_quality/data/' + filename,sep=',') - File: TensorFlowFlask/main.py - > Line 55: filename = None -File: TensorFlowFlask/main.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('test_data_upload.html',form=form, filename=filename) - - - -lucilecoutouly/back-flask -https://github.com/lucilecoutouly/back-flask -Entry file: back-flask/back_nsa/app/__init__.py -Scanned: 2016-10-19 11:28:35.667885 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -jdgwartney/flask-blueprint -https://github.com/jdgwartney/flask-blueprint -Entry file: flask-blueprint/application/__init__.py -Scanned: 2016-10-19 11:28:36.946633 -No vulnerabilities found. - - -ketanrk/flask_practice -https://github.com/ketanrk/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-19 11:28:37.516616 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mehemken/generic-flask -https://github.com/mehemken/generic-flask -Entry file: generic-flask/app.py -Scanned: 2016-10-19 11:28:38.797983 -No vulnerabilities found. - - -abhishekg785/flask-gevent -https://github.com/abhishekg785/flask-gevent -Entry file: flask-gevent/chatServer.py -Scanned: 2016-10-19 11:28:40.122155 -No vulnerabilities found. - - -ja8zyjits/redis-flask -https://github.com/ja8zyjits/redis-flask -Entry file: redis-flask/flask_app.py -Scanned: 2016-10-19 11:28:41.404270 -Vulnerability 1: -File: redis-flask/flask_app.py - > User input at line 13, trigger word "get(": - number = int(request.values.get('number')) -Reassigned in: - File: redis-flask/flask_app.py - > Line 14: value = find_sum(number) -File: redis-flask/flask_app.py - > reaches line 15, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sum_finder.html',sum_value=value) - - - -bigzhao/flask-wechat -https://github.com/bigzhao/flask-wechat -Entry file: flask-wechat/fenghuang/__init__.py -Scanned: 2016-10-19 11:28:41.921377 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -szparag3/flask-blog -https://github.com/szparag3/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:28:44.447130 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Keita1/flask-blog -https://github.com/Keita1/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:28:46.004723 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -vishukamble/PythonFlask -https://github.com/vishukamble/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 11:28:55.371551 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -cooleo/flask-cassandra -https://github.com/cooleo/flask-cassandra -Entry file: flask-cassandra/app/__init__.py -Scanned: 2016-10-19 11:28:56.846676 -Vulnerability 1: -File: flask-cassandra/app/models/app.py - > User input at line 301, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: flask-cassandra/app/models/app.py - > Line 304: user = User(username=username) - File: flask-cassandra/app/models/app.py - > Line 307: session['id'] = user.id - File: flask-cassandra/app/models/app.py - > Line 309: user = current_user() - File: flask-cassandra/app/models/app.py - > Line 302: user = User.query.filter_by(username=username).first() - File: flask-cassandra/app/models/app.py - > Line 308: ret_MAYBE_FUNCTION_NAME = redirect('/') -File: flask-cassandra/app/models/app.py - > reaches line 310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',user=user) - - - -ggrumbley/flask_example -https://github.com/ggrumbley/flask_example -Entry file: None -Scanned: 2016-10-19 11:28:57.362718 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -themikepearce/flask-blog -https://github.com/themikepearce/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:28:57.902086 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Momingcoder/learn-flask -https://github.com/Momingcoder/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 11:28:58.615150 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -greenapplepark/flask_docker -https://github.com/greenapplepark/flask_docker -Entry file: flask_docker/app/flaskEntry.py -Scanned: 2016-10-19 11:28:59.855385 -No vulnerabilities found. - - -karloku/beginners_flask -https://github.com/karloku/beginners_flask -Entry file: beginners_flask/application/__init__.py -Scanned: 2016-10-19 11:29:01.213259 -No vulnerabilities found. - - -s2tephen/flask-network -https://github.com/s2tephen/flask-network -Entry file: flask-network/app.py -Scanned: 2016-10-19 11:29:02.444033 -No vulnerabilities found. - - -julianparismorgan/flask_cellcounter -https://github.com/julianparismorgan/flask_cellcounter -Entry file: flask_cellcounter/cell-app.py -Scanned: 2016-10-19 11:29:06.960869 -No vulnerabilities found. - - -vigneshrajkumar/simple-flask -https://github.com/vigneshrajkumar/simple-flask -Entry file: simple-flask/simple.py -Scanned: 2016-10-19 11:29:08.257763 -No vulnerabilities found. - - -linkinshurik/api_flask -https://github.com/linkinshurik/api_flask -Entry file: api_flask/app/__init__.py -Scanned: 2016-10-19 11:29:10.641754 -No vulnerabilities found. - - -pranavbadami/damson-flask -https://github.com/pranavbadami/damson-flask -Entry file: damson-flask/damson.py -Scanned: 2016-10-19 11:29:13.871107 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coding2000/flask_web -https://github.com/coding2000/flask_web -Entry file: flask_web/helloflask.py -Scanned: 2016-10-19 11:29:14.431548 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py - -shihanng/appengine-flask -https://github.com/shihanng/appengine-flask -Entry file: appengine-flask/src/application/__init__.py -Scanned: 2016-10-19 11:29:15.671888 -No vulnerabilities found. - - -cristopher-rodrigues/phyton-flask -https://github.com/cristopher-rodrigues/phyton-flask -Entry file: None -Scanned: 2016-10-19 11:29:19.553189 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -alodavi/flask_blog -https://github.com/alodavi/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:29:20.052471 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sharan-monikantan/hello-flask -https://github.com/sharan-monikantan/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 11:29:20.611243 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -Mubbly/flask_test -https://github.com/Mubbly/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 11:29:21.171124 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asherkhb/flask-tutorial -https://github.com/asherkhb/flask-tutorial -Entry file: None -Scanned: 2016-10-19 11:29:31.712827 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -awproksel/docker_flask -https://github.com/awproksel/docker_flask -Entry file: docker_flask/code/app.py -Scanned: 2016-10-19 11:29:33.481477 -No vulnerabilities found. - - -tigerisnotinwood/flask_wx -https://github.com/tigerisnotinwood/flask_wx -Entry file: flask_wx/run.py -Scanned: 2016-10-19 11:29:34.766404 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sdzharkov/bitFlask -https://github.com/sdzharkov/bitFlask -Entry file: None -Scanned: 2016-10-19 11:29:38.523199 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SverreHerland/flask-intro -https://github.com/SverreHerland/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:29:39.033336 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -valexandersaulys/flask-ladder -https://github.com/valexandersaulys/flask-ladder -Entry file: flask-ladder/app/__init__.py -Scanned: 2016-10-19 11:29:40.564756 -No vulnerabilities found. - - -lucidfrontier45/flask-rethinkview -https://github.com/lucidfrontier45/flask-rethinkview -Entry file: flask-rethinkview/examples/main.py -Scanned: 2016-10-19 11:29:41.779489 -No vulnerabilities found. - - -ricleal/TornadoFlask -https://github.com/ricleal/TornadoFlask -Entry file: TornadoFlask/flasky.py -Scanned: 2016-10-19 11:29:43.113633 -No vulnerabilities found. - - -ekozlowski/flask_demo -https://github.com/ekozlowski/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-19 11:29:43.641564 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -python-ning/jira_flask -https://github.com/python-ning/jira_flask -Entry file: jira_flask/jira.py -Scanned: 2016-10-19 11:29:44.967969 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -devtye/learn-flask -https://github.com/devtye/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 11:29:45.587068 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laerciosb/flask_challanges -https://github.com/laerciosb/flask_challanges -Entry file: flask_challanges/v2/app/core.py -Scanned: 2016-10-19 11:29:47.937652 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zheins/portalFlask -https://github.com/zheins/portalFlask -Entry file: portalFlask/portalFlask.py -Scanned: 2016-10-19 11:29:49.606166 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yvonnendutaw/flask-template -https://github.com/yvonnendutaw/flask-template -Entry file: None -Scanned: 2016-10-19 11:29:57.133967 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yvonnendutaw/flask-template. - -Subh1994/flask_demo -https://github.com/Subh1994/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-19 11:29:58.661268 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chriskoh/intraday-flask -https://github.com/chriskoh/intraday-flask -Entry file: None -Scanned: 2016-10-19 11:30:03.141602 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pouya-abbassi/rashapay-flask -https://github.com/pouya-abbassi/rashapay-flask -Entry file: rashapay-flask/main.py -Scanned: 2016-10-19 11:30:04.485343 -No vulnerabilities found. - - -c03rcion/flask-weather -https://github.com/c03rcion/flask-weather -Entry file: flask-weather/app.py -Scanned: 2016-10-19 11:30:05.021227 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neoden/flask-filecache -https://github.com/neoden/flask-filecache -Entry file: flask-filecache/flask_filecache.py -Scanned: 2016-10-19 11:30:06.357582 -No vulnerabilities found. - - -lstmemery/flask-sqlalchemy -https://github.com/lstmemery/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-19 11:30:06.868160 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -charoleizer/TDD-Flask -https://github.com/charoleizer/TDD-Flask -Entry file: TDD-Flask/fonts/py/WebService/app.py -Scanned: 2016-10-19 11:30:11.359612 -No vulnerabilities found. - - -botheredbybees/flask-rss -https://github.com/botheredbybees/flask-rss -Entry file: flask-rss/headlines.py -Scanned: 2016-10-19 11:30:12.782425 -Vulnerability 1: -File: flask-rss/headlines.py - > User input at line 21, trigger word "get(": - query = urllib.parse.unquote_plus(request.args.get('publication')) -Reassigned in: - File: flask-rss/headlines.py - > Line 23: query = 'ABC Hobart' - File: flask-rss/headlines.py - > Line 24: feed = feedparser.parse(RSS_FEEDS[query]) - File: flask-rss/headlines.py - > Line 28: ret_MAYBE_FUNCTION_NAME = 'no news is good news' -File: flask-rss/headlines.py - > reaches line 26, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',articles=feed['entries'], header=query, rssFeeds=RSS_FEEDS, weather=weather) - - - -coding2000/flask_base -https://github.com/coding2000/flask_base -Entry file: flask_base/flask_01.py -Scanned: 2016-10-19 11:30:14.035957 -No vulnerabilities found. - - -afrancisboeuf/workshop_flask -https://github.com/afrancisboeuf/workshop_flask -Entry file: workshop_flask/1_get_started/6.py -Scanned: 2016-10-19 11:30:18.556027 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: workshop_flask/1_get_started/venv/lib/python2.7/genericpath.py - -tyfulcrum/Flask_Demo -https://github.com/tyfulcrum/Flask_Demo -Entry file: Flask_Demo/hello.py -Scanned: 2016-10-19 11:30:19.769551 -No vulnerabilities found. - - -chenkaiyu1997/flask-learning -https://github.com/chenkaiyu1997/flask-learning -Entry file: flask-learning/app/__init__.py -Scanned: 2016-10-19 11:30:21.027829 -No vulnerabilities found. - - -tpugh/flask_sample -https://github.com/tpugh/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-19 11:30:21.556351 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -schenkd/flask-core -https://github.com/schenkd/flask-core -Entry file: flask-core/app/__init__.py -Scanned: 2016-10-19 11:30:28.629317 -No vulnerabilities found. - - -sasakalaba/flask_project -https://github.com/sasakalaba/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-19 11:30:29.572664 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jorgezepeda/flask-hello-world -https://github.com/jorgezepeda/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 11:30:30.178086 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -rajarshi98/giftsaver -https://github.com/rajarshi98/giftsaver -Entry file: giftsaver/app.py -Scanned: 2016-10-19 11:30:35.071420 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -newkdukem/flask4e -https://github.com/newkdukem/flask4e -Entry file: flask4e/headlines.py -Scanned: 2016-10-19 11:30:36.846364 -No vulnerabilities found. - - -fmlvn/quiz -https://github.com/fmlvn/quiz -Entry file: quiz/quiz/__init__.py -Scanned: 2016-10-19 11:30:38.298488 -No vulnerabilities found. - - -top2topii/FlaskServiceWin32 -https://github.com/top2topii/FlaskServiceWin32 -Entry file: FlaskServiceWin32/myapp.py -Scanned: 2016-10-19 11:30:41.588817 -No vulnerabilities found. - - -jpvillavicencio/FlaskDemoAPI -https://github.com/jpvillavicencio/FlaskDemoAPI -Entry file: FlaskDemoAPI/app.py -Scanned: 2016-10-19 11:30:42.964776 -No vulnerabilities found. - - -Karthik-Ramvijay/Flask_API-PROJECT -https://github.com/Karthik-Ramvijay/Flask_API-PROJECT -Entry file: None -Scanned: 2016-10-19 11:30:44.791750 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Karthik-Ramvijay/Flask_API-PROJECT. - -thirotan/flask_test_app -https://github.com/thirotan/flask_test_app -Entry file: flask_test_app/first_app/__init__.py -Scanned: 2016-10-19 11:30:46.160132 -No vulnerabilities found. - - -cdumay/flask-graylog-bundle -https://github.com/cdumay/flask-graylog-bundle -Entry file: flask-graylog-bundle/examples/auth.py -Scanned: 2016-10-19 11:30:47.520766 -No vulnerabilities found. - - -themese/flask -https://github.com/themese/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:30:50.172047 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -bTanya/flask -https://github.com/bTanya/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:30:58.748921 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -rafaelhenrique/flask_tutorial -https://github.com/rafaelhenrique/flask_tutorial -Entry file: None -Scanned: 2016-10-19 11:31:00.727399 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sousic/flask_study -https://github.com/sousic/flask_study -Entry file: flask_study/views.py -Scanned: 2016-10-19 11:31:06.725152 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davidgomes/flask-pygood -https://github.com/davidgomes/flask-pygood -Entry file: flask-pygood/flask_pygood/test/demo.py -Scanned: 2016-10-19 11:31:07.947515 -No vulnerabilities found. - - -goodman1209/flaskrestserver -https://github.com/goodman1209/flaskrestserver -Entry file: flaskrestserver/hello.py -Scanned: 2016-10-19 11:31:09.140419 -No vulnerabilities found. - - -marvinmarnold/flasky -https://github.com/marvinmarnold/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:09.638643 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bassel-meet/flasky -https://github.com/bassel-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:13.152856 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sima16-meet/flasky -https://github.com/sima16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:14.639950 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tamar16-meet/flasky -https://github.com/tamar16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:16.136818 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alma16-meet/flasky -https://github.com/alma16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:20.653172 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -guy16-meet/flasky -https://github.com/guy16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:22.176868 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aixiamomo/flasky -https://github.com/aixiamomo/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:23.156298 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rama16-meet/flasky -https://github.com/rama16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:23.655698 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dina16-meet/flasky -https://github.com/dina16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:31.249975 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -orr16-meet/flasky -https://github.com/orr16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:31.808872 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -roni16-meet/flasky -https://github.com/roni16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:35.337454 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wwpika/flaskww -https://github.com/wwpika/flaskww -Entry file: flaskww/app/__init__.py -Scanned: 2016-10-19 11:31:39.656836 -Vulnerability 1: -File: flaskww/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 32: posts = pagination.items - File: flaskww/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskww/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskww/app/main/views.py - > User input at line 24, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskww/app/main/views.py - > Line 22: show_followed = False - File: flaskww/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskww/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskww/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 45: posts = pagination.items -File: flaskww/app/main/views.py - > reaches line 46, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flaskww/app/main/views.py - > User input at line 103, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 105: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskww/app/main/views.py - > Line 107: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 111: comments = pagination.items - File: flaskww/app/main/views.py - > Line 102: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskww/app/main/views.py - > reaches line 112, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flaskww/app/main/views.py - > User input at line 168, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 169: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 173: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskww/app/main/views.py - > Line 167: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskww/app/main/views.py - > reaches line 175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flaskww/app/main/views.py - > User input at line 185, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 186: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 190: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskww/app/main/views.py - > Line 184: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskww/app/main/views.py - > reaches line 192, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flaskww/app/main/views.py - > User input at line 214, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 215: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 219: comments = pagination.items -File: flaskww/app/main/views.py - > reaches line 220, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flaskww/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('get', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/users.py - > Line 18: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 19: prev = None - File: flaskww/app/api_1_0/users.py - > Line 22: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 21, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flaskww/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('get', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/users.py - > Line 18: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 19: prev = None - File: flaskww/app/api_1_0/users.py - > Line 22: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 24, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flaskww/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('get', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/users.py - > Line 18: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 19: prev = None - File: flaskww/app/api_1_0/users.py - > Line 22: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 25, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flaskww/app/api_1_0/users.py - > User input at line 35, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 36: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], errror_out=False) - File: flaskww/app/api_1_0/users.py - > Line 40: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 41: prev = None - File: flaskww/app/api_1_0/users.py - > Line 45: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 43, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flaskww/app/api_1_0/users.py - > User input at line 35, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 36: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], errror_out=False) - File: flaskww/app/api_1_0/users.py - > Line 40: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 41: prev = None - File: flaskww/app/api_1_0/users.py - > Line 45: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flaskww/app/api_1_0/users.py - > User input at line 35, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 36: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], errror_out=False) - File: flaskww/app/api_1_0/users.py - > Line 40: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 41: prev = None - File: flaskww/app/api_1_0/users.py - > Line 45: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flaskww/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskww/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskww/app/api_1_0/posts.py - > Line 19: next = None -File: flaskww/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flaskww/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskww/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskww/app/api_1_0/posts.py - > Line 19: next = None -File: flaskww/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flaskww/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskww/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskww/app/api_1_0/posts.py - > Line 19: next = None -File: flaskww/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flaskww/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 18: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flaskww/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 18: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flaskww/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 18: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flaskww/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 46: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flaskww/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 46: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flaskww/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 46: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -yuyanqiuqiu/flaskblog -https://github.com/yuyanqiuqiu/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 11:31:40.196988 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -amjad16-meet/flasky -https://github.com/amjad16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:40.744896 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elias16-meet/flasky -https://github.com/elias16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:42.281790 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yasmeen16-meet/flasky -https://github.com/yasmeen16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:43.786267 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bluethon/flasky -https://github.com/bluethon/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:45.278246 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -teodorgarzdin/Flaskr -https://github.com/teodorgarzdin/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 11:31:45.784187 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -langlangago/Flasky -https://github.com/langlangago/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-19 11:31:47.281299 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aksenovpb/flaskproject -https://github.com/aksenovpb/flaskproject -Entry file: None -Scanned: 2016-10-19 11:31:47.767861 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pengshiqi/Flaskr -https://github.com/pengshiqi/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 11:31:49.270735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stylianos-kampakis/flasktaskr -https://github.com/stylianos-kampakis/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:31:49.770912 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yara16-meet/flasky -https://github.com/yara16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:31:51.291989 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nimala16-meet/Flasky- -https://github.com/nimala16-meet/Flasky- -Entry file: None -Scanned: 2016-10-19 11:32:01.759583 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nimala16-meet/Flasky-. - -shiran16-meet/flasky -https://github.com/shiran16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:32:02.272845 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fadi16-meet/flasky -https://github.com/fadi16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:32:02.778721 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chijie/flaskdemo -https://github.com/chijie/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 11:32:06.291437 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -decherd/flasktaskr -https://github.com/decherd/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:32:07.794863 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -arsalanam/flasktasker7 -https://github.com/arsalanam/flasktasker7 -Entry file: flasktasker7/project/__init__.py -Scanned: 2016-10-19 11:32:09.166975 -No vulnerabilities found. - - -Recad/FlaskSO -https://github.com/Recad/FlaskSO -Entry file: FlaskSO/Flask-vbox-so.py -Scanned: 2016-10-19 11:32:10.425968 -No vulnerabilities found. - - -LiKePAIN/FlaskStudy -https://github.com/LiKePAIN/FlaskStudy -Entry file: FlaskStudy/flaskr.py -Scanned: 2016-10-19 11:32:10.929038 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NateLove/FlaskTest -https://github.com/NateLove/FlaskTest -Entry file: None -Scanned: 2016-10-19 11:32:14.432457 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/NateLove/FlaskTest. - -playscforever/flaskProject -https://github.com/playscforever/flaskProject -Entry file: flaskProject/helloFlask/app.py -Scanned: 2016-10-19 11:32:15.930380 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -winray/FlaskNote -https://github.com/winray/FlaskNote -Entry file: FlaskNote/microblog/app/__init__.py -Scanned: 2016-10-19 11:32:18.310550 -No vulnerabilities found. - - -anilkunchalaece/flaskForm -https://github.com/anilkunchalaece/flaskForm -Entry file: flaskForm/flaskApp.py -Scanned: 2016-10-19 11:32:22.578788 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bigzhao/flask-wechat -https://github.com/bigzhao/flask-wechat -Entry file: flask-wechat/fenghuang/__init__.py -Scanned: 2016-10-19 11:32:24.560598 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rysev-a/flask-blueprints -https://github.com/rysev-a/flask-blueprints -Entry file: flask-blueprints/ch05/application/__init__.py -Scanned: 2016-10-19 11:32:25.930356 -No vulnerabilities found. - - -opentracing-contrib/python-flask -https://github.com/opentracing-contrib/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-19 11:32:32.486891 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ooldDoctor/Flask-Shell -https://github.com/ooldDoctor/Flask-Shell -Entry file: Flask-Shell/server.py -Scanned: 2016-10-19 11:32:33.919915 -No vulnerabilities found. - - -keik/flask-tutorial -https://github.com/keik/flask-tutorial -Entry file: None -Scanned: 2016-10-19 11:32:36.442585 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CaveMike/flask_rest -https://github.com/CaveMike/flask_rest -Entry file: None -Scanned: 2016-10-19 11:32:38.812840 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/CaveMike/flask_rest. - -Keita1/flask-blog -https://github.com/Keita1/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:32:41.336021 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -juliocesarfort/flask-demos -https://github.com/juliocesarfort/flask-demos -Entry file: flask-demos/json-contentsniffing.py -Scanned: 2016-10-19 11:32:44.042093 -No vulnerabilities found. - - -wlingxiao/HelloFlask -https://github.com/wlingxiao/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-19 11:32:45.548803 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Gherero/analitika-flask -https://github.com/Gherero/analitika-flask -Entry file: analitika-flask/app/main.py -Scanned: 2016-10-19 11:32:50.156562 -No vulnerabilities found. - - -jen8/Flask-Intro -https://github.com/jen8/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-19 11:32:50.686284 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -evereux/flask_template -https://github.com/evereux/flask_template -Entry file: None -Scanned: 2016-10-19 11:32:51.199868 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/evereux/flask_template. - -Jareechang/flask-basic -https://github.com/Jareechang/flask-basic -Entry file: flask-basic/templates.py -Scanned: 2016-10-19 11:32:53.016655 -No vulnerabilities found. - - -alodavi/flask_blog -https://github.com/alodavi/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:32:53.506400 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sdzharkov/bitFlask -https://github.com/sdzharkov/bitFlask -Entry file: None -Scanned: 2016-10-19 11:32:54.043916 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SverreHerland/flask-intro -https://github.com/SverreHerland/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:33:01.558690 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -doblel/Flask-Hooker -https://github.com/doblel/Flask-Hooker -Entry file: Flask-Hooker/test.py -Scanned: 2016-10-19 11:33:04.839264 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ainjii/20160719_flask -https://github.com/ainjii/20160719_flask -Entry file: 20160719_flask/nice.py -Scanned: 2016-10-19 11:33:06.036335 -No vulnerabilities found. - - -whitneybelba/Flask-Intro -https://github.com/whitneybelba/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-19 11:33:07.550775 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahmsolo/flask-intro -https://github.com/ahmsolo/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:33:09.052213 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aaron4444/master_flask -https://github.com/aaron4444/master_flask -Entry file: master_flask/main.py -Scanned: 2016-10-19 11:33:10.435931 -No vulnerabilities found. - - -scotteggs/flask_tutor -https://github.com/scotteggs/flask_tutor -Entry file: flask_tutor/tmp/main.py -Scanned: 2016-10-19 11:33:10.958727 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -v2hey/flask-blog -https://github.com/v2hey/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:33:12.494430 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -defhook/flask-blog -https://github.com/defhook/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:33:16.012863 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -eflagg/flask-intro -https://github.com/eflagg/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:33:17.518238 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MariaAngela24/flask-intro -https://github.com/MariaAngela24/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:33:19.015894 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tarzioo/flask-intro -https://github.com/tarzioo/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:33:23.514411 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lingsitu1290/Flask-Intro -https://github.com/lingsitu1290/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-19 11:33:26.004045 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thepomeranian/flask-intro -https://github.com/thepomeranian/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:33:26.501966 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ibhan88/Flask-Intro -https://github.com/ibhan88/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-19 11:33:27.002502 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apastewk/flask-intro -https://github.com/apastewk/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:33:33.532703 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -n4s/flask-test -https://github.com/n4s/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 11:33:34.102033 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -boyxiaolong/flask_blog -https://github.com/boyxiaolong/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:33:37.635301 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ricleal/TornadoFlask -https://github.com/ricleal/TornadoFlask -Entry file: TornadoFlask/flasky.py -Scanned: 2016-10-19 11:33:39.899929 -No vulnerabilities found. - - -sarahdwyer/flask-intro -https://github.com/sarahdwyer/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:33:42.414323 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shankj3/flask_version -https://github.com/shankj3/flask_version -Entry file: flask_version/render_with_jinja/render_with_jinja.py -Scanned: 2016-10-19 11:33:45.316207 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -13923858795/flask-blog -https://github.com/13923858795/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:33:45.832452 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -neldevfull/flask_api -https://github.com/neldevfull/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-19 11:33:48.838288 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -decherd/flask-blog -https://github.com/decherd/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:33:52.369768 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -thesiti92/flask_example -https://github.com/thesiti92/flask_example -Entry file: None -Scanned: 2016-10-19 11:33:52.864245 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rayramsay/flask-intro -https://github.com/rayramsay/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:33:53.394126 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aig-/flask_google -https://github.com/aig-/flask_google -Entry file: flask_google/app.py -Scanned: 2016-10-19 11:33:54.734626 -Vulnerability 1: -File: flask_google/app.py - > User input at line 93, trigger word "get(": - response = 'state''status'task.statetask.info.get('status', '') -Reassigned in: - File: flask_google/app.py - > Line 88: response = 'state''status'task.state'Pending...' - File: flask_google/app.py - > Line 101: response = 'state''status'task.statestr(task.info) -File: flask_google/app.py - > reaches line 105, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(response) - - - -yfalcon8/Flask_Intro -https://github.com/yfalcon8/Flask_Intro -Entry file: Flask_Intro/nice.py -Scanned: 2016-10-19 11:33:58.435536 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Intro/env/lib/python2.7/genericpath.py - -chriskoh/intraday-flask -https://github.com/chriskoh/intraday-flask -Entry file: None -Scanned: 2016-10-19 11:33:58.930826 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -laylasian/poke-flask -https://github.com/laylasian/poke-flask -Entry file: poke-flask/poke/app.py -Scanned: 2016-10-19 11:34:04.397388 -No vulnerabilities found. - - -YuliYaSokolova/home_flask -https://github.com/YuliYaSokolova/home_flask -Entry file: home_flask/__init__.py -Scanned: 2016-10-19 11:34:09.804035 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: home_flask/.envi/lib/python3.4/struct.py - -alodavi/flask_simple -https://github.com/alodavi/flask_simple -Entry file: flask_simple/hello.py -Scanned: 2016-10-19 11:34:11.091847 -No vulnerabilities found. - - -cdagli/flask-blueprint -https://github.com/cdagli/flask-blueprint -Entry file: flask-blueprint/api/__init__.py -Scanned: 2016-10-19 11:34:12.377846 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -charoleizer/TDD-Flask -https://github.com/charoleizer/TDD-Flask -Entry file: TDD-Flask/fonts/py/WebService/app.py -Scanned: 2016-10-19 11:34:16.433560 -No vulnerabilities found. - - -thechutrain/flask-tutorial -https://github.com/thechutrain/flask-tutorial -Entry file: None -Scanned: 2016-10-19 11:34:17.451897 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -RetardedPigeon/flask_project -https://github.com/RetardedPigeon/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-19 11:34:19.186272 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Jzengzhan/Flask -https://github.com/Jzengzhan/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:34:21.003697 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crazw/flask -https://github.com/crazw/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:34:25.578059 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -mwongeraE/Flask -https://github.com/mwongeraE/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:34:27.124766 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -radajin/flask -https://github.com/radajin/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:34:28.144541 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -suryadana/Flask -https://github.com/suryadana/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:34:34.661194 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TheNixNinja/flask-boilerplate -https://github.com/TheNixNinja/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 11:34:35.162640 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/TheNixNinja/flask-boilerplate. - -clef/flask-nameko -https://github.com/clef/flask-nameko -Entry file: flask-nameko/tests/test_flask_pooled_cluster_rpc_proxy.py -Scanned: 2016-10-19 11:34:39.593392 -No vulnerabilities found. - - -weihg/flaskr -https://github.com/weihg/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:34:43.600304 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Dasmemes/flasky -https://github.com/Dasmemes/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:34:44.101427 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dhan12/Flaskblog -https://github.com/dhan12/Flaskblog -Entry file: Flaskblog/run.py -Scanned: 2016-10-19 11:34:49.378136 -Vulnerability 1: -File: Flaskblog/flaskblog/routes.py - > User input at line 42, trigger word "form[": - searchText = request.form['search'] -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 54: searchText = request.args.get('search', '') - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - -Vulnerability 2: -File: Flaskblog/flaskblog/routes.py - > User input at line 54, trigger word "get(": - searchText = request.args.get('search', '') -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 42: searchText = request.form['search'] - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - -Vulnerability 3: -File: Flaskblog/flaskblog/routes.py - > User input at line 42, trigger word "form[": - searchText = request.form['search'] -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 54: searchText = request.args.get('search', '') - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - -Vulnerability 4: -File: Flaskblog/flaskblog/routes.py - > User input at line 54, trigger word "get(": - searchText = request.args.get('search', '') -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 42: searchText = request.form['search'] - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - - - -SachinMaharana/flaskblog -https://github.com/SachinMaharana/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 11:34:49.890789 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -linjialongmao/flasky -https://github.com/linjialongmao/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:34:50.400181 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -algalanb/flaskapp -https://github.com/algalanb/flaskapp -Entry file: None -Scanned: 2016-10-19 11:34:53.893216 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/algalanb/flaskapp. - -sinwar/flaskr -https://github.com/sinwar/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:34:54.388050 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -igoroppo6/flasky -https://github.com/igoroppo6/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:34:54.891750 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -evanzd/flasky -https://github.com/evanzd/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:34:55.387880 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Dawson-G/flaskwebapp -https://github.com/Dawson-G/flaskwebapp -Entry file: flaskwebapp/main.py -Scanned: 2016-10-19 11:34:57.624416 -No vulnerabilities found. - - -diazdeentr/flasktest -https://github.com/diazdeentr/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 11:35:00.147044 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sT00ne/FlaskMega -https://github.com/sT00ne/FlaskMega -Entry file: FlaskMega/app/__init__.py -Scanned: 2016-10-19 11:35:05.990684 -No vulnerabilities found. - - -dedystyawan/flask2 -https://github.com/dedystyawan/flask2 -Entry file: flask2/app.py -Scanned: 2016-10-19 11:35:07.523519 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TitledPythonFile/FlaskItems -https://github.com/TitledPythonFile/FlaskItems -Entry file: FlaskItems/app/__init__.py -Scanned: 2016-10-19 11:35:08.855454 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mtlevine0/FlaskPhoto -https://github.com/mtlevine0/FlaskPhoto -Entry file: FlaskPhoto/flaskphoto.py -Scanned: 2016-10-19 11:35:12.837907 -No vulnerabilities found. - - -laketiticaca/FlaskApp -https://github.com/laketiticaca/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 11:35:13.437612 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yipersevere/FlaskTutorial -https://github.com/yipersevere/FlaskTutorial -Entry file: None -Scanned: 2016-10-19 11:35:18.416446 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jk34/Blog_Flask -https://github.com/jk34/Blog_Flask -Entry file: Blog_Flask/app.py -Scanned: 2016-10-19 11:35:22.907828 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Blog_Flask/lib/python2.7/genericpath.py - -vanalex/restful-flask -https://github.com/vanalex/restful-flask -Entry file: restful-flask/restful-flask.py -Scanned: 2016-10-19 11:35:24.609987 -No vulnerabilities found. - - -chicaum/flask_blog -https://github.com/chicaum/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:35:25.108717 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Wangbicong/flask-newspaper -https://github.com/Wangbicong/flask-newspaper -Entry file: flask-newspaper/app/__init__.py -Scanned: 2016-10-19 11:35:27.889554 -Vulnerability 1: -File: flask-newspaper/app/main/views.py - > User input at line 29, trigger word "get(": - tab = request.args.get('tab') -Reassigned in: - File: flask-newspaper/app/main/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = redirect('/login/') - File: flask-newspaper/app/main/views.py - > Line 45: ret_MAYBE_FUNCTION_NAME = render_template('news.html',news_data=news_data) - File: flask-newspaper/app/main/views.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('index.html',news_data=news_data, user_data=user_data, tab_mark='user') - File: flask-newspaper/app/main/views.py - > Line 67: ret_MAYBE_FUNCTION_NAME = render_template('record.html',record_data=record_data) -File: flask-newspaper/app/main/views.py - > reaches line 72, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',news_data=news_data, user_data=user_data, tab_mark=tab) - - - -anupam0601/flask-REST -https://github.com/anupam0601/flask-REST -Entry file: flask-REST/restful.py -Scanned: 2016-10-19 11:35:29.119049 -No vulnerabilities found. - - -kerol/flask-utils -https://github.com/kerol/flask-utils -Entry file: flask-utils/logger.py -Scanned: 2016-10-19 11:35:30.846267 -No vulnerabilities found. - - -hicris/flask-note -https://github.com/hicris/flask-note -Entry file: flask-note/note.py -Scanned: 2016-10-19 11:35:31.410741 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yyoowwllgit/flask_agent -https://github.com/yyoowwllgit/flask_agent -Entry file: flask_agent/flask_agent_server/agent_server.py -Scanned: 2016-10-19 11:35:37.368898 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -evereux/flask_template -https://github.com/evereux/flask_template -Entry file: None -Scanned: 2016-10-19 11:35:37.857714 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/evereux/flask_template. - -Faoxis/flask-microblog -https://github.com/Faoxis/flask-microblog -Entry file: None -Scanned: 2016-10-19 11:35:40.381513 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AndrewSmiley/flask-demo -https://github.com/AndrewSmiley/flask-demo -Entry file: None -Scanned: 2016-10-19 11:35:42.917554 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AndrewSmiley/flask-demo. - -volny/flask-openid -https://github.com/volny/flask-openid -Entry file: flask-openid/flask_openid.py -Scanned: 2016-10-19 11:35:45.951045 -No vulnerabilities found. - - -brianbrittain/flask-blog -https://github.com/brianbrittain/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:35:49.475457 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -broschke/flask_api -https://github.com/broschke/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-19 11:35:50.994310 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -welserjr/Flask_Recaptcha -https://github.com/welserjr/Flask_Recaptcha -Entry file: Flask_Recaptcha/app.py -Scanned: 2016-10-19 11:35:52.334338 -Vulnerability 1: -File: Flask_Recaptcha/app.py - > User input at line 36, trigger word "get(": - comments = session.get('comments', []) -File: Flask_Recaptcha/app.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',comments=comments, form=form) - - - -jearnest88/flask_practice -https://github.com/jearnest88/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-19 11:35:56.096475 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cbenderust/flask_dev -https://github.com/cbenderust/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-19 11:35:56.610411 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scagle/Flask-Website -https://github.com/scagle/Flask-Website -Entry file: Flask-Website/hello.py -Scanned: 2016-10-19 11:35:57.877215 -No vulnerabilities found. - - -jfcorsini/testing-flask -https://github.com/jfcorsini/testing-flask -Entry file: None -Scanned: 2016-10-19 11:36:07.361286 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -josenavarro-famoco/flask-pg -https://github.com/josenavarro-famoco/flask-pg -Entry file: flask-pg/pogo/ext_api.py -Scanned: 2016-10-19 11:36:09.054182 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apjanco/flask_blog -https://github.com/apjanco/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:36:10.036838 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChaosSoong/python_flask -https://github.com/ChaosSoong/python_flask -Entry file: None -Scanned: 2016-10-19 11:36:10.544314 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ChaosSoong/python_flask. - -mwave1239/Flask_Tutorials -https://github.com/mwave1239/Flask_Tutorials -Entry file: Flask_Tutorials/registration_form/server.py -Scanned: 2016-10-19 11:36:16.690079 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Tutorials/registration_form/venv/lib/python2.7/genericpath.py - -yehiaa/flask-play -https://github.com/yehiaa/flask-play -Entry file: flask-play/app.py -Scanned: 2016-10-19 11:36:17.965127 -No vulnerabilities found. - - -tleskin/microblog-flask -https://github.com/tleskin/microblog-flask -Entry file: None -Scanned: 2016-10-19 11:36:18.956458 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ecfairle/flask_site -https://github.com/ecfairle/flask_site -Entry file: flask_site/mysite.py -Scanned: 2016-10-19 11:36:19.451061 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shankj3/flask_version -https://github.com/shankj3/flask_version -Entry file: flask_version/render_with_jinja/render_with_jinja.py -Scanned: 2016-10-19 11:36:19.953113 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neldevfull/flask_api -https://github.com/neldevfull/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-19 11:36:24.949923 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lanyuan27/flask-web -https://github.com/lanyuan27/flask-web -Entry file: flask-web/test.py -Scanned: 2016-10-19 11:36:27.185094 -No vulnerabilities found. - - -bjgill/flask-testing -https://github.com/bjgill/flask-testing -Entry file: flask-testing/server.py -Scanned: 2016-10-19 11:36:28.469686 -No vulnerabilities found. - - -guoweikuang/flask-hello -https://github.com/guoweikuang/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-19 11:36:29.995472 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aiden0z/Flask-Thriftclient -https://github.com/aiden0z/Flask-Thriftclient -Entry file: Flask-Thriftclient/tests/thriftclient.py -Scanned: 2016-10-19 11:36:33.376545 -No vulnerabilities found. - - -hputiprawan2/flask-aprt -https://github.com/hputiprawan2/flask-aprt -Entry file: flask-aprt/app.py -Scanned: 2016-10-19 11:36:37.089492 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-aprt/venv/lib/python2.7/genericpath.py - -datasciencemonkey/flask_test -https://github.com/datasciencemonkey/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 11:36:37.629220 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KittuJain/explore_Flask -https://github.com/KittuJain/explore_Flask -Entry file: explore_Flask/Hello.py -Scanned: 2016-10-19 11:36:39.880389 -No vulnerabilities found. - - -c75/flask-blueprint -https://github.com/c75/flask-blueprint -Entry file: flask-blueprint/api/__init__.py -Scanned: 2016-10-19 11:36:41.490807 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -darbik/flask_fun -https://github.com/darbik/flask_fun -Entry file: flask_fun/blog/flaskr.py -Scanned: 2016-10-19 11:36:44.814980 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NujjLTD/nujjWebsiteNew -https://github.com/NujjLTD/nujjWebsiteNew -Entry file: None -Scanned: 2016-10-19 11:37:00.254521 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pengxy8/TimeManager -https://github.com/pengxy8/TimeManager -Entry file: None -Scanned: 2016-10-19 11:37:01.486916 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pengxy8/TimeManager. - -vennyk/flask-hello-world -https://github.com/vennyk/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 11:37:02.044752 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -saifulazad/FlaskLargeApp -https://github.com/saifulazad/FlaskLargeApp -Entry file: FlaskLargeApp/run.py -Scanned: 2016-10-19 11:37:03.723072 -No vulnerabilities found. - - -jpvillavicencio/FlaskSQLAlchemyAPI -https://github.com/jpvillavicencio/FlaskSQLAlchemyAPI -Entry file: FlaskSQLAlchemyAPI/app.py -Scanned: 2016-10-19 11:37:04.977273 -No vulnerabilities found. - - -bradleygolden/cookiecutter-flaskrestful-barebones -https://github.com/bradleygolden/cookiecutter-flaskrestful-barebones -Entry file: cookiecutter-flaskrestful-barebones/{{cookiecutter.project_name}}/app.py -Scanned: 2016-10-19 11:37:06.199389 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brevno/test_pg_flask -https://github.com/brevno/test_pg_flask -Entry file: test_pg_flask/app/__init__.py -Scanned: 2016-10-19 11:37:07.407802 -Vulnerability 1: -File: test_pg_flask/app/views.py - > User input at line 20, trigger word "form[": - user = User.query.get_or_404(request.form['id']) -Reassigned in: - File: test_pg_flask/app/views.py - > Line 25: user = User(request.form.to_dict()) -File: test_pg_flask/app/views.py - > reaches line 28, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify([user.as_dict()]) - - - -jksutow/flask_login_reg -https://github.com/jksutow/flask_login_reg -Entry file: flask_login_reg/login.py -Scanned: 2016-10-19 11:37:15.172333 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mwave1239/MySQL-Flask-Examples -https://github.com/mwave1239/MySQL-Flask-Examples -Entry file: MySQL-Flask-Examples/friends/server.py -Scanned: 2016-10-19 11:37:19.648654 -No vulnerabilities found. - - -myhro/flask-gunicorn-example -https://github.com/myhro/flask-gunicorn-example -Entry file: flask-gunicorn-example/web.py -Scanned: 2016-10-19 11:37:21.867121 -No vulnerabilities found. - - -yfalcon8/Project_Tracker_Flask -https://github.com/yfalcon8/Project_Tracker_Flask -Entry file: Project_Tracker_Flask/hackbright-web.py -Scanned: 2016-10-19 11:37:23.085271 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jeanhl/HB_SQL_Flask -https://github.com/jeanhl/HB_SQL_Flask -Entry file: HB_SQL_Flask/hackbright-web.py -Scanned: 2016-10-19 11:37:24.401049 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -knalavadi/project-tracker-flask-felowship -https://github.com/knalavadi/project-tracker-flask-felowship -Entry file: project-tracker-flask-felowship/hackbright-web.py -Scanned: 2016-10-19 11:37:25.626556 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ssmores/20160726_project_tracker_flask -https://github.com/ssmores/20160726_project_tracker_flask -Entry file: 20160726_project_tracker_flask/hackbright-web.py -Scanned: 2016-10-19 11:37:26.833174 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -polarisc8t/HB---project_tracker_flask -https://github.com/polarisc8t/HB---project_tracker_flask -Entry file: HB---project_tracker_flask/hackbright-web.py -Scanned: 2016-10-19 11:37:28.220269 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ElizabethLane/HB-flask-sequel-exercise -https://github.com/ElizabethLane/HB-flask-sequel-exercise -Entry file: HB-flask-sequel-exercise/hackbright-web.py -Scanned: 2016-10-19 11:37:29.491648 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -FromZeus/python_flask_learning -https://github.com/FromZeus/python_flask_learning -Entry file: python_flask_learning/lesson-02/app/__init__.py -Scanned: 2016-10-19 11:37:31.503379 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jen8/Project-Tracker-Flask -https://github.com/jen8/Project-Tracker-Flask -Entry file: Project-Tracker-Flask/hackbright-web.py -Scanned: 2016-10-19 11:37:32.007455 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yfalcon8/Flask_Intro_Lab -https://github.com/yfalcon8/Flask_Intro_Lab -Entry file: Flask_Intro_Lab/nice.py -Scanned: 2016-10-19 11:37:33.476083 -No vulnerabilities found. - - -HiiYL/vision-flask-demo -https://github.com/HiiYL/vision-flask-demo -Entry file: None -Scanned: 2016-10-19 11:37:35.163564 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/HiiYL/vision-flask-demo. - -heratyian/flask-cat-tinder -https://github.com/heratyian/flask-cat-tinder -Entry file: flask-cat-tinder/app.py -Scanned: 2016-10-19 11:37:36.761551 -No vulnerabilities found. - - -brettlangdon/cookiecutter-flask-app -https://github.com/brettlangdon/cookiecutter-flask-app -Entry file: cookiecutter-flask-app/{{cookiecutter.project_name}}/{{cookiecutter.project_name}}/__init__.py -Scanned: 2016-10-19 11:37:38.107807 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -feistiller/LearnPythonFlask -https://github.com/feistiller/LearnPythonFlask -Entry file: LearnPythonFlask/Demo1HelloWorld.py -Scanned: 2016-10-19 11:37:39.334875 -Vulnerability 1: -File: LearnPythonFlask/Demo4WtfHelloWorld.py - > User input at line 18, trigger word ".data": - name = form.name.data -Reassigned in: - File: LearnPythonFlask/Demo4WtfHelloWorld.py - > Line 15: name = None -File: LearnPythonFlask/Demo4WtfHelloWorld.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('wtfIndex.html',form=form, name=name) - - - -yfalcon8/Flask_Job_Application -https://github.com/yfalcon8/Flask_Job_Application -Entry file: Flask_Job_Application/application.py -Scanned: 2016-10-19 11:37:40.587728 -No vulnerabilities found. - - -eriknguyen/basic-auth-flask -https://github.com/eriknguyen/basic-auth-flask -Entry file: basic-auth-flask/flask_intro/__init__.py -Scanned: 2016-10-19 11:37:41.934408 -No vulnerabilities found. - - -micaiahparker/startkit-flask-heroku -https://github.com/micaiahparker/startkit-flask-heroku -Entry file: startkit-flask-heroku/app.py -Scanned: 2016-10-19 11:37:43.195225 -No vulnerabilities found. - - -thepomeranian/project-tracker-flask -https://github.com/thepomeranian/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-19 11:37:45.708591 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottx611x/AWS-SNS-Flask -https://github.com/scottx611x/AWS-SNS-Flask -Entry file: AWS-SNS-Flask/recieve_SNS.py -Scanned: 2016-10-19 11:37:50.206898 -No vulnerabilities found. - - -Coolwater7/flask -https://github.com/Coolwater7/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:38:02.131285 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -sepihere/flask -https://github.com/sepihere/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:38:03.690548 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -SicunStudio/aunet-flask -https://github.com/SicunStudio/aunet-flask -Entry file: None -Scanned: 2016-10-19 11:38:05.358885 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SicunStudio/aunet-flask. - -afropolymath/papers -https://github.com/afropolymath/papers -Entry file: papers/api/__init__.py -Scanned: 2016-10-19 11:38:06.760544 -Vulnerability 1: -File: papers/api/controllers/files.py - > User input at line 149, trigger word "get(": - parent_id = args.get('parent_id', None) -Reassigned in: - File: papers/api/controllers/files.py - > Line 161: update_fields['tag'] = parent_id == '0'g.file['id']'{}#{}'.format(folder_access['tag'], folder['last_index']) - File: papers/api/controllers/files.py - > Line 166: update_fields['parent_id'] = parent_id - File: papers/api/controllers/files.py - > Line 152: update_fields['name'] = name -File: papers/api/controllers/files.py - > reaches line 156, trigger word "filter(": - folder_access = Folder.filter('id''creator'parent_iduser_id) - - - -munendrasn/Flaskr -https://github.com/munendrasn/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 11:38:07.278604 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Eyali1001/flaskcalculator -https://github.com/Eyali1001/flaskcalculator -Entry file: flaskcalculator/calculator.py -Scanned: 2016-10-19 11:38:08.497625 -Vulnerability 1: -File: flaskcalculator/calculator.py - > User input at line 14, trigger word "form[": - result = int(request.form['title']) + int(request.form['text']) -File: flaskcalculator/calculator.py - > reaches line 15, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultpage.html',result=result) - - - -penglee87/flaskr -https://github.com/penglee87/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:38:09.009079 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pecone/flaskr -https://github.com/pecone/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:38:17.502091 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lechain/flaskr -https://github.com/lechain/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:38:22.028698 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fiezwang/flasky -https://github.com/fiezwang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:38:22.527624 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -swdmike/flasky -https://github.com/swdmike/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:38:23.020495 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChuckiePae/flaskr -https://github.com/ChuckiePae/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:38:23.529619 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -linjialongmao/flasky -https://github.com/linjialongmao/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:38:25.066408 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -algalanb/flaskapp -https://github.com/algalanb/flaskapp -Entry file: None -Scanned: 2016-10-19 11:38:26.558965 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/algalanb/flaskapp. - -Unknown22/Flaskr -https://github.com/Unknown22/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 11:38:28.052456 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sinwar/flaskr -https://github.com/sinwar/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:38:28.541084 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lux600/flasktest -https://github.com/lux600/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 11:38:30.161533 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sagaragarwal94/flask-site-builder -https://github.com/sagaragarwal94/flask-site-builder -Entry file: flask-site-builder/sitebuilder.py -Scanned: 2016-10-19 11:38:33.367537 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Melvie/FlaskLearns -https://github.com/Melvie/FlaskLearns -Entry file: None -Scanned: 2016-10-19 11:38:35.002699 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Leon14451/FlaskMultisite -https://github.com/Leon14451/FlaskMultisite -Entry file: FlaskMultisite/wwwroot/__init__.py -Scanned: 2016-10-19 11:38:36.354348 -No vulnerabilities found. - - -laketiticaca/FlaskApp -https://github.com/laketiticaca/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 11:38:36.889218 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rssenar/FlaskApp -https://github.com/rssenar/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 11:38:37.496912 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nenodias/flask-webservice -https://github.com/nenodias/flask-webservice -Entry file: flask-webservice/app.py -Scanned: 2016-10-19 11:38:39.852131 -Vulnerability 1: -File: flask-webservice/app.py - > User input at line 32, trigger word "get(": - dev = Developer(request.json.name, request.json.get('hireDate', ''), request.json.get('focus', '')) -File: flask-webservice/app.py - > reaches line 35, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('developer'dev), 201) - -Vulnerability 2: -File: flask-webservice/app.py - > User input at line 45, trigger word "get(": - dev = Developer.query.get(id) -Reassigned in: - File: flask-webservice/app.py - > Line 46: dev.name = request.json.get('name', dev.name) - File: flask-webservice/app.py - > Line 47: dev.hireDate = request.json.get('hireDate', dev.name) - File: flask-webservice/app.py - > Line 48: dev.focus = request.json.get('focus', dev.focus) -File: flask-webservice/app.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('dev'dev) - - - -StrGlee/flask-demo -https://github.com/StrGlee/flask-demo -Entry file: None -Scanned: 2016-10-19 11:38:40.356180 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/StrGlee/flask-demo. - -rconnol/PromotionsFlask -https://github.com/rconnol/PromotionsFlask -Entry file: PromotionsFlask/app/__init__.py -Scanned: 2016-10-19 11:38:41.613600 -No vulnerabilities found. - - -dschmaryl/golf-flask -https://github.com/dschmaryl/golf-flask -Entry file: golf-flask/stats.py -Scanned: 2016-10-19 11:38:42.893364 -No vulnerabilities found. - - -Dudeguy409/flask_demo -https://github.com/Dudeguy409/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-19 11:38:44.649220 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -1572766337/py_flask -https://github.com/1572766337/py_flask -Entry file: py_flask/app/__init__.py -Scanned: 2016-10-19 11:38:50.770686 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -letterli/Flask-blog -https://github.com/letterli/Flask-blog -Entry file: Flask-blog/app/__init__.py -Scanned: 2016-10-19 11:38:53.251294 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -srinivasb07/Flask_Sample -https://github.com/srinivasb07/Flask_Sample -Entry file: Flask_Sample/app.py -Scanned: 2016-10-19 11:39:03.854342 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Jollyhrothgar/flask_template -https://github.com/Jollyhrothgar/flask_template -Entry file: None -Scanned: 2016-10-19 11:39:05.355948 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Jollyhrothgar/flask_template. - -apengok/flask_tutor -https://github.com/apengok/flask_tutor -Entry file: flask_tutor/tmp/main.py -Scanned: 2016-10-19 11:39:05.852412 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ArioShaman/flask-site -https://github.com/ArioShaman/flask-site -Entry file: None -Scanned: 2016-10-19 11:39:18.121461 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ibrewdudes/flask-server -https://github.com/ibrewdudes/flask-server -Entry file: None -Scanned: 2016-10-19 11:39:18.630987 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ibrewdudes/flask-server. - -hackrole/flask_demo -https://github.com/hackrole/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-19 11:39:19.128097 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -YeongjinOh/flask_pratice -https://github.com/YeongjinOh/flask_pratice -Entry file: flask_pratice/app/__init__.py -Scanned: 2016-10-19 11:39:20.397124 -No vulnerabilities found. - - -DylanVerstraete/ItsyouonlineFlask -https://github.com/DylanVerstraete/ItsyouonlineFlask -Entry file: ItsyouonlineFlask/itsyouonline-flask/ItsYouOnlineServer/app.py -Scanned: 2016-10-19 11:39:24.182732 -No vulnerabilities found. - - -jauschalley/flask_practice -https://github.com/jauschalley/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-19 11:39:24.860000 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jubjub55/flask_test -https://github.com/jubjub55/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 11:39:25.431323 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sourav2406/learnFlask -https://github.com/sourav2406/learnFlask -Entry file: None -Scanned: 2016-10-19 11:39:25.936642 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sourav2406/learnFlask. - -chrisco/flask-demo -https://github.com/chrisco/flask-demo -Entry file: None -Scanned: 2016-10-19 11:39:26.466764 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chrisco/flask-demo. - -aripddev/cms_flask -https://github.com/aripddev/cms_flask -Entry file: cms_flask/app/__init__.py -Scanned: 2016-10-19 11:39:31.118474 -Vulnerability 1: -File: cms_flask/app/core/controllers.py - > User input at line 76, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 83: ret_MAYBE_FUNCTION_NAME = render_template('contact.html',form=form) - File: cms_flask/app/core/controllers.py - > Line 80: ret_MAYBE_FUNCTION_NAME = abort(400) -File: cms_flask/app/core/controllers.py - > reaches line 82, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - -Vulnerability 2: -File: cms_flask/app/core/controllers.py - > User input at line 76, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 83: ret_MAYBE_FUNCTION_NAME = render_template('contact.html',form=form) - File: cms_flask/app/core/controllers.py - > Line 80: ret_MAYBE_FUNCTION_NAME = abort(400) -File: cms_flask/app/core/controllers.py - > reaches line 82, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - -Vulnerability 3: -File: cms_flask/app/core/controllers.py - > User input at line 94, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 96: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 97, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.show.html',post=post) - -Vulnerability 4: -File: cms_flask/app/core/controllers.py - > User input at line 120, trigger word "form[": - post = Post(headline=request.form['headline'], subheadline=request.form['subheadline'], body=request.form['body']) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 114: ret_MAYBE_FUNCTION_NAME = render_template('/admin/post.new.html') - File: cms_flask/app/core/controllers.py - > Line 118: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_new')) -File: cms_flask/app/core/controllers.py - > reaches line 124, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 5: -File: cms_flask/app/core/controllers.py - > User input at line 120, trigger word "form[": - post = Post(headline=request.form['headline'], subheadline=request.form['subheadline'], body=request.form['body']) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 114: ret_MAYBE_FUNCTION_NAME = render_template('/admin/post.new.html') - File: cms_flask/app/core/controllers.py - > Line 118: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_new')) -File: cms_flask/app/core/controllers.py - > reaches line 124, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 6: -File: cms_flask/app/core/controllers.py - > User input at line 129, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 131: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 132, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/admin/post.edit.html',post=post) - -Vulnerability 7: -File: cms_flask/app/core/controllers.py - > User input at line 137, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 143, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 8: -File: cms_flask/app/core/controllers.py - > User input at line 137, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 143, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 9: -File: cms_flask/app/core/controllers.py - > User input at line 137, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 150, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 10: -File: cms_flask/app/core/controllers.py - > User input at line 137, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 150, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 11: -File: cms_flask/app/core/controllers.py - > User input at line 161, trigger word "get(": - category = Category.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 163: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 165, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.show.html',category=category, posts=posts) - -Vulnerability 12: -File: cms_flask/app/core/controllers.py - > User input at line 172, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 174: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('page.show.html',page=page) - -Vulnerability 13: -File: cms_flask/app/core/controllers.py - > User input at line 193, trigger word "form[": - page = Page(title=request.form['title'], body=request.form['body']) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('/admin/page.new.html') - File: cms_flask/app/core/controllers.py - > Line 191: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_new')) -File: cms_flask/app/core/controllers.py - > reaches line 197, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 14: -File: cms_flask/app/core/controllers.py - > User input at line 193, trigger word "form[": - page = Page(title=request.form['title'], body=request.form['body']) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('/admin/page.new.html') - File: cms_flask/app/core/controllers.py - > Line 191: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_new')) -File: cms_flask/app/core/controllers.py - > reaches line 197, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 15: -File: cms_flask/app/core/controllers.py - > User input at line 202, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 204: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 205, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/admin/page.edit.html',page=page) - -Vulnerability 16: -File: cms_flask/app/core/controllers.py - > User input at line 210, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 216, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 17: -File: cms_flask/app/core/controllers.py - > User input at line 210, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 216, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 18: -File: cms_flask/app/core/controllers.py - > User input at line 210, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 222, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 19: -File: cms_flask/app/core/controllers.py - > User input at line 210, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 222, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 20: -File: cms_flask/app/core/controllers.py - > User input at line 249, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 251: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 252, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/admin/user.edit.html',user=user) - -Vulnerability 21: -File: cms_flask/app/core/controllers.py - > User input at line 257, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 263, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_edit',id=user.id)) - -Vulnerability 22: -File: cms_flask/app/core/controllers.py - > User input at line 257, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 263, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_edit',id=user.id)) - -Vulnerability 23: -File: cms_flask/app/core/controllers.py - > User input at line 257, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 269, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_show',id=user.id)) - -Vulnerability 24: -File: cms_flask/app/core/controllers.py - > User input at line 257, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 269, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_show',id=user.id)) - -Vulnerability 25: -File: cms_flask/app/core/controllers.py - > User input at line 274, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 276: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 277, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/admin/user.show.html',user=user) - - - -northwestyam/flask_hello -https://github.com/northwestyam/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-19 11:39:31.853106 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ibhan88/Flask-Testing -https://github.com/ibhan88/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-19 11:39:33.793065 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -titov-andrei/microblog-flask -https://github.com/titov-andrei/microblog-flask -Entry file: None -Scanned: 2016-10-19 11:39:34.318864 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -glenpadua/flask-blog -https://github.com/glenpadua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:39:34.885774 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -juliuskrah/flask-blog -https://github.com/juliuskrah/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:39:35.399862 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -elthran/flask-game -https://github.com/elthran/flask-game -Entry file: flask-game/flask-intro/app.py -Scanned: 2016-10-19 11:39:37.854877 -No vulnerabilities found. - - -ChaosSoong/python_flask -https://github.com/ChaosSoong/python_flask -Entry file: None -Scanned: 2016-10-19 11:39:38.839353 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ChaosSoong/python_flask. - -TheDeadMays/flask-bootstrap -https://github.com/TheDeadMays/flask-bootstrap -Entry file: flask-bootstrap/app/__init__.py -Scanned: 2016-10-19 11:39:41.604985 -No vulnerabilities found. - - -whitneybelba/Flask-Testing -https://github.com/whitneybelba/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-19 11:39:42.115681 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MadhuriHB/Testing-flask -https://github.com/MadhuriHB/Testing-flask -Entry file: Testing-flask/party.py -Scanned: 2016-10-19 11:39:43.797624 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -langep/flask-template -https://github.com/langep/flask-template -Entry file: None -Scanned: 2016-10-19 11:39:44.331616 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/langep/flask-template. - -tuvttran/flask-learning -https://github.com/tuvttran/flask-learning -Entry file: flask-learning/hello.py -Scanned: 2016-10-19 11:39:46.569549 -No vulnerabilities found. - - -couldtt/flask-foundation -https://github.com/couldtt/flask-foundation -Entry file: flask-foundation/app/__init__.py -Scanned: 2016-10-19 11:39:50.188616 -No vulnerabilities found. - - -haithamslaibi/Flask_Template -https://github.com/haithamslaibi/Flask_Template -Entry file: Flask_Template/web_app.py -Scanned: 2016-10-19 11:39:52.454012 -No vulnerabilities found. - - -XiongZhijun/simple-flask -https://github.com/XiongZhijun/simple-flask -Entry file: simple-flask/app/app.py -Scanned: 2016-10-19 11:39:55.081609 -Vulnerability 1: -File: simple-flask/app/auth/views.py - > User input at line 16, trigger word ".data": - user = User.query.filter(or_(User.username == form.username.data)).first() -File: simple-flask/app/auth/views.py - > reaches line 16, trigger word "filter(": - user = User.query.filter(or_(User.username == form.username.data)).first() - - - -lanyuan27/flask-web -https://github.com/lanyuan27/flask-web -Entry file: flask-web/test.py -Scanned: 2016-10-19 11:40:06.340477 -No vulnerabilities found. - - -italomaia/flask-rev -https://github.com/italomaia/flask-rev -Entry file: flask-rev/tests/runtests.py -Scanned: 2016-10-19 11:40:07.721035 -No vulnerabilities found. - - -ckaren28/python-Flask -https://github.com/ckaren28/python-Flask -Entry file: python-Flask/PYTHON_FLASK/friends/server.py -Scanned: 2016-10-19 11:40:14.936761 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-Flask/PYTHON_FLASK/friends/venv/lib/python2.7/genericpath.py - -ssong319/Flask-Testing -https://github.com/ssong319/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-19 11:40:15.437784 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrb101/Flask-Sauce -https://github.com/mrb101/Flask-Sauce -Entry file: Flask-Sauce/app/__init__.py -Scanned: 2016-10-19 11:40:20.855775 -No vulnerabilities found. - - -mattalat/flask-microblog -https://github.com/mattalat/flask-microblog -Entry file: None -Scanned: 2016-10-19 11:40:21.351997 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yehe01/minitwit-mongo -https://github.com/yehe01/minitwit-mongo -Entry file: minitwit-mongo/minitwit/main.py -Scanned: 2016-10-19 11:40:22.703361 -No vulnerabilities found. - - -pythonbean/microblog -https://github.com/pythonbean/microblog -Entry file: None -Scanned: 2016-10-19 11:40:23.223659 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vseeker/app -https://github.com/vseeker/app -Entry file: app/__init__.py -Scanned: 2016-10-19 11:40:26.492811 -No vulnerabilities found. - - -redtreelchao/microblog -https://github.com/redtreelchao/microblog -Entry file: None -Scanned: 2016-10-19 11:40:26.994997 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -katiayx/hblab_0805_Testing-Balloonicorn-After-Party -https://github.com/katiayx/hblab_0805_Testing-Balloonicorn-After-Party -Entry file: hblab_0805_Testing-Balloonicorn-After-Party/party.py -Scanned: 2016-10-19 11:40:28.721444 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iverstraeten/headlines -https://github.com/iverstraeten/headlines -Entry file: headlines/headlines.py -Scanned: 2016-10-19 11:40:30.615200 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Mizzlr/FlaskWebApp -https://github.com/Mizzlr/FlaskWebApp -Entry file: FlaskWebApp/FanGuardFlask/__init__.py -Scanned: 2016-10-19 11:40:31.156487 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MusaTamzid05/FlaskYoutubeTest -https://github.com/MusaTamzid05/FlaskYoutubeTest -Entry file: None -Scanned: 2016-10-19 11:40:33.535160 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MusaTamzid05/FlaskYoutubeTest. - -ApexMuse/FlaskWebDevelopmentPractice -https://github.com/ApexMuse/FlaskWebDevelopmentPractice -Entry file: FlaskWebDevelopmentPractice/extensions.py -Scanned: 2016-10-19 11:40:34.785125 -No vulnerabilities found. - - -brizow/FlaskTriviaApp -https://github.com/brizow/FlaskTriviaApp -Entry file: FlaskTriviaApp/FlaskWebProject1/__init__.py -Scanned: 2016-10-19 11:40:37.579755 -Vulnerability 1: -File: FlaskTriviaApp/FlaskWebProject1/views.py - > User input at line 37, trigger word "form[": - question = request.form['question'] -Reassigned in: - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 48: ret_MAYBE_FUNCTION_NAME = '

Invalid Request

' - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 31: ret_MAYBE_FUNCTION_NAME = render_template('CreateQuestion.html',title='Create a question', year=year) -File: FlaskTriviaApp/FlaskWebProject1/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('CreatedQuestion.html',question=question, title='Thanks!', year=year) - -Vulnerability 2: -File: FlaskTriviaApp/FlaskWebProject1/views.py - > User input at line 56, trigger word "get(": - question = r.get(title + ':question') -Reassigned in: - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html',title='Good job!', year=year) - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('Incorrect.html',submittedAnswer=submittedAnswer, answer=answer, title='Oh noes!', year=year) - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 68: ret_MAYBE_FUNCTION_NAME = '

Invalid Request

' -File: FlaskTriviaApp/FlaskWebProject1/views.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question, title='Answer Question', year=year) - -Vulnerability 3: -File: FlaskTriviaApp/FlaskWebProject1/views.py - > User input at line 60, trigger word "form[": - submittedAnswer = request.form['submittedAnswer'] -Reassigned in: - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 68: ret_MAYBE_FUNCTION_NAME = '

Invalid Request

' - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question, title='Answer Question', year=year) - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html',title='Good job!', year=year) -File: FlaskTriviaApp/FlaskWebProject1/views.py - > reaches line 66, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('Incorrect.html',submittedAnswer=submittedAnswer, answer=answer, title='Oh noes!', year=year) - -Vulnerability 4: -File: FlaskTriviaApp/FlaskWebProject1/views.py - > User input at line 62, trigger word "get(": - answer = r.get(title + ':answer') -Reassigned in: - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 68: ret_MAYBE_FUNCTION_NAME = '

Invalid Request

' - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question, title='Answer Question', year=year) - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html',title='Good job!', year=year) -File: FlaskTriviaApp/FlaskWebProject1/views.py - > reaches line 66, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('Incorrect.html',submittedAnswer=submittedAnswer, answer=answer, title='Oh noes!', year=year) - - - -Chi-Qingjun/FlaskWechatDev -https://github.com/Chi-Qingjun/FlaskWechatDev -Entry file: FlaskWechatDev/app/__init__.py -Scanned: 2016-10-19 11:40:38.962454 -Vulnerability 1: -File: FlaskWechatDev/app/main/views.py - > User input at line 30, trigger word ".data": - tree = ET.fromstring(request.data.decode('utf-8')) -File: FlaskWechatDev/app/main/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('text.xml',to_user_name=tree.find('FromUserName').text, from_user_name=tree.find('ToUserName').text, timestamp=datetime.utcnow().timestamp(), content=tree.find('Content').text) - - - -lindsaynchan/hb_flask_testing -https://github.com/lindsaynchan/hb_flask_testing -Entry file: hb_flask_testing/party.py -Scanned: 2016-10-19 11:40:40.754641 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simsinght/microblog_flask_tutorial -https://github.com/simsinght/microblog_flask_tutorial -Entry file: microblog_flask_tutorial/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 11:40:43.744199 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -measurigtime/flask-by-example -https://github.com/measurigtime/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-19 11:40:44.597941 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Anthonyhawkins/flask_megatutorial_lab -https://github.com/Anthonyhawkins/flask_megatutorial_lab -Entry file: flask_megatutorial_lab/app/__init__.py -Scanned: 2016-10-19 11:40:45.852603 -No vulnerabilities found. - - -beatricep/hblab_0805_testing-flask -https://github.com/beatricep/hblab_0805_testing-flask -Entry file: hblab_0805_testing-flask/party.py -Scanned: 2016-10-19 11:40:47.601193 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottx611x/AWS-SNS-Flask -https://github.com/scottx611x/AWS-SNS-Flask -Entry file: AWS-SNS-Flask/recieve_SNS.py -Scanned: 2016-10-19 11:40:49.588689 -No vulnerabilities found. - - -daniellawrence/flask-rest-sqla -https://github.com/daniellawrence/flask-rest-sqla -Entry file: flask-rest-sqla/web.py -Scanned: 2016-10-19 11:40:55.834741 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -12DReflections/docker_flask_mdb -https://github.com/12DReflections/docker_flask_mdb -Entry file: docker_flask_mdb/app.py -Scanned: 2016-10-19 11:40:57.066117 -No vulnerabilities found. - - -yucealiosman1/flask-deneme1 -https://github.com/yucealiosman1/flask-deneme1 -Entry file: flask-deneme1/app.py -Scanned: 2016-10-19 11:40:58.329565 -No vulnerabilities found. - - -vecelo/flask_lear_proj -https://github.com/vecelo/flask_lear_proj -Entry file: flask_lear_proj/blogs/Lib/site-packages/flask-0.11.1-py2.7.egg/flask/sessions.py -Scanned: 2016-10-19 11:41:01.964452 -No vulnerabilities found. - - -dinhnv/nginx-flask-stub -https://github.com/dinhnv/nginx-flask-stub -Entry file: nginx-flask-stub/webapp/eanstub_app.py -Scanned: 2016-10-19 11:41:08.394600 -No vulnerabilities found. - - -tinapastelero/HB-flask-test -https://github.com/tinapastelero/HB-flask-test -Entry file: HB-flask-test/party.py -Scanned: 2016-10-19 11:41:10.069637 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laurelkorwin/hb-flask-testing -https://github.com/laurelkorwin/hb-flask-testing -Entry file: hb-flask-testing/party.py -Scanned: 2016-10-19 11:41:11.896108 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lgorham/flask_testing_0805 -https://github.com/lgorham/flask_testing_0805 -Entry file: flask_testing_0805/party.py -Scanned: 2016-10-19 11:41:18.658349 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eugenepark81/flask-hello-world -https://github.com/eugenepark81/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 11:41:21.211998 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -NexusRJ/react_flask_blog -https://github.com/NexusRJ/react_flask_blog -Entry file: react_flask_blog/app/__init__.py -Scanned: 2016-10-19 11:41:23.699983 -Vulnerability 1: -File: react_flask_blog/app/admin/views.py - > User input at line 102, trigger word "get(": - x = Article.query.filter_by(id=request.args.get('id')).first() -File: react_flask_blog/app/admin/views.py - > reaches line 106, trigger word "flash(": - flash('已删除' + x.title) - - - -stonewm/flask_by_example -https://github.com/stonewm/flask_by_example -Entry file: flask_by_example/headlines.py -Scanned: 2016-10-19 11:41:24.968574 -No vulnerabilities found. - - -thechutrain/flask-burrito-app -https://github.com/thechutrain/flask-burrito-app -Entry file: flask-burrito-app/tacocat.py -Scanned: 2016-10-19 11:41:26.290232 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jordanagreen/flask-todo-lists -https://github.com/jordanagreen/flask-todo-lists -Entry file: flask-todo-lists/app.py -Scanned: 2016-10-19 11:41:27.655024 -Vulnerability 1: -File: flask-todo-lists/views.py - > User input at line 24, trigger word "get(": - l = TodoList.query.get(id) -File: flask-todo-lists/views.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('list.html',title=l.title, list=l) - -Vulnerability 2: -File: flask-todo-lists/views.py - > User input at line 45, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask-todo-lists/views.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form) - File: flask-todo-lists/views.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form) - File: flask-todo-lists/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = abort(400) -File: flask-todo-lists/views.py - > reaches line 48, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - -Vulnerability 3: -File: flask-todo-lists/views.py - > User input at line 45, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask-todo-lists/views.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form) - File: flask-todo-lists/views.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form) - File: flask-todo-lists/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = abort(400) -File: flask-todo-lists/views.py - > reaches line 48, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - - - -tis86/flask -https://github.com/tis86/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:41:31.181852 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -yangliu2/flask -https://github.com/yangliu2/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:41:32.760908 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -KeyJia/Flask -https://github.com/KeyJia/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:41:34.261117 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Coolwater7/flask -https://github.com/Coolwater7/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:41:35.798989 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -vipitsoft/flask -https://github.com/vipitsoft/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:41:37.389054 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -reed-chi/flask -https://github.com/reed-chi/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:41:39.968535 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -huhjuang/Flask -https://github.com/huhjuang/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:41:40.474196 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mosquito/flask-example -https://github.com/mosquito/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-19 11:41:43.494702 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -teuton0215/microblog -https://github.com/teuton0215/microblog -Entry file: None -Scanned: 2016-10-19 11:41:44.008387 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -babydeya/flaskr -https://github.com/babydeya/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:41:45.513286 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rouzazari/flaskangular -https://github.com/rouzazari/flaskangular -Entry file: flaskangular/app/__init__.py -Scanned: 2016-10-19 11:41:47.776848 -No vulnerabilities found. - - -nocotan/flaski -https://github.com/nocotan/flaski -Entry file: flaski/app.py -Scanned: 2016-10-19 11:41:49.083904 -No vulnerabilities found. - - -berezovskiydenis/flasktaskr -https://github.com/berezovskiydenis/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:41:49.595046 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bencelder/flaskr -https://github.com/bencelder/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:41:50.139236 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -penglee87/flaskr -https://github.com/penglee87/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:41:51.626209 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pecone/flaskr -https://github.com/pecone/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:41:58.138464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -faridalrafi/flaskopencv -https://github.com/faridalrafi/flaskopencv -Entry file: flaskopencv/app.py -Scanned: 2016-10-19 11:41:59.844219 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smilemlz/flasktest -https://github.com/smilemlz/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 11:42:00.372606 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -YaleYeah/flasky -https://github.com/YaleYeah/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:42:08.878239 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Runningdogs/flasky -https://github.com/Runningdogs/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:42:10.395267 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seizans/flasko -https://github.com/seizans/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-19 11:42:12.042229 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py - -rouzazari/flaskfirst -https://github.com/rouzazari/flaskfirst -Entry file: flaskfirst/app/__init__.py -Scanned: 2016-10-19 11:42:19.373252 -No vulnerabilities found. - - -ChuckiePae/flaskr -https://github.com/ChuckiePae/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:42:22.878737 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KamiNoSierhej/flaskkk -https://github.com/KamiNoSierhej/flaskkk -Entry file: flaskkk/flaskkk/Polczan.py -Scanned: 2016-10-19 11:42:25.107066 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sampathweb/ml-cookiecutter-starter-flask-app -https://github.com/sampathweb/ml-cookiecutter-starter-flask-app -Entry file: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/__init__.py -Scanned: 2016-10-19 11:42:26.673662 -Vulnerability 1: -File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > User input at line 32, trigger word ".data": - submitted_data = form.data -Reassigned in: - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 36: sepal_length = float(submitted_data['sepal_length']) - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 37: sepal_width = float(submitted_data['sepal_width']) - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 38: petal_length = float(submitted_data['petal_length']) - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 39: petal_width = float(submitted_data['petal_width']) - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 42: flower_instance = [sepal_length, sepal_width, petal_length, petal_width] - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 47: my_predictions = estimator.predict([flower_instance]) - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 50: my_prediction = my_predictions[0] - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 54: data = [flower_instance] - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 28: data = [] -File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, prediction=predicted_iris, data=json.dumps(data)) - - - -roemhildtg/flask-can-crud -https://github.com/roemhildtg/flask-can-crud -Entry file: flask-can-crud/flaskapp.py -Scanned: 2016-10-19 11:42:28.601898 -No vulnerabilities found. - - -thippo/FlaskFrame -https://github.com/thippo/FlaskFrame -Entry file: FlaskFrame/myweb/__init__.py -Scanned: 2016-10-19 11:42:30.582933 -Vulnerability 1: -File: FlaskFrame/myweb/bitcoin/bitcoin.py - > User input at line 12, trigger word ".data": - data = form.q.data.strip() -Reassigned in: - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 18: transfer_dict['pkuc'] = data - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 19: transfer_dict['pkc'] = utils.WIF_to_compressed(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 20: p2a = py3private2address.Private2Address(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 21: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 22: transfer_dict['bac'] = p2a.bitcoinaddress_compressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 24: transfer_dict['type'] = 1 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 25: transfer_dict['pkc'] = data - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 26: transfer_dict['pkuc'] = utils.compressed_to_WIF(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 27: p2a = py3private2address.Private2Address(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 28: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 29: transfer_dict['bac'] = p2a.bitcoinaddress_compressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 34: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 36: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 38: transfer_dict['type'] = 0 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('bitcoin',transfer_dict=transfer_dict, form=form) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 14: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 17: transfer_dict['type'] = 1 -File: FlaskFrame/myweb/bitcoin/bitcoin.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('bitcoinaddress',data=data, form=form) - - - -famesprinter/FlaskDemo -https://github.com/famesprinter/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 11:42:31.097693 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -omokehinde/FlaskExam -https://github.com/omokehinde/FlaskExam -Entry file: FlaskExam/app.py -Scanned: 2016-10-19 11:42:48.336897 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -fantingdong/flasky1 -https://github.com/fantingdong/flasky1 -Entry file: flasky1/app/__init__.py -Scanned: 2016-10-19 11:42:49.852795 -Vulnerability 1: -File: flasky1/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 55: posts = pagination.items - File: flasky1/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky1/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flasky1/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flasky1/app/main/views.py - > Line 45: show_followed = False - File: flasky1/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky1/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flasky1/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 67: posts = pagination.items -File: flasky1/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flasky1/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flasky1/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 134: comments = pagination.items - File: flasky1/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flasky1/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flasky1/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flasky1/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky1/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flasky1/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flasky1/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky1/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flasky1/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 246: comments = pagination.items -File: flasky1/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flasky1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky1/app/api_1_0/users.py - > Line 23: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flasky1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky1/app/api_1_0/users.py - > Line 23: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flasky1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky1/app/api_1_0/users.py - > Line 23: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flasky1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky1/app/api_1_0/users.py - > Line 46: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flasky1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky1/app/api_1_0/users.py - > Line 46: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flasky1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky1/app/api_1_0/users.py - > Line 46: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flasky1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky1/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flasky1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky1/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flasky1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky1/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flasky1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flasky1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flasky1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flasky1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flasky1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flasky1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -jmelchio/FlaskCF -https://github.com/jmelchio/FlaskCF -Entry file: FlaskCF/FlaskCF.py -Scanned: 2016-10-19 11:42:51.095094 -No vulnerabilities found. - - -lidingke/flaskStudy -https://github.com/lidingke/flaskStudy -Entry file: flaskStudy/user/app/__init__.py -Scanned: 2016-10-19 11:42:52.462614 -No vulnerabilities found. - - -xyq946692052/flaskLearn -https://github.com/xyq946692052/flaskLearn -Entry file: None -Scanned: 2016-10-19 11:42:53.737301 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xyq946692052/flaskLearn. - -wccosby/flaskML -https://github.com/wccosby/flaskML -Entry file: flaskML/app/__init__.py -Scanned: 2016-10-19 11:42:55.243342 -Vulnerability 1: -File: flaskML/app/views.py - > User input at line 32, trigger word ".data": - submitted_data = form.data -Reassigned in: - File: flaskML/app/views.py - > Line 36: sepal_length = float(submitted_data['sepal_length']) - File: flaskML/app/views.py - > Line 37: sepal_width = float(submitted_data['sepal_width']) - File: flaskML/app/views.py - > Line 38: petal_length = float(submitted_data['petal_length']) - File: flaskML/app/views.py - > Line 39: petal_width = float(submitted_data['petal_width']) - File: flaskML/app/views.py - > Line 42: flower_instance = [sepal_length, sepal_width, petal_length, petal_width] - File: flaskML/app/views.py - > Line 47: my_predictions = estimator.predict([flower_instance]) - File: flaskML/app/views.py - > Line 50: my_prediction = my_predictions[0] - File: flaskML/app/views.py - > Line 54: data = [flower_instance] - File: flaskML/app/views.py - > Line 28: data = [] -File: flaskML/app/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, prediction=predicted_iris, data=json.dumps(data)) - - - -nenodias/flask-webservice -https://github.com/nenodias/flask-webservice -Entry file: flask-webservice/app.py -Scanned: 2016-10-19 11:42:56.613290 -Vulnerability 1: -File: flask-webservice/app.py - > User input at line 32, trigger word "get(": - dev = Developer(request.json.name, request.json.get('hireDate', ''), request.json.get('focus', '')) -File: flask-webservice/app.py - > reaches line 35, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('developer'dev), 201) - -Vulnerability 2: -File: flask-webservice/app.py - > User input at line 45, trigger word "get(": - dev = Developer.query.get(id) -Reassigned in: - File: flask-webservice/app.py - > Line 46: dev.name = request.json.get('name', dev.name) - File: flask-webservice/app.py - > Line 47: dev.hireDate = request.json.get('hireDate', dev.name) - File: flask-webservice/app.py - > Line 48: dev.focus = request.json.get('focus', dev.focus) -File: flask-webservice/app.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('dev'dev) - - - -StrGlee/flask-demo -https://github.com/StrGlee/flask-demo -Entry file: None -Scanned: 2016-10-19 11:42:57.158223 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/StrGlee/flask-demo. - -SachinMaharana/firstapp-flask -https://github.com/SachinMaharana/firstapp-flask -Entry file: firstapp-flask/hello.py -Scanned: 2016-10-19 11:42:58.414594 -No vulnerabilities found. - - -kwin-wang/flask-learn -https://github.com/kwin-wang/flask-learn -Entry file: flask-learn/hello.py -Scanned: 2016-10-19 11:42:59.817312 -Vulnerability 1: -File: flask-learn/hello.py - > User input at line 52, trigger word "get(": - msg = Message(app.config.get('FLASKY_MAIL_SUBJECT_PREFIX') + subject,sender=app.config.get('FLASKY_MAIL_SENDER'), recipients=[to]) -File: flask-learn/hello.py - > reaches line 54, trigger word "render_template(": - msg.body = render_template(template + '.txt',kwargs) - -Vulnerability 2: -File: flask-learn/hello.py - > User input at line 52, trigger word "get(": - msg = Message(app.config.get('FLASKY_MAIL_SUBJECT_PREFIX') + subject,sender=app.config.get('FLASKY_MAIL_SENDER'), recipients=[to]) -File: flask-learn/hello.py - > reaches line 55, trigger word "render_template(": - msg.html = render_template(template + '.html',kwargs) - - - -xuqi1987/21.Flask -https://github.com/xuqi1987/21.Flask -Entry file: None -Scanned: 2016-10-19 11:43:01.020864 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xuqi1987/21.Flask. - -PlasmaSheep/flask-bug -https://github.com/PlasmaSheep/flask-bug -Entry file: None -Scanned: 2016-10-19 11:43:02.238246 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/PlasmaSheep/flask-bug. - -rconnol/PromotionsFlask -https://github.com/rconnol/PromotionsFlask -Entry file: PromotionsFlask/app/__init__.py -Scanned: 2016-10-19 11:43:03.481255 -No vulnerabilities found. - - -shtakai/flask-first -https://github.com/shtakai/flask-first -Entry file: flask-first/flask-first-notes.py -Scanned: 2016-10-19 11:43:04.102190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DaoQiu/flask_tutorial -https://github.com/DaoQiu/flask_tutorial -Entry file: None -Scanned: 2016-10-19 11:43:04.594896 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Maoao530/flask-todo -https://github.com/Maoao530/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-19 11:43:05.111617 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -remarkablemark/flask-template -https://github.com/remarkablemark/flask-template -Entry file: None -Scanned: 2016-10-19 11:43:05.604903 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/remarkablemark/flask-template. - -Coolwater7/Flask_sample -https://github.com/Coolwater7/Flask_sample -Entry file: Flask_sample/app/__init__.py -Scanned: 2016-10-19 11:43:10.341930 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -askz/flask-sandbox -https://github.com/askz/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-19 11:43:10.842001 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -saeveritt/flask-DHT -https://github.com/saeveritt/flask-DHT -Entry file: flask-DHT/DHT-web.py -Scanned: 2016-10-19 11:43:12.249966 -No vulnerabilities found. - - -Nakort/flask_workouts -https://github.com/Nakort/flask_workouts -Entry file: flask_workouts/app/__init__.py -Scanned: 2016-10-19 11:43:13.500239 -No vulnerabilities found. - - -petersowa/flask_blog -https://github.com/petersowa/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:43:14.010141 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -janreyho/flask-demo -https://github.com/janreyho/flask-demo -Entry file: None -Scanned: 2016-10-19 11:43:14.529433 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/janreyho/flask-demo. - -Jollyhrothgar/flask_template -https://github.com/Jollyhrothgar/flask_template -Entry file: None -Scanned: 2016-10-19 11:43:20.016945 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Jollyhrothgar/flask_template. - -apengok/flask_tutor -https://github.com/apengok/flask_tutor -Entry file: flask_tutor/tmp/main.py -Scanned: 2016-10-19 11:43:24.519868 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -minodes/flask_boilerplate -https://github.com/minodes/flask_boilerplate -Entry file: flask_boilerplate/application/__init__.py -Scanned: 2016-10-19 11:43:26.041795 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -guoqiao/flask-examples -https://github.com/guoqiao/flask-examples -Entry file: flask-examples/minitwit/minitwit.py -Scanned: 2016-10-19 11:43:29.123358 -Vulnerability 1: -File: flask-examples/minitwit/minitwit.py - > User input at line 78, trigger word "get(": - profile_user = User.objects.filter(username__exact=username).get() -Reassigned in: - File: flask-examples/minitwit/minitwit.py - > Line 84: followed = profile_user in g.user.followers or None - File: flask-examples/minitwit/minitwit.py - > Line 82: followed = False -File: flask-examples/minitwit/minitwit.py - > reaches line 78, trigger word "filter(": - profile_user = User.objects.filter(username__exact=username).get() - -Vulnerability 2: -File: flask-examples/minitwit/minitwit.py - > User input at line 78, trigger word "get(": - profile_user = User.objects.filter(username__exact=username).get() -Reassigned in: - File: flask-examples/minitwit/minitwit.py - > Line 84: followed = profile_user in g.user.followers or None - File: flask-examples/minitwit/minitwit.py - > Line 82: followed = False -File: flask-examples/minitwit/minitwit.py - > reaches line 87, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('timeline.html',messages=messages, followed=followed, profile_user=profile_user) - -Vulnerability 3: -File: flask-examples/minitwit/minitwit.py - > User input at line 102, trigger word "get(": - user = User.objects.filter(username__exact=username).get() -File: flask-examples/minitwit/minitwit.py - > reaches line 102, trigger word "filter(": - user = User.objects.filter(username__exact=username).get() - -Vulnerability 4: -File: flask-examples/minitwit/minitwit.py - > User input at line 102, trigger word "get(": - user = User.objects.filter(username__exact=username).get() -File: flask-examples/minitwit/minitwit.py - > reaches line 105, trigger word "filter(": - User.objects.filter(username__exact=g.user.username).update_one(add_to_set__followers=user) - -Vulnerability 5: -File: flask-examples/minitwit/minitwit.py - > User input at line 120, trigger word "get(": - user = User.objects.filter(username__exact=username).get() -File: flask-examples/minitwit/minitwit.py - > reaches line 120, trigger word "filter(": - user = User.objects.filter(username__exact=username).get() - -Vulnerability 6: -File: flask-examples/minitwit/minitwit.py - > User input at line 120, trigger word "get(": - user = User.objects.filter(username__exact=username).get() -File: flask-examples/minitwit/minitwit.py - > reaches line 123, trigger word "filter(": - User.objects.filter(username__exact=g.user.username).update_one(pull__followers=user) - -Vulnerability 7: -File: flask-examples/minitwit/minitwit.py - > User input at line 153, trigger word "get(": - user = User.objects.filter(username__exact=request.form['username']).get() -Reassigned in: - File: flask-examples/minitwit/minitwit.py - > Line 158: session['user_id'] = user.id -File: flask-examples/minitwit/minitwit.py - > reaches line 153, trigger word "filter(": - user = User.objects.filter(username__exact=request.form['username']).get() - -Vulnerability 8: -File: flask-examples/minitwit/minitwit.py - > User input at line 153, trigger word "form[": - user = User.objects.filter(username__exact=request.form['username']).get() -Reassigned in: - File: flask-examples/minitwit/minitwit.py - > Line 158: session['user_id'] = user.id -File: flask-examples/minitwit/minitwit.py - > reaches line 153, trigger word "filter(": - user = User.objects.filter(username__exact=request.form['username']).get() - - - -ibhan88/Flask-Testing -https://github.com/ibhan88/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-19 11:43:30.697183 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -titov-andrei/microblog-flask -https://github.com/titov-andrei/microblog-flask -Entry file: None -Scanned: 2016-10-19 11:43:32.298788 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -anthonyheidenreich/flask-vagrant -https://github.com/anthonyheidenreich/flask-vagrant -Entry file: flask-vagrant/app.py -Scanned: 2016-10-19 11:43:34.104901 -No vulnerabilities found. - - -r0oki3/flask-webapp -https://github.com/r0oki3/flask-webapp -Entry file: flask-webapp/app.py -Scanned: 2016-10-19 11:43:51.354780 -No vulnerabilities found. - - -znebby/ubuntu-flask -https://github.com/znebby/ubuntu-flask -Entry file: ubuntu-flask/myproject/myproject.py -Scanned: 2016-10-19 11:43:52.574049 -No vulnerabilities found. - - -Muazzama/flask_app -https://github.com/Muazzama/flask_app -Entry file: None -Scanned: 2016-10-19 11:43:53.093480 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Muazzama/flask_app. - -tjctw/flask_intro -https://github.com/tjctw/flask_intro -Entry file: flask_intro/first_app.py -Scanned: 2016-10-19 11:43:54.602177 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py - -wouzar/flask-microblog -https://github.com/wouzar/flask-microblog -Entry file: None -Scanned: 2016-10-19 11:43:56.122336 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DanielQujun/flask-web -https://github.com/DanielQujun/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-19 11:43:58.986520 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kzh4ng/flask_server -https://github.com/kzh4ng/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-19 11:43:59.494918 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -uisky/flask-fish -https://github.com/uisky/flask-fish -Entry file: flask-fish/skel/app/app.py -Scanned: 2016-10-19 11:44:00.844779 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenpadua/flask-blog -https://github.com/glenpadua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:44:01.363341 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -buzibu/flask-blog -https://github.com/buzibu/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:44:02.902946 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -bgiesa/flask-test -https://github.com/bgiesa/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 11:44:04.440543 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -neoden/flask-nmail -https://github.com/neoden/flask-nmail -Entry file: flask-nmail/flask-nmail.py -Scanned: 2016-10-19 11:44:06.698889 -No vulnerabilities found. - - -vThaian/flask_example -https://github.com/vThaian/flask_example -Entry file: None -Scanned: 2016-10-19 11:44:07.222929 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -xawei/flask_gw -https://github.com/xawei/flask_gw -Entry file: flask_gw/app/__init__.py -Scanned: 2016-10-19 11:44:08.819223 -Vulnerability 1: -File: flask_gw/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 32: posts = pagination.items - File: flask_gw/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_gw/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flask_gw/app/main/views.py - > User input at line 24, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 22: show_followed = False - File: flask_gw/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_gw/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flask_gw/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 44: posts = pagination.items -File: flask_gw/app/main/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flask_gw/app/main/views.py - > User input at line 104, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 106: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask_gw/app/main/views.py - > Line 108: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 111: comments = pagination.items - File: flask_gw/app/main/views.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask_gw/app/main/views.py - > reaches line 112, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flask_gw/app/main/views.py - > User input at line 171, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 172: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_gw/app/main/views.py - > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_gw/app/main/views.py - > reaches line 177, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flask_gw/app/main/views.py - > User input at line 188, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 189: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 192: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask_gw/app/main/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_gw/app/main/views.py - > reaches line 194, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flask_gw/app/main/views.py - > User input at line 219, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 220: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 223: comments = pagination.items -File: flask_gw/app/main/views.py - > reaches line 224, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -KeyJia/Flask-Python -https://github.com/KeyJia/Flask-Python -Entry file: Flask-Python/Flask.py -Scanned: 2016-10-19 11:44:10.071050 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rhymiz/flask-template -https://github.com/rhymiz/flask-template -Entry file: None -Scanned: 2016-10-19 11:44:10.567956 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rhymiz/flask-template. - -schoolofnetcom/flask-python -https://github.com/schoolofnetcom/flask-python -Entry file: flask-python/init.py -Scanned: 2016-10-19 11:44:12.166376 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-python/venv/lib/python2.7/genericpath.py - -TheDeadMays/flask-bootstrap -https://github.com/TheDeadMays/flask-bootstrap -Entry file: flask-bootstrap/app/__init__.py -Scanned: 2016-10-19 11:44:14.869403 -No vulnerabilities found. - - -whitneybelba/Flask-Testing -https://github.com/whitneybelba/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-19 11:44:15.385227 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MadhuriHB/Testing-flask -https://github.com/MadhuriHB/Testing-flask -Entry file: Testing-flask/party.py -Scanned: 2016-10-19 11:44:15.877138 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tuvttran/flask-learning -https://github.com/tuvttran/flask-learning -Entry file: flask-learning/hello.py -Scanned: 2016-10-19 11:44:22.128601 -No vulnerabilities found. - - -couldtt/flask-foundation -https://github.com/couldtt/flask-foundation -Entry file: flask-foundation/app/__init__.py -Scanned: 2016-10-19 11:44:26.726161 -No vulnerabilities found. - - -ewjoachim/bttn_flask -https://github.com/ewjoachim/bttn_flask -Entry file: bttn_flask/bttn_flask.py -Scanned: 2016-10-19 11:44:27.936764 -No vulnerabilities found. - - -stonewm/flask_blog -https://github.com/stonewm/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:44:29.482833 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -curious725/blog_flask -https://github.com/curious725/blog_flask -Entry file: blog_flask/app.py -Scanned: 2016-10-19 11:44:33.550477 -No vulnerabilities found. - - -ssong319/Flask-Testing -https://github.com/ssong319/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-19 11:44:34.054821 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yantiz/flask-blog -https://github.com/yantiz/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:44:34.605763 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -nanakenashi/flask_hello -https://github.com/nanakenashi/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-19 11:44:52.707652 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -voltagemeeder/FirstFlask -https://github.com/voltagemeeder/FirstFlask -Entry file: FirstFlask/app.py -Scanned: 2016-10-19 11:44:53.329248 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py - -zembrzuski/openshift-flask -https://github.com/zembrzuski/openshift-flask -Entry file: openshift-flask/app.py -Scanned: 2016-10-19 11:44:55.564901 -No vulnerabilities found. - - -wgerald90/tth-Flask -https://github.com/wgerald90/tth-Flask -Entry file: None -Scanned: 2016-10-19 11:44:59.483074 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -NataKuskova/Classwork_flask -https://github.com/NataKuskova/Classwork_flask -Entry file: Classwork_flask/script.py -Scanned: 2016-10-19 11:45:00.724765 -Vulnerability 1: -File: Classwork_flask/script.py - > User input at line 27, trigger word "form[": - text = request.form['text'] -File: Classwork_flask/script.py - > reaches line 31, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('result',text=text)) - -Vulnerability 2: -File: Classwork_flask/script.py - > User input at line 27, trigger word "form[": - text = request.form['text'] -File: Classwork_flask/script.py - > reaches line 31, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('result',text=text)) - - - -BadSol/flask-vendor -https://github.com/BadSol/flask-vendor -Entry file: flask-vendor/vendor/__init__.py -Scanned: 2016-10-19 11:45:02.389896 -Vulnerability 1: -File: flask-vendor/vendor/user/views.py - > User input at line 18, trigger word "form[": - user_obj = User.query.filter(User.email == request.form['email'].lower()).one_or_none() -File: flask-vendor/vendor/user/views.py - > reaches line 18, trigger word "filter(": - user_obj = User.query.filter(User.email == request.form['email'].lower()).one_or_none() - - - -kozyrevsergey89/flask_backend -https://github.com/kozyrevsergey89/flask_backend -Entry file: flask_backend/hello.py -Scanned: 2016-10-19 11:45:03.717191 -No vulnerabilities found. - - -haimapi/flask_pro -https://github.com/haimapi/flask_pro -Entry file: flask_pro/he.py -Scanned: 2016-10-19 11:45:04.222661 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -katiayx/hblab_0805_Testing-Balloonicorn-After-Party -https://github.com/katiayx/hblab_0805_Testing-Balloonicorn-After-Party -Entry file: hblab_0805_Testing-Balloonicorn-After-Party/party.py -Scanned: 2016-10-19 11:45:04.714448 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -csyouk/faust-register-py -https://github.com/csyouk/faust-register-py -Entry file: faust-register-py/register_server.py -Scanned: 2016-10-19 11:45:06.490204 -Vulnerability 1: -File: faust-register-py/register_server.py - > User input at line 56, trigger word "form[": - session = game.find_session(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 53: session = [] -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 2: -File: faust-register-py/register_server.py - > User input at line 57, trigger word "form[": - player_list = player.get_all_player(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 52: player_list = [] -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 3: -File: faust-register-py/register_server.py - > User input at line 58, trigger word "form[": - player_count = player.get_count(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 54: player_count = 0 -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 4: -File: faust-register-py/register_server.py - > User input at line 139, trigger word "get(": - error_type = request.args.get('error_type') -File: faust-register-py/register_server.py - > reaches line 142, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('alert.html',error_type=error_type) - - - -deonna/flask -https://github.com/deonna/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:45:08.449707 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -ksbek/flask -https://github.com/ksbek/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:45:09.030585 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -feirendada/Flask -https://github.com/feirendada/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:45:09.552394 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -krandmm/flask -https://github.com/krandmm/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:45:10.096714 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -huhjuang/Flask -https://github.com/huhjuang/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:45:10.586641 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Vaspy/Flask -https://github.com/Vaspy/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:45:12.101982 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sebas095/Flask -https://github.com/sebas095/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:45:14.102159 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -codigofacilito/flask_cf -https://github.com/codigofacilito/flask_cf -Entry file: flask_cf/Project/main.py -Scanned: 2016-10-19 11:45:16.727672 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lizTheDeveloper/__g26_flask -https://github.com/lizTheDeveloper/__g26_flask -Entry file: __g26_flask/model.py -Scanned: 2016-10-19 11:45:18.061777 -Vulnerability 1: -File: __g26_flask/app.py - > User input at line 27, trigger word "get(": - user = load_user(session.get('user_id')) -File: __g26_flask/app.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',title='Pokestraveganzamon', pokemon=pokelist, user=user) - - - -ZakStrassberg/flask_products_group_project -https://github.com/ZakStrassberg/flask_products_group_project -Entry file: flask_products_group_project/server.py -Scanned: 2016-10-19 11:45:19.476068 -No vulnerabilities found. - - -iamrajhans/FlaskBackend -https://github.com/iamrajhans/FlaskBackend -Entry file: FlaskBackend/drone/main.py -Scanned: 2016-10-19 11:45:28.567705 -No vulnerabilities found. - - -yantiz/flasktaskr -https://github.com/yantiz/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:45:29.123533 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nocotan/flaski -https://github.com/nocotan/flaski -Entry file: flaski/app.py -Scanned: 2016-10-19 11:45:32.283222 -No vulnerabilities found. - - -asimonia/Flaskbook -https://github.com/asimonia/Flaskbook -Entry file: Flaskbook/maps.py -Scanned: 2016-10-19 11:45:32.797058 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Markmwaura/Flaskblog -https://github.com/Markmwaura/Flaskblog -Entry file: Flaskblog/app/__init__.py -Scanned: 2016-10-19 11:45:35.081719 -No vulnerabilities found. - - -seizans/flasko -https://github.com/seizans/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-19 11:45:35.686289 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py - -vennyk/flasktaskr -https://github.com/vennyk/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:45:36.192274 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -akjanik/flasktutorial -https://github.com/akjanik/flasktutorial -Entry file: None -Scanned: 2016-10-19 11:45:53.742552 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hyteer/flaskdemo -https://github.com/hyteer/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-19 11:45:54.366018 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhang555/flasky -https://github.com/zhang555/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:45:56.108669 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wuqingwuqingwu/flaskk -https://github.com/wuqingwuqingwu/flaskk -Entry file: flaskk/hello.py -Scanned: 2016-10-19 11:46:05.591944 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskk/venv/lib/python2.7/genericpath.py - -HJeongWon/flaskr -https://github.com/HJeongWon/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:46:06.105208 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -oscarnyl/flaskpost -https://github.com/oscarnyl/flaskpost -Entry file: flaskpost/flaskpost/__init__.py -Scanned: 2016-10-19 11:46:07.501896 -No vulnerabilities found. - - -AdamWawrow/flasktaskr -https://github.com/AdamWawrow/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:46:08.020573 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -reed-chi/flasktaskr -https://github.com/reed-chi/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:46:08.510990 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -thippo/FlaskFrame -https://github.com/thippo/FlaskFrame -Entry file: FlaskFrame/myweb/__init__.py -Scanned: 2016-10-19 11:46:10.345994 -Vulnerability 1: -File: FlaskFrame/myweb/bitcoin/bitcoin.py - > User input at line 12, trigger word ".data": - data = form.q.data.strip() -Reassigned in: - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 18: transfer_dict['pkuc'] = data - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 19: transfer_dict['pkc'] = utils.WIF_to_compressed(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 20: p2a = py3private2address.Private2Address(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 21: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 22: transfer_dict['bac'] = p2a.bitcoinaddress_compressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 24: transfer_dict['type'] = 1 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 25: transfer_dict['pkc'] = data - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 26: transfer_dict['pkuc'] = utils.compressed_to_WIF(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 27: p2a = py3private2address.Private2Address(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 28: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 29: transfer_dict['bac'] = p2a.bitcoinaddress_compressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 34: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 36: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 38: transfer_dict['type'] = 0 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('bitcoin',transfer_dict=transfer_dict, form=form) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 14: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 17: transfer_dict['type'] = 1 -File: FlaskFrame/myweb/bitcoin/bitcoin.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('bitcoinaddress',data=data, form=form) - - - -sevenZz/FlaskTest -https://github.com/sevenZz/FlaskTest -Entry file: None -Scanned: 2016-10-19 11:46:10.856496 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sevenZz/FlaskTest. - -omokehinde/FlaskExam -https://github.com/omokehinde/FlaskExam -Entry file: FlaskExam/app.py -Scanned: 2016-10-19 11:46:12.167479 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -Niel2016/FlaskApp -https://github.com/Niel2016/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 11:46:12.713757 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Chemoday/FlaskPractice -https://github.com/Chemoday/FlaskPractice -Entry file: FlaskPractice/app/__init__.py -Scanned: 2016-10-19 11:46:14.114411 -No vulnerabilities found. - - -JonathanFrederick/flask-cards -https://github.com/JonathanFrederick/flask-cards -Entry file: flask-cards/app.py -Scanned: 2016-10-19 11:46:15.944462 -Vulnerability 1: -File: flask-cards/app.py - > User input at line 20, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flask-cards/app.py - > Line 26: user = models.User(username=username, password=password) -File: flask-cards/app.py - > reaches line 29, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201) - -Vulnerability 2: -File: flask-cards/app.py - > User input at line 21, trigger word "get(": - password = request.json.get('password') -Reassigned in: - File: flask-cards/app.py - > Line 26: user = models.User(username=username, password=password) -File: flask-cards/app.py - > reaches line 29, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201) - - - -petersowa/flask_blog -https://github.com/petersowa/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:46:16.436461 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -janreyho/flask-demo -https://github.com/janreyho/flask-demo -Entry file: None -Scanned: 2016-10-19 11:46:16.937215 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/janreyho/flask-demo. - -morpy/flask_app -https://github.com/morpy/flask_app -Entry file: None -Scanned: 2016-10-19 11:46:17.482712 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/morpy/flask_app. - -sacktla/JOURNAL_FLASK -https://github.com/sacktla/JOURNAL_FLASK -Entry file: JOURNAL_FLASK/journal.py -Scanned: 2016-10-19 11:46:19.748498 -No vulnerabilities found. - - -MrRedAmber/SlackFlask -https://github.com/MrRedAmber/SlackFlask -Entry file: SlackFlask/k.py -Scanned: 2016-10-19 11:46:20.995112 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flavio99/Flask-Scaffold -https://github.com/flavio99/Flask-Scaffold -Entry file: None -Scanned: 2016-10-19 11:46:24.552973 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/flavio99/Flask-Scaffold. - -Caveat4U/flask.docker -https://github.com/Caveat4U/flask.docker -Entry file: flask/hello.py -Scanned: 2016-10-19 11:46:29.115638 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -MustafaAdam/flask_app -https://github.com/MustafaAdam/flask_app -Entry file: None -Scanned: 2016-10-19 11:46:30.731795 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MustafaAdam/flask_app. - -huyuguo/flask_small -https://github.com/huyuguo/flask_small -Entry file: flask_small/small.py -Scanned: 2016-10-19 11:46:33.318958 -No vulnerabilities found. - - -michaelbahng999/dnd-flask -https://github.com/michaelbahng999/dnd-flask -Entry file: dnd-flask/app.py -Scanned: 2016-10-19 11:46:34.522978 -No vulnerabilities found. - - -sbarratt/flask-prometheus -https://github.com/sbarratt/flask-prometheus -Entry file: flask-prometheus/flask_prometheus/__init__.py -Scanned: 2016-10-19 11:46:36.775363 -No vulnerabilities found. - - -tjctw/flask_intro -https://github.com/tjctw/flask_intro -Entry file: flask_intro/first_app.py -Scanned: 2016-10-19 11:46:37.301733 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py - -evanxg852000/flask-starter -https://github.com/evanxg852000/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-19 11:46:37.806835 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rafaelescrich/pdf-flask -https://github.com/rafaelescrich/pdf-flask -Entry file: pdf-flask/app.py -Scanned: 2016-10-19 11:47:00.137725 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wouzar/flask-microblog -https://github.com/wouzar/flask-microblog -Entry file: None -Scanned: 2016-10-19 11:47:00.638023 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DanielQujun/flask-web -https://github.com/DanielQujun/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-19 11:47:01.138267 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -CiscoPartnerCloudRotation/sparkbot-flask -https://github.com/CiscoPartnerCloudRotation/sparkbot-flask -Entry file: sparkbot-flask/spark_integration.py -Scanned: 2016-10-19 11:47:02.527566 -No vulnerabilities found. - - -vennyk/flask-blog -https://github.com/vennyk/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 11:47:03.066599 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -we444/flask-myblog -https://github.com/we444/flask-myblog -Entry file: flask-myblog/app/__init__.py -Scanned: 2016-10-19 11:47:08.519976 -No vulnerabilities found. - - -crhowell/plj-flask -https://github.com/crhowell/plj-flask -Entry file: plj-flask/app.py -Scanned: 2016-10-19 11:47:09.875335 -Vulnerability 1: -File: plj-flask/app.py - > User input at line 76, trigger word "get(": - entry = models.Entry.get(id=entry_id) -Reassigned in: - File: plj-flask/app.py - > Line 92: form.title.data = entry.title - File: plj-flask/app.py - > Line 93: form.date.data = entry.date - File: plj-flask/app.py - > Line 94: form.time_spent.data = entry.time_spent - File: plj-flask/app.py - > Line 95: form.learned.data = entry.learned - File: plj-flask/app.py - > Line 96: form.resources.data = entry.resources - File: plj-flask/app.py - > Line 97: form.tags.data = entry.tags - File: plj-flask/app.py - > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id) - File: plj-flask/app.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) -File: plj-flask/app.py - > reaches line 88, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id)) - -Vulnerability 2: -File: plj-flask/app.py - > User input at line 76, trigger word "get(": - entry = models.Entry.get(id=entry_id) -Reassigned in: - File: plj-flask/app.py - > Line 92: form.title.data = entry.title - File: plj-flask/app.py - > Line 93: form.date.data = entry.date - File: plj-flask/app.py - > Line 94: form.time_spent.data = entry.time_spent - File: plj-flask/app.py - > Line 95: form.learned.data = entry.learned - File: plj-flask/app.py - > Line 96: form.resources.data = entry.resources - File: plj-flask/app.py - > Line 97: form.tags.data = entry.tags - File: plj-flask/app.py - > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id) - File: plj-flask/app.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) -File: plj-flask/app.py - > reaches line 88, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id)) - -Vulnerability 3: -File: plj-flask/app.py - > User input at line 76, trigger word "get(": - entry = models.Entry.get(id=entry_id) -Reassigned in: - File: plj-flask/app.py - > Line 92: form.title.data = entry.title - File: plj-flask/app.py - > Line 93: form.date.data = entry.date - File: plj-flask/app.py - > Line 94: form.time_spent.data = entry.time_spent - File: plj-flask/app.py - > Line 95: form.learned.data = entry.learned - File: plj-flask/app.py - > Line 96: form.resources.data = entry.resources - File: plj-flask/app.py - > Line 97: form.tags.data = entry.tags - File: plj-flask/app.py - > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id) - File: plj-flask/app.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) -File: plj-flask/app.py - > reaches line 90, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id)) - -Vulnerability 4: -File: plj-flask/app.py - > User input at line 76, trigger word "get(": - entry = models.Entry.get(id=entry_id) -Reassigned in: - File: plj-flask/app.py - > Line 92: form.title.data = entry.title - File: plj-flask/app.py - > Line 93: form.date.data = entry.date - File: plj-flask/app.py - > Line 94: form.time_spent.data = entry.time_spent - File: plj-flask/app.py - > Line 95: form.learned.data = entry.learned - File: plj-flask/app.py - > Line 96: form.resources.data = entry.resources - File: plj-flask/app.py - > Line 97: form.tags.data = entry.tags - File: plj-flask/app.py - > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id) - File: plj-flask/app.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) -File: plj-flask/app.py - > reaches line 90, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id)) - -Vulnerability 5: -File: plj-flask/app.py - > User input at line 110, trigger word "get(": - entry = models.Entry.get(id=entry_id) -Reassigned in: - File: plj-flask/app.py - > Line 114: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) - File: plj-flask/app.py - > Line 115: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) -File: plj-flask/app.py - > reaches line 111, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',entry=entry) - - - -bgiesa/flask-test -https://github.com/bgiesa/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 11:47:10.870224 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -neoden/flask-nmail -https://github.com/neoden/flask-nmail -Entry file: flask-nmail/flask-nmail.py -Scanned: 2016-10-19 11:47:12.203880 -No vulnerabilities found. - - -vThaian/flask_example -https://github.com/vThaian/flask_example -Entry file: None -Scanned: 2016-10-19 11:47:12.700327 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -helelily/flask-demo -https://github.com/helelily/flask-demo -Entry file: None -Scanned: 2016-10-19 11:47:13.189697 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/helelily/flask-demo. - -HCT118/Flask-web -https://github.com/HCT118/Flask-web -Entry file: Flask-web/app/__init__.py -Scanned: 2016-10-19 11:47:14.723458 -Vulnerability 1: -File: Flask-web/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 55: posts = pagination.items - File: Flask-web/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-web/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Flask-web/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 45: show_followed = False - File: Flask-web/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-web/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Flask-web/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 67: posts = pagination.items -File: Flask-web/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Flask-web/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Flask-web/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 134: comments = pagination.items - File: Flask-web/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Flask-web/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Flask-web/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Flask-web/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-web/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Flask-web/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Flask-web/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-web/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Flask-web/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 246: comments = pagination.items -File: Flask-web/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: Flask-web/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 23: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: Flask-web/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 23: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: Flask-web/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 23: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: Flask-web/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 42: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 46: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: Flask-web/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 42: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 46: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: Flask-web/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 42: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 46: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: Flask-web/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: Flask-web/app/api_1_0/posts.py - > Line 16: prev = None - File: Flask-web/app/api_1_0/posts.py - > Line 19: next = None -File: Flask-web/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: Flask-web/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: Flask-web/app/api_1_0/posts.py - > Line 16: prev = None - File: Flask-web/app/api_1_0/posts.py - > Line 19: next = None -File: Flask-web/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: Flask-web/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: Flask-web/app/api_1_0/posts.py - > Line 16: prev = None - File: Flask-web/app/api_1_0/posts.py - > Line 19: next = None -File: Flask-web/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: Flask-web/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: Flask-web/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: Flask-web/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: Flask-web/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 43: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 46: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: Flask-web/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 43: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 46: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: Flask-web/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 43: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 46: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -chenglinguang/flask_blog -https://github.com/chenglinguang/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:47:15.238265 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jraaurellano/first-flask -https://github.com/jraaurellano/first-flask -Entry file: None -Scanned: 2016-10-19 11:47:18.506911 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -olagodavid/Flask-project -https://github.com/olagodavid/Flask-project -Entry file: None -Scanned: 2016-10-19 11:47:21.927753 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tsriram/flask-playground -https://github.com/tsriram/flask-playground -Entry file: flask-playground/app/__init__.py -Scanned: 2016-10-19 11:47:23.128658 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shutdown57/learning_flask -https://github.com/shutdown57/learning_flask -Entry file: learning_flask/src/app.py -Scanned: 2016-10-19 11:47:24.808406 -Vulnerability 1: -File: learning_flask/src/users/views.py - > User input at line 79, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/src/users/views.py - > Line 83: my_coordinates = p.address_to_latlng(address) - File: learning_flask/src/users/views.py - > Line 84: places = p.query(address) - File: learning_flask/src/users/views.py - > Line 67: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/src/users/views.py - > Line 71: places = [] - File: learning_flask/src/users/views.py - > Line 72: my_coordinates = (37.4221, -122.0844) - File: learning_flask/src/users/views.py - > Line 76: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/src/users/views.py - > reaches line 87, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - -Vulnerability 2: -File: learning_flask/src/users/views.py - > User input at line 79, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/src/users/views.py - > Line 83: my_coordinates = p.address_to_latlng(address) - File: learning_flask/src/users/views.py - > Line 84: places = p.query(address) - File: learning_flask/src/users/views.py - > Line 67: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/src/users/views.py - > Line 71: places = [] - File: learning_flask/src/users/views.py - > Line 72: my_coordinates = (37.4221, -122.0844) - File: learning_flask/src/users/views.py - > Line 76: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/src/users/views.py - > reaches line 90, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - - - -RatulGhosh/flask_tutorial -https://github.com/RatulGhosh/flask_tutorial -Entry file: None -Scanned: 2016-10-19 11:47:25.337948 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -voltagemeeder/flask-intro -https://github.com/voltagemeeder/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 11:47:25.849415 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rdammkoehler/root_flask -https://github.com/rdammkoehler/root_flask -Entry file: root_flask/n/s/f/app_factory.py -Scanned: 2016-10-19 11:47:27.327783 -No vulnerabilities found. - - -aniruddhabarapatre/flask-microblog -https://github.com/aniruddhabarapatre/flask-microblog -Entry file: None -Scanned: 2016-10-19 11:47:27.835920 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -KeyJia/Flask-Python -https://github.com/KeyJia/Flask-Python -Entry file: Flask-Python/Flask.py -Scanned: 2016-10-19 11:47:28.366191 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GuanYQ0926/flask-restful -https://github.com/GuanYQ0926/flask-restful -Entry file: flask-restful/flask_restful/__init__.py -Scanned: 2016-10-19 11:47:30.960250 -No vulnerabilities found. - - -kuaiwu/MyFlask -https://github.com/kuaiwu/MyFlask -Entry file: MyFlask/app/__init__.py -Scanned: 2016-10-19 11:47:33.780492 -Vulnerability 1: -File: MyFlask/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 55: posts = pagination.items - File: MyFlask/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlask/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: MyFlask/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 45: show_followed = False - File: MyFlask/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlask/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: MyFlask/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 67: posts = pagination.items -File: MyFlask/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: MyFlask/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: MyFlask/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 134: comments = pagination.items - File: MyFlask/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: MyFlask/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: MyFlask/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: MyFlask/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlask/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: MyFlask/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: MyFlask/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlask/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: MyFlask/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 246: comments = pagination.items -File: MyFlask/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: MyFlask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 23: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: MyFlask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 23: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: MyFlask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 23: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: MyFlask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 46: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: MyFlask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 46: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: MyFlask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 46: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: MyFlask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlask/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlask/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlask/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: MyFlask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlask/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlask/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlask/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: MyFlask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlask/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlask/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlask/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: MyFlask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: MyFlask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: MyFlask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: MyFlask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: MyFlask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: MyFlask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -Tangugo/flask_learn -https://github.com/Tangugo/flask_learn -Entry file: flask_learn/hello.py -Scanned: 2016-10-19 11:47:34.291252 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -upbit/flask_whiteboard -https://github.com/upbit/flask_whiteboard -Entry file: flask_whiteboard/main.py -Scanned: 2016-10-19 11:47:38.096088 -Vulnerability 1: -File: flask_whiteboard/main.py - > User input at line 41, trigger word "get(": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 46: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 51: segments = jieba.cut_for_search(word) - File: flask_whiteboard/main.py - > Line 53: segments = jieba.cut(word,cut_all=True) - File: flask_whiteboard/main.py - > Line 55: segments = jieba.cut(word) - File: flask_whiteboard/main.py - > Line 57: segments = mmseg.seg_txt(word) - File: flask_whiteboard/main.py - > Line 59: segments = mmseg.search.seg_txt_search(word) - File: flask_whiteboard/main.py - > Line 62: result = ', '.join(segments) - File: flask_whiteboard/main.py - > Line 65: result = result.encode('utf-8') - File: flask_whiteboard/main.py - > Line 69: content = result - File: flask_whiteboard/main.py - > Line 71: content += '
' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2)) - File: flask_whiteboard/main.py - > Line 74: word = '' - File: flask_whiteboard/main.py - > Line 77: content += '支持的模式:
  jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式
  mmseg: /mm mmseg模式; /mms mmseg.search模式' -File: flask_whiteboard/main.py - > reaches line 76, trigger word "url_for(": - content = '请在地址栏后或输入框中,输入要分词的内容
例如: %s

' % (url_for('cut_words',word=EXAMPLE_WORDS).encode('utf8'), '/cut/' + EXAMPLE_WORDS) - -Vulnerability 2: -File: flask_whiteboard/main.py - > User input at line 41, trigger word "form[": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 46: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 51: segments = jieba.cut_for_search(word) - File: flask_whiteboard/main.py - > Line 53: segments = jieba.cut(word,cut_all=True) - File: flask_whiteboard/main.py - > Line 55: segments = jieba.cut(word) - File: flask_whiteboard/main.py - > Line 57: segments = mmseg.seg_txt(word) - File: flask_whiteboard/main.py - > Line 59: segments = mmseg.search.seg_txt_search(word) - File: flask_whiteboard/main.py - > Line 62: result = ', '.join(segments) - File: flask_whiteboard/main.py - > Line 65: result = result.encode('utf-8') - File: flask_whiteboard/main.py - > Line 69: content = result - File: flask_whiteboard/main.py - > Line 71: content += '
' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2)) - File: flask_whiteboard/main.py - > Line 74: word = '' - File: flask_whiteboard/main.py - > Line 77: content += '支持的模式:
  jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式
  mmseg: /mm mmseg模式; /mms mmseg.search模式' -File: flask_whiteboard/main.py - > reaches line 76, trigger word "url_for(": - content = '请在地址栏后或输入框中,输入要分词的内容
例如: %s

' % (url_for('cut_words',word=EXAMPLE_WORDS).encode('utf8'), '/cut/' + EXAMPLE_WORDS) - -Vulnerability 3: -File: flask_whiteboard/main.py - > User input at line 41, trigger word "get(": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 46: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 51: segments = jieba.cut_for_search(word) - File: flask_whiteboard/main.py - > Line 53: segments = jieba.cut(word,cut_all=True) - File: flask_whiteboard/main.py - > Line 55: segments = jieba.cut(word) - File: flask_whiteboard/main.py - > Line 57: segments = mmseg.seg_txt(word) - File: flask_whiteboard/main.py - > Line 59: segments = mmseg.search.seg_txt_search(word) - File: flask_whiteboard/main.py - > Line 62: result = ', '.join(segments) - File: flask_whiteboard/main.py - > Line 65: result = result.encode('utf-8') - File: flask_whiteboard/main.py - > Line 69: content = result - File: flask_whiteboard/main.py - > Line 71: content += '
' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2)) - File: flask_whiteboard/main.py - > Line 74: word = '' - File: flask_whiteboard/main.py - > Line 77: content += '支持的模式:
  jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式
  mmseg: /mm mmseg模式; /mms mmseg.search模式' -File: flask_whiteboard/main.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试') - -Vulnerability 4: -File: flask_whiteboard/main.py - > User input at line 41, trigger word "form[": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 46: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 51: segments = jieba.cut_for_search(word) - File: flask_whiteboard/main.py - > Line 53: segments = jieba.cut(word,cut_all=True) - File: flask_whiteboard/main.py - > Line 55: segments = jieba.cut(word) - File: flask_whiteboard/main.py - > Line 57: segments = mmseg.seg_txt(word) - File: flask_whiteboard/main.py - > Line 59: segments = mmseg.search.seg_txt_search(word) - File: flask_whiteboard/main.py - > Line 62: result = ', '.join(segments) - File: flask_whiteboard/main.py - > Line 65: result = result.encode('utf-8') - File: flask_whiteboard/main.py - > Line 69: content = result - File: flask_whiteboard/main.py - > Line 71: content += '
' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2)) - File: flask_whiteboard/main.py - > Line 74: word = '' - File: flask_whiteboard/main.py - > Line 77: content += '支持的模式:
  jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式
  mmseg: /mm mmseg模式; /mms mmseg.search模式' -File: flask_whiteboard/main.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试') - -Vulnerability 5: -File: flask_whiteboard/main.py - > User input at line 43, trigger word "get(": - mode = request.method == 'POST'request.form['mode']request.args.get('mode') -Reassigned in: - File: flask_whiteboard/main.py - > Line 48: mode = 'mms' - File: flask_whiteboard/main.py - > Line 75: mode = '' -File: flask_whiteboard/main.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试') - -Vulnerability 6: -File: flask_whiteboard/main.py - > User input at line 43, trigger word "form[": - mode = request.method == 'POST'request.form['mode']request.args.get('mode') -Reassigned in: - File: flask_whiteboard/main.py - > Line 48: mode = 'mms' - File: flask_whiteboard/main.py - > Line 75: mode = '' -File: flask_whiteboard/main.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试') - -Vulnerability 7: -File: flask_whiteboard/main.py - > User input at line 87, trigger word "get(": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 90: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 91: segments = ['%s/%s' % (w, f) for (w, f) in pseg.cut(word)] - File: flask_whiteboard/main.py - > Line 95: word = '' -File: flask_whiteboard/main.py - > reaches line 98, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, content=content, title='Jieba词性标注测试') - -Vulnerability 8: -File: flask_whiteboard/main.py - > User input at line 87, trigger word "form[": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 90: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 91: segments = ['%s/%s' % (w, f) for (w, f) in pseg.cut(word)] - File: flask_whiteboard/main.py - > Line 95: word = '' -File: flask_whiteboard/main.py - > reaches line 98, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, content=content, title='Jieba词性标注测试') - - - -python-ning/flask_blog -https://github.com/python-ning/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 11:47:38.595196 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kenju254/flask-microblog -https://github.com/kenju254/flask-microblog -Entry file: None -Scanned: 2016-10-19 11:47:39.101385 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chloebecker/flask-tutorial -https://github.com/chloebecker/flask-tutorial -Entry file: None -Scanned: 2016-10-19 11:47:56.653416 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -4dsolutions/tiny_flask -https://github.com/4dsolutions/tiny_flask -Entry file: tiny_flask/flask_app.py -Scanned: 2016-10-19 11:48:03.184760 -No vulnerabilities found. - - -EduhG/Flask-App -https://github.com/EduhG/Flask-App -Entry file: Flask-App/app/flaskapp/__init__.py -Scanned: 2016-10-19 11:48:04.516083 -No vulnerabilities found. - - -submorphic/hello-flask -https://github.com/submorphic/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 11:48:05.099743 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -jmontroy90/first-flask -https://github.com/jmontroy90/first-flask -Entry file: None -Scanned: 2016-10-19 11:48:05.602918 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -szomolanyi/flask-base -https://github.com/szomolanyi/flask-base -Entry file: None -Scanned: 2016-10-19 11:48:09.103877 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/szomolanyi/flask-base. - -DGideas/flask_microservice -https://github.com/DGideas/flask_microservice -Entry file: flask_microservice/main.py -Scanned: 2016-10-19 11:48:11.329977 -No vulnerabilities found. - - -johnngugi/flask-assesment -https://github.com/johnngugi/flask-assesment -Entry file: flask-assesment/app/__init__.py -Scanned: 2016-10-19 11:48:12.913834 -No vulnerabilities found. - - -lieuhon/First-Flask -https://github.com/lieuhon/First-Flask -Entry file: First-Flask/app/__init__.py -Scanned: 2016-10-19 11:48:14.750196 -Vulnerability 1: -File: First-Flask/app/mod_auth/views.py - > User input at line 33, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: First-Flask/app/mod_auth/views.py - > Line 37: session['user_id'] = user.id -File: First-Flask/app/mod_auth/views.py - > reaches line 39, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -YuliYaSokolova/microservices_flask -https://github.com/YuliYaSokolova/microservices_flask -Entry file: microservices_flask/rating_route.py -Scanned: 2016-10-19 11:48:19.910398 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: microservices_flask/.envi/lib/python3.4/struct.py - -nenodias/flask-bigapp -https://github.com/nenodias/flask-bigapp -Entry file: flask-bigapp/app/__init__.py -Scanned: 2016-10-19 11:48:21.245051 -No vulnerabilities found. - - -rezastd/flask_two -https://github.com/rezastd/flask_two -Entry file: flask_two/app.py -Scanned: 2016-10-19 11:48:25.663354 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_two/venv/lib/python2.7/genericpath.py - -wuruthie/FirstFlask -https://github.com/wuruthie/FirstFlask -Entry file: FirstFlask/app.py -Scanned: 2016-10-19 11:48:26.205652 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py - -patoupatou/microblog -https://github.com/patoupatou/microblog -Entry file: None -Scanned: 2016-10-19 11:48:27.183488 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ahoff314/geet -https://github.com/ahoff314/geet -Entry file: geet/geet/app/main.py -Scanned: 2016-10-19 11:48:30.752853 -No vulnerabilities found. - - -csyouk/faust-register-py -https://github.com/csyouk/faust-register-py -Entry file: faust-register-py/register_server.py -Scanned: 2016-10-19 11:48:35.336127 -Vulnerability 1: -File: faust-register-py/register_server.py - > User input at line 56, trigger word "form[": - session = game.find_session(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 53: session = [] -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 2: -File: faust-register-py/register_server.py - > User input at line 57, trigger word "form[": - player_list = player.get_all_player(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 52: player_list = [] -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 3: -File: faust-register-py/register_server.py - > User input at line 58, trigger word "form[": - player_count = player.get_count(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 54: player_count = 0 -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 4: -File: faust-register-py/register_server.py - > User input at line 139, trigger word "get(": - error_type = request.args.get('error_type') -File: faust-register-py/register_server.py - > reaches line 142, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('alert.html',error_type=error_type) - - - -Riffstation/flaskutilsexample -https://github.com/Riffstation/flaskutilsexample -Entry file: flaskutilsexample/src/app/__init__.py -Scanned: 2016-10-19 11:54:33.758962 -No vulnerabilities found. - - -KyleSeem/Flask -https://github.com/KyleSeem/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:54:35.302435 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nppat/Flask -https://github.com/nppat/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:54:35.866273 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dolv/Flask -https://github.com/dolv/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:54:36.363807 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Mamun-dueee/flask -https://github.com/Mamun-dueee/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 11:54:36.936827 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Kirade/Flask -https://github.com/Kirade/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 11:54:37.473829 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cloverstd/flask-wechatpy -https://github.com/cloverstd/flask-wechatpy -Entry file: flask-wechatpy/demo.py -Scanned: 2016-10-19 11:54:38.889257 -No vulnerabilities found. - - -13923858795/Tutorial -https://github.com/13923858795/Tutorial -Entry file: Tutorial/my/app/__init__.py -Scanned: 2016-10-19 11:54:42.351522 -Vulnerability 1: -File: Tutorial/my/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 33: posts = pagination.items - File: Tutorial/my/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Tutorial/my/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 23: show_followed = False - File: Tutorial/my/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Tutorial/my/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 44: posts = pagination.items -File: Tutorial/my/app/main/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Tutorial/my/app/main/views.py - > User input at line 109, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 111: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Tutorial/my/app/main/views.py - > Line 113: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 116: comments = pagination.items - File: Tutorial/my/app/main/views.py - > Line 108: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Tutorial/my/app/main/views.py - > reaches line 117, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Tutorial/my/app/main/views.py - > User input at line 176, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 177: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 180: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Tutorial/my/app/main/views.py - > Line 175: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 182, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Tutorial/my/app/main/views.py - > User input at line 193, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 194: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 197: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Tutorial/my/app/main/views.py - > Line 192: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 199, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Tutorial/my/app/main/views.py - > User input at line 231, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 232: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 235: comments = pagination.items -File: Tutorial/my/app/main/views.py - > reaches line 236, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -szparag3/flask-hello-world -https://github.com/szparag3/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 11:54:42.889500 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -QuentinMoss/reimagined-computing-machine -https://github.com/QuentinMoss/reimagined-computing-machine -Entry file: reimagined-computing-machine/app/__init__.py -Scanned: 2016-10-19 11:54:44.252319 -No vulnerabilities found. - - -penglee87/flaskweb -https://github.com/penglee87/flaskweb -Entry file: None -Scanned: 2016-10-19 11:54:44.781930 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yuyanqiuqiu/flaskr -https://github.com/yuyanqiuqiu/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:54:45.275635 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -WayneChen1987/flasky -https://github.com/WayneChen1987/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:54:45.778536 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -IronFist16/flasky -https://github.com/IronFist16/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 11:54:46.277464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bsdtux/flaskblog -https://github.com/bsdtux/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 11:54:46.796951 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -terryllowery/flasktaskr -https://github.com/terryllowery/flasktaskr -Entry file: None -Scanned: 2016-10-19 11:54:47.291712 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -playgrdstar/flaskapp -https://github.com/playgrdstar/flaskapp -Entry file: None -Scanned: 2016-10-19 11:54:47.807318 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/playgrdstar/flaskapp. - -LongstreetSolutions/flaskr -https://github.com/LongstreetSolutions/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 11:54:48.514558 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NathanJ4620/flasker -https://github.com/NathanJ4620/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-19 11:54:49.005159 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulmkumar/flaskapp -https://github.com/rahulmkumar/flaskapp -Entry file: None -Scanned: 2016-10-19 11:54:49.542330 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rahulmkumar/flaskapp. - -chenglinguang/flaskky -https://github.com/chenglinguang/flaskky -Entry file: flaskky/hello1.py -Scanned: 2016-10-19 11:54:50.984804 -No vulnerabilities found. - - -jutreras/flaskTest -https://github.com/jutreras/flaskTest -Entry file: flaskTest/url.py -Scanned: 2016-10-19 11:54:52.025500 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -feocco/flaskLab -https://github.com/feocco/flaskLab -Entry file: flaskLab/app.py -Scanned: 2016-10-19 11:54:53.373502 -Vulnerability 1: -File: flaskLab/auth.py - > User input at line 26, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flaskLab/auth.py - > Line 32: user = User(username=username) -File: flaskLab/auth.py - > reaches line 36, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 2: -File: flaskLab/auth.py - > User input at line 26, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flaskLab/auth.py - > Line 32: user = User(username=username) -File: flaskLab/auth.py - > reaches line 36, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: flaskLab/auth.py - > User input at line 42, trigger word "get(": - user = session.query(User).get(id) -File: flaskLab/auth.py - > reaches line 45, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username) - - - -sarahbees/FlaskHeroku -https://github.com/sarahbees/FlaskHeroku -Entry file: FlaskHeroku/hello.py -Scanned: 2016-10-19 11:54:54.586123 -No vulnerabilities found. - - -954324919/FlaskDemo -https://github.com/954324919/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-19 11:54:55.116965 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cdagli/flask-restful-example -https://github.com/cdagli/flask-restful-example -Entry file: flask-restful-example/api.py -Scanned: 2016-10-19 11:54:55.626578 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -linkyndy/flask-rethinkdb -https://github.com/linkyndy/flask-rethinkdb -Entry file: flask-rethinkdb/tests/__init__.py -Scanned: 2016-10-19 12:36:59.044586 -No vulnerabilities found. - - -erm/flaskel -https://github.com/erm/flaskel -Entry file: flaskel/flaskel.py -Scanned: 2016-10-19 12:37:00.465561 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ajmarcus/flaskhost -https://github.com/ajmarcus/flaskhost -Entry file: flaskhost/test.py -Scanned: 2016-10-19 12:37:02.231449 -No vulnerabilities found. - - -stef-k/flaskapp -https://github.com/stef-k/flaskapp -Entry file: None -Scanned: 2016-10-19 12:37:02.762056 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/stef-k/flaskapp. - -zenideas/flaskblog -https://github.com/zenideas/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 12:37:03.302869 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -asap/weather-wizard -https://github.com/asap/weather-wizard -Entry file: weather-wizard/weather/__init__.py -Scanned: 2016-10-19 12:37:05.051534 -Vulnerability 1: -File: weather-wizard/weather/views.py - > User input at line 21, trigger word "get(": - root = app.config.get('FORECASTIO_ROOT') -Reassigned in: - File: weather-wizard/weather/views.py - > Line 25: url = root + key + '/' + lat + ', ' + lng + ', ' + timestamp - File: weather-wizard/weather/views.py - > Line 27: r = requests.get(url) -File: weather-wizard/weather/views.py - > reaches line 29, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(r.okr.json()) - -Vulnerability 2: -File: weather-wizard/weather/views.py - > User input at line 22, trigger word "get(": - key = app.config.get('FORECASTIO_API_KEY') -Reassigned in: - File: weather-wizard/weather/views.py - > Line 25: url = root + key + '/' + lat + ', ' + lng + ', ' + timestamp - File: weather-wizard/weather/views.py - > Line 27: r = requests.get(url) -File: weather-wizard/weather/views.py - > reaches line 29, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(r.okr.json()) - -Vulnerability 3: -File: weather-wizard/weather/views.py - > User input at line 27, trigger word "get(": - r = requests.get(url) -File: weather-wizard/weather/views.py - > reaches line 29, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(r.okr.json()) - - - -miguelp77/flaskDemo -https://github.com/miguelp77/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-19 12:37:06.056801 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sumitsarkar/FlaskLogger -https://github.com/sumitsarkar/FlaskLogger -Entry file: FlaskLogger/app/__init__.py -Scanned: 2016-10-19 12:37:07.878316 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SeavantUUz/lolibot -https://github.com/SeavantUUz/lolibot -Entry file: lolibot/lolibot/loli.py -Scanned: 2016-10-19 12:37:09.252454 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pierrelux/flask-zotero -https://github.com/pierrelux/flask-zotero -Entry file: flask-zotero/zotero.py -Scanned: 2016-10-19 12:37:10.587705 -Vulnerability 1: -File: flask-zotero/zotero.py - > User input at line 61, trigger word "get(": - resp = zotero.get('users/' + g.user['userID'] + '/items?q=delay&format=atom&content=json&key=' + g.user['oauth_token_secret']) -Reassigned in: - File: flask-zotero/zotero.py - > Line 63: feed = resp.data - File: flask-zotero/zotero.py - > Line 64: d = feedparser.parse(resp.data) - File: flask-zotero/zotero.py - > Line 65: titles = [entry.title for entry in d.entries] - File: flask-zotero/zotero.py - > Line 59: titles = None -File: flask-zotero/zotero.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',titles=titles) - -Vulnerability 2: -File: flask-zotero/zotero.py - > User input at line 64, trigger word ".data": - d = feedparser.parse(resp.data) -Reassigned in: - File: flask-zotero/zotero.py - > Line 65: titles = [entry.title for entry in d.entries] - File: flask-zotero/zotero.py - > Line 59: titles = None -File: flask-zotero/zotero.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',titles=titles) - -Vulnerability 3: -File: flask-zotero/zotero.py - > User input at line 72, trigger word "get(": - callback_url = url_for('oauthorized',next=request.args.get('next')) -Reassigned in: - File: flask-zotero/zotero.py - > Line 73: ret_MAYBE_FUNCTION_NAME = zotero.authorize(callback=callback_url or request.referrer or None) -File: flask-zotero/zotero.py - > reaches line 72, trigger word "url_for(": - callback_url = url_for('oauthorized',next=request.args.get('next')) - - - -Knirta/flask_html -https://github.com/Knirta/flask_html -Entry file: flask_html/flaskapphome.py -Scanned: 2016-10-19 12:37:11.880163 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tgtech1000/flask-app -https://github.com/tgtech1000/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-19 12:37:12.866685 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -designhawg/flask_micro -https://github.com/designhawg/flask_micro -Entry file: flask_micro/app/__init__.py -Scanned: 2016-10-19 12:37:15.448320 -No vulnerabilities found. - - -IuryAlves/generate-flask-skeletons -https://github.com/IuryAlves/generate-flask-skeletons -Entry file: None -Scanned: 2016-10-19 12:37:17.698490 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/IuryAlves/generate-flask-skeletons. - -Vostbur/flask-tiny-blog -https://github.com/Vostbur/flask-tiny-blog -Entry file: flask-tiny-blog/app/__init__.py -Scanned: 2016-10-19 12:37:19.061923 -No vulnerabilities found. - - -Vostbur/Flask-tiny-skeleton -https://github.com/Vostbur/Flask-tiny-skeleton -Entry file: Flask-tiny-skeleton/app/__init__.py -Scanned: 2016-10-19 12:37:20.350541 -No vulnerabilities found. - - -yymm/Flask_Pusher_Sample -https://github.com/yymm/Flask_Pusher_Sample -Entry file: Flask_Pusher_Sample/app.py -Scanned: 2016-10-19 12:37:22.001841 -No vulnerabilities found. - - -Vostbur/microb -https://github.com/Vostbur/microb -Entry file: microb/app/__init__.py -Scanned: 2016-10-19 12:37:23.612859 -No vulnerabilities found. - - -JamesLaverack/website -https://github.com/JamesLaverack/website -Entry file: website/website.py -Scanned: 2016-10-19 12:37:25.678863 -No vulnerabilities found. - - -nokurn/webhook -https://github.com/nokurn/webhook -Entry file: webhook/webhook/__init__.py -Scanned: 2016-10-19 12:37:26.978994 -Vulnerability 1: -File: webhook/webhook/github.py - > User input at line 7, trigger word "get(": - r = requests.get(url_for('meta')) -File: webhook/webhook/github.py - > reaches line 7, trigger word "url_for(": - r = requests.get(url_for('meta')) - - - -lmas/feedloggr -https://github.com/lmas/feedloggr -Entry file: feedloggr/tests.py -Scanned: 2016-10-19 12:37:28.537100 -No vulnerabilities found. - - -macndesign/pin_clone -https://github.com/macndesign/pin_clone -Entry file: None -Scanned: 2016-10-19 12:38:00.927543 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/macndesign/pin_clone. - -anthonyyim/microblog -https://github.com/anthonyyim/microblog -Entry file: None -Scanned: 2016-10-19 12:38:01.431114 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nealkhosla/website -https://github.com/nealkhosla/website -Entry file: website/app/__init__.py -Scanned: 2016-10-19 12:38:03.408233 -No vulnerabilities found. - - -schdef/clicker -https://github.com/schdef/clicker -Entry file: clicker/src/server_pi.py -Scanned: 2016-10-19 12:38:05.482327 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -clearglass/webapp -https://github.com/clearglass/webapp -Entry file: webapp/app/__init__.py -Scanned: 2016-10-19 12:38:06.877921 -No vulnerabilities found. - - -codelucas/flask_reddit -https://github.com/codelucas/flask_reddit -Entry file: None -Scanned: 2016-10-19 12:38:09.317462 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/codelucas/flask_reddit. - -corydolphin/flask-headers -https://github.com/corydolphin/flask-headers -Entry file: flask-headers/test.py -Scanned: 2016-10-19 12:38:11.196931 -No vulnerabilities found. - - -benhoyle/FlaskEnergyMeter -https://github.com/benhoyle/FlaskEnergyMeter -Entry file: FlaskEnergyMeter/flask_reader.py -Scanned: 2016-10-19 12:38:12.697075 -No vulnerabilities found. - - -1000ch/cobra -https://github.com/1000ch/cobra -Entry file: cobra/cobra/__init__.py -Scanned: 2016-10-19 12:38:14.208401 -No vulnerabilities found. - - -shenhailuanma/flaskblog -https://github.com/shenhailuanma/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 12:38:14.722098 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -yasoob/logit-bin -https://github.com/yasoob/logit-bin -Entry file: logit-bin/app.py -Scanned: 2016-10-19 12:38:16.242223 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sumitsarkar/FlaskLogger -https://github.com/sumitsarkar/FlaskLogger -Entry file: FlaskLogger/app/__init__.py -Scanned: 2016-10-19 12:38:16.758606 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TrevorN/FlaskFM -https://github.com/TrevorN/FlaskFM -Entry file: FlaskFM/flaskfm.py -Scanned: 2016-10-19 12:38:19.711868 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskFM/venv/lib/python2.7/genericpath.py - -javierchavez/Flask-proj -https://github.com/javierchavez/Flask-proj -Entry file: Flask-proj/wsgi.py -Scanned: 2016-10-19 12:38:21.378410 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jeredding/flask_cmdliner -https://github.com/jeredding/flask_cmdliner -Entry file: flask_cmdliner/cmdliner.py -Scanned: 2016-10-19 12:38:22.669012 -No vulnerabilities found. - - -jeasoft/flask-bp -https://github.com/jeasoft/flask-bp -Entry file: flask-bp/app/__init__.py -Scanned: 2016-10-19 12:38:24.160664 -No vulnerabilities found. - - -jiam/flask_sample -https://github.com/jiam/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-19 12:38:24.725488 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AsahikawaPythonWorkshop/flask-handson -https://github.com/AsahikawaPythonWorkshop/flask-handson -Entry file: flask-handson/flaskr/__init__.py -Scanned: 2016-10-19 12:38:25.306511 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rona25/demo-flask -https://github.com/rona25/demo-flask -Entry file: demo-flask/app.py -Scanned: 2016-10-19 12:38:26.290873 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sparta1337/flask_blog -https://github.com/sparta1337/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 12:38:27.289217 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -QuazyThain/Flask_html_db -https://github.com/QuazyThain/Flask_html_db -Entry file: Flask_html_db/flask_framework.py -Scanned: 2016-10-19 12:38:28.561949 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -froyo-team/openshift-flask-weixin -https://github.com/froyo-team/openshift-flask-weixin -Entry file: openshift-flask-weixin/wsgi/runserver.py -Scanned: 2016-10-19 12:38:29.968645 -No vulnerabilities found. - - -nikulesko/Flask-WebGLEarth -https://github.com/nikulesko/Flask-WebGLEarth -Entry file: None -Scanned: 2016-10-19 12:38:32.947126 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nikulesko/Flask-WebGLEarth. - -samf2147/profile -https://github.com/samf2147/profile -Entry file: profile/router.py -Scanned: 2016-10-19 12:38:34.567808 -No vulnerabilities found. - - -mswift42/helloflask -https://github.com/mswift42/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 12:38:35.145208 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -tsh/flask-0-10-tut-quickstart -https://github.com/tsh/flask-0-10-tut-quickstart -Entry file: flask-0-10-tut-quickstart/hello.py -Scanned: 2016-10-19 12:39:00.974581 -No vulnerabilities found. - - -lmas/feedloggr -https://github.com/lmas/feedloggr -Entry file: feedloggr/tests.py -Scanned: 2016-10-19 12:39:04.054971 -No vulnerabilities found. - - -chandyland/jook -https://github.com/chandyland/jook -Entry file: jook/jook.py -Scanned: 2016-10-19 12:39:09.646388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Haseebvp/Microblog-using-Flask-in-python-1- -https://github.com/Haseebvp/Microblog-using-Flask-in-python-1- -Entry file: None -Scanned: 2016-10-19 12:39:11.360666 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Haseebvp/Microblog-using-Flask-in-python-1-. - -sungnoone/infosrv -https://github.com/sungnoone/infosrv -Entry file: infosrv/infosrv.py -Scanned: 2016-10-19 12:39:12.794346 -No vulnerabilities found. - - -dpwrussell/photoviewer -https://github.com/dpwrussell/photoviewer -Entry file: photoviewer/photoviewer.py -Scanned: 2016-10-19 12:39:14.090976 -No vulnerabilities found. - - -clearglass/webapp -https://github.com/clearglass/webapp -Entry file: webapp/app/__init__.py -Scanned: 2016-10-19 12:39:15.407236 -No vulnerabilities found. - - -JGaard/GoogleDomain---AD-web-console -https://github.com/JGaard/GoogleDomain---AD-web-console -Entry file: GoogleDomain---AD-web-console/__init__.py -Scanned: 2016-10-19 12:39:16.997860 -Vulnerability 1: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 158, trigger word "get(": - username = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 174: username = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 2: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 159, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 175: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 3: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 161, trigger word "form[": - user_chosen = json.loads(request.form['user_chosen']) -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 180: ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 4: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 162, trigger word "form[": - domain_chosen = json.loads(request.form['domain_chosen']) -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 180: ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 5: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 174, trigger word "get(": - username = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 158: username = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 6: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 175, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 159: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 7: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 158, trigger word "get(": - username = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 174: username = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) - -Vulnerability 8: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 159, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 175: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) - -Vulnerability 9: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 174, trigger word "get(": - username = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 158: username = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) - -Vulnerability 10: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 175, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 159: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) - -Vulnerability 11: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 187, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 201: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 191, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 12: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 201, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 187: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 191, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 13: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 187, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 201: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 14: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 201, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 187: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 15: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 187, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 201: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 198, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 16: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 201, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 187: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 198, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 17: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 187, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 201: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 202, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 18: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 201, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 187: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 202, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 19: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 230, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 232: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 236, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 20: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 231, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 232: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 236, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 21: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 240, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 242: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 246, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 22: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 241, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 242: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 246, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 23: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 250, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 252: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 256, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 24: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 251, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 252: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 256, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 25: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 264, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 268: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 276, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 26: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 268, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 264: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 276, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 27: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 264, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 268: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 276, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 28: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 268, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 264: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 276, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 29: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 264, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 268: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 292, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 30: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 268, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 264: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 292, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 31: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 264, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 268: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 292, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 32: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 268, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 264: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 292, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 33: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 263, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 267: user = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 276: ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - File: GoogleDomain---AD-web-console/routes.py - > Line 292: ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) -File: GoogleDomain---AD-web-console/routes.py - > reaches line 296, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editusers.html',username=user, org_domain=org_domain, form=form, givenname=gAPI.get_firstname(), familyname=gAPI.get_lastname(), nicknames=gAPI.retrieve_nicknames()) - -Vulnerability 34: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 264, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 268: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 296, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editusers.html',username=user, org_domain=org_domain, form=form, givenname=gAPI.get_firstname(), familyname=gAPI.get_lastname(), nicknames=gAPI.retrieve_nicknames()) - -Vulnerability 35: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 267, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 263: user = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 276: ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - File: GoogleDomain---AD-web-console/routes.py - > Line 292: ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) -File: GoogleDomain---AD-web-console/routes.py - > reaches line 296, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editusers.html',username=user, org_domain=org_domain, form=form, givenname=gAPI.get_firstname(), familyname=gAPI.get_lastname(), nicknames=gAPI.retrieve_nicknames()) - -Vulnerability 36: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 268, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 264: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 296, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editusers.html',username=user, org_domain=org_domain, form=form, givenname=gAPI.get_firstname(), familyname=gAPI.get_lastname(), nicknames=gAPI.retrieve_nicknames()) - -Vulnerability 37: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 329, trigger word "form[": - org_domain = request.form['org_domain'] -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 330: gAPI = google_api.gAPI(org_domain, None, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 334, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user_list_display.html',domain_users=domain_users, given_names=given_names, family_names=family_names, org_domain=org_domain) - -Vulnerability 38: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 342, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 344: filename = secure_filename(file.filename) - File: GoogleDomain---AD-web-console/routes.py - > Line 349: ret_MAYBE_FUNCTION_NAME = render_template('upload.html') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 348, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 39: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 342, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 344: filename = secure_filename(file.filename) - File: GoogleDomain---AD-web-console/routes.py - > Line 349: ret_MAYBE_FUNCTION_NAME = render_template('upload.html') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 348, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -1stvamp/flask-straw-poll -https://github.com/1stvamp/flask-straw-poll -Entry file: flask-straw-poll/flask_straw_poll/__init__.py -Scanned: 2016-10-19 12:39:19.437004 -Vulnerability 1: -File: flask-straw-poll/flask_straw_poll/views.py - > User input at line 44, trigger word "get(": - vote = Vote(constituency_id=request.form.get('constituency_id'), party_id=request.form.get('party_id')) -Reassigned in: - File: flask-straw-poll/flask_straw_poll/views.py - > Line 42: ret_MAYBE_FUNCTION_NAME = (jsonify(error='Already voted.'), 401) -File: flask-straw-poll/flask_straw_poll/views.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(vote) - - - -corydolphin/flask-headers -https://github.com/corydolphin/flask-headers -Entry file: flask-headers/test.py -Scanned: 2016-10-19 12:39:20.744482 -No vulnerabilities found. - - -waynew/draftin-a-flask -https://github.com/waynew/draftin-a-flask -Entry file: draftin-a-flask/draftin_a_flask/draftin_a_flask.py -Scanned: 2016-10-19 12:39:22.141154 -No vulnerabilities found. - - -kocicjelena/flaskclever -https://github.com/kocicjelena/flaskclever -Entry file: flaskclever/i.py -Scanned: 2016-10-19 12:39:23.405072 -No vulnerabilities found. - - -cmlizama/flaskr -https://github.com/cmlizama/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 12:39:23.929698 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -im-auld/flaskapp -https://github.com/im-auld/flaskapp -Entry file: None -Scanned: 2016-10-19 12:39:24.516735 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/im-auld/flaskapp. - -payoung/flask-sqlalchemy-login-manager-template -https://github.com/payoung/flask-sqlalchemy-login-manager-template -Entry file: flask-sqlalchemy-login-manager-template/views.py -Scanned: 2016-10-19 12:39:25.958345 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yasoob/logit-bin -https://github.com/yasoob/logit-bin -Entry file: logit-bin/app.py -Scanned: 2016-10-19 12:39:26.490898 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Gliimpse/Flask-RESTful-Demo -https://github.com/Gliimpse/Flask-RESTful-Demo -Entry file: Flask-RESTful-Demo/server.py -Scanned: 2016-10-19 12:39:28.273821 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -0xc0defeed/captcha -https://github.com/0xc0defeed/captcha -Entry file: captcha/captcha/__init__.py -Scanned: 2016-10-19 12:39:29.677640 -No vulnerabilities found. - - -internetfett/flask-timekeeper -https://github.com/internetfett/flask-timekeeper -Entry file: flask-timekeeper/main.py -Scanned: 2016-10-19 12:39:32.834228 -Vulnerability 1: -File: flask-timekeeper/main.py - > User input at line 81, trigger word "form[": - project_id = request.form['project_id'] -File: flask-timekeeper/main.py - > reaches line 83, trigger word "execute(": - g.db.execute('insert into timekeeper (project_id, start_date) values (?, ?)', [project_id, start_date]) - -Vulnerability 2: -File: flask-timekeeper/main.py - > User input at line 81, trigger word "form[": - project_id = request.form['project_id'] -File: flask-timekeeper/main.py - > reaches line 85, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project_id)) - -Vulnerability 3: -File: flask-timekeeper/main.py - > User input at line 81, trigger word "form[": - project_id = request.form['project_id'] -File: flask-timekeeper/main.py - > reaches line 85, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project_id)) - -Vulnerability 4: -File: flask-timekeeper/main.py - > User input at line 90, trigger word "form[": - timekeeper_id = request.form['timekeeper_id'] -File: flask-timekeeper/main.py - > reaches line 92, trigger word "execute(": - g.db.execute('update timekeeper set stop_date=(?) where (id)=(?)', [stop_date, timekeeper_id]) - -Vulnerability 5: -File: flask-timekeeper/main.py - > User input at line 89, trigger word "form[": - project_id = request.form['project_id'] -File: flask-timekeeper/main.py - > reaches line 94, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project_id)) - -Vulnerability 6: -File: flask-timekeeper/main.py - > User input at line 89, trigger word "form[": - project_id = request.form['project_id'] -File: flask-timekeeper/main.py - > reaches line 94, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project_id)) - -Vulnerability 7: -File: flask-timekeeper/main.py - > User input at line 101, trigger word "form[": - start_date = request.form['start_date'] -Reassigned in: - File: flask-timekeeper/main.py - > Line 110: start_date = '' -File: flask-timekeeper/main.py - > reaches line 112, trigger word "execute(": - g.db.execute('update timekeeper set start_date=(?), stop_date=(?), description=(?) where (id)=(?)', [start_date, stop_date, request.form['description'], timekeeper_id]) - -Vulnerability 8: -File: flask-timekeeper/main.py - > User input at line 101, trigger word "form[": - stop_date = request.form['stop_date'] -Reassigned in: - File: flask-timekeeper/main.py - > Line 105: stop_date = '' -File: flask-timekeeper/main.py - > reaches line 112, trigger word "execute(": - g.db.execute('update timekeeper set start_date=(?), stop_date=(?), description=(?) where (id)=(?)', [start_date, stop_date, request.form['description'], timekeeper_id]) - - - -jeredding/flask_cmdliner -https://github.com/jeredding/flask_cmdliner -Entry file: flask_cmdliner/cmdliner.py -Scanned: 2016-10-19 12:39:34.578840 -No vulnerabilities found. - - -jeasoft/flask-bp -https://github.com/jeasoft/flask-bp -Entry file: flask-bp/app/__init__.py -Scanned: 2016-10-19 12:39:36.087876 -No vulnerabilities found. - - -mjhea0/flask-input -https://github.com/mjhea0/flask-input -Entry file: flask-input/app.py -Scanned: 2016-10-19 12:39:38.368727 -No vulnerabilities found. - - -gpestana/flask-boilerplate -https://github.com/gpestana/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 12:39:38.890753 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/gpestana/flask-boilerplate. - -xiaopeng163/twisted-flask -https://github.com/xiaopeng163/twisted-flask -Entry file: twisted-flask/restful/api.py -Scanned: 2016-10-19 12:39:40.149919 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nigma/web-screenshots -https://github.com/nigma/web-screenshots -Entry file: web-screenshots/app.py -Scanned: 2016-10-19 12:39:41.417189 -No vulnerabilities found. - - -merisbahti/mongodb-flask-fun -https://github.com/merisbahti/mongodb-flask-fun -Entry file: mongodb-flask-fun/index.py -Scanned: 2016-10-19 12:39:43.015118 -Vulnerability 1: -File: mongodb-flask-fun/index.py - > User input at line 61, trigger word "get(": - file = FS.get(ObjectId(oid)) -Reassigned in: - File: mongodb-flask-fun/index.py - > Line 65: response.mimetype = file.content_type - File: mongodb-flask-fun/index.py - > Line 66: response.headers['Content-Disposition'] = 'attachment; filename="' + file.name + '"' - File: mongodb-flask-fun/index.py - > Line 67: ret_MAYBE_FUNCTION_NAME = response - File: mongodb-flask-fun/index.py - > Line 69: ret_MAYBE_FUNCTION_NAME = 'No file' -File: mongodb-flask-fun/index.py - > reaches line 63, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show',upload_id=file.upload_id)) - -Vulnerability 2: -File: mongodb-flask-fun/index.py - > User input at line 61, trigger word "get(": - file = FS.get(ObjectId(oid)) -Reassigned in: - File: mongodb-flask-fun/index.py - > Line 65: response.mimetype = file.content_type - File: mongodb-flask-fun/index.py - > Line 66: response.headers['Content-Disposition'] = 'attachment; filename="' + file.name + '"' - File: mongodb-flask-fun/index.py - > Line 67: ret_MAYBE_FUNCTION_NAME = response - File: mongodb-flask-fun/index.py - > Line 69: ret_MAYBE_FUNCTION_NAME = 'No file' -File: mongodb-flask-fun/index.py - > reaches line 63, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show',upload_id=file.upload_id)) - - - -arvelt/flask-fileupload-sample -https://github.com/arvelt/flask-fileupload-sample -Entry file: flask-fileupload-sample/flaskupload.py -Scanned: 2016-10-19 12:39:44.419333 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sayanchowdhury/mukti-flask-101 -https://github.com/sayanchowdhury/mukti-flask-101 -Entry file: mukti-flask-101/webapp/__init__.py -Scanned: 2016-10-19 12:40:02.906193 -No vulnerabilities found. - - -im-auld/Flask_Inventory_Manager -https://github.com/im-auld/Flask_Inventory_Manager -Entry file: Flask_Inventory_Manager/flasktest.py -Scanned: 2016-10-19 12:40:05.569694 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cfmeyers/flask-api-factory -https://github.com/cfmeyers/flask-api-factory -Entry file: flask-api-factory/App/__init__.py -Scanned: 2016-10-19 12:40:07.098600 -No vulnerabilities found. - - -Kroisse/flask-study-2014 -https://github.com/Kroisse/flask-study-2014 -Entry file: flask-study-2014/week1/part1/app/__init__.py -Scanned: 2016-10-19 12:40:08.399637 -No vulnerabilities found. - - -recognosco/flask-uwsgi-error -https://github.com/recognosco/flask-uwsgi-error -Entry file: flask-uwsgi-error/main.py -Scanned: 2016-10-19 12:40:13.088195 -No vulnerabilities found. - - -dgolovan/angular-flask-gplus -https://github.com/dgolovan/angular-flask-gplus -Entry file: angular-flask-gplus/angular_flask/__init__.py -Scanned: 2016-10-19 12:40:14.856570 -No vulnerabilities found. - - -andrewmetersky/spotify-flaskapp -https://github.com/andrewmetersky/spotify-flaskapp -Entry file: spotify-flaskapp/routes.py -Scanned: 2016-10-19 12:40:16.599664 -Vulnerability 1: -File: spotify-flaskapp/routes.py - > User input at line 23, trigger word "get(": - message = request.args.get('q', '').split() -Reassigned in: - File: spotify-flaskapp/routes.py - > Line 24: first_arg = ' '.join(message) - File: spotify-flaskapp/routes.py - > Line 28: href = decrementList(message) - File: spotify-flaskapp/routes.py - > Line 28: new_list = decrementList(message) - File: spotify-flaskapp/routes.py - > Line 28: for_playlist = decrementList(message) - File: spotify-flaskapp/routes.py - > Line 29: message = new_list -File: spotify-flaskapp/routes.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',first_arg=first_arg, results=results, playlist_link=playlist_link) - - - -jterskine/flask-heroku-imageupload-s3 -https://github.com/jterskine/flask-heroku-imageupload-s3 -Entry file: flask-heroku-imageupload-s3/app.py -Scanned: 2016-10-19 12:40:20.910515 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-heroku-imageupload-s3/lib/python2.7/genericpath.py - -max-k/blog -https://github.com/max-k/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 12:40:21.928556 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Crowdlink/lever -https://github.com/Crowdlink/lever -Entry file: lever/lever/tests/model_helpers.py -Scanned: 2016-10-19 12:40:23.499383 -No vulnerabilities found. - - -Pennvention/pvapp -https://github.com/Pennvention/pvapp -Entry file: pvapp/pvapp/__init__.py -Scanned: 2016-10-19 12:40:27.794356 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pulmro/pulmro-blog -https://github.com/pulmro/pulmro-blog -Entry file: pulmro-blog/blog/__init__.py -Scanned: 2016-10-19 12:40:29.453588 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seenaburns/lifts -https://github.com/seenaburns/lifts -Entry file: lifts/server.py -Scanned: 2016-10-19 12:40:31.751866 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -madr/adp -https://github.com/madr/adp -Entry file: adp/wsgi.py -Scanned: 2016-10-19 12:40:34.081067 -No vulnerabilities found. - - -SerCeMan/PlayCharm -https://github.com/SerCeMan/PlayCharm -Entry file: PlayCharm/PlayCharm.py -Scanned: 2016-10-19 12:40:35.744282 -No vulnerabilities found. - - -brenden17/blog -https://github.com/brenden17/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-19 12:40:36.760986 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marselester/upload-a-file -https://github.com/marselester/upload-a-file -Entry file: upload-a-file/uploader/__init__.py -Scanned: 2016-10-19 12:40:38.064926 -Vulnerability 1: -File: upload-a-file/uploader/views.py - > User input at line 28, trigger word "files[": - file_ = request.files['uploading_file'] -Reassigned in: - File: upload-a-file/uploader/views.py - > Line 30: filename = secure_filename(file_.filename) - File: upload-a-file/uploader/views.py - > Line 31: file_path = os.path.join(app.config['UPLOAD_PATH'], filename) - File: upload-a-file/uploader/views.py - > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('upload.html',menu_basic='active') -File: upload-a-file/uploader/views.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_file',filename=filename)) - -Vulnerability 2: -File: upload-a-file/uploader/views.py - > User input at line 28, trigger word "files[": - file_ = request.files['uploading_file'] -Reassigned in: - File: upload-a-file/uploader/views.py - > Line 30: filename = secure_filename(file_.filename) - File: upload-a-file/uploader/views.py - > Line 31: file_path = os.path.join(app.config['UPLOAD_PATH'], filename) - File: upload-a-file/uploader/views.py - > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('upload.html',menu_basic='active') -File: upload-a-file/uploader/views.py - > reaches line 33, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_file',filename=filename)) - -Vulnerability 3: -File: upload-a-file/uploader/views.py - > User input at line 44, trigger word "files[": - file_ = request.files['uploading_file'] -Reassigned in: - File: upload-a-file/uploader/views.py - > Line 47: filename = photos.save(file_) - File: upload-a-file/uploader/views.py - > Line 52: ret_MAYBE_FUNCTION_NAME = render_template('upload.html',menu_extension='active') -File: upload-a-file/uploader/views.py - > reaches line 51, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_file',filename=filename)) - -Vulnerability 4: -File: upload-a-file/uploader/views.py - > User input at line 44, trigger word "files[": - file_ = request.files['uploading_file'] -Reassigned in: - File: upload-a-file/uploader/views.py - > Line 47: filename = photos.save(file_) - File: upload-a-file/uploader/views.py - > Line 52: ret_MAYBE_FUNCTION_NAME = render_template('upload.html',menu_extension='active') -File: upload-a-file/uploader/views.py - > reaches line 51, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_file',filename=filename)) - - - -Raynes/pydiff -https://github.com/Raynes/pydiff -Entry file: pydiff/pydiff/__init__.py -Scanned: 2016-10-19 12:40:39.402203 -No vulnerabilities found. - - -janLo/restful-fieldsets -https://github.com/janLo/restful-fieldsets -Entry file: restful-fieldsets/tests/test_fieldset.py -Scanned: 2016-10-19 12:40:40.843726 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -tknickman/car_computer-RASPI_ARDUINO -https://github.com/tknickman/car_computer-RASPI_ARDUINO -Entry file: car_computer-RASPI_ARDUINO/main_app.py -Scanned: 2016-10-19 12:40:42.121373 -No vulnerabilities found. - - -jamesharding/DigitalStatusBoard -https://github.com/jamesharding/DigitalStatusBoard -Entry file: DigitalStatusBoard/app.py -Scanned: 2016-10-19 12:40:44.832152 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nouyang/WTFisThisRegister -https://github.com/nouyang/WTFisThisRegister -Entry file: WTFisThisRegister/WTFisThisRegister.py -Scanned: 2016-10-19 12:40:46.141438 -Vulnerability 1: -File: WTFisThisRegister/WTFisThisRegister.py - > User input at line 48, trigger word "form[": - keyword = request.form['searchterm'] -Reassigned in: - File: WTFisThisRegister/WTFisThisRegister.py - > Line 51: result = [dict(keyword=keyword, helptext=row[0]) for row in cur.fetchall()] -File: WTFisThisRegister/WTFisThisRegister.py - > reaches line 49, trigger word "execute(": - cur = g.db.execute('select helptext from entries where keyword = ?', [keyword]) - -Vulnerability 2: -File: WTFisThisRegister/WTFisThisRegister.py - > User input at line 48, trigger word "form[": - keyword = request.form['searchterm'] -Reassigned in: - File: WTFisThisRegister/WTFisThisRegister.py - > Line 51: result = [dict(keyword=keyword, helptext=row[0]) for row in cur.fetchall()] -File: WTFisThisRegister/WTFisThisRegister.py - > reaches line 52, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',result=result) - - - -JGaard/GoogleDomain---AD-web-console -https://github.com/JGaard/GoogleDomain---AD-web-console -Entry file: GoogleDomain---AD-web-console/__init__.py -Scanned: 2016-10-19 12:40:47.742907 -Vulnerability 1: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 158, trigger word "get(": - username = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 174: username = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 2: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 159, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 175: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 3: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 161, trigger word "form[": - user_chosen = json.loads(request.form['user_chosen']) -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 180: ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 4: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 162, trigger word "form[": - domain_chosen = json.loads(request.form['domain_chosen']) -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 180: ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 5: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 174, trigger word "get(": - username = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 158: username = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 6: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 175, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 159: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 171, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=user_chosen, domainGroups=domain_chosen) - -Vulnerability 7: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 158, trigger word "get(": - username = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 174: username = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) - -Vulnerability 8: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 159, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 175: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) - -Vulnerability 9: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 174, trigger word "get(": - username = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 158: username = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) - -Vulnerability 10: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 175, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 159: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 160: gAPI = google_api.gAPI(org_domain, username, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 176: gAPI = google_api.gAPI(org_domain, username, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editgroups.html',username=username, org_domain=org_domain, userGroups=userGroups, domainGroups=domainGroups) - -Vulnerability 11: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 187, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 201: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 191, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 12: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 201, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 187: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 191, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 13: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 187, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 201: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 14: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 201, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 187: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 15: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 187, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 201: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 198, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 16: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 201, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 187: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 198, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 17: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 187, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 201: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 202, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 18: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 201, trigger word "get(": - gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 187: gAPI = _initFromHTML(request.args.get('org_domain'), request.args.get('user'), '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 202, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editforwarding.html',org_domain=request.args.get('org_domain'), username=request.args.get('user'), forwarding=gAPI.retrieveUserForwarding(), form=form) - -Vulnerability 19: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 230, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 232: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 236, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 20: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 231, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 232: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 236, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 21: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 240, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 242: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 246, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 22: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 241, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 242: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 246, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 23: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 250, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 252: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 256, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 24: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 251, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 252: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 256, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('actionconfirm.html',message=message, message_two=message_two, user=user, org_domain=org_domain) - -Vulnerability 25: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 264, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 268: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 276, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 26: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 268, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 264: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 276, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 27: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 264, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 268: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 276, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 28: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 268, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 264: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 276, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 29: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 264, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 268: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 292, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 30: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 268, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 264: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 292, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 31: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 264, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 268: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 292, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 32: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 268, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 264: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 292, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - -Vulnerability 33: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 263, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 267: user = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 276: ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - File: GoogleDomain---AD-web-console/routes.py - > Line 292: ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) -File: GoogleDomain---AD-web-console/routes.py - > reaches line 296, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editusers.html',username=user, org_domain=org_domain, form=form, givenname=gAPI.get_firstname(), familyname=gAPI.get_lastname(), nicknames=gAPI.retrieve_nicknames()) - -Vulnerability 34: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 264, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 268: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 296, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editusers.html',username=user, org_domain=org_domain, form=form, givenname=gAPI.get_firstname(), familyname=gAPI.get_lastname(), nicknames=gAPI.retrieve_nicknames()) - -Vulnerability 35: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 267, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 263: user = request.args.get('user') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 276: ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) - File: GoogleDomain---AD-web-console/routes.py - > Line 292: ret_MAYBE_FUNCTION_NAME = redirect(url_for('editusers',user=form.username.data, org_domain=org_domain)) -File: GoogleDomain---AD-web-console/routes.py - > reaches line 296, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editusers.html',username=user, org_domain=org_domain, form=form, givenname=gAPI.get_firstname(), familyname=gAPI.get_lastname(), nicknames=gAPI.retrieve_nicknames()) - -Vulnerability 36: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 268, trigger word "get(": - org_domain = request.args.get('org_domain') -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 264: org_domain = request.args.get('org_domain') - File: GoogleDomain---AD-web-console/routes.py - > Line 269: gAPI = google_api.gAPI(org_domain, user, '') - File: GoogleDomain---AD-web-console/routes.py - > Line 295: gAPI = google_api.gAPI(org_domain, user, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 296, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('editusers.html',username=user, org_domain=org_domain, form=form, givenname=gAPI.get_firstname(), familyname=gAPI.get_lastname(), nicknames=gAPI.retrieve_nicknames()) - -Vulnerability 37: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 329, trigger word "form[": - org_domain = request.form['org_domain'] -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 330: gAPI = google_api.gAPI(org_domain, None, '') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 334, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user_list_display.html',domain_users=domain_users, given_names=given_names, family_names=family_names, org_domain=org_domain) - -Vulnerability 38: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 342, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 344: filename = secure_filename(file.filename) - File: GoogleDomain---AD-web-console/routes.py - > Line 349: ret_MAYBE_FUNCTION_NAME = render_template('upload.html') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 348, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 39: -File: GoogleDomain---AD-web-console/routes.py - > User input at line 342, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: GoogleDomain---AD-web-console/routes.py - > Line 344: filename = secure_filename(file.filename) - File: GoogleDomain---AD-web-console/routes.py - > Line 349: ret_MAYBE_FUNCTION_NAME = render_template('upload.html') -File: GoogleDomain---AD-web-console/routes.py - > reaches line 348, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -kylewmoser/HistoryEmergent -https://github.com/kylewmoser/HistoryEmergent -Entry file: HistoryEmergent/historyemergent/__init__.py -Scanned: 2016-10-19 12:40:49.478386 -Vulnerability 1: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 26, trigger word ".data": - file_obj = form.uploaded.data -Reassigned in: - File: HistoryEmergent/historyemergent/docs/views.py - > Line 27: filename = werkzeug.secure_filename(file_obj.filename) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 28: randstr = upload_to_s3(file_obj) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 30: filename = insert_in_filename(filename, randstr) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 31: doc = Document(form.name.data, make_s3_path(filename), request.form['format'], current_user) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 33: doc.uuid = croc.add_doc_to_croc(doc.s3path) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 38, trigger word "flash(": - flash('Successfully uploaded {0}'.format(filename), 'success') - -Vulnerability 2: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 62, trigger word "get(": - doc = Document.query.get(doc_id) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 73, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('docs.view_doc',doc_id=doc.uid)) - -Vulnerability 3: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 62, trigger word "get(": - doc = Document.query.get(doc_id) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 73, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('docs.view_doc',doc_id=doc.uid)) - -Vulnerability 4: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 62, trigger word "get(": - doc = Document.query.get(doc_id) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 74, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('view_doc.html',doc=doc, viewer_url='https://crocodoc.com/view/%7B0%7D'.format(str(doc.get_croc_session(current_user))), titleForm=title_form, fileForm=file_form) - -Vulnerability 5: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 83, trigger word "get(": - doc = Document.query.get(doc_id) -Reassigned in: - File: HistoryEmergent/historyemergent/docs/views.py - > Line 88: filename = insert_in_filename(werkzeug.secure_filename(file_obj.filename), '-{0}-rev.{1}'.format(current_user.username, len(doc.versions))) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 91: s3path = make_s3_path(filename) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 93: version = Version(form.comment.data, s3path, croc.add_doc_to_croc(s3path), doc) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 96, trigger word "flash(": - flash('Added new version of {0}'.format(doc.name), 'success') - -Vulnerability 6: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 83, trigger word "get(": - doc = Document.query.get(doc_id) -Reassigned in: - File: HistoryEmergent/historyemergent/docs/views.py - > Line 88: filename = insert_in_filename(werkzeug.secure_filename(file_obj.filename), '-{0}-rev.{1}'.format(current_user.username, len(doc.versions))) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 91: s3path = make_s3_path(filename) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 93: version = Version(form.comment.data, s3path, croc.add_doc_to_croc(s3path), doc) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 97, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('docs.view_doc',doc_id=doc.uid)) - -Vulnerability 7: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 83, trigger word "get(": - doc = Document.query.get(doc_id) -Reassigned in: - File: HistoryEmergent/historyemergent/docs/views.py - > Line 88: filename = insert_in_filename(werkzeug.secure_filename(file_obj.filename), '-{0}-rev.{1}'.format(current_user.username, len(doc.versions))) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 91: s3path = make_s3_path(filename) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 93: version = Version(form.comment.data, s3path, croc.add_doc_to_croc(s3path), doc) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 97, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('docs.view_doc',doc_id=doc.uid)) - -Vulnerability 8: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 83, trigger word "get(": - doc = Document.query.get(doc_id) -Reassigned in: - File: HistoryEmergent/historyemergent/docs/views.py - > Line 88: filename = insert_in_filename(werkzeug.secure_filename(file_obj.filename), '-{0}-rev.{1}'.format(current_user.username, len(doc.versions))) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 91: s3path = make_s3_path(filename) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 93: version = Version(form.comment.data, s3path, croc.add_doc_to_croc(s3path), doc) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 99, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('docs.view_doc',doc_id=doc.uid)) - -Vulnerability 9: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 83, trigger word "get(": - doc = Document.query.get(doc_id) -Reassigned in: - File: HistoryEmergent/historyemergent/docs/views.py - > Line 88: filename = insert_in_filename(werkzeug.secure_filename(file_obj.filename), '-{0}-rev.{1}'.format(current_user.username, len(doc.versions))) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 91: s3path = make_s3_path(filename) - File: HistoryEmergent/historyemergent/docs/views.py - > Line 93: version = Version(form.comment.data, s3path, croc.add_doc_to_croc(s3path), doc) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 99, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('docs.view_doc',doc_id=doc.uid)) - -Vulnerability 10: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 106, trigger word "get(": - doc = Document.query.get(doc_id) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 120, trigger word "replace(": - files_to_delete.append(doc.s3path.replace('http://s3.amazonaws.com/%7B0%7D/'.format(app.config['BUCKET_NAME']), '')) - -Vulnerability 11: -File: HistoryEmergent/historyemergent/docs/views.py - > User input at line 106, trigger word "get(": - doc = Document.query.get(doc_id) -File: HistoryEmergent/historyemergent/docs/views.py - > reaches line 127, trigger word "flash(": - flash('{0} has been deleted.'.format(doc.name), 'info') - -Vulnerability 12: -File: HistoryEmergent/historyemergent/users/views.py - > User input at line 26, trigger word ".data": - uid = get_id_from_email(form.email.data) -Reassigned in: - File: HistoryEmergent/historyemergent/users/views.py - > Line 31: user = load_user(uid) -File: HistoryEmergent/historyemergent/users/views.py - > reaches line 38, trigger word "flash(": - flash('Good to have you back, {0}'.format(user.firstname), 'success') - -Vulnerability 13: -File: HistoryEmergent/historyemergent/users/views.py - > User input at line 70, trigger word ".data": - message = check_username_and_email(form.email.data, form.username.data) -File: HistoryEmergent/historyemergent/users/views.py - > reaches line 73, trigger word "flash(": - flash(message, 'error') - -Vulnerability 14: -File: HistoryEmergent/historyemergent/users/views.py - > User input at line 75, trigger word ".data": - user = User(form.firstname.data, form.lastname.data, form.username.data, form.email.data, form.password.data) -File: HistoryEmergent/historyemergent/users/views.py - > reaches line 79, trigger word "flash(": - flash('Your account has been created, {0}.'.format(user.firstname), 'success') - - - -chokepoint/flaskgur -https://github.com/chokepoint/flaskgur -Entry file: flaskgur/flaskgur.py -Scanned: 2016-10-19 12:41:06.562389 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rayokota/generator-angular-flask -https://github.com/rayokota/generator-angular-flask -Entry file: None -Scanned: 2016-10-19 12:41:08.080213 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rayokota/generator-angular-flask. - -zeekay/flask-uwsgi-websocket -https://github.com/zeekay/flask-uwsgi-websocket -Entry file: flask-uwsgi-websocket/examples/pubsub-asyncio/pubsub.py -Scanned: 2016-10-19 12:41:09.614200 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -inveniosoftware/flask-sso -https://github.com/inveniosoftware/flask-sso -Entry file: flask-sso/tests/helpers.py -Scanned: 2016-10-19 12:41:11.101597 -No vulnerabilities found. - - -kevincrane/flaskblog -https://github.com/kevincrane/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 12:41:15.212742 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -brakedust/flasktutorial -https://github.com/brakedust/flasktutorial -Entry file: None -Scanned: 2016-10-19 12:41:16.723843 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -HAYASAKA-Ryosuke/flaskserialmonitor -https://github.com/HAYASAKA-Ryosuke/flaskserialmonitor -Entry file: flaskserialmonitor/main.py -Scanned: 2016-10-19 12:41:18.034987 -No vulnerabilities found. - - -lnielsen/flask-ext-skeleton -https://github.com/lnielsen/flask-ext-skeleton -Entry file: flask-ext-skeleton/tests/helpers.py -Scanned: 2016-10-19 12:41:19.435740 -No vulnerabilities found. - - -avidas/flask-paypal-verify -https://github.com/avidas/flask-paypal-verify -Entry file: flask-paypal-verify/app.py -Scanned: 2016-10-19 12:41:20.824437 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shivam5992/FlaskBlog -https://github.com/shivam5992/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 12:41:23.530328 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miqingren/flaskOpen -https://github.com/miqingren/flaskOpen -Entry file: flaskOpen/minitwit/minitwit.py -Scanned: 2016-10-19 12:41:24.849466 -No vulnerabilities found. - - -exversion/layer -https://github.com/exversion/layer -Entry file: layer/src/app.py -Scanned: 2016-10-19 12:41:26.499377 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thimslugga/flask-helloworld -https://github.com/thimslugga/flask-helloworld -Entry file: flask-helloworld/run.py -Scanned: 2016-10-19 12:41:27.787311 -No vulnerabilities found. - - -rch/flask-gacl -https://github.com/rch/flask-gacl -Entry file: flask-gacl/flask_gacl/flaskr.py -Scanned: 2016-10-19 12:41:32.252764 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davidcoallier/howto-flask -https://github.com/davidcoallier/howto-flask -Entry file: howto-flask/api.py -Scanned: 2016-10-19 12:41:33.716152 -No vulnerabilities found. - - -machow/flask-template -https://github.com/machow/flask-template -Entry file: None -Scanned: 2016-10-19 12:41:34.260165 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/machow/flask-template. - -doggyloot/sirius-flask -https://github.com/doggyloot/sirius-flask -Entry file: sirius-flask/app.py -Scanned: 2016-10-19 12:41:35.667752 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hermansc/flask-amazon -https://github.com/hermansc/flask-amazon -Entry file: flask-amazon/main.py -Scanned: 2016-10-19 12:41:36.944048 -No vulnerabilities found. - - -ammiranda/flask_microblog -https://github.com/ammiranda/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 12:41:37.492531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shivam5992/pywordcloud-flask -https://github.com/shivam5992/pywordcloud-flask -Entry file: pywordcloud-flask/words.py -Scanned: 2016-10-19 12:41:38.883198 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ripleyaffect/flask_tut -https://github.com/ripleyaffect/flask_tut -Entry file: flask_tut/flaskr.py -Scanned: 2016-10-19 12:41:40.156195 -No vulnerabilities found. - - -myevan/flask_server -https://github.com/myevan/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-19 12:41:40.699551 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nidhinp/flask-blogapp -https://github.com/nidhinp/flask-blogapp -Entry file: flask-blogapp/run.py -Scanned: 2016-10-19 12:41:42.215293 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tr-Heath/FlaskMicroBlog -https://github.com/Tr-Heath/FlaskMicroBlog -Entry file: FlaskMicroBlog/app/__init__.py -Scanned: 2016-10-19 12:41:43.592708 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -petertbernhardt/FlaskPostGetTest -https://github.com/petertbernhardt/FlaskPostGetTest -Entry file: FlaskPostGetTest/main/__init__.py -Scanned: 2016-10-19 12:41:44.864491 -Vulnerability 1: -File: FlaskPostGetTest/main/__init__.py - > User input at line 19, trigger word "form[": - name = request.form['yourname'] -File: FlaskPostGetTest/main/__init__.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('form_action.html',name=name, email=email) - -Vulnerability 2: -File: FlaskPostGetTest/main/__init__.py - > User input at line 20, trigger word "form[": - email = request.form['youremail'] -File: FlaskPostGetTest/main/__init__.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('form_action.html',name=name, email=email) - - - -sayanchowdhury/mukti-flask-101 -https://github.com/sayanchowdhury/mukti-flask-101 -Entry file: mukti-flask-101/webapp/__init__.py -Scanned: 2016-10-19 12:41:48.746145 -No vulnerabilities found. - - -charlie-es/flask-file-structure -https://github.com/charlie-es/flask-file-structure -Entry file: flask-file-structure/application_name/__init__.py -Scanned: 2016-10-19 12:41:51.045205 -No vulnerabilities found. - - -florianpaquet/flask-mease-example -https://github.com/florianpaquet/flask-mease-example -Entry file: flask-mease-example/app.py -Scanned: 2016-10-19 12:41:52.318845 -No vulnerabilities found. - - -scottmiao/Flask-Mega-Tutorial -https://github.com/scottmiao/Flask-Mega-Tutorial -Entry file: Flask-Mega-Tutorial/app/__init__.py -Scanned: 2016-10-19 12:42:04.887599 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BoulderBTC/valar -https://github.com/BoulderBTC/valar -Entry file: valar/valar/__init__.py -Scanned: 2016-10-19 12:42:09.428783 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Haseebvp/Simple-Microblog-app-using-flask- -https://github.com/Haseebvp/Simple-Microblog-app-using-flask- -Entry file: None -Scanned: 2016-10-19 12:42:11.162765 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Haseebvp/Simple-Microblog-app-using-flask-. - -dgolovan/everblog -https://github.com/dgolovan/everblog -Entry file: everblog/angular_flask/__init__.py -Scanned: 2016-10-19 12:42:17.847588 -No vulnerabilities found. - - -Haseebvp/Blog-app-using-flask-in-python-version-2 -https://github.com/Haseebvp/Blog-app-using-flask-in-python-version-2 -Entry file: None -Scanned: 2016-10-19 12:42:19.568427 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Haseebvp/Blog-app-using-flask-in-python-version-2. - -mikesu/miki -https://github.com/mikesu/miki -Entry file: miki/src/Main.py -Scanned: 2016-10-19 12:42:21.282088 -No vulnerabilities found. - - -insom/dogefaucet -https://github.com/insom/dogefaucet -Entry file: dogefaucet/main.py -Scanned: 2016-10-19 12:42:22.551581 -Vulnerability 1: -File: dogefaucet/main.py - > User input at line 42, trigger word "get(": - form = app.config.get('RECAPTCHA_PRIVATE_KEY') and SecureWalletForm() or WalletForm() -File: dogefaucet/main.py - > reaches line 44, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',wallet=wallet, form=form) - -Vulnerability 2: -File: dogefaucet/main.py - > User input at line 43, trigger word "get(": - wallet = session.get('wallet', []) -File: dogefaucet/main.py - > reaches line 44, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',wallet=wallet, form=form) - -Vulnerability 3: -File: dogefaucet/main.py - > User input at line 50, trigger word ".data": - wallet = form.wallet.data.strip() -Reassigned in: - File: dogefaucet/main.py - > Line 51: validation = coin.validateaddress(wallet) - File: dogefaucet/main.py - > Line 66: wallet_row = Wallet(wallet=wallet, ip=request.remote_addr) - File: dogefaucet/main.py - > Line 73: tx = coin.sendtoaddress(wallet, app.config['DOGE_AMOUNT'],comment='Dogebowl #{}'.format(wallet_row.id)) - File: dogefaucet/main.py - > Line 78: tx_url = 'http://dogechain.info/tx/%7B%7D'.format(tx) - File: dogefaucet/main.py - > Line 81: ret_MAYBE_FUNCTION_NAME = index(form) - File: dogefaucet/main.py - > Line 54: ret_MAYBE_FUNCTION_NAME = index(form) - File: dogefaucet/main.py - > Line 62: ret_MAYBE_FUNCTION_NAME = index(form) - File: dogefaucet/main.py - > Line 65: ret_MAYBE_FUNCTION_NAME = index(form) - File: dogefaucet/main.py - > Line 77: ret_MAYBE_FUNCTION_NAME = index(form) -File: dogefaucet/main.py - > reaches line 56, trigger word "filter(": - res = Wallet.query.filter(and_(or_(Wallet.wallet == wallet, Wallet.ip == request.remote_addr), Wallet.created > an_hour_ago)) - -Vulnerability 4: -File: dogefaucet/main.py - > User input at line 50, trigger word ".data": - wallet = form.wallet.data.strip() -Reassigned in: - File: dogefaucet/main.py - > Line 51: validation = coin.validateaddress(wallet) - File: dogefaucet/main.py - > Line 66: wallet_row = Wallet(wallet=wallet, ip=request.remote_addr) - File: dogefaucet/main.py - > Line 73: tx = coin.sendtoaddress(wallet, app.config['DOGE_AMOUNT'],comment='Dogebowl #{}'.format(wallet_row.id)) - File: dogefaucet/main.py - > Line 78: tx_url = 'http://dogechain.info/tx/%7B%7D'.format(tx) - File: dogefaucet/main.py - > Line 81: ret_MAYBE_FUNCTION_NAME = index(form) - File: dogefaucet/main.py - > Line 54: ret_MAYBE_FUNCTION_NAME = index(form) - File: dogefaucet/main.py - > Line 62: ret_MAYBE_FUNCTION_NAME = index(form) - File: dogefaucet/main.py - > Line 65: ret_MAYBE_FUNCTION_NAME = index(form) - File: dogefaucet/main.py - > Line 77: ret_MAYBE_FUNCTION_NAME = index(form) -File: dogefaucet/main.py - > reaches line 79, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('success.html',block_chain_url=tx_url, doge_amount=app.config['DOGE_AMOUNT']) - - - -johnrork/skeletor -https://github.com/johnrork/skeletor -Entry file: skeletor/__init__.py -Scanned: 2016-10-19 12:42:24.307393 -Vulnerability 1: -File: skeletor/__init__.py - > User input at line 44, trigger word "get(": - order = request.args.get('sort') -Reassigned in: - File: skeletor/__init__.py - > Line 46: order = db.desc(order) - File: skeletor/__init__.py - > Line 47: data = data.order_by(order) - File: skeletor/__init__.py - > Line 41: data = Album.query -File: skeletor/__init__.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('list.html',list=data.paginate(page), cols=['Title'], params=params) - - - -seemless/tanr -https://github.com/seemless/tanr -Entry file: tanr/file_texts.py -Scanned: 2016-10-19 12:42:26.089629 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rafaelmartins/rst-resume -https://github.com/rafaelmartins/rst-resume -Entry file: rst-resume/rst_resume/__init__.py -Scanned: 2016-10-19 12:42:27.489680 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -josh23941/Brew_PYE -https://github.com/josh23941/Brew_PYE -Entry file: Brew_PYE/Brew_PYE/brew_py/__init__.py -Scanned: 2016-10-19 12:42:30.341044 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rouanw/feature-toggles -https://github.com/rouanw/feature-toggles -Entry file: feature-toggles/flaskr.py -Scanned: 2016-10-19 12:42:33.070818 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gpatrick/SimpleNewsService -https://github.com/gpatrick/SimpleNewsService -Entry file: SimpleNewsService/simple-news-service.py -Scanned: 2016-10-19 12:42:35.354824 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattupstate/flask-jwt -https://github.com/mattupstate/flask-jwt -Entry file: flask-jwt/tests/conftest.py -Scanned: 2016-10-19 12:42:38.080440 -No vulnerabilities found. - - -Frozenball/flask-color -https://github.com/Frozenball/flask-color -Entry file: flask-color/sample.py -Scanned: 2016-10-19 12:42:39.372789 -No vulnerabilities found. - - -merkhofer/flask_angular -https://github.com/merkhofer/flask_angular -Entry file: flask_angular/flask_rest_service.py -Scanned: 2016-10-19 12:42:40.880502 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -angstwad/elemental -https://github.com/angstwad/elemental -Entry file: elemental/elemental/__init__.py -Scanned: 2016-10-19 12:42:42.305815 -No vulnerabilities found. - - -Zizzamia/tasty-flask-app -https://github.com/Zizzamia/tasty-flask-app -Entry file: tasty-flask-app/shared.py -Scanned: 2016-10-19 12:42:44.027863 -Vulnerability 1: -File: tasty-flask-app/api/timeline.py - > User input at line 32, trigger word "get(": - data = 'success''list_tweet''seconds_to_restart'Truetimeline_storage.get()30 -File: tasty-flask-app/api/timeline.py - > reaches line 37, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(data) - - - -leaena/snp-api -https://github.com/leaena/snp-api -Entry file: snp-api/snpapi/__init__.py -Scanned: 2016-10-19 12:42:45.428531 -No vulnerabilities found. - - -beshrkayali/flaskshort -https://github.com/beshrkayali/flaskshort -Entry file: flaskshort/models.py -Scanned: 2016-10-19 12:42:46.819084 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Toasty2/flaskr -https://github.com/Toasty2/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 12:42:47.334787 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Nouzlin/flaskapp -https://github.com/Nouzlin/flaskapp -Entry file: None -Scanned: 2016-10-19 12:42:47.835390 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Nouzlin/flaskapp. - -cogwheelcircuitworks/barcodatron -https://github.com/cogwheelcircuitworks/barcodatron -Entry file: barcodatron/barcode_flask/__init__.py -Scanned: 2016-10-19 12:42:49.471128 -No vulnerabilities found. - - -deslee/flask-counter -https://github.com/deslee/flask-counter -Entry file: flask-counter/counter/app.py -Scanned: 2016-10-19 12:42:50.805494 -No vulnerabilities found. - - -itdxer/flask-test -https://github.com/itdxer/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 12:42:51.343241 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -1995eaton/flask-bitcoin -https://github.com/1995eaton/flask-bitcoin -Entry file: flask-bitcoin/bitcoin.py -Scanned: 2016-10-19 12:42:53.740945 -No vulnerabilities found. - - -alexandremello/python_flask -https://github.com/alexandremello/python_flask -Entry file: None -Scanned: 2016-10-19 12:43:06.311461 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/alexandremello/python_flask. - -rch/flask-gacl -https://github.com/rch/flask-gacl -Entry file: flask-gacl/flask_gacl/flaskr.py -Scanned: 2016-10-19 12:43:09.822102 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -inuishan/LearningFlask -https://github.com/inuishan/LearningFlask -Entry file: LearningFlask/app/__init__.py -Scanned: 2016-10-19 12:43:12.373004 -No vulnerabilities found. - - -machow/flask-template -https://github.com/machow/flask-template -Entry file: None -Scanned: 2016-10-19 12:43:12.886915 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/machow/flask-template. - -utsavdusad/ModifiedFlask -https://github.com/utsavdusad/ModifiedFlask -Entry file: None -Scanned: 2016-10-19 12:43:18.485366 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -shivam5992/pywordcloud-flask -https://github.com/shivam5992/pywordcloud-flask -Entry file: pywordcloud-flask/words.py -Scanned: 2016-10-19 12:43:18.990663 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -abrade/flask_tut -https://github.com/abrade/flask_tut -Entry file: flask_tut/app/__init__.py -Scanned: 2016-10-19 12:43:20.439629 -No vulnerabilities found. - - -cruor99/networkcp_flask -https://github.com/cruor99/networkcp_flask -Entry file: networkcp_flask/app/__init__.py -Scanned: 2016-10-19 12:43:31.055758 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tr-Heath/FlaskMicroBlog -https://github.com/Tr-Heath/FlaskMicroBlog -Entry file: FlaskMicroBlog/app/__init__.py -Scanned: 2016-10-19 12:43:31.617391 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sambev/basicflask -https://github.com/sambev/basicflask -Entry file: basicflask/server.py -Scanned: 2016-10-19 12:43:33.901910 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MrFabkirox/python-flask-1 -https://github.com/MrFabkirox/python-flask-1 -Entry file: python-flask-1/routes.py -Scanned: 2016-10-19 12:43:35.190384 -No vulnerabilities found. - - -charlie-es/flask-file-structure -https://github.com/charlie-es/flask-file-structure -Entry file: flask-file-structure/application_name/__init__.py -Scanned: 2016-10-19 12:43:36.458116 -No vulnerabilities found. - - -mjp2220/my_first_flask -https://github.com/mjp2220/my_first_flask -Entry file: my_first_flask/app.py -Scanned: 2016-10-19 12:43:37.748682 -Vulnerability 1: -File: my_first_flask/app.py - > User input at line 39, trigger word "get(": - response_dict = requests.get(url).json() -Reassigned in: - File: my_first_flask/app.py - > Line 40: cleaned_response = parse_response(response_dict) -File: my_first_flask/app.py - > reaches line 41, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',api_data=cleaned_response) - - - -josephlee021/timecontrol-chessclock-flask -https://github.com/josephlee021/timecontrol-chessclock-flask -Entry file: timecontrol-chessclock-flask/project/app.py -Scanned: 2016-10-19 12:43:39.377334 -No vulnerabilities found. - - -Scatchell/m-pedigree-flask -https://github.com/Scatchell/m-pedigree-flask -Entry file: m-pedigree-flask/goldkeys/__init__.py -Scanned: 2016-10-19 12:43:42.018792 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -timgalvin/Rpi-server-flask -https://github.com/timgalvin/Rpi-server-flask -Entry file: Rpi-server-flask/start.py -Scanned: 2016-10-19 12:43:43.281733 -No vulnerabilities found. - - -cogell/learningPythonFlask -https://github.com/cogell/learningPythonFlask -Entry file: learningPythonFlask/app/__init__.py -Scanned: 2016-10-19 12:43:44.639522 -Vulnerability 1: -File: learningPythonFlask/app/views.py - > User input at line 13, trigger word "files[": - file = request.files['files'] -Reassigned in: - File: learningPythonFlask/app/views.py - > Line 15: filename = secure_filename(file.filename) - File: learningPythonFlask/app/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: learningPythonFlask/app/views.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',filename=filename) - - - -jeremymeyersny/arthum -https://github.com/jeremymeyersny/arthum -Entry file: arthum/arthum.py -Scanned: 2016-10-19 12:43:45.942942 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -theho/dokku -https://github.com/theho/dokku -Entry file: dokku/hello.py -Scanned: 2016-10-19 12:43:47.230599 -No vulnerabilities found. - - -wesleyan/pulleffect -https://github.com/wesleyan/pulleffect -Entry file: pulleffect/pulleffect/__init__.py -Scanned: 2016-10-19 12:43:50.588884 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -drsm79/baguette -https://github.com/drsm79/baguette -Entry file: baguette/test.py -Scanned: 2016-10-19 12:43:52.367605 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kajun/microblog -https://github.com/kajun/microblog -Entry file: None -Scanned: 2016-10-19 12:43:53.395907 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -johnrork/skeletor -https://github.com/johnrork/skeletor -Entry file: skeletor/__init__.py -Scanned: 2016-10-19 12:43:55.147552 -Vulnerability 1: -File: skeletor/__init__.py - > User input at line 44, trigger word "get(": - order = request.args.get('sort') -Reassigned in: - File: skeletor/__init__.py - > Line 46: order = db.desc(order) - File: skeletor/__init__.py - > Line 47: data = data.order_by(order) - File: skeletor/__init__.py - > Line 41: data = Album.query -File: skeletor/__init__.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('list.html',list=data.paginate(page), cols=['Title'], params=params) - - - -diadara/guiwsn -https://github.com/diadara/guiwsn -Entry file: guiwsn/app/__init__.py -Scanned: 2016-10-19 12:43:57.818306 -No vulnerabilities found. - - -supertom44/PythonMicroblog -https://github.com/supertom44/PythonMicroblog -Entry file: PythonMicroblog/flask/Lib/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 12:44:02.034458 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -billjedi/nfl_picks -https://github.com/billjedi/nfl_picks -Entry file: nfl_picks/app/__init__.py -Scanned: 2016-10-19 12:44:03.592163 -No vulnerabilities found. - - -cparlette/FakeDataServer -https://github.com/cparlette/FakeDataServer -Entry file: FakeDataServer/FakeDataServer.py -Scanned: 2016-10-19 12:44:06.845705 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FakeDataServer/venv/lib/python2.7/genericpath.py - -ant1441/xvfb-viewer -https://github.com/ant1441/xvfb-viewer -Entry file: xvfb-viewer/xvfb_viewer/__init__.py -Scanned: 2016-10-19 12:44:08.218710 -No vulnerabilities found. - - -mking/flask-uwsgi -https://github.com/mking/flask-uwsgi -Entry file: flask-uwsgi/flask_uwsgi.py -Scanned: 2016-10-19 12:44:13.504879 -No vulnerabilities found. - - -moremorefor/flask-fileupload-ajax-example -https://github.com/moremorefor/flask-fileupload-ajax-example -Entry file: flask-fileupload-ajax-example/app.py -Scanned: 2016-10-19 12:44:14.777271 -Vulnerability 1: -File: flask-fileupload-ajax-example/app.py - > User input at line 71, trigger word "files[": - files = request.files['file'] -Reassigned in: - File: flask-fileupload-ajax-example/app.py - > Line 73: filename = secure_filename(files.filename) - File: flask-fileupload-ajax-example/app.py - > Line 77: file_size = os.path.getsize(os.path.join(updir, filename)) -File: flask-fileupload-ajax-example/app.py - > reaches line 78, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(name=filename, size=file_size) - - - -dgilland/flask-alchy -https://github.com/dgilland/flask-alchy -Entry file: flask-alchy/test_flask_alchy.py -Scanned: 2016-10-19 12:44:19.210921 -No vulnerabilities found. - - -ArtAPI/artFlask -https://github.com/ArtAPI/artFlask -Entry file: artFlask/mainapp.py -Scanned: 2016-10-19 12:44:22.894127 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sbezboro/standard-web-flask -https://github.com/sbezboro/standard-web-flask -Entry file: standard-web-flask/standardweb/__init__.py -Scanned: 2016-10-19 12:44:25.869197 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -merkhofer/flask_angular -https://github.com/merkhofer/flask_angular -Entry file: flask_angular/flask_rest_service.py -Scanned: 2016-10-19 12:44:26.374867 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -angstwad/elemental -https://github.com/angstwad/elemental -Entry file: elemental/elemental/__init__.py -Scanned: 2016-10-19 12:44:34.263971 -No vulnerabilities found. - - -gouthambs/angularjs-flask -https://github.com/gouthambs/angularjs-flask -Entry file: angularjs-flask/src/example2/webapp.py -Scanned: 2016-10-19 12:44:36.609922 -No vulnerabilities found. - - -jeyraof/flask-protein -https://github.com/jeyraof/flask-protein -Entry file: None -Scanned: 2016-10-19 12:44:38.047388 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jeyraof/flask-protein. - -Zizzamia/tasty-flask-app -https://github.com/Zizzamia/tasty-flask-app -Entry file: tasty-flask-app/shared.py -Scanned: 2016-10-19 12:44:39.787349 -Vulnerability 1: -File: tasty-flask-app/api/timeline.py - > User input at line 32, trigger word "get(": - data = 'success''list_tweet''seconds_to_restart'Truetimeline_storage.get()30 -File: tasty-flask-app/api/timeline.py - > reaches line 37, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(data) - - - -craigglennie/flask-api-starter -https://github.com/craigglennie/flask-api-starter -Entry file: flask-api-starter/my_app/app.py -Scanned: 2016-10-19 12:44:41.216557 -No vulnerabilities found. - - -erkarl/flask-restful-todo -https://github.com/erkarl/flask-restful-todo -Entry file: flask-restful-todo/apps/app.py -Scanned: 2016-10-19 12:44:43.387556 -No vulnerabilities found. - - -shaunktw/flaskapp -https://github.com/shaunktw/flaskapp -Entry file: None -Scanned: 2016-10-19 12:44:43.927027 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shaunktw/flaskapp. - -kajun/flaskr -https://github.com/kajun/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 12:44:44.424752 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mjhea0/music-streaming-flask -https://github.com/mjhea0/music-streaming-flask -Entry file: music-streaming-flask/app/__init__.py -Scanned: 2016-10-19 12:44:46.534620 -Vulnerability 1: -File: music-streaming-flask/app/views.py - > User input at line 13, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: music-streaming-flask/app/views.py - > Line 15: filename = secure_filename(file.filename) - File: music-streaming-flask/app/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: music-streaming-flask/app/views.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',filename=filename) - - - -junqed/flask-resty -https://github.com/junqed/flask-resty -Entry file: flask-resty/flask_resty/helpers.py -Scanned: 2016-10-19 12:44:47.879257 -No vulnerabilities found. - - -riquellopes/boot-flask -https://github.com/riquellopes/boot-flask -Entry file: boot-flask/boot_flask/boot_file.py -Scanned: 2016-10-19 12:44:49.265229 -No vulnerabilities found. - - -shaffer-wv/flask-microblog -https://github.com/shaffer-wv/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:44:49.806719 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -inuishan/LearningFlask -https://github.com/inuishan/LearningFlask -Entry file: LearningFlask/app/__init__.py -Scanned: 2016-10-19 12:44:53.308308 -No vulnerabilities found. - - -cogfor/flask-init -https://github.com/cogfor/flask-init -Entry file: flask-init/hello.py -Scanned: 2016-10-19 12:44:54.583937 -No vulnerabilities found. - - -sayangel/helloflask -https://github.com/sayangel/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 12:44:55.124774 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -rram/moneypenny -https://github.com/rram/moneypenny -Entry file: moneypenny/moneypenny.py -Scanned: 2016-10-19 12:44:56.521678 -Vulnerability 1: -File: moneypenny/moneypenny.py - > User input at line 116, trigger word "get(": - date = entry.get('signed_in_time_local') -Reassigned in: - File: moneypenny/moneypenny.py - > Line 117: date = datetime.strptime(date, '%Y-%m-%d %H:%M:%S') - File: moneypenny/moneypenny.py - > Line 141: title = link_format.format(d=date, location=loc_info, visitor_name=visitor_name) - File: moneypenny/moneypenny.py - > Line 149: s = sr.submit(title,text=text, url=img_url, raise_captcha_exception=True) - File: moneypenny/moneypenny.py - > Line 153: link = s - File: moneypenny/moneypenny.py - > Line 156: link = s.short_link - File: moneypenny/moneypenny.py - > Line 159: message = message_format.format(d=date, location=loc_info, visitor_name=visitor_name, link=link) - File: moneypenny/moneypenny.py - > Line 166: ret_MAYBE_FUNCTION_NAME = link - File: moneypenny/moneypenny.py - > Line 112: ret_MAYBE_FUNCTION_NAME = '' - File: moneypenny/moneypenny.py - > Line 150: link = 'Something went wrong here' -File: moneypenny/moneypenny.py - > reaches line 118, trigger word "replace(": - date = date.replace(tzinfo=pytz.timezone(loc_info[1])) - - - -drincruz/flask-tutorial-flaskr -https://github.com/drincruz/flask-tutorial-flaskr -Entry file: flask-tutorial-flaskr/flaskr.py -Scanned: 2016-10-19 12:44:57.782444 -No vulnerabilities found. - - -gurpp/FlaskMusicLibrary -https://github.com/gurpp/FlaskMusicLibrary -Entry file: FlaskMusicLibrary/musicmanager.py -Scanned: 2016-10-19 12:44:59.394333 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chrislaskey/kingdom -https://github.com/chrislaskey/kingdom -Entry file: kingdom/app/__init__.py -Scanned: 2016-10-19 12:45:01.153908 -No vulnerabilities found. - - -saltycrane/flask-subdomain-dispatcher-example -https://github.com/saltycrane/flask-subdomain-dispatcher-example -Entry file: flask-subdomain-dispatcher-example/subdomainexample.py -Scanned: 2016-10-19 12:45:04.387496 -No vulnerabilities found. - - -colorstain/flask-api-base -https://github.com/colorstain/flask-api-base -Entry file: flask-api-base/tests/test_require_json.py -Scanned: 2016-10-19 12:45:09.353194 -No vulnerabilities found. - - -superpilot/cr_flask_api -https://github.com/superpilot/cr_flask_api -Entry file: cr_flask_api/wsgi.py -Scanned: 2016-10-19 12:45:13.804701 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DhashS/TryOutFlask -https://github.com/DhashS/TryOutFlask -Entry file: TryOutFlask/TryOutFlask/app/__init__.py -Scanned: 2016-10-19 12:45:19.036808 -No vulnerabilities found. - - -PyBulls/teach-me-flask -https://github.com/PyBulls/teach-me-flask -Entry file: teach-me-flask/submit.py -Scanned: 2016-10-19 12:45:20.433857 -No vulnerabilities found. - - -cogell/learningPythonFlask -https://github.com/cogell/learningPythonFlask -Entry file: learningPythonFlask/app/__init__.py -Scanned: 2016-10-19 12:45:21.782623 -Vulnerability 1: -File: learningPythonFlask/app/views.py - > User input at line 13, trigger word "files[": - file = request.files['files'] -Reassigned in: - File: learningPythonFlask/app/views.py - > Line 15: filename = secure_filename(file.filename) - File: learningPythonFlask/app/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: learningPythonFlask/app/views.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',filename=filename) - - - -jashmead/helloflask -https://github.com/jashmead/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 12:45:22.310027 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -jashmead/hello -https://github.com/jashmead/hello -Entry file: hello/hello.py -Scanned: 2016-10-19 12:45:29.081564 -No vulnerabilities found. - - -Beluki/Frozen-Blog -https://github.com/Beluki/Frozen-Blog -Entry file: Frozen-Blog/Source/blog.py -Scanned: 2016-10-19 12:45:35.698520 -No vulnerabilities found. - - -chenyunchen/NexmoCalendar -https://github.com/chenyunchen/NexmoCalendar -Entry file: None -Scanned: 2016-10-19 12:45:38.629205 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -merkhofer/parsel -https://github.com/merkhofer/parsel -Entry file: None -Scanned: 2016-10-19 12:45:40.636491 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/merkhofer/parsel. - -ajmarcus/bootflask -https://github.com/ajmarcus/bootflask -Entry file: bootflask/app/views.py -Scanned: 2016-10-19 12:45:42.002605 -No vulnerabilities found. - - -davemurph/ICTProject -https://github.com/davemurph/ICTProject -Entry file: ICTProject/_ubuntu_files/exchange_api.py -Scanned: 2016-10-19 12:45:45.561968 -No vulnerabilities found. - - -madflow/toni -https://github.com/madflow/toni -Entry file: None -Scanned: 2016-10-19 12:45:48.449165 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/madflow/toni. - -akahuang/comic-viewer -https://github.com/akahuang/comic-viewer -Entry file: comic-viewer/index.py -Scanned: 2016-10-19 12:45:49.850284 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -djds23/deanstream -https://github.com/djds23/deanstream -Entry file: deanstream/app/__init__.py -Scanned: 2016-10-19 12:45:53.579062 -No vulnerabilities found. - - -JonHMChan/nimbus -https://github.com/JonHMChan/nimbus -Entry file: nimbus/index.py -Scanned: 2016-10-19 12:45:54.884306 -No vulnerabilities found. - - -alexwright/restrepos -https://github.com/alexwright/restrepos -Entry file: restrepos/rest.py -Scanned: 2016-10-19 12:45:56.168508 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -willfong/okgotit -https://github.com/willfong/okgotit -Entry file: okgotit/app.py -Scanned: 2016-10-19 12:45:57.587539 -Vulnerability 1: -File: okgotit/app.py - > User input at line 290, trigger word "form[": - callgroup = request.form['callgroup'] -File: okgotit/app.py - > reaches line 295, trigger word "execute(": - cur = g.db.execute('SELECT id FROM callgroup WHERE name = ?', [callgroup]) - -Vulnerability 2: -File: okgotit/app.py - > User input at line 290, trigger word "form[": - callgroup = request.form['callgroup'] -File: okgotit/app.py - > reaches line 299, trigger word "execute(": - cur = g.db.execute('SELECT u.name, u.mobilenum FROM user AS u INNER JOIN notification AS s ON u.id = s.userid AND s.groupid = ? AND s.typeid = 1', [gid[0]]) - -Vulnerability 3: -File: okgotit/app.py - > User input at line 344, trigger word "get(": - response = int(request.args.get('Digits', '')) -File: okgotit/app.py - > reaches line 345, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('response.xml',response=response) - - - -TomDunn/flog -https://github.com/TomDunn/flog -Entry file: flog/application.py -Scanned: 2016-10-19 12:45:59.442304 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nitesh201/wisspr -https://github.com/nitesh201/wisspr -Entry file: wisspr/wisspr.py -Scanned: 2016-10-19 12:46:01.177897 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tlewis/microblog -https://github.com/tlewis/microblog -Entry file: None -Scanned: 2016-10-19 12:46:01.683410 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -acamilo/WS2811Web -https://github.com/acamilo/WS2811Web -Entry file: WS2811Web/ws2811web.py -Scanned: 2016-10-19 12:46:03.406766 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -billjedi/nfl_picks -https://github.com/billjedi/nfl_picks -Entry file: nfl_picks/app/__init__.py -Scanned: 2016-10-19 12:46:04.944574 -No vulnerabilities found. - - -aliyarahman/code-for-progress-curriculum -https://github.com/aliyarahman/code-for-progress-curriculum -Entry file: code-for-progress-curriculum/app/__init__.py -Scanned: 2016-10-19 12:46:06.456074 -Vulnerability 1: -File: code-for-progress-curriculum/app/views.py - > User input at line 36, trigger word "get(": - nextlesson = LessonPlan.query.get(lesson.id + 1) -File: code-for-progress-curriculum/app/views.py - > reaches line 38, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('lesson_plan.html',lesson=lesson, nextlesson=nextlesson, previouslesson=previouslesson) - -Vulnerability 2: -File: code-for-progress-curriculum/app/views.py - > User input at line 37, trigger word "get(": - previouslesson = LessonPlan.query.get(lesson.id - 1) -File: code-for-progress-curriculum/app/views.py - > reaches line 38, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('lesson_plan.html',lesson=lesson, nextlesson=nextlesson, previouslesson=previouslesson) - -Vulnerability 3: -File: code-for-progress-curriculum/app/views.py - > User input at line 45, trigger word "get(": - nextlesson = LessonPlan.query.get(lesson.id + 1) -Reassigned in: - File: code-for-progress-curriculum/app/views.py - > Line 52: ret_MAYBE_FUNCTION_NAME = redirect('/index') -File: code-for-progress-curriculum/app/views.py - > reaches line 53, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edit_lesson.html',lesson=lesson, form=form, previouslesson=previouslesson, nextlesson=nextlesson) - -Vulnerability 4: -File: code-for-progress-curriculum/app/views.py - > User input at line 46, trigger word "get(": - previouslesson = LessonPlan.query.get(lesson.id - 1) -Reassigned in: - File: code-for-progress-curriculum/app/views.py - > Line 52: ret_MAYBE_FUNCTION_NAME = redirect('/index') -File: code-for-progress-curriculum/app/views.py - > reaches line 53, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edit_lesson.html',lesson=lesson, form=form, previouslesson=previouslesson, nextlesson=nextlesson) - - - -x1o/brblog -https://github.com/x1o/brblog -Entry file: None -Scanned: 2016-10-19 12:46:07.892740 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/x1o/brblog. - -miguelgrinberg/Flask-SocketIO -https://github.com/miguelgrinberg/Flask-SocketIO -Entry file: None -Scanned: 2016-10-19 12:46:09.499192 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -alisaifee/flask-limiter -https://github.com/alisaifee/flask-limiter -Entry file: flask-limiter/tests/test_regressions.py -Scanned: 2016-10-19 12:46:15.493593 -No vulnerabilities found. - - -Jahaja/psdash -https://github.com/Jahaja/psdash -Entry file: psdash/psdash/run.py -Scanned: 2016-10-19 12:46:17.791403 -Vulnerability 1: -File: psdash/psdash/web.py - > User input at line 227, trigger word "get(": - form_values = dict(((k, request.args.get(k, default_val)) for (k, default_val) in form_keys.iteritems())) -Reassigned in: - File: psdash/psdash/web.py - > Line 238: conns = current_service.get_connections(form_values) -File: psdash/psdash/web.py - > reaches line 248, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('network.html',page='network', network_interfaces=netifs, connections=conns, socket_families=socket_families, socket_types=socket_types, states=states, is_xhr=request.is_xhr, num_conns=len(conns), form_values) - -Vulnerability 2: -File: psdash/psdash/web.py - > User input at line 292, trigger word "get(": - seek_tail = request.args.get('seek_tail', '1') != '0' -Reassigned in: - File: psdash/psdash/web.py - > Line 296: content = current_service.read_log(filename,session_key=session_key, seek_tail=seek_tail) - File: psdash/psdash/web.py - > Line 304: ret_MAYBE_FUNCTION_NAME = content - File: psdash/psdash/web.py - > Line 300: ret_MAYBE_FUNCTION_NAME = error_msg - File: psdash/psdash/web.py - > Line 301: ret_MAYBE_FUNCTION_NAME = (render_template('error.html',error=error_msg), 404) -File: psdash/psdash/web.py - > reaches line 306, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('log.html',content=content, filename=filename) - -Vulnerability 3: -File: psdash/psdash/web.py - > User input at line 293, trigger word "get(": - session_key = session.get('client_id') -Reassigned in: - File: psdash/psdash/web.py - > Line 296: content = current_service.read_log(filename,session_key=session_key, seek_tail=seek_tail) - File: psdash/psdash/web.py - > Line 304: ret_MAYBE_FUNCTION_NAME = content - File: psdash/psdash/web.py - > Line 300: ret_MAYBE_FUNCTION_NAME = error_msg - File: psdash/psdash/web.py - > Line 301: ret_MAYBE_FUNCTION_NAME = (render_template('error.html',error=error_msg), 404) -File: psdash/psdash/web.py - > reaches line 306, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('log.html',content=content, filename=filename) - -Vulnerability 4: -File: psdash/psdash/web.py - > User input at line 313, trigger word "get(": - session_key = session.get('client_id') -Reassigned in: - File: psdash/psdash/web.py - > Line 316: data = current_service.search_log(filename, query_text,session_key=session_key) - File: psdash/psdash/web.py - > Line 319: ret_MAYBE_FUNCTION_NAME = ('Could not find log file with given filename', 404) -File: psdash/psdash/web.py - > reaches line 317, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(data) - - - -cewing/training.sample-flask-app -https://github.com/cewing/training.sample-flask-app -Entry file: None -Scanned: 2016-10-19 12:46:23.751975 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cewing/training.sample-flask-app. - -mattbates/mycms_mongodb -https://github.com/mattbates/mycms_mongodb -Entry file: mycms_mongodb/web.py -Scanned: 2016-10-19 12:46:27.540764 -No vulnerabilities found. - - -rgrinberg/flask-gevent-omegle -https://github.com/rgrinberg/flask-gevent-omegle -Entry file: None -Scanned: 2016-10-19 12:46:31.622711 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rgrinberg/flask-gevent-omegle. - -alyssaq/flask-restful-api-appengine -https://github.com/alyssaq/flask-restful-api-appengine -Entry file: flask-restful-api-appengine/server/__init__.py -Scanned: 2016-10-19 12:46:36.932262 -No vulnerabilities found. - - -fhirschmann/Flask-FlatPages-Knitr -https://github.com/fhirschmann/Flask-FlatPages-Knitr -Entry file: Flask-FlatPages-Knitr/testapp/sitebuilder.py -Scanned: 2016-10-19 12:46:41.957380 -No vulnerabilities found. - - -aaboyd/flask-shared-templates -https://github.com/aaboyd/flask-shared-templates -Entry file: flask-shared-templates/app.py -Scanned: 2016-10-19 12:46:43.356075 -No vulnerabilities found. - - -fhirschmann/Flask-FlatPages-Pandoc -https://github.com/fhirschmann/Flask-FlatPages-Pandoc -Entry file: Flask-FlatPages-Pandoc/tests.py -Scanned: 2016-10-19 12:46:44.737298 -No vulnerabilities found. - - -qdonnellan/flaskblog -https://github.com/qdonnellan/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 12:46:47.265772 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -ipdae/flaskr -https://github.com/ipdae/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 12:46:47.773974 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregconant/flasktest -https://github.com/gregconant/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 12:46:48.294808 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jephdo/flaskapp -https://github.com/jephdo/flaskapp -Entry file: None -Scanned: 2016-10-19 12:46:50.798489 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jephdo/flaskapp. - -Mordeaux/FlaskCheckers -https://github.com/Mordeaux/FlaskCheckers -Entry file: FlaskCheckers/run.py -Scanned: 2016-10-19 12:46:56.820228 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kajun/flaskr2 -https://github.com/kajun/flaskr2 -Entry file: flaskr2/flaskr.py -Scanned: 2016-10-19 12:46:58.225355 -No vulnerabilities found. - - -rdegges/flask-api-sample -https://github.com/rdegges/flask-api-sample -Entry file: flask-api-sample/app.py -Scanned: 2016-10-19 12:46:59.736778 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gilesbrown/flask_inform -https://github.com/gilesbrown/flask_inform -Entry file: flask_inform/demo_flask_inform.py -Scanned: 2016-10-19 12:47:01.158102 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jason2506/flask-skeleton -https://github.com/jason2506/flask-skeleton -Entry file: None -Scanned: 2016-10-19 12:47:02.182405 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jason2506/flask-skeleton. - -drawcode/deployee-flask -https://github.com/drawcode/deployee-flask -Entry file: deployee-flask/app/__init__.py -Scanned: 2016-10-19 12:47:05.112264 -Vulnerability 1: -File: deployee-flask/app/users/views.py - > User input at line 33, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: deployee-flask/app/users/views.py - > Line 38: session['user_id'] = user.id -File: deployee-flask/app/users/views.py - > reaches line 39, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -chen-huaijin/owlympics_flask -https://github.com/chen-huaijin/owlympics_flask -Entry file: owlympics_flask/owlympics.py -Scanned: 2016-10-19 12:47:11.631569 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: owlympics_flask/lib/python2.7/genericpath.py - -chizel/try_flask -https://github.com/chizel/try_flask -Entry file: try_flask/my_site/__init__.py -Scanned: 2016-10-19 12:47:13.319370 -No vulnerabilities found. - - -drawcode/blueprints-flask -https://github.com/drawcode/blueprints-flask -Entry file: blueprints-flask/app/__init__.py -Scanned: 2016-10-19 12:47:14.742317 -Vulnerability 1: -File: blueprints-flask/app/users/views.py - > User input at line 33, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: blueprints-flask/app/users/views.py - > Line 38: session['user_id'] = user.id -File: blueprints-flask/app/users/views.py - > reaches line 39, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -Zren/flask-examples -https://github.com/Zren/flask-examples -Entry file: flask-examples/memcache-example/app.py -Scanned: 2016-10-19 12:47:16.024049 -No vulnerabilities found. - - -sibukixxx/docker_web -https://github.com/sibukixxx/docker_web -Entry file: docker_web/docker_web.py -Scanned: 2016-10-19 12:47:17.424125 -No vulnerabilities found. - - -chiffa/Flask4Meitoppi -https://github.com/chiffa/Flask4Meitoppi -Entry file: Flask4Meitoppi/source/MainServer.py -Scanned: 2016-10-19 12:47:18.817891 -No vulnerabilities found. - - -vladkrylov/FlaskLoginTest -https://github.com/vladkrylov/FlaskLoginTest -Entry file: FlaskLoginTest/app/__init__.py -Scanned: 2016-10-19 12:47:20.564309 -Vulnerability 1: -File: FlaskLoginTest/app/views.py - > User input at line 45, trigger word ".data": - userName = form.openid.data -File: FlaskLoginTest/app/views.py - > reaches line 47, trigger word "filter(": - user = User.query.filter(User.name == userName).first() - - - -dhuntsperger/new_flask_app -https://github.com/dhuntsperger/new_flask_app -Entry file: new_flask_app/app/flask_app/__init__.py -Scanned: 2016-10-19 12:47:24.313639 -No vulnerabilities found. - - -MarkRoddy/heroku-first-flask -https://github.com/MarkRoddy/heroku-first-flask -Entry file: heroku-first-flask/hello.py -Scanned: 2016-10-19 12:47:25.646858 -No vulnerabilities found. - - -cdahlhausen/flask-web-demo -https://github.com/cdahlhausen/flask-web-demo -Entry file: flask-web-demo/ve/lib/python2.7/site-packages/flask/sessions.py -Scanned: 2016-10-19 12:47:28.593238 -No vulnerabilities found. - - -PyBulls/teach-me-flask -https://github.com/PyBulls/teach-me-flask -Entry file: teach-me-flask/submit.py -Scanned: 2016-10-19 12:47:33.126677 -No vulnerabilities found. - - -palei/ng-flask-shop -https://github.com/palei/ng-flask-shop -Entry file: ng-flask-shop/app/__init__.py -Scanned: 2016-10-19 12:47:38.804015 -No vulnerabilities found. - - -dihuynh/helloflask -https://github.com/dihuynh/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 12:47:39.337399 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -aphivantrakul/microblog -https://github.com/aphivantrakul/microblog -Entry file: None -Scanned: 2016-10-19 12:47:42.924212 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kafkahw/flaskr-tdd -https://github.com/kafkahw/flaskr-tdd -Entry file: flaskr-tdd/flaskr.py -Scanned: 2016-10-19 12:47:45.336237 -No vulnerabilities found. - - -yangyeol/flaskr_tutorial -https://github.com/yangyeol/flaskr_tutorial -Entry file: flaskr_tutorial/flaskr.py -Scanned: 2016-10-19 12:47:46.645573 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -michaelew/ducking-octo-bear -https://github.com/michaelew/ducking-octo-bear -Entry file: ducking-octo-bear/app.py -Scanned: 2016-10-19 12:47:50.059437 -No vulnerabilities found. - - -davemurph/ICTProject -https://github.com/davemurph/ICTProject -Entry file: ICTProject/_ubuntu_files/exchange_api.py -Scanned: 2016-10-19 12:47:53.597806 -No vulnerabilities found. - - -blancgab/devfest-2014-training -https://github.com/blancgab/devfest-2014-training -Entry file: devfest-2014-training/app.py -Scanned: 2016-10-19 12:47:56.561768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nadol/to_do -https://github.com/nadol/to_do -Entry file: to_do/todo.py -Scanned: 2016-10-19 12:47:58.307165 -No vulnerabilities found. - - -jonathanwgoodwin/AnsibleConductor -https://github.com/jonathanwgoodwin/AnsibleConductor -Entry file: None -Scanned: 2016-10-19 12:47:59.701429 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jonathanwgoodwin/AnsibleConductor. - -qdonnellan/helloflask -https://github.com/qdonnellan/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 12:48:00.225754 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -kr4ng/helloflask -https://github.com/kr4ng/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 12:48:00.749463 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -mrkaiser/confrencebackend -https://github.com/mrkaiser/confrencebackend -Entry file: confrencebackend/migrate.py -Scanned: 2016-10-19 12:48:02.673904 -No vulnerabilities found. - - -djds23/deanstream -https://github.com/djds23/deanstream -Entry file: deanstream/app/__init__.py -Scanned: 2016-10-19 12:48:06.402837 -No vulnerabilities found. - - -cmanallen/refreshly -https://github.com/cmanallen/refreshly -Entry file: refreshly/refreshly.py -Scanned: 2016-10-19 12:48:09.373622 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: refreshly/env/lib/python3.3/struct.py - -nitesh201/wisspr -https://github.com/nitesh201/wisspr -Entry file: wisspr/wisspr.py -Scanned: 2016-10-19 12:48:09.884384 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dannytranlx/interface-feed-parser -https://github.com/dannytranlx/interface-feed-parser -Entry file: interface-feed-parser/application.py -Scanned: 2016-10-19 12:48:11.262952 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lingthio/Flask-User -https://github.com/lingthio/Flask-User -Entry file: Flask-User/example_apps/multi_email_app.py -Scanned: 2016-10-19 12:48:18.752331 -Vulnerability 1: -File: Flask-User/example_apps/user_profile_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/user_profile_app.py - > Line 90: db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile) - File: Flask-User/example_apps/user_profile_app.py - > Line 91: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_profile_app.py - > reaches line 94, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 2: -File: Flask-User/example_apps/user_profile_app.py - > User input at line 90, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile) -Reassigned in: - File: Flask-User/example_apps/user_profile_app.py - > Line 91: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_profile_app.py - > reaches line 94, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 3: -File: Flask-User/example_apps/roles_required_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/roles_required_app.py - > Line 83: db_adapter = SQLAlchemyAdapter(db, User) - File: Flask-User/example_apps/roles_required_app.py - > Line 84: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/roles_required_app.py - > reaches line 87, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 4: -File: Flask-User/example_apps/roles_required_app.py - > User input at line 83, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User) -Reassigned in: - File: Flask-User/example_apps/roles_required_app.py - > Line 84: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/roles_required_app.py - > reaches line 87, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 5: -File: Flask-User/example_apps/user_auth_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/user_auth_app.py - > Line 92: db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth) - File: Flask-User/example_apps/user_auth_app.py - > Line 93: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_auth_app.py - > reaches line 96, trigger word "filter(": - if not UserAuth.query.filter(UserAuth.username == 'user007').first(): - -Vulnerability 6: -File: Flask-User/example_apps/user_auth_app.py - > User input at line 92, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth) -Reassigned in: - File: Flask-User/example_apps/user_auth_app.py - > Line 93: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_auth_app.py - > reaches line 96, trigger word "filter(": - if not UserAuth.query.filter(UserAuth.username == 'user007').first(): - - - -alisaifee/flask-limiter -https://github.com/alisaifee/flask-limiter -Entry file: flask-limiter/tests/test_regressions.py -Scanned: 2016-10-19 12:48:21.162724 -No vulnerabilities found. - - -stormpath/stormpath-flask -https://github.com/stormpath/stormpath-flask -Entry file: stormpath-flask/tests/test_stormpath.py -Scanned: 2016-10-19 12:48:24.155093 -No vulnerabilities found. - - -Jahaja/psdash -https://github.com/Jahaja/psdash -Entry file: psdash/psdash/run.py -Scanned: 2016-10-19 12:48:26.696852 -Vulnerability 1: -File: psdash/psdash/web.py - > User input at line 227, trigger word "get(": - form_values = dict(((k, request.args.get(k, default_val)) for (k, default_val) in form_keys.iteritems())) -Reassigned in: - File: psdash/psdash/web.py - > Line 238: conns = current_service.get_connections(form_values) -File: psdash/psdash/web.py - > reaches line 248, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('network.html',page='network', network_interfaces=netifs, connections=conns, socket_families=socket_families, socket_types=socket_types, states=states, is_xhr=request.is_xhr, num_conns=len(conns), form_values) - -Vulnerability 2: -File: psdash/psdash/web.py - > User input at line 292, trigger word "get(": - seek_tail = request.args.get('seek_tail', '1') != '0' -Reassigned in: - File: psdash/psdash/web.py - > Line 296: content = current_service.read_log(filename,session_key=session_key, seek_tail=seek_tail) - File: psdash/psdash/web.py - > Line 304: ret_MAYBE_FUNCTION_NAME = content - File: psdash/psdash/web.py - > Line 300: ret_MAYBE_FUNCTION_NAME = error_msg - File: psdash/psdash/web.py - > Line 301: ret_MAYBE_FUNCTION_NAME = (render_template('error.html',error=error_msg), 404) -File: psdash/psdash/web.py - > reaches line 306, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('log.html',content=content, filename=filename) - -Vulnerability 3: -File: psdash/psdash/web.py - > User input at line 293, trigger word "get(": - session_key = session.get('client_id') -Reassigned in: - File: psdash/psdash/web.py - > Line 296: content = current_service.read_log(filename,session_key=session_key, seek_tail=seek_tail) - File: psdash/psdash/web.py - > Line 304: ret_MAYBE_FUNCTION_NAME = content - File: psdash/psdash/web.py - > Line 300: ret_MAYBE_FUNCTION_NAME = error_msg - File: psdash/psdash/web.py - > Line 301: ret_MAYBE_FUNCTION_NAME = (render_template('error.html',error=error_msg), 404) -File: psdash/psdash/web.py - > reaches line 306, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('log.html',content=content, filename=filename) - -Vulnerability 4: -File: psdash/psdash/web.py - > User input at line 313, trigger word "get(": - session_key = session.get('client_id') -Reassigned in: - File: psdash/psdash/web.py - > Line 316: data = current_service.search_log(filename, query_text,session_key=session_key) - File: psdash/psdash/web.py - > Line 319: ret_MAYBE_FUNCTION_NAME = ('Could not find log file with given filename', 404) -File: psdash/psdash/web.py - > reaches line 317, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(data) - - - -Jwpe/Flask-Nicely -https://github.com/Jwpe/Flask-Nicely -Entry file: Flask-Nicely/examples/app.py -Scanned: 2016-10-19 12:48:28.061394 -No vulnerabilities found. - - -michaljemala/hello-python -https://github.com/michaljemala/hello-python -Entry file: hello-python/hello.py -Scanned: 2016-10-19 12:48:29.297751 -No vulnerabilities found. - - -sloria/webargs -https://github.com/sloria/webargs -Entry file: webargs/examples/annotations_example.py -Scanned: 2016-10-19 12:48:35.160614 -Vulnerability 1: -File: webargs/examples/annotations_example.py - > User input at line 68, trigger word ".data": - exc = err.data['exc'] -File: webargs/examples/annotations_example.py - > reaches line 69, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('errors'exc.messages), 422) - -Vulnerability 2: -File: webargs/examples/flask_example.py - > User input at line 63, trigger word ".data": - exc = err.data['exc'] -File: webargs/examples/flask_example.py - > reaches line 64, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('errors'exc.messages), 422) - -Vulnerability 3: -File: webargs/examples/schema_example.py - > User input at line 116, trigger word ".data": - exc = err.data['exc'] -File: webargs/examples/schema_example.py - > reaches line 117, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('errors'exc.messages), 422) - - - -elleryq/FlaskPractice -https://github.com/elleryq/FlaskPractice -Entry file: FlaskPractice/app4/hello.py -Scanned: 2016-10-19 12:48:39.577215 -No vulnerabilities found. - - -efazati/flask-tutorial -https://github.com/efazati/flask-tutorial -Entry file: None -Scanned: 2016-10-19 12:48:44.591189 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -thinkingserious/api-design-with-apiaryio-python-and-flask -https://github.com/thinkingserious/api-design-with-apiaryio-python-and-flask -Entry file: api-design-with-apiaryio-python-and-flask/app.py -Scanned: 2016-10-19 12:48:46.910496 -Vulnerability 1: -File: api-design-with-apiaryio-python-and-flask/app.py - > User input at line 38, trigger word "get(": - folder = 'id''name''description''parent''meta'folders[-1]['id'] + 1request.json['name']request.json['description']request.json['parent']request.json.get('meta', 'NULL') -File: api-design-with-apiaryio-python-and-flask/app.py - > reaches line 46, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(folder), 201) - - - -tehpug/TehPUG-flask -https://github.com/tehpug/TehPUG-flask -Entry file: TehPUG-flask/wsgi/app/__init__.py -Scanned: 2016-10-19 12:48:49.042370 -Vulnerability 1: -File: TehPUG-flask/wsgi/app/views.py - > User input at line 243, trigger word "get(": - ss = Session.query.get(int(id)) -Reassigned in: - File: TehPUG-flask/wsgi/app/views.py - > Line 244: user = User.query.get(ss.user_id) - File: TehPUG-flask/wsgi/app/views.py - > Line 246: ret_MAYBE_FUNCTION_NAME = render_template('sessions.html',sessions=sessions) -File: TehPUG-flask/wsgi/app/views.py - > reaches line 245, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sessions.html',sessions=sessions, ss=ss, user=user) - -Vulnerability 2: -File: TehPUG-flask/wsgi/app/views.py - > User input at line 244, trigger word "get(": - user = User.query.get(ss.user_id) -Reassigned in: - File: TehPUG-flask/wsgi/app/views.py - > Line 246: ret_MAYBE_FUNCTION_NAME = render_template('sessions.html',sessions=sessions) -File: TehPUG-flask/wsgi/app/views.py - > reaches line 245, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sessions.html',sessions=sessions, ss=ss, user=user) - -Vulnerability 3: -File: TehPUG-flask/wsgi/app/views.py - > User input at line 254, trigger word "get(": - news = News.query.get(int(id)) -Reassigned in: - File: TehPUG-flask/wsgi/app/views.py - > Line 256: user = User.query.get(news.user_id) - File: TehPUG-flask/wsgi/app/views.py - > Line 258: ret_MAYBE_FUNCTION_NAME = render_template('news.html',allnews=allnews) -File: TehPUG-flask/wsgi/app/views.py - > reaches line 257, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('news.html',allnews=allnews, news=news, comments=comments, user=user) - -Vulnerability 4: -File: TehPUG-flask/wsgi/app/views.py - > User input at line 256, trigger word "get(": - user = User.query.get(news.user_id) -Reassigned in: - File: TehPUG-flask/wsgi/app/views.py - > Line 258: ret_MAYBE_FUNCTION_NAME = render_template('news.html',allnews=allnews) -File: TehPUG-flask/wsgi/app/views.py - > reaches line 257, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('news.html',allnews=allnews, news=news, comments=comments, user=user) - - - -mpatini/flaskr -https://github.com/mpatini/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 12:48:50.560385 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Chokwanghwan/flaskr -https://github.com/Chokwanghwan/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 12:48:55.546334 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ipdae/flaskr -https://github.com/ipdae/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 12:48:59.042409 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregconant/flasktest -https://github.com/gregconant/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 12:49:00.575422 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elainewlee/FlaskMicroblog -https://github.com/elainewlee/FlaskMicroblog -Entry file: None -Scanned: 2016-10-19 12:49:08.821028 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Mordeaux/FlaskCheckers -https://github.com/Mordeaux/FlaskCheckers -Entry file: FlaskCheckers/run.py -Scanned: 2016-10-19 12:49:09.318455 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shaffer-wv/flask-todo -https://github.com/shaffer-wv/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-19 12:49:09.879323 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -moloch/flask_addressbook -https://github.com/moloch/flask_addressbook -Entry file: flask_addressbook/addressbook/__init__.py -Scanned: 2016-10-19 12:49:11.263875 -Vulnerability 1: -File: flask_addressbook/addressbook/views.py - > User input at line 33, trigger word "get(": - search_txt = request.args.get('search_txt') -Reassigned in: - File: flask_addressbook/addressbook/views.py - > Line 34: query_string = '%' + search_txt + '%' -File: flask_addressbook/addressbook/views.py - > reaches line 35, trigger word "filter(": - entries = Entry.query.filter(Entry.first_name.ilike(query_string) | Entry.last_name.ilike(query_string) | Entry.phone_number.ilike(query_string)) - - - -rosscdh/flask-wtd -https://github.com/rosscdh/flask-wtd -Entry file: flask-wtd/wtd.py -Scanned: 2016-10-19 12:49:12.998383 -No vulnerabilities found. - - -h4k1m0u/flask-rdv -https://github.com/h4k1m0u/flask-rdv -Entry file: flask-rdv/app.py -Scanned: 2016-10-19 12:49:14.516882 -Vulnerability 1: -File: flask-rdv/app.py - > User input at line 50, trigger word "get(": - is_logged_in = session.get('is_logged_in') -Reassigned in: - File: flask-rdv/app.py - > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(url_for('rdv')) - File: flask-rdv/app.py - > Line 80: ret_MAYBE_FUNCTION_NAME = redirect(url_for('rdv')) -File: flask-rdv/app.py - > reaches line 82, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('register.html','login_form''register_form''is_logged_in''username''getmtime'login_formregister_formis_logged_inusernameos.path.getmtime) - -Vulnerability 2: -File: flask-rdv/app.py - > User input at line 51, trigger word "get(": - username = session.get('username') -Reassigned in: - File: flask-rdv/app.py - > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(url_for('rdv')) - File: flask-rdv/app.py - > Line 80: ret_MAYBE_FUNCTION_NAME = redirect(url_for('rdv')) -File: flask-rdv/app.py - > reaches line 82, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('register.html','login_form''register_form''is_logged_in''username''getmtime'login_formregister_formis_logged_inusernameos.path.getmtime) - -Vulnerability 3: -File: flask-rdv/app.py - > User input at line 109, trigger word "get(": - title = request.args.get('title', None,type=str) -File: flask-rdv/app.py - > reaches line 120, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(flash='Rdv '%s' added between %s and %s' % (title, start, end)) - -Vulnerability 4: -File: flask-rdv/app.py - > User input at line 110, trigger word "get(": - start = datetime.strptime(request.args.get('start', None,type=str), '%a, %d %b %Y %H:%M:%S %Z') -File: flask-rdv/app.py - > reaches line 120, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(flash='Rdv '%s' added between %s and %s' % (title, start, end)) - -Vulnerability 5: -File: flask-rdv/app.py - > User input at line 111, trigger word "get(": - end = datetime.strptime(request.args.get('end', None,type=str), '%a, %d %b %Y %H:%M:%S %Z') -File: flask-rdv/app.py - > reaches line 120, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(flash='Rdv '%s' added between %s and %s' % (title, start, end)) - - - -kholidfu/flask_init -https://github.com/kholidfu/flask_init -Entry file: None -Scanned: 2016-10-19 12:49:16.265620 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kholidfu/flask_init. - -code-first-cambridge/flask-1 -https://github.com/code-first-cambridge/flask-1 -Entry file: flask-1/hello1.py -Scanned: 2016-10-19 12:49:18.074758 -No vulnerabilities found. - - -benhagen/flask-sessionable -https://github.com/benhagen/flask-sessionable -Entry file: flask-sessionable/example/app.py -Scanned: 2016-10-19 12:49:19.468380 -No vulnerabilities found. - - -alexfehr15/Flask_Tutorial -https://github.com/alexfehr15/Flask_Tutorial -Entry file: Flask_Tutorial/flaskr.py -Scanned: 2016-10-19 12:49:20.191289 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Tutorial/venv/lib/python2.7/genericpath.py - -HellerCommaA/flask-template -https://github.com/HellerCommaA/flask-template -Entry file: None -Scanned: 2016-10-19 12:49:20.686727 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/HellerCommaA/flask-template. - -achivil/flask_practice -https://github.com/achivil/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-19 12:49:21.212977 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vishwin/flask-wikitongues -https://github.com/vishwin/flask-wikitongues -Entry file: None -Scanned: 2016-10-19 12:49:22.734379 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vishwin/flask-wikitongues. - -anxst/flask_test -https://github.com/anxst/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 12:49:23.358318 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ko/sandbox-flask -https://github.com/ko/sandbox-flask -Entry file: sandbox-flask/flask-httpauth/main.py -Scanned: 2016-10-19 12:49:26.802105 -Vulnerability 1: -File: sandbox-flask/flask-httpauth/main.py - > User input at line 73, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: sandbox-flask/flask-httpauth/main.py - > Line 85: user = User(username=username) -File: sandbox-flask/flask-httpauth/main.py - > reaches line 90, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201) - - - -chizel/try_flask -https://github.com/chizel/try_flask -Entry file: try_flask/my_site/__init__.py -Scanned: 2016-10-19 12:49:29.485412 -No vulnerabilities found. - - -Casagrill/flask-blog -https://github.com/Casagrill/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 12:49:30.062429 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -ami-GS/Flask_practice -https://github.com/ami-GS/Flask_practice -Entry file: Flask_practice/minitwit/minitwit.py -Scanned: 2016-10-19 12:49:33.676883 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alfg/flask-conditional -https://github.com/alfg/flask-conditional -Entry file: flask-conditional/test_conditional.py -Scanned: 2016-10-19 12:49:35.985930 -No vulnerabilities found. - - -gpapakyriakopoulos/PyFlask -https://github.com/gpapakyriakopoulos/PyFlask -Entry file: PyFlask/app.py -Scanned: 2016-10-19 12:49:40.625589 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: PyFlask/venv/lib/python2.7/genericpath.py - -lanius/flask-mime -https://github.com/lanius/flask-mime -Entry file: flask-mime/test_mime.py -Scanned: 2016-10-19 12:49:42.966930 -No vulnerabilities found. - - -clarkduvall/fleroku -https://github.com/clarkduvall/fleroku -Entry file: None -Scanned: 2016-10-19 12:49:47.396036 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/clarkduvall/fleroku. - -davenportw15/FlaskPostBeta -https://github.com/davenportw15/FlaskPostBeta -Entry file: FlaskPostBeta/application.py -Scanned: 2016-10-19 12:49:48.833465 -No vulnerabilities found. - - -vladkrylov/FlaskLoginTest -https://github.com/vladkrylov/FlaskLoginTest -Entry file: FlaskLoginTest/app/__init__.py -Scanned: 2016-10-19 12:49:50.693067 -Vulnerability 1: -File: FlaskLoginTest/app/views.py - > User input at line 45, trigger word ".data": - userName = form.openid.data -File: FlaskLoginTest/app/views.py - > reaches line 47, trigger word "filter(": - user = User.query.filter(User.name == userName).first() - - - -cliffmin/flask_bootstrap_boiler -https://github.com/cliffmin/flask_bootstrap_boiler -Entry file: None -Scanned: 2016-10-19 12:49:54.936344 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yijingping/flask-memcache-cloud -https://github.com/yijingping/flask-memcache-cloud -Entry file: flask-memcache-cloud/memcache_cloud/__init__.py -Scanned: 2016-10-19 12:49:56.662517 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cevaris/flask-hk5 -https://github.com/cevaris/flask-hk5 -Entry file: flask-hk5/mongoFlask/__init__.py -Scanned: 2016-10-19 12:50:03.067358 -Vulnerability 1: -File: flask-hk5/mongoFlask/views.py - > User input at line 13, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: flask-hk5/mongoFlask/views.py - > Line 17: articles = Article.objects(body__contains=query) - File: flask-hk5/mongoFlask/views.py - > Line 19: articles = [] -File: flask-hk5/mongoFlask/views.py - > reaches line 22, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('articles/index.html',articles=articles[count]) - -Vulnerability 2: -File: flask-hk5/mongoFlask/views.py - > User input at line 14, trigger word "get(": - count = int(request.args.get('n', 0)) -Reassigned in: - File: flask-hk5/mongoFlask/views.py - > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('articles/index.html',articles=articles) -File: flask-hk5/mongoFlask/views.py - > reaches line 22, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('articles/index.html',articles=articles[count]) - -Vulnerability 3: -File: flask-hk5/mongoFlask/views.py - > User input at line 13, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: flask-hk5/mongoFlask/views.py - > Line 17: articles = Article.objects(body__contains=query) - File: flask-hk5/mongoFlask/views.py - > Line 19: articles = [] -File: flask-hk5/mongoFlask/views.py - > reaches line 24, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('articles/index.html',articles=articles) - -Vulnerability 4: -File: flask-hk5/mongoFlask/views.py - > User input at line 41, trigger word "form[": - body = request.form['body'] -Reassigned in: - File: flask-hk5/mongoFlask/views.py - > Line 45: article = Article(body=body, author=author, title=title, slug=slug) - File: flask-hk5/mongoFlask/views.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('articles/create.html') -File: flask-hk5/mongoFlask/views.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('articles/show.html',article=article) - -Vulnerability 5: -File: flask-hk5/mongoFlask/views.py - > User input at line 42, trigger word "form[": - author = request.form['body'] -Reassigned in: - File: flask-hk5/mongoFlask/views.py - > Line 45: article = Article(body=body, author=author, title=title, slug=slug) - File: flask-hk5/mongoFlask/views.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('articles/create.html') -File: flask-hk5/mongoFlask/views.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('articles/show.html',article=article) - -Vulnerability 6: -File: flask-hk5/mongoFlask/views.py - > User input at line 43, trigger word "form[": - title = request.form['body'] -Reassigned in: - File: flask-hk5/mongoFlask/views.py - > Line 44: slug = slugify(title) - File: flask-hk5/mongoFlask/views.py - > Line 45: article = Article(body=body, author=author, title=title, slug=slug) - File: flask-hk5/mongoFlask/views.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('articles/create.html') -File: flask-hk5/mongoFlask/views.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('articles/show.html',article=article) - - - -camall/Sli.ba-Flask -https://github.com/camall/Sli.ba-Flask -Entry file: None -Scanned: 2016-10-19 12:50:06.681396 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/camall/Sli.ba-Flask. - -Gentle/gw2flask -https://github.com/Gentle/gw2flask -Entry file: gw2flask/app.py -Scanned: 2016-10-19 12:50:11.500789 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SparrowJang/flask-babel-example -https://github.com/SparrowJang/flask-babel-example -Entry file: flask-babel-example/app.py -Scanned: 2016-10-19 12:50:12.996452 -No vulnerabilities found. - - -rameshwor/flask-mini-blog -https://github.com/rameshwor/flask-mini-blog -Entry file: None -Scanned: 2016-10-19 12:50:14.286378 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rameshwor/flask-mini-blog. - -chiwanpark/flask-gae-skeleton -https://github.com/chiwanpark/flask-gae-skeleton -Entry file: flask-gae-skeleton/gae/main.py -Scanned: 2016-10-19 12:50:14.795003 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -guyjacks/flask-blueprints-simple-tutorial -https://github.com/guyjacks/flask-blueprints-simple-tutorial -Entry file: flask-blueprints-simple-tutorial/app.py -Scanned: 2016-10-19 12:50:16.092020 -No vulnerabilities found. - - -Yves-T/python_microblog -https://github.com/Yves-T/python_microblog -Entry file: None -Scanned: 2016-10-19 12:50:21.628635 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -juliomenendez/heroku-vagrant-flask-postgres-app -https://github.com/juliomenendez/heroku-vagrant-flask-postgres-app -Entry file: heroku-vagrant-flask-postgres-app/app.py -Scanned: 2016-10-19 12:50:22.938799 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wiliamsouza/cars -https://github.com/wiliamsouza/cars -Entry file: cars/cars/__init__.py -Scanned: 2016-10-19 12:50:24.585792 -Vulnerability 1: -File: cars/cars/controllers.py - > User input at line 77, trigger word "get(": - car = Car.objects.get(id=id) -Reassigned in: - File: cars/cars/controllers.py - > Line 78: form = CarForm(obj=car) - File: cars/cars/controllers.py - > Line 88: car.manufacturer = form.manufacturer.data - File: cars/cars/controllers.py - > Line 89: car.model = form.model.data - File: cars/cars/controllers.py - > Line 90: car.year = form.year.data -File: cars/cars/controllers.py - > reaches line 93, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(car.edit_absolute_url()) - -Vulnerability 2: -File: cars/cars/controllers.py - > User input at line 77, trigger word "get(": - car = Car.objects.get(id=id) -Reassigned in: - File: cars/cars/controllers.py - > Line 78: form = CarForm(obj=car) - File: cars/cars/controllers.py - > Line 88: car.manufacturer = form.manufacturer.data - File: cars/cars/controllers.py - > Line 89: car.model = form.model.data - File: cars/cars/controllers.py - > Line 90: car.year = form.year.data -File: cars/cars/controllers.py - > reaches line 95, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('cars.html',form=form, url=url) - - - -michaelew/ducking-octo-bear -https://github.com/michaelew/ducking-octo-bear -Entry file: ducking-octo-bear/app.py -Scanned: 2016-10-19 12:50:26.003114 -No vulnerabilities found. - - -volnt/yabuf -https://github.com/volnt/yabuf -Entry file: yabuf/app/main.py -Scanned: 2016-10-19 12:50:27.826574 -No vulnerabilities found. - - -michaelew/psychic-hipster -https://github.com/michaelew/psychic-hipster -Entry file: None -Scanned: 2016-10-19 12:50:33.234276 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dantezhu/kola -https://github.com/dantezhu/kola -Entry file: kola/kola/bin/kola_http.py -Scanned: 2016-10-19 12:50:34.730938 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ytjohn/clubflask -https://github.com/ytjohn/clubflask -Entry file: clubflask/clubflask/app.py -Scanned: 2016-10-19 12:50:36.971435 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -artran/MyMdb -https://github.com/artran/MyMdb -Entry file: MyMdb/application.py -Scanned: 2016-10-19 12:50:38.550110 -Vulnerability 1: -File: MyMdb/adaptors/controllers/user_controller.py - > User input at line 54, trigger word "get(": - followed = user_repo.get_by_username(request.args.get('name')) -File: MyMdb/adaptors/controllers/user_controller.py - > reaches line 56, trigger word "flash(": - flash('You are now following %s' % followed.username, 'success') - -Vulnerability 2: -File: MyMdb/adaptors/controllers/user_controller.py - > User input at line 45, trigger word "get(": - user_repo = current_app.config.get('user-repo') -File: MyMdb/adaptors/controllers/user_controller.py - > reaches line 60, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('follow.html',users=user_repo.get_all(), following=[f.username for f in following]) - -Vulnerability 3: -File: MyMdb/adaptors/controllers/user_controller.py - > User input at line 47, trigger word "get(": - follower = session.get('user', '') -Reassigned in: - File: MyMdb/adaptors/controllers/user_controller.py - > Line 48: follower = user_repo.get_by_username(follower) - File: MyMdb/adaptors/controllers/user_controller.py - > Line 59: following = follower_repo.get_following(follower) - File: MyMdb/adaptors/controllers/user_controller.py - > Line 50: ret_MAYBE_FUNCTION_NAME = redirect(url_for('IndexView:index')) - File: MyMdb/adaptors/controllers/user_controller.py - > Line 57: ret_MAYBE_FUNCTION_NAME = redirect(url_for('UserView:follow')) -File: MyMdb/adaptors/controllers/user_controller.py - > reaches line 60, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('follow.html',users=user_repo.get_all(), following=[f.username for f in following]) - -Vulnerability 4: -File: MyMdb/adaptors/controllers/movies_controller.py - > User input at line 11, trigger word "get(": - movies_repo = current_app.config.get('movies-repo') -File: MyMdb/adaptors/controllers/movies_controller.py - > reaches line 12, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('movies.html',movies=movies_repo.get_all().values()) - - - -scjackson/twiceurl -https://github.com/scjackson/twiceurl -Entry file: twiceurl/twiceurl.py -Scanned: 2016-10-19 12:50:39.963068 -Vulnerability 1: -File: twiceurl/twiceurl.py - > User input at line 86, trigger word "form[": - url_request = request.form['full_url'] -Reassigned in: - File: twiceurl/twiceurl.py - > Line 89: url_request = urlparse.urlparse(url_request,scheme='http') - File: twiceurl/twiceurl.py - > Line 97: url_request = url_request.geturl() - File: twiceurl/twiceurl.py - > Line 100: result = look_up_by_url('https://github.com/',%20url_request) - File: twiceurl/twiceurl.py - > Line 119: ret_MAYBE_FUNCTION_NAME = render_template('new_url.html',full_url=request.form['full_url'], server_error=True) - File: twiceurl/twiceurl.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('url_information',short_url=convert_to_base62(valid_id))) - File: twiceurl/twiceurl.py - > Line 91: ret_MAYBE_FUNCTION_NAME = render_template('new_url.html',full_url=request.form['full_url'], bad_format=True) -File: twiceurl/twiceurl.py - > reaches line 102, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('url_information',short_url=convert_to_base62(result[0]['id']))) - -Vulnerability 2: -File: twiceurl/twiceurl.py - > User input at line 86, trigger word "form[": - url_request = request.form['full_url'] -Reassigned in: - File: twiceurl/twiceurl.py - > Line 89: url_request = urlparse.urlparse(url_request,scheme='http') - File: twiceurl/twiceurl.py - > Line 97: url_request = url_request.geturl() - File: twiceurl/twiceurl.py - > Line 100: result = look_up_by_url('https://github.com/',%20url_request) - File: twiceurl/twiceurl.py - > Line 119: ret_MAYBE_FUNCTION_NAME = render_template('new_url.html',full_url=request.form['full_url'], server_error=True) - File: twiceurl/twiceurl.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('url_information',short_url=convert_to_base62(valid_id))) - File: twiceurl/twiceurl.py - > Line 91: ret_MAYBE_FUNCTION_NAME = render_template('new_url.html',full_url=request.form['full_url'], bad_format=True) -File: twiceurl/twiceurl.py - > reaches line 102, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('url_information',short_url=convert_to_base62(result[0]['id']))) - - - -fizyk20/beelzebuBB -https://github.com/fizyk20/beelzebuBB -Entry file: beelzebuBB/beelzebubb/__init__.py -Scanned: 2016-10-19 12:50:41.852479 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -ericdoi/LittleLibrarian -https://github.com/ericdoi/LittleLibrarian -Entry file: LittleLibrarian/main.py -Scanned: 2016-10-19 12:50:43.315582 -No vulnerabilities found. - - -snirp/flatfreeze -https://github.com/snirp/flatfreeze -Entry file: flatfreeze/app.py -Scanned: 2016-10-19 12:50:49.621513 -No vulnerabilities found. - - -okaram/learnmongo -https://github.com/okaram/learnmongo -Entry file: learnmongo/FlaskApplication/__init__.py -Scanned: 2016-10-19 12:50:51.872978 -Vulnerability 1: -File: learnmongo/FlaskApplication/__init__.py - > User input at line 19, trigger word "get(": - obj = client.okaram.test.find('_id'request.args.get('id')) -Reassigned in: - File: learnmongo/FlaskApplication/__init__.py - > Line 20: dict = 'content'obj -File: learnmongo/FlaskApplication/__init__.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',title='Welcome', text=dict) - - - -jashmead/mapsndata -https://github.com/jashmead/mapsndata -Entry file: mapsndata/mapsndata.py -Scanned: 2016-10-19 12:50:53.894314 -No vulnerabilities found. - - -adionditsak/Newiki -https://github.com/adionditsak/Newiki -Entry file: Newiki/app/__init__.py -Scanned: 2016-10-19 12:50:57.693953 -No vulnerabilities found. - - -opyate/soapbox -https://github.com/opyate/soapbox -Entry file: soapbox/soapbox/__init__.py -Scanned: 2016-10-19 12:51:03.958366 -No vulnerabilities found. - - -lingthio/Flask-User -https://github.com/lingthio/Flask-User -Entry file: Flask-User/example_apps/multi_email_app.py -Scanned: 2016-10-19 12:51:10.194774 -Vulnerability 1: -File: Flask-User/example_apps/user_profile_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/user_profile_app.py - > Line 90: db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile) - File: Flask-User/example_apps/user_profile_app.py - > Line 91: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_profile_app.py - > reaches line 94, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 2: -File: Flask-User/example_apps/user_profile_app.py - > User input at line 90, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile) -Reassigned in: - File: Flask-User/example_apps/user_profile_app.py - > Line 91: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_profile_app.py - > reaches line 94, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 3: -File: Flask-User/example_apps/roles_required_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/roles_required_app.py - > Line 83: db_adapter = SQLAlchemyAdapter(db, User) - File: Flask-User/example_apps/roles_required_app.py - > Line 84: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/roles_required_app.py - > reaches line 87, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 4: -File: Flask-User/example_apps/roles_required_app.py - > User input at line 83, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User) -Reassigned in: - File: Flask-User/example_apps/roles_required_app.py - > Line 84: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/roles_required_app.py - > reaches line 87, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 5: -File: Flask-User/example_apps/user_auth_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/user_auth_app.py - > Line 92: db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth) - File: Flask-User/example_apps/user_auth_app.py - > Line 93: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_auth_app.py - > reaches line 96, trigger word "filter(": - if not UserAuth.query.filter(UserAuth.username == 'user007').first(): - -Vulnerability 6: -File: Flask-User/example_apps/user_auth_app.py - > User input at line 92, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth) -Reassigned in: - File: Flask-User/example_apps/user_auth_app.py - > Line 93: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_auth_app.py - > reaches line 96, trigger word "filter(": - if not UserAuth.query.filter(UserAuth.username == 'user007').first(): - - - -citruspi/Flask-Analytics -https://github.com/citruspi/Flask-Analytics -Entry file: Flask-Analytics/test/app.py -Scanned: 2016-10-19 12:51:12.859982 -No vulnerabilities found. - - -adambard/flask-skeleton -https://github.com/adambard/flask-skeleton -Entry file: None -Scanned: 2016-10-19 12:51:13.382385 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/adambard/flask-skeleton. - -naushadzaman/heroku-flask-sklearn -https://github.com/naushadzaman/heroku-flask-sklearn -Entry file: heroku-flask-sklearn/hello.py -Scanned: 2016-10-19 12:51:15.783647 -No vulnerabilities found. - - -digismack/si4703-flask-web-server -https://github.com/digismack/si4703-flask-web-server -Entry file: None -Scanned: 2016-10-19 12:51:18.111802 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/digismack/si4703-flask-web-server. - -nhayes-roth/FlaskApp -https://github.com/nhayes-roth/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-19 12:51:18.745392 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -erictempleton1/FlaskTemplate -https://github.com/erictempleton1/FlaskTemplate -Entry file: FlaskTemplate/app/__init__.py -Scanned: 2016-10-19 12:51:24.390138 -No vulnerabilities found. - - -valdelmeglio/flaskAPIs -https://github.com/valdelmeglio/flaskAPIs -Entry file: flaskAPIs/flaskApi.py -Scanned: 2016-10-19 12:51:25.896888 -No vulnerabilities found. - - -MarioZX/flask_thi -https://github.com/MarioZX/flask_thi -Entry file: flask_thi/app/__init__.py -Scanned: 2016-10-19 12:51:27.578153 -Vulnerability 1: -File: flask_thi/app/views.py - > User input at line 93, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: flask_thi/app/views.py - > Line 95: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_thi/app/views.py - > reaches line 99, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(page)) - -Vulnerability 2: -File: flask_thi/app/views.py - > User input at line 93, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: flask_thi/app/views.py - > Line 95: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_thi/app/views.py - > reaches line 99, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(page)) - -Vulnerability 3: -File: flask_thi/app/views.py - > User input at line 93, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: flask_thi/app/views.py - > Line 95: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_thi/app/views.py - > reaches line 105, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(page)) - -Vulnerability 4: -File: flask_thi/app/views.py - > User input at line 93, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: flask_thi/app/views.py - > Line 95: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_thi/app/views.py - > reaches line 105, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(page)) - -Vulnerability 5: -File: flask_thi/app/views.py - > User input at line 93, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: flask_thi/app/views.py - > Line 95: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_thi/app/views.py - > reaches line 107, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',error=error, page=page) - -Vulnerability 6: -File: flask_thi/app/views.py - > User input at line 120, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: flask_thi/app/views.py - > Line 132: ret_MAYBE_FUNCTION_NAME = render_template('admin/index.html') - File: flask_thi/app/views.py - > Line 122: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_thi/app/views.py - > reaches line 124, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(page)) - -Vulnerability 7: -File: flask_thi/app/views.py - > User input at line 120, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: flask_thi/app/views.py - > Line 132: ret_MAYBE_FUNCTION_NAME = render_template('admin/index.html') - File: flask_thi/app/views.py - > Line 122: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_thi/app/views.py - > reaches line 124, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(page)) - -Vulnerability 8: -File: flask_thi/app/views.py - > User input at line 120, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: flask_thi/app/views.py - > Line 132: ret_MAYBE_FUNCTION_NAME = render_template('admin/index.html') - File: flask_thi/app/views.py - > Line 122: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_thi/app/views.py - > reaches line 129, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(page)) - -Vulnerability 9: -File: flask_thi/app/views.py - > User input at line 120, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: flask_thi/app/views.py - > Line 132: ret_MAYBE_FUNCTION_NAME = render_template('admin/index.html') - File: flask_thi/app/views.py - > Line 122: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_thi/app/views.py - > reaches line 129, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(page)) - - - -eslamio/flask_tutorials -https://github.com/eslamio/flask_tutorials -Entry file: None -Scanned: 2016-10-19 12:51:28.815849 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/eslamio/flask_tutorials. - -kholidfu/flask_init -https://github.com/kholidfu/flask_init -Entry file: None -Scanned: 2016-10-19 12:51:30.319142 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kholidfu/flask_init. - -ericzhong/flask_demo -https://github.com/ericzhong/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-19 12:51:34.841337 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -code-first-cambridge/flask-2 -https://github.com/code-first-cambridge/flask-2 -Entry file: flask-2/guthub6.py -Scanned: 2016-10-19 12:51:38.057893 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aert/flask-microblog -https://github.com/aert/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:51:38.563171 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Igorolivei/flask_bar -https://github.com/Igorolivei/flask_bar -Entry file: flask_bar/app.py -Scanned: 2016-10-19 12:51:41.094912 -No vulnerabilities found. - - -code-first-cambridge/flask-1 -https://github.com/code-first-cambridge/flask-1 -Entry file: flask-1/hello1.py -Scanned: 2016-10-19 12:51:42.858948 -No vulnerabilities found. - - -ldcicconi/flask-strap -https://github.com/ldcicconi/flask-strap -Entry file: flask-strap/app/__init__.py -Scanned: 2016-10-19 12:51:44.954523 -No vulnerabilities found. - - -j3rrywan9/flask-study -https://github.com/j3rrywan9/flask-study -Entry file: flask-study/hello.py -Scanned: 2016-10-19 12:51:46.299573 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -LeanThis/hola-flask -https://github.com/LeanThis/hola-flask -Entry file: hola-flask/app.py -Scanned: 2016-10-19 12:51:50.622524 -No vulnerabilities found. - - -cevaris/flask-dating -https://github.com/cevaris/flask-dating -Entry file: flask-dating/dating/__init__.py -Scanned: 2016-10-19 12:51:52.030677 -Vulnerability 1: -File: flask-dating/dating/views.py - > User input at line 13, trigger word "get(": - name = request.args.get('name', '') -Reassigned in: - File: flask-dating/dating/views.py - > Line 27: pets = [] - File: flask-dating/dating/views.py - > Line 29: form_data = 'name''pet_type''count'namepet_typecount -File: flask-dating/dating/views.py - > reaches line 25, trigger word "filter(": - pets = Pets.objects.filter(name__contains=name, pet_type__contains=pet_type) - -Vulnerability 2: -File: flask-dating/dating/views.py - > User input at line 15, trigger word "get(": - pet_type = request.args.get('pet_type', '') -Reassigned in: - File: flask-dating/dating/views.py - > Line 27: pets = [] - File: flask-dating/dating/views.py - > Line 29: form_data = 'name''pet_type''count'namepet_typecount -File: flask-dating/dating/views.py - > reaches line 25, trigger word "filter(": - pets = Pets.objects.filter(name__contains=name, pet_type__contains=pet_type) - -Vulnerability 3: -File: flask-dating/dating/views.py - > User input at line 13, trigger word "get(": - name = request.args.get('name', '') -Reassigned in: - File: flask-dating/dating/views.py - > Line 27: pets = [] - File: flask-dating/dating/views.py - > Line 29: form_data = 'name''pet_type''count'namepet_typecount -File: flask-dating/dating/views.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dating/pets.html',pets=pets[count], data=form_data) - -Vulnerability 4: -File: flask-dating/dating/views.py - > User input at line 15, trigger word "get(": - pet_type = request.args.get('pet_type', '') -Reassigned in: - File: flask-dating/dating/views.py - > Line 27: pets = [] - File: flask-dating/dating/views.py - > Line 29: form_data = 'name''pet_type''count'namepet_typecount -File: flask-dating/dating/views.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dating/pets.html',pets=pets[count], data=form_data) - -Vulnerability 5: -File: flask-dating/dating/views.py - > User input at line 20, trigger word "get(": - count = int(request.args.get('n').encode('utf8')) or Pets.objects.count() -Reassigned in: - File: flask-dating/dating/views.py - > Line 18: count = Pets.objects.count() - File: flask-dating/dating/views.py - > Line 29: form_data = 'name''pet_type''count'namepet_typecount -File: flask-dating/dating/views.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dating/pets.html',pets=pets[count], data=form_data) - -Vulnerability 6: -File: flask-dating/dating/views.py - > User input at line 13, trigger word "get(": - name = request.args.get('name', '') -Reassigned in: - File: flask-dating/dating/views.py - > Line 27: pets = [] - File: flask-dating/dating/views.py - > Line 29: form_data = 'name''pet_type''count'namepet_typecount -File: flask-dating/dating/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dating/pets.html',pets=pets, data=form_data) - -Vulnerability 7: -File: flask-dating/dating/views.py - > User input at line 15, trigger word "get(": - pet_type = request.args.get('pet_type', '') -Reassigned in: - File: flask-dating/dating/views.py - > Line 27: pets = [] - File: flask-dating/dating/views.py - > Line 29: form_data = 'name''pet_type''count'namepet_typecount -File: flask-dating/dating/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dating/pets.html',pets=pets, data=form_data) - -Vulnerability 8: -File: flask-dating/dating/views.py - > User input at line 20, trigger word "get(": - count = int(request.args.get('n').encode('utf8')) or Pets.objects.count() -Reassigned in: - File: flask-dating/dating/views.py - > Line 18: count = Pets.objects.count() - File: flask-dating/dating/views.py - > Line 29: form_data = 'name''pet_type''count'namepet_typecount -File: flask-dating/dating/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dating/pets.html',pets=pets, data=form_data) - - - -bceskavich/flask-foundation -https://github.com/bceskavich/flask-foundation -Entry file: flask-foundation/app/__init__.py -Scanned: 2016-10-19 12:51:54.354461 -No vulnerabilities found. - - -lanius/flask-mime -https://github.com/lanius/flask-mime -Entry file: flask-mime/test_mime.py -Scanned: 2016-10-19 12:51:56.663288 -No vulnerabilities found. - - -alyonajun/flask_application -https://github.com/alyonajun/flask_application -Entry file: flask_application/application/__init__.py -Scanned: 2016-10-19 12:51:59.095870 -No vulnerabilities found. - - -thermosym/web-test -https://github.com/thermosym/web-test -Entry file: web-test/app/__init__.py -Scanned: 2016-10-19 12:52:00.384034 -No vulnerabilities found. - - -marianatuma/helloflask -https://github.com/marianatuma/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 12:52:02.913056 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -ssinha3/FlaskWebService -https://github.com/ssinha3/FlaskWebService -Entry file: FlaskWebService/flaskWebServiceTest.py -Scanned: 2016-10-19 12:52:05.202958 -No vulnerabilities found. - - -orangain/example-github-oauth-flask -https://github.com/orangain/example-github-oauth-flask -Entry file: example-github-oauth-flask/github_oauth.py -Scanned: 2016-10-19 12:52:07.816355 -No vulnerabilities found. - - -bradcypert/PyComoFlaskDemo -https://github.com/bradcypert/PyComoFlaskDemo -Entry file: PyComoFlaskDemo/FlaskApi.py -Scanned: 2016-10-19 12:52:13.620325 -Vulnerability 1: -File: PyComoFlaskDemo/FlaskApi.py - > User input at line 41, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: PyComoFlaskDemo/FlaskApi.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -murphsp1/WebDevelopmentWithFlask -https://github.com/murphsp1/WebDevelopmentWithFlask -Entry file: WebDevelopmentWithFlask/mongo/mongo.py -Scanned: 2016-10-19 12:52:16.745237 -No vulnerabilities found. - - -ahh2131/pebmo-authorization-flask -https://github.com/ahh2131/pebmo-authorization-flask -Entry file: pebmo-authorization-flask/__init__.py -Scanned: 2016-10-19 12:52:18.129507 -Vulnerability 1: -File: pebmo-authorization-flask/pebmo.py - > User input at line 15, trigger word "get(": - access_token = request.args.get('access_token') -File: pebmo-authorization-flask/pebmo.py - > reaches line 16, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',access_token=access_token) - - - -matrix10657/flask-alchemy-api -https://github.com/matrix10657/flask-alchemy-api -Entry file: flask-alchemy-api/tests/__init__.py -Scanned: 2016-10-19 12:52:20.568120 -No vulnerabilities found. - - -periclesmacedo/flask_first_blog -https://github.com/periclesmacedo/flask_first_blog -Entry file: flask_first_blog/flaskr.py -Scanned: 2016-10-19 12:52:26.016077 -No vulnerabilities found. - - -erictempleton1/TodoList -https://github.com/erictempleton1/TodoList -Entry file: TodoList/todo/__init__.py -Scanned: 2016-10-19 12:52:27.791034 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -manugarri/d3_map -https://github.com/manugarri/d3_map -Entry file: d3_map/app/__init__.py -Scanned: 2016-10-19 12:52:30.044654 -No vulnerabilities found. - - -cevaris/music-ch6 -https://github.com/cevaris/music-ch6 -Entry file: music-ch6/music/__init__.py -Scanned: 2016-10-19 12:52:32.565596 -No vulnerabilities found. - - -melissayu/Url-Shortener -https://github.com/melissayu/Url-Shortener -Entry file: None -Scanned: 2016-10-19 12:52:38.554130 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -scjackson/twiceurl -https://github.com/scjackson/twiceurl -Entry file: twiceurl/twiceurl.py -Scanned: 2016-10-19 12:52:39.923784 -Vulnerability 1: -File: twiceurl/twiceurl.py - > User input at line 86, trigger word "form[": - url_request = request.form['full_url'] -Reassigned in: - File: twiceurl/twiceurl.py - > Line 89: url_request = urlparse.urlparse(url_request,scheme='http') - File: twiceurl/twiceurl.py - > Line 97: url_request = url_request.geturl() - File: twiceurl/twiceurl.py - > Line 100: result = look_up_by_url('https://github.com/',%20url_request) - File: twiceurl/twiceurl.py - > Line 119: ret_MAYBE_FUNCTION_NAME = render_template('new_url.html',full_url=request.form['full_url'], server_error=True) - File: twiceurl/twiceurl.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('url_information',short_url=convert_to_base62(valid_id))) - File: twiceurl/twiceurl.py - > Line 91: ret_MAYBE_FUNCTION_NAME = render_template('new_url.html',full_url=request.form['full_url'], bad_format=True) -File: twiceurl/twiceurl.py - > reaches line 102, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('url_information',short_url=convert_to_base62(result[0]['id']))) - -Vulnerability 2: -File: twiceurl/twiceurl.py - > User input at line 86, trigger word "form[": - url_request = request.form['full_url'] -Reassigned in: - File: twiceurl/twiceurl.py - > Line 89: url_request = urlparse.urlparse(url_request,scheme='http') - File: twiceurl/twiceurl.py - > Line 97: url_request = url_request.geturl() - File: twiceurl/twiceurl.py - > Line 100: result = look_up_by_url('https://github.com/',%20url_request) - File: twiceurl/twiceurl.py - > Line 119: ret_MAYBE_FUNCTION_NAME = render_template('new_url.html',full_url=request.form['full_url'], server_error=True) - File: twiceurl/twiceurl.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('url_information',short_url=convert_to_base62(valid_id))) - File: twiceurl/twiceurl.py - > Line 91: ret_MAYBE_FUNCTION_NAME = render_template('new_url.html',full_url=request.form['full_url'], bad_format=True) -File: twiceurl/twiceurl.py - > reaches line 102, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('url_information',short_url=convert_to_base62(result[0]['id']))) - - - -fizyk20/beelzebuBB -https://github.com/fizyk20/beelzebuBB -Entry file: beelzebuBB/beelzebubb/__init__.py -Scanned: 2016-10-19 12:52:40.931525 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -bluecliff/python-blog -https://github.com/bluecliff/python-blog -Entry file: python-blog/blog/__init__.py -Scanned: 2016-10-19 12:52:42.703921 -No vulnerabilities found. - - -zephod/pio -https://github.com/zephod/pio -Entry file: None -Scanned: 2016-10-19 12:52:44.251962 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zephod/pio. - -okaram/learnmongo -https://github.com/okaram/learnmongo -Entry file: learnmongo/FlaskApplication/__init__.py -Scanned: 2016-10-19 12:52:46.597488 -Vulnerability 1: -File: learnmongo/FlaskApplication/__init__.py - > User input at line 19, trigger word "get(": - obj = client.okaram.test.find('_id'request.args.get('id')) -Reassigned in: - File: learnmongo/FlaskApplication/__init__.py - > Line 20: dict = 'content'obj -File: learnmongo/FlaskApplication/__init__.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',title='Welcome', text=dict) - - - -jashmead/mapsndata -https://github.com/jashmead/mapsndata -Entry file: mapsndata/mapsndata.py -Scanned: 2016-10-19 12:52:49.147782 -No vulnerabilities found. - - -patadune/pyblogr -https://github.com/patadune/pyblogr -Entry file: pyblogr/pyblogr/__init__.py -Scanned: 2016-10-19 12:52:50.558939 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -VollMich/vdrcontrol -https://github.com/VollMich/vdrcontrol -Entry file: vdrcontrol/server.py -Scanned: 2016-10-19 12:52:51.850449 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikejamesthompson/magic-bins -https://github.com/mikejamesthompson/magic-bins -Entry file: magic-bins/app/__init__.py -Scanned: 2016-10-19 12:52:53.535951 -Vulnerability 1: -File: magic-bins/app/views.py - > User input at line 32, trigger word "get(": - search_string = form.data.get('road') -Reassigned in: - File: magic-bins/app/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: magic-bins/app/views.py - > reaches line 33, trigger word "filter(": - roads = Location.query.filter(Location.name.ilike('%' + search_string + '%')).all() - -Vulnerability 2: -File: magic-bins/app/views.py - > User input at line 32, trigger word ".data": - search_string = form.data.get('road') -Reassigned in: - File: magic-bins/app/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: magic-bins/app/views.py - > reaches line 33, trigger word "filter(": - roads = Location.query.filter(Location.name.ilike('%' + search_string + '%')).all() - -Vulnerability 3: -File: magic-bins/app/views.py - > User input at line 32, trigger word "get(": - search_string = form.data.get('road') -Reassigned in: - File: magic-bins/app/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: magic-bins/app/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',form=form, roads=roads, title='Finding bin collections for roads matching ' + search_string, body='search') - -Vulnerability 4: -File: magic-bins/app/views.py - > User input at line 32, trigger word ".data": - search_string = form.data.get('road') -Reassigned in: - File: magic-bins/app/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: magic-bins/app/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',form=form, roads=roads, title='Finding bin collections for roads matching ' + search_string, body='search') - - - -adionditsak/Newiki -https://github.com/adionditsak/Newiki -Entry file: Newiki/app/__init__.py -Scanned: 2016-10-19 12:52:55.825031 -No vulnerabilities found. - - -CLOUGH/info3180-lab4 -https://github.com/CLOUGH/info3180-lab4 -Entry file: info3180-lab4/lib/flask/sessions.py -Scanned: 2016-10-19 12:52:59.156968 -No vulnerabilities found. - - -Eleonore9/MyNotes -https://github.com/Eleonore9/MyNotes -Entry file: MyNotes/__init__.py -Scanned: 2016-10-19 12:53:02.449569 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: MyNotes/tumblelog/lib/python2.7/genericpath.py - -KyleJamesWalker/brunch-with-friends -https://github.com/KyleJamesWalker/brunch-with-friends -Entry file: brunch-with-friends/api/__init__.py -Scanned: 2016-10-19 12:53:03.841534 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -FRC-Team-3140/north-american-happiness -https://github.com/FRC-Team-3140/north-american-happiness -Entry file: north-american-happiness/routes.py -Scanned: 2016-10-19 12:53:08.215267 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -OzTamir/AlienHot -https://github.com/OzTamir/AlienHot -Entry file: AlienHot/routes.py -Scanned: 2016-10-19 12:53:10.758265 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -I-am-Gabi/getting-started-with-python-heroku -https://github.com/I-am-Gabi/getting-started-with-python-heroku -Entry file: getting-started-with-python-heroku/hello.py -Scanned: 2016-10-19 12:53:12.141817 -No vulnerabilities found. - - -miguelgrinberg/flask-pycon2014 -https://github.com/miguelgrinberg/flask-pycon2014 -Entry file: flask-pycon2014/app/__init__.py -Scanned: 2016-10-19 12:53:14.899213 -Vulnerability 1: -File: flask-pycon2014/app/talks/routes.py - > User input at line 13, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-pycon2014/app/talks/routes.py - > Line 14: pagination = Talk.query.order_by(Talk.date.desc()).paginate(page,per_page=current_app.config['TALKS_PER_PAGE'], error_out=False) - File: flask-pycon2014/app/talks/routes.py - > Line 17: talk_list = pagination.items -File: flask-pycon2014/app/talks/routes.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('talks/index.html',talks=talk_list, pagination=pagination) - -Vulnerability 2: -File: flask-pycon2014/app/talks/routes.py - > User input at line 25, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-pycon2014/app/talks/routes.py - > Line 26: pagination = user.talks.order_by(Talk.date.desc()).paginate(page,per_page=current_app.config['TALKS_PER_PAGE'], error_out=False) - File: flask-pycon2014/app/talks/routes.py - > Line 29: talk_list = pagination.items -File: flask-pycon2014/app/talks/routes.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('talks/user.html',user=user, talks=talk_list, pagination=pagination) - -Vulnerability 3: -File: flask-pycon2014/app/talks/routes.py - > User input at line 101, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-pycon2014/app/talks/routes.py - > Line 102: pagination = comments_query.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flask-pycon2014/app/talks/routes.py - > Line 105: comments = pagination.items - File: flask-pycon2014/app/talks/routes.py - > Line 95: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.talk',id=talk.id) + '#top') -File: flask-pycon2014/app/talks/routes.py - > reaches line 109, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = (render_template('talks/talk.html',talk=talk, form=form, comments=comments, pagination=pagination), 200, headers) - - - -anuppathak/flask -https://github.com/anuppathak/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 12:53:16.518641 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -lustlost/saltstack-api-Flask -https://github.com/lustlost/saltstack-api-Flask -Entry file: saltstack-api-Flask/api.py -Scanned: 2016-10-19 12:53:21.328497 -No vulnerabilities found. - - -easonhan007/flyback_blog -https://github.com/easonhan007/flyback_blog -Entry file: flyback_blog/app.py -Scanned: 2016-10-19 12:53:23.033804 -Vulnerability 1: -File: flyback_blog/app.py - > User input at line 58, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: flyback_blog/app.py - > Line 59: posts = get_lists(page) - File: flyback_blog/app.py - > Line 60: next_page = page + 1 - File: flyback_blog/app.py - > Line 61: pre_page = page - 1 -File: flyback_blog/app.py - > reaches line 63, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, action='https://github.com/list', current_page=page, next_page=next_page, pre_page=pre_page, total_page=total_page) - - - -elbuo8/flask-tutorial -https://github.com/elbuo8/flask-tutorial -Entry file: None -Scanned: 2016-10-19 12:53:23.547558 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rfyiamcool/flask_restful_api -https://github.com/rfyiamcool/flask_restful_api -Entry file: flask_restful_api/app.py -Scanned: 2016-10-19 12:53:27.876390 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrichman/flask-redis -https://github.com/mrichman/flask-redis -Entry file: flask-redis/flask-redis.py -Scanned: 2016-10-19 12:53:29.360691 -No vulnerabilities found. - - -parasm/flask-boilerplate -https://github.com/parasm/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 12:53:29.898751 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/parasm/flask-boilerplate. - -naushadzaman/heroku-flask-sklearn -https://github.com/naushadzaman/heroku-flask-sklearn -Entry file: heroku-flask-sklearn/hello.py -Scanned: 2016-10-19 12:53:33.845912 -No vulnerabilities found. - - -iynaix/manga-downloader-flask -https://github.com/iynaix/manga-downloader-flask -Entry file: None -Scanned: 2016-10-19 12:53:35.598184 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/iynaix/manga-downloader-flask. - -brunsgaard/yoloAPI -https://github.com/brunsgaard/yoloAPI -Entry file: yoloAPI/app.py -Scanned: 2016-10-19 12:53:41.037609 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -mauri84/FlaskTut -https://github.com/mauri84/FlaskTut -Entry file: FlaskTut/app/__init__.py -Scanned: 2016-10-19 12:53:42.476394 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -valdelmeglio/flaskAPIs -https://github.com/valdelmeglio/flaskAPIs -Entry file: flaskAPIs/flaskApi.py -Scanned: 2016-10-19 12:53:43.987934 -No vulnerabilities found. - - -vimalkvn/flask_security_example -https://github.com/vimalkvn/flask_security_example -Entry file: flask_security_example/flaskr.py -Scanned: 2016-10-19 12:53:45.315961 -No vulnerabilities found. - - -eslamio/flask_tutorials -https://github.com/eslamio/flask_tutorials -Entry file: None -Scanned: 2016-10-19 12:53:45.827367 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/eslamio/flask_tutorials. - -genju83/flask_skeleton -https://github.com/genju83/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-19 12:53:46.355730 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -axce1/flask-microblog -https://github.com/axce1/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:53:48.880644 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -code-first-cambridge/flask-2 -https://github.com/code-first-cambridge/flask-2 -Entry file: flask-2/guthub6.py -Scanned: 2016-10-19 12:53:49.398144 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bluecliff/flask-microblog -https://github.com/bluecliff/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:53:50.913624 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aert/flask-microblog -https://github.com/aert/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:53:52.420299 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kryptykfysh/flask-microblog -https://github.com/kryptykfysh/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:53:53.944145 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -timothydbutterworth/flask-starter -https://github.com/timothydbutterworth/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-19 12:53:56.454196 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -LeanThis/hola-flask -https://github.com/LeanThis/hola-flask -Entry file: hola-flask/app.py -Scanned: 2016-10-19 12:53:59.752983 -No vulnerabilities found. - - -haya14busa/learning-flask -https://github.com/haya14busa/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-19 12:54:01.345721 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -noorbakerally/flask_blueprint -https://github.com/noorbakerally/flask_blueprint -Entry file: flask_blueprint/dispatcher.py -Scanned: 2016-10-19 12:54:05.660794 -No vulnerabilities found. - - -jdelacruz9/flask-demo -https://github.com/jdelacruz9/flask-demo -Entry file: None -Scanned: 2016-10-19 12:54:06.188555 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jdelacruz9/flask-demo. - -iwanbk/licode-python-basic-example -https://github.com/iwanbk/licode-python-basic-example -Entry file: licode-python-basic-example/app.py -Scanned: 2016-10-19 12:54:11.790696 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -naushadzaman/flask-app-on-heroku -https://github.com/naushadzaman/flask-app-on-heroku -Entry file: flask-app-on-heroku/tmp/hello.py -Scanned: 2016-10-19 12:54:16.644104 -No vulnerabilities found. - - -LeanThis/flask-security-basico -https://github.com/LeanThis/flask-security-basico -Entry file: flask-security-basico/app.py -Scanned: 2016-10-19 12:54:17.961764 -No vulnerabilities found. - - -orangain/example-github-oauth-flask -https://github.com/orangain/example-github-oauth-flask -Entry file: example-github-oauth-flask/github_oauth.py -Scanned: 2016-10-19 12:54:19.588712 -No vulnerabilities found. - - -shashisp/flask-todo--REST-API -https://github.com/shashisp/flask-todo--REST-API -Entry file: flask-todo--REST-API/app.py -Scanned: 2016-10-19 12:54:23.968111 -No vulnerabilities found. - - -bradcypert/PyComoFlaskDemo -https://github.com/bradcypert/PyComoFlaskDemo -Entry file: PyComoFlaskDemo/FlaskApi.py -Scanned: 2016-10-19 12:54:26.308194 -Vulnerability 1: -File: PyComoFlaskDemo/FlaskApi.py - > User input at line 41, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: PyComoFlaskDemo/FlaskApi.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -murphsp1/WebDevelopmentWithFlask -https://github.com/murphsp1/WebDevelopmentWithFlask -Entry file: WebDevelopmentWithFlask/mongo/mongo.py -Scanned: 2016-10-19 12:54:30.503797 -No vulnerabilities found. - - -mphuie/flask_restful_angular_uirouter -https://github.com/mphuie/flask_restful_angular_uirouter -Entry file: flask_restful_angular_uirouter/myapp/__init__.py -Scanned: 2016-10-19 12:54:33.218140 -No vulnerabilities found. - - -avishai-ish-shalom/flask-demo-app -https://github.com/avishai-ish-shalom/flask-demo-app -Entry file: flask-demo-app/app.py -Scanned: 2016-10-19 12:54:34.895380 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ko/base-flask-restful-api -https://github.com/ko/base-flask-restful-api -Entry file: base-flask-restful-api/app/__init__.py -Scanned: 2016-10-19 12:54:36.689364 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilbertom/flask_base_template -https://github.com/wilbertom/flask_base_template -Entry file: flask_base_template/{{cookiecutter.app_name}}/{{cookiecutter.app_name}}/app.py -Scanned: 2016-10-19 12:54:41.996839 -No vulnerabilities found. - - -ryanrdetzel/slack-flask-hook -https://github.com/ryanrdetzel/slack-flask-hook -Entry file: slack-flask-hook/listener.py -Scanned: 2016-10-19 12:54:44.312932 -No vulnerabilities found. - - -eithanshavit/eithanshavit.com.flask -https://github.com/eithanshavit/eithanshavit.com.flask -Entry file: None -Scanned: 2016-10-19 12:54:50.127944 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/eithanshavit/eithanshavit.com.flask. - -asciifaceman/voran -https://github.com/asciifaceman/voran -Entry file: voran/voran/__init__.py -Scanned: 2016-10-19 12:54:51.553999 -No vulnerabilities found. - - -theanalyst/thermos -https://github.com/theanalyst/thermos -Entry file: thermos/__init__.py -Scanned: 2016-10-19 12:54:52.881780 -No vulnerabilities found. - - -avezhenya/musicstream -https://github.com/avezhenya/musicstream -Entry file: musicstream/app/__init__.py -Scanned: 2016-10-19 12:54:54.326331 -Vulnerability 1: -File: musicstream/app/views.py - > User input at line 17, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: musicstream/app/views.py - > Line 19: filename = secure_filename(file.filename) - File: musicstream/app/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: musicstream/app/views.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',filename=filename) - - - -qadeer05/qanalytics -https://github.com/qadeer05/qanalytics -Entry file: qanalytics/qanalytics/__init__.py -Scanned: 2016-10-19 12:54:55.816557 -Vulnerability 1: -File: qanalytics/qanalytics/analytics/views.py - > User input at line 32, trigger word "get(": - browser = request.headers.get('User-Agent') -Reassigned in: - File: qanalytics/qanalytics/analytics/views.py - > Line 44: form = VisitForm(csrf_enabled=False, site=site, browser=browser, url=url, ip_address=ip_address, latitude=geodata.get('latitude'), longitude=geodata.get('longitude'), location=location, event=event) - File: qanalytics/qanalytics/analytics/views.py - > Line 59: ret_MAYBE_FUNCTION_NAME = ('', 204) -File: qanalytics/qanalytics/analytics/views.py - > reaches line 61, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(errors=form.errors), 400) - -Vulnerability 2: -File: qanalytics/qanalytics/analytics/views.py - > User input at line 33, trigger word "get(": - url = request.values.get('url') or request.headers.get('Referer') -Reassigned in: - File: qanalytics/qanalytics/analytics/views.py - > Line 44: form = VisitForm(csrf_enabled=False, site=site, browser=browser, url=url, ip_address=ip_address, latitude=geodata.get('latitude'), longitude=geodata.get('longitude'), location=location, event=event) - File: qanalytics/qanalytics/analytics/views.py - > Line 59: ret_MAYBE_FUNCTION_NAME = ('', 204) -File: qanalytics/qanalytics/analytics/views.py - > reaches line 61, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(errors=form.errors), 400) - -Vulnerability 3: -File: qanalytics/qanalytics/analytics/views.py - > User input at line 34, trigger word "get(": - event = request.values.get('event') -Reassigned in: - File: qanalytics/qanalytics/analytics/views.py - > Line 44: form = VisitForm(csrf_enabled=False, site=site, browser=browser, url=url, ip_address=ip_address, latitude=geodata.get('latitude'), longitude=geodata.get('longitude'), location=location, event=event) - File: qanalytics/qanalytics/analytics/views.py - > Line 59: ret_MAYBE_FUNCTION_NAME = ('', 204) -File: qanalytics/qanalytics/analytics/views.py - > reaches line 61, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(errors=form.errors), 400) - -Vulnerability 4: -File: qanalytics/qanalytics/analytics/views.py - > User input at line 37, trigger word "get(": - location = '{}, {}'.format(geodata.get('city'), geodata.get('zipcode')) -Reassigned in: - File: qanalytics/qanalytics/analytics/views.py - > Line 44: form = VisitForm(csrf_enabled=False, site=site, browser=browser, url=url, ip_address=ip_address, latitude=geodata.get('latitude'), longitude=geodata.get('longitude'), location=location, event=event) - File: qanalytics/qanalytics/analytics/views.py - > Line 59: ret_MAYBE_FUNCTION_NAME = ('', 204) -File: qanalytics/qanalytics/analytics/views.py - > reaches line 61, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(errors=form.errors), 400) - -Vulnerability 5: -File: qanalytics/qanalytics/analytics/views.py - > User input at line 44, trigger word "get(": - form = VisitForm(csrf_enabled=False, site=site, browser=browser, url=url, ip_address=ip_address, latitude=geodata.get('latitude'), longitude=geodata.get('longitude'), location=location, event=event) -Reassigned in: - File: qanalytics/qanalytics/analytics/views.py - > Line 59: ret_MAYBE_FUNCTION_NAME = ('', 204) -File: qanalytics/qanalytics/analytics/views.py - > reaches line 61, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(errors=form.errors), 400) - -Vulnerability 6: -File: qanalytics/qanalytics/users/forms.py - > User input at line 19, trigger word ".data": - user = User.query.filter(User.email == form.email.data).one() -Reassigned in: - File: qanalytics/qanalytics/users/forms.py - > Line 29: form.user = user -File: qanalytics/qanalytics/users/forms.py - > reaches line 19, trigger word "filter(": - user = User.query.filter(User.email == form.email.data).one() - -Vulnerability 7: -File: qanalytics/qanalytics/users/forms.py - > User input at line 38, trigger word ".data": - user = User.query.filter(User.email == field.data).first() -File: qanalytics/qanalytics/users/forms.py - > reaches line 38, trigger word "filter(": - user = User.query.filter(User.email == field.data).first() - - - -cyberved/simple-web-proxy -https://github.com/cyberved/simple-web-proxy -Entry file: simple-web-proxy/app.py -Scanned: 2016-10-19 12:54:57.661451 -Vulnerability 1: -File: simple-web-proxy/app.py - > User input at line 87, trigger word "form[": - url = request.form['req_url'] -Reassigned in: - File: simple-web-proxy/app.py - > Line 86: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: simple-web-proxy/app.py - > reaches line 88, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('fetch',url=url)) - -Vulnerability 2: -File: simple-web-proxy/app.py - > User input at line 87, trigger word "form[": - url = request.form['req_url'] -Reassigned in: - File: simple-web-proxy/app.py - > Line 86: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: simple-web-proxy/app.py - > reaches line 88, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('fetch',url=url)) - - - -mapleoin/shorter -https://github.com/mapleoin/shorter -Entry file: shorter/shorter/web.py -Scanned: 2016-10-19 12:54:59.157385 -Vulnerability 1: -File: shorter/shorter/web.py - > User input at line 47, trigger word "form[": - url = request.form['url'] -Reassigned in: - File: shorter/shorter/web.py - > Line 52: db_url = database.Url(url) - File: shorter/shorter/web.py - > Line 62: shorter = urljoin(config.base_url, db_url.short) -File: shorter/shorter/web.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('shorter.html',original=url, shorter=shorter) - - - -anggao/albatross -https://github.com/anggao/albatross -Entry file: albatross/app/__init__.py -Scanned: 2016-10-19 12:55:01.288509 -No vulnerabilities found. - - -bluecliff/python-blog -https://github.com/bluecliff/python-blog -Entry file: python-blog/blog/__init__.py -Scanned: 2016-10-19 12:55:03.018696 -No vulnerabilities found. - - -delqn/text-ddg -https://github.com/delqn/text-ddg -Entry file: text-ddg/app.py -Scanned: 2016-10-19 12:55:04.351156 -No vulnerabilities found. - - -Jonnyd55/first-news-app -https://github.com/Jonnyd55/first-news-app -Entry file: first-news-app/app.py -Scanned: 2016-10-19 12:55:08.252812 -No vulnerabilities found. - - -michelsazevedo/koffe -https://github.com/michelsazevedo/koffe -Entry file: koffe/app/__init__.py -Scanned: 2016-10-19 12:55:16.919752 -No vulnerabilities found. - - -fogleman/RssToJson -https://github.com/fogleman/RssToJson -Entry file: RssToJson/rss_json/__init__.py -Scanned: 2016-10-19 12:55:19.244143 -Vulnerability 1: -File: RssToJson/rss_json/__init__.py - > User input at line 67, trigger word "get(": - etag = request.args.get('etag') or None -File: RssToJson/rss_json/__init__.py - > reaches line 69, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(parse(url, etag, modified)) - -Vulnerability 2: -File: RssToJson/rss_json/__init__.py - > User input at line 68, trigger word "get(": - modified = request.args.get('modified') or None -File: RssToJson/rss_json/__init__.py - > reaches line 69, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(parse(url, etag, modified)) - - - -brummell/dougr -https://github.com/brummell/dougr -Entry file: dougr/dougr.py -Scanned: 2016-10-19 12:55:20.532537 -No vulnerabilities found. - - -mpatini/wiki -https://github.com/mpatini/wiki -Entry file: None -Scanned: 2016-10-19 12:55:24.503392 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aaronroe/handle-grid-visualizer -https://github.com/aaronroe/handle-grid-visualizer -Entry file: handle-grid-visualizer/handlegridvis.py -Scanned: 2016-10-19 12:55:25.934812 -No vulnerabilities found. - - -indiv0/texserve -https://github.com/indiv0/texserve -Entry file: texserve/app/__init__.py -Scanned: 2016-10-19 12:55:27.363295 -No vulnerabilities found. - - -souparno/scaling-octo -https://github.com/souparno/scaling-octo -Entry file: scaling-octo/__init__.py -Scanned: 2016-10-19 12:55:31.718076 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xmm/flask-restful-example -https://github.com/xmm/flask-restful-example -Entry file: flask-restful-example/api.py -Scanned: 2016-10-19 12:55:34.751428 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -anuppathak/flask -https://github.com/anuppathak/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 12:55:37.307539 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -williamHuang5468/Flask -https://github.com/williamHuang5468/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 12:55:42.317721 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rfyiamcool/flask_restful_api -https://github.com/rfyiamcool/flask_restful_api -Entry file: flask_restful_api/app.py -Scanned: 2016-10-19 12:55:44.821323 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -morgan-del/flask-espresso -https://github.com/morgan-del/flask-espresso -Entry file: flask-espresso/setup.py -Scanned: 2016-10-19 12:55:52.892782 -No vulnerabilities found. - - -axce1/flask-microblog -https://github.com/axce1/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:55:53.395162 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jbrengman/flask-microblog -https://github.com/jbrengman/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:55:54.896628 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lukewrites/flask-microblog -https://github.com/lukewrites/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:55:56.424405 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -markcharyk/flask-microblog -https://github.com/markcharyk/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:55:57.928735 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -abeinstein/recoil-flask -https://github.com/abeinstein/recoil-flask -Entry file: recoil-flask/app.py -Scanned: 2016-10-19 12:55:59.378597 -No vulnerabilities found. - - -kryptykfysh/flask-microblog -https://github.com/kryptykfysh/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:55:59.904226 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -GeorgiCodes/GdayFlask -https://github.com/GeorgiCodes/GdayFlask -Entry file: GdayFlask/hello.py -Scanned: 2016-10-19 12:56:02.202613 -No vulnerabilities found. - - -wolf0403/flask-boilerplate -https://github.com/wolf0403/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 12:56:04.680713 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wolf0403/flask-boilerplate. - -sniboboof/flask-microblog -https://github.com/sniboboof/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:56:07.186114 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jwhite007/Flask-Microblog -https://github.com/jwhite007/Flask-Microblog -Entry file: Flask-Microblog/microblog_package/app/__init__.py -Scanned: 2016-10-19 12:56:09.628382 -No vulnerabilities found. - - -jamescarr/flask-demo -https://github.com/jamescarr/flask-demo -Entry file: None -Scanned: 2016-10-19 12:56:13.153376 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jamescarr/flask-demo. - -risingmoon/flask-microblog -https://github.com/risingmoon/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:56:15.667502 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sbabineau/flask-microblog -https://github.com/sbabineau/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:56:17.172787 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -geekofalltrades/flask-microblog -https://github.com/geekofalltrades/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:56:19.674891 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -noorbakerally/flask_blueprint -https://github.com/noorbakerally/flask_blueprint -Entry file: flask_blueprint/dispatcher.py -Scanned: 2016-10-19 12:56:21.996149 -No vulnerabilities found. - - -dinob0t/Flask_test -https://github.com/dinob0t/Flask_test -Entry file: Flask_test/hello.py -Scanned: 2016-10-19 12:56:24.333809 -No vulnerabilities found. - - -iwanbk/licode-python-basic-example -https://github.com/iwanbk/licode-python-basic-example -Entry file: licode-python-basic-example/app.py -Scanned: 2016-10-19 12:56:26.844536 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crimsoneer/FlaskQueueManager -https://github.com/crimsoneer/FlaskQueueManager -Entry file: FlaskQueueManager/app/__init__.py -Scanned: 2016-10-19 12:56:29.295423 -Vulnerability 1: -File: FlaskQueueManager/app/views.py - > User input at line 84, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: FlaskQueueManager/app/views.py - > Line 85: role = User.query.get(user).role - File: FlaskQueueManager/app/views.py - > Line 77: ret_MAYBE_FUNCTION_NAME = redirect('') -File: FlaskQueueManager/app/views.py - > reaches line 90, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edit_user.html',form=form, user=user, anonymous=current_user.is_anonymous(), role=role, role_label=role_label, current_user=current_user, is_admin=is_admin) - -Vulnerability 2: -File: FlaskQueueManager/app/views.py - > User input at line 85, trigger word "get(": - role = User.query.get(user).role -Reassigned in: - File: FlaskQueueManager/app/views.py - > Line 77: ret_MAYBE_FUNCTION_NAME = redirect('') -File: FlaskQueueManager/app/views.py - > reaches line 90, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edit_user.html',form=form, user=user, anonymous=current_user.is_anonymous(), role=role, role_label=role_label, current_user=current_user, is_admin=is_admin) - -Vulnerability 3: -File: FlaskQueueManager/app/views.py - > User input at line 239, trigger word "get(": - previous_task = Task.query.get(previous_no) -Reassigned in: - File: FlaskQueueManager/app/views.py - > Line 240: start_hour = str(previous_task.end_hour) - File: FlaskQueueManager/app/views.py - > Line 242: start_hour = '0' + start_hour - File: FlaskQueueManager/app/views.py - > Line 243: start_minute = str(previous_task.end_minute) - File: FlaskQueueManager/app/views.py - > Line 245: start_minute = '0' + start_minute - File: FlaskQueueManager/app/views.py - > Line 230: start_hour = 0 - File: FlaskQueueManager/app/views.py - > Line 231: start_minute = 0 -File: FlaskQueueManager/app/views.py - > reaches line 266, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',title='Home', task_no=task_no, task_no_type=task_no_type, form=form, task_types=task_types_dict, current_user=current_user, is_admin=is_admin, anonymous=current_user.is_anonymous(), tasks=tasks, start_hour=start_hour, start_minute=start_minute) - - - -crimsoneer/FlaskMegaTutorial -https://github.com/crimsoneer/FlaskMegaTutorial -Entry file: FlaskMegaTutorial/flask/Lib/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 12:56:34.211653 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kljensen/flask-sockets-demo -https://github.com/kljensen/flask-sockets-demo -Entry file: flask-sockets-demo/hello.py -Scanned: 2016-10-19 12:56:35.511227 -No vulnerabilities found. - - -cevaris/flask-ch8 -https://github.com/cevaris/flask-ch8 -Entry file: flask-ch8/hello.py -Scanned: 2016-10-19 12:56:37.141726 -No vulnerabilities found. - - -mhw32/Online-Flask-Tutorial -https://github.com/mhw32/Online-Flask-Tutorial -Entry file: None -Scanned: 2016-10-19 12:56:42.775902 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wulongqiu/Python-Flask-Microblog -https://github.com/wulongqiu/Python-Flask-Microblog -Entry file: Python-Flask-Microblog/app/__init__.py -Scanned: 2016-10-19 12:56:44.034093 -No vulnerabilities found. - - -leafpeak/QuickRest-Flask -https://github.com/leafpeak/QuickRest-Flask -Entry file: QuickRest-Flask/app.py -Scanned: 2016-10-19 12:56:45.346366 -No vulnerabilities found. - - -marchibbins/teela -https://github.com/marchibbins/teela -Entry file: teela/teela/app.py -Scanned: 2016-10-19 12:56:46.888062 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cff007/todo_list -https://github.com/cff007/todo_list -Entry file: todo_list/todo.py -Scanned: 2016-10-19 12:56:48.190128 -No vulnerabilities found. - - -mfrohberg/microblog -https://github.com/mfrohberg/microblog -Entry file: None -Scanned: 2016-10-19 12:56:48.740329 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wxue/Tonbo -https://github.com/wxue/Tonbo -Entry file: Tonbo/lib/flask/sessions.py -Scanned: 2016-10-19 12:56:56.589848 -No vulnerabilities found. - - -ryan-lane/together-video -https://github.com/ryan-lane/together-video -Entry file: together-video/tv/__init__.py -Scanned: 2016-10-19 12:57:00.086205 -No vulnerabilities found. - - -nakul225/command-module -https://github.com/nakul225/command-module -Entry file: command-module/application.py -Scanned: 2016-10-19 12:57:01.764908 -Vulnerability 1: -File: command-module/application.py - > User input at line 194, trigger word "form[": - alfred_response = process_command(request.form['text']) -File: command-module/application.py - > reaches line 195, trigger word "flash(": - flash('Alfred says: ' + alfred_response) - - - -hammadmlk/TailorMadeFlaskEmailServ -https://github.com/hammadmlk/TailorMadeFlaskEmailServ -Entry file: TailorMadeFlaskEmailServ/server.py -Scanned: 2016-10-19 12:57:03.723479 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sant0sh/BlogSpot -https://github.com/sant0sh/BlogSpot -Entry file: None -Scanned: 2016-10-19 12:57:05.070760 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sant0sh/BlogSpot. - -brianfarris/simplelogin-form-db -https://github.com/brianfarris/simplelogin-form-db -Entry file: simplelogin-form-db/app/__init__.py -Scanned: 2016-10-19 12:57:07.287426 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -miclovich/personal -https://github.com/miclovich/personal -Entry file: personal/routes.py -Scanned: 2016-10-19 12:57:08.587681 -No vulnerabilities found. - - -yhuili/Schedule -https://github.com/yhuili/Schedule -Entry file: Schedule/sched/app.py -Scanned: 2016-10-19 12:57:10.035159 -Vulnerability 1: -File: Schedule/sched/app.py - > User input at line 58, trigger word "get(": - appt = db.session.query(Appointment).get(appointment_id) -File: Schedule/sched/app.py - > reaches line 63, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('appointment/detail.html',appt=appt) - -Vulnerability 2: -File: Schedule/sched/app.py - > User input at line 71, trigger word "get(": - appt = db.session.query(Appointment).get(appointment_id) -Reassigned in: - File: Schedule/sched/app.py - > Line 76: form = AppointmentForm(request.form, appt) -File: Schedule/sched/app.py - > reaches line 80, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('appointment_detail',appointment_id=appt.id)) - -Vulnerability 3: -File: Schedule/sched/app.py - > User input at line 71, trigger word "get(": - appt = db.session.query(Appointment).get(appointment_id) -Reassigned in: - File: Schedule/sched/app.py - > Line 76: form = AppointmentForm(request.form, appt) -File: Schedule/sched/app.py - > reaches line 80, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('appointment_detail',appointment_id=appt.id)) - -Vulnerability 4: -File: Schedule/sched/app.py - > User input at line 71, trigger word "get(": - appt = db.session.query(Appointment).get(appointment_id) -Reassigned in: - File: Schedule/sched/app.py - > Line 76: form = AppointmentForm(request.form, appt) -File: Schedule/sched/app.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('appointment/edit.html',form=form) - - - -matmoody/Local-Weather -https://github.com/matmoody/Local-Weather -Entry file: None -Scanned: 2016-10-19 12:57:13.364183 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -salmanwahed/wecare -https://github.com/salmanwahed/wecare -Entry file: wecare/wecareapi.py -Scanned: 2016-10-19 12:57:17.386142 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: wecare/venv/lib/python2.7/genericpath.py - -altvec/glowing-hipster -https://github.com/altvec/glowing-hipster -Entry file: glowing-hipster/app/__init__.py -Scanned: 2016-10-19 12:57:18.783269 -No vulnerabilities found. - - -conanc2c/spelunkytracker -https://github.com/conanc2c/spelunkytracker -Entry file: spelunkytracker/spelunkytrack.py -Scanned: 2016-10-19 12:57:20.214379 -No vulnerabilities found. - - -delqn/text-ddg -https://github.com/delqn/text-ddg -Entry file: text-ddg/app.py -Scanned: 2016-10-19 12:57:21.996510 -No vulnerabilities found. - - -jdglover/homepage -https://github.com/jdglover/homepage -Entry file: None -Scanned: 2016-10-19 12:57:24.412950 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -balloonsys/newsapi -https://github.com/balloonsys/newsapi -Entry file: newsapi/app.py -Scanned: 2016-10-19 12:57:30.524131 -No vulnerabilities found. - - -michelsazevedo/koffe -https://github.com/michelsazevedo/koffe -Entry file: koffe/app/__init__.py -Scanned: 2016-10-19 12:57:33.140620 -No vulnerabilities found. - - -gabalese/isbn-checker -https://github.com/gabalese/isbn-checker -Entry file: isbn-checker/isbn-checker.py -Scanned: 2016-10-19 12:57:35.071851 -No vulnerabilities found. - - -kchudy/deploy_webhook -https://github.com/kchudy/deploy_webhook -Entry file: deploy_webhook/webhook.py -Scanned: 2016-10-19 12:57:37.028471 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -StudioQi/htpasswd-api -https://github.com/StudioQi/htpasswd-api -Entry file: htpasswd-api/app.py -Scanned: 2016-10-19 12:57:38.424967 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brianfarris/simplelogin -https://github.com/brianfarris/simplelogin -Entry file: simplelogin/app/__init__.py -Scanned: 2016-10-19 12:57:40.097434 -Vulnerability 1: -File: simplelogin/app/frontend.py - > User input at line 48, trigger word "get(": - thisuser_request = SERVICE.people().get(userId='me') -File: simplelogin/app/frontend.py - > reaches line 49, trigger word "execute(": - thisuser = thisuser_request.execute(http=http) - - - -cgie/dline-srv -https://github.com/cgie/dline-srv -Entry file: dline-srv/app.py -Scanned: 2016-10-19 12:57:45.396704 -No vulnerabilities found. - - -brianfarris/simpleflask -https://github.com/brianfarris/simpleflask -Entry file: simpleflask/app/__init__.py -Scanned: 2016-10-19 12:57:47.025867 -No vulnerabilities found. - - -xmm/flask-restful-example -https://github.com/xmm/flask-restful-example -Entry file: flask-restful-example/api.py -Scanned: 2016-10-19 12:57:48.535364 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cff007/flask -https://github.com/cff007/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 12:57:50.142808 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -DanielSalgado/Flask -https://github.com/DanielSalgado/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 12:57:54.693282 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mjhea0/flask-geolocation -https://github.com/mjhea0/flask-geolocation -Entry file: flask-geolocation/run.py -Scanned: 2016-10-19 12:58:09.865354 -No vulnerabilities found. - - -fainle/sae_python_blog -https://github.com/fainle/sae_python_blog -Entry file: sae_python_blog/site-packages/flask/sessions.py -Scanned: 2016-10-19 12:58:12.698443 -No vulnerabilities found. - - -thisissoon/flask-template -https://github.com/thisissoon/flask-template -Entry file: None -Scanned: 2016-10-19 12:58:13.213909 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/thisissoon/flask-template. - -jbrambleDC/flitterFlask -https://github.com/jbrambleDC/flitterFlask -Entry file: flitterFlask/flitter/app/__init__.py -Scanned: 2016-10-19 12:58:14.891438 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mbr/Flask-Debug -https://github.com/mbr/Flask-Debug -Entry file: Flask-Debug/tests/test_client.py -Scanned: 2016-10-19 12:58:16.302433 -No vulnerabilities found. - - -morgan-del/flask-espresso -https://github.com/morgan-del/flask-espresso -Entry file: flask-espresso/setup.py -Scanned: 2016-10-19 12:58:17.834678 -No vulnerabilities found. - - -zyhazwraith/flaskr -https://github.com/zyhazwraith/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 12:58:18.353428 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -frimmy/flaskr -https://github.com/frimmy/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 12:58:18.868582 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shiflonium/BookBay -https://github.com/shiflonium/BookBay -Entry file: BookBay/app/__init__.py -Scanned: 2016-10-19 12:58:21.458719 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nfb-onf/nfbsearch-flask -https://github.com/nfb-onf/nfbsearch-flask -Entry file: nfbsearch-flask/nfbsearch_flask/nfbsearch_flask.py -Scanned: 2016-10-19 12:58:22.744392 -Vulnerability 1: -File: nfbsearch-flask/nfbsearch_flask/nfbsearch_flask.py - > User input at line 10, trigger word "get(": - query = request.args.get('q', None) -Reassigned in: - File: nfbsearch-flask/nfbsearch_flask/nfbsearch_flask.py - > Line 12: ret_MAYBE_FUNCTION_NAME = 'please provide a q parameter' -File: nfbsearch-flask/nfbsearch_flask/nfbsearch_flask.py - > reaches line 14, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(es.search(index='nfb_films', doc_type='films', body='query''bool''should''query_string''default_field''query''_all'query)) - - - -tkmallik/PythonFlask -https://github.com/tkmallik/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 12:58:29.761573 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -ochen/flask-notification -https://github.com/ochen/flask-notification -Entry file: flask-notification/app/__init__.py -Scanned: 2016-10-19 12:58:33.226631 -Vulnerability 1: -File: flask-notification/app/views.py - > User input at line 43, trigger word ".data": - nickname = form.nickname.data -Reassigned in: - File: flask-notification/app/views.py - > Line 48: user = User(nickname=nickname, email=form.email.data, mobile=form.mobile.data, email_notification=form.email_notification.data, sms_notification=form.sms_notification.data, app_notification=form.app_notification.data) - File: flask-notification/app/views.py - > Line 44: user = User.query.filter_by(nickname=nickname).first() -File: flask-notification/app/views.py - > reaches line 55, trigger word "flash(": - flash('User {} added.'.format(nickname)) - -Vulnerability 2: -File: flask-notification/app/views.py - > User input at line 139, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask-notification/app/views.py - > Line 140: template = Template(name=name, email_subject=form.email_subject.data, email=form.email.data, sms=form.sms.data, app=form.app.data) - File: flask-notification/app/views.py - > Line 134: template = Template.query.filter_by(name=form.name.data).first() -File: flask-notification/app/views.py - > reaches line 144, trigger word "flash(": - flash('Template for notification type {} added.'.format(name)) - - - -tatiana/flask_api -https://github.com/tatiana/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-19 12:58:33.765567 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -oceanboy2012/flask-dev -https://github.com/oceanboy2012/flask-dev -Entry file: flask-dev/app.py -Scanned: 2016-10-19 12:58:35.553175 -Vulnerability 1: -File: flask-dev/app.py - > User input at line 32, trigger word "get(": - a = request.args.get('a', 0,type=int) -File: flask-dev/app.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result=a + b) - -Vulnerability 2: -File: flask-dev/app.py - > User input at line 33, trigger word "get(": - b = request.args.get('b', 0,type=int) -File: flask-dev/app.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result=a + b) - - - -shuxiang/flask-sample -https://github.com/shuxiang/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-19 12:58:36.113583 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaychoo/flask-baseapp -https://github.com/jaychoo/flask-baseapp -Entry file: None -Scanned: 2016-10-19 12:58:40.332204 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bearzk/flask-microblog -https://github.com/bearzk/flask-microblog -Entry file: None -Scanned: 2016-10-19 12:58:40.848025 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -claudyus/flask-sql -https://github.com/claudyus/flask-sql -Entry file: flask-sql/app.py -Scanned: 2016-10-19 12:58:42.609162 -No vulnerabilities found. - - -tsnaomi/flask_microblog -https://github.com/tsnaomi/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 12:58:43.143810 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jwhite007/Flask-Microblog -https://github.com/jwhite007/Flask-Microblog -Entry file: Flask-Microblog/microblog_package/app/__init__.py -Scanned: 2016-10-19 12:58:44.586789 -No vulnerabilities found. - - -gszpura/flask-ratelimiter -https://github.com/gszpura/flask-ratelimiter -Entry file: flask-ratelimiter/tests/helpers.py -Scanned: 2016-10-19 12:58:46.056112 -No vulnerabilities found. - - -crimsoneer/FlaskQueueManager -https://github.com/crimsoneer/FlaskQueueManager -Entry file: FlaskQueueManager/app/__init__.py -Scanned: 2016-10-19 12:58:47.504873 -Vulnerability 1: -File: FlaskQueueManager/app/views.py - > User input at line 84, trigger word "get(": - user = request.args.get('user') -Reassigned in: - File: FlaskQueueManager/app/views.py - > Line 85: role = User.query.get(user).role - File: FlaskQueueManager/app/views.py - > Line 77: ret_MAYBE_FUNCTION_NAME = redirect('') -File: FlaskQueueManager/app/views.py - > reaches line 90, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edit_user.html',form=form, user=user, anonymous=current_user.is_anonymous(), role=role, role_label=role_label, current_user=current_user, is_admin=is_admin) - -Vulnerability 2: -File: FlaskQueueManager/app/views.py - > User input at line 85, trigger word "get(": - role = User.query.get(user).role -Reassigned in: - File: FlaskQueueManager/app/views.py - > Line 77: ret_MAYBE_FUNCTION_NAME = redirect('') -File: FlaskQueueManager/app/views.py - > reaches line 90, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edit_user.html',form=form, user=user, anonymous=current_user.is_anonymous(), role=role, role_label=role_label, current_user=current_user, is_admin=is_admin) - -Vulnerability 3: -File: FlaskQueueManager/app/views.py - > User input at line 239, trigger word "get(": - previous_task = Task.query.get(previous_no) -Reassigned in: - File: FlaskQueueManager/app/views.py - > Line 240: start_hour = str(previous_task.end_hour) - File: FlaskQueueManager/app/views.py - > Line 242: start_hour = '0' + start_hour - File: FlaskQueueManager/app/views.py - > Line 243: start_minute = str(previous_task.end_minute) - File: FlaskQueueManager/app/views.py - > Line 245: start_minute = '0' + start_minute - File: FlaskQueueManager/app/views.py - > Line 230: start_hour = 0 - File: FlaskQueueManager/app/views.py - > Line 231: start_minute = 0 -File: FlaskQueueManager/app/views.py - > reaches line 266, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',title='Home', task_no=task_no, task_no_type=task_no_type, form=form, task_types=task_types_dict, current_user=current_user, is_admin=is_admin, anonymous=current_user.is_anonymous(), tasks=tasks, start_hour=start_hour, start_minute=start_minute) - - - -kevinchenxyz/Flask_mongodb_CRUD -https://github.com/kevinchenxyz/Flask_mongodb_CRUD -Entry file: Flask_mongodb_CRUD/app/__init__.py -Scanned: 2016-10-19 12:58:48.893423 -No vulnerabilities found. - - -rebill/flask-zmq-demo -https://github.com/rebill/flask-zmq-demo -Entry file: flask-zmq-demo/web/demo.py -Scanned: 2016-10-19 12:58:50.214349 -No vulnerabilities found. - - -ToxicWar/Flask-SocketIO-Test -https://github.com/ToxicWar/Flask-SocketIO-Test -Entry file: Flask-SocketIO-Test/server.py -Scanned: 2016-10-19 12:58:51.537528 -No vulnerabilities found. - - -olegarioca/BDD-Behave-Flask -https://github.com/olegarioca/BDD-Behave-Flask -Entry file: BDD-Behave-Flask/app.py -Scanned: 2016-10-19 12:58:52.945137 -Vulnerability 1: -File: BDD-Behave-Flask/app.py - > User input at line 12, trigger word "form[": - meal_cost = int(request.form['meal_cost']) -Reassigned in: - File: BDD-Behave-Flask/app.py - > Line 14: tip_cost = int(meal_cost) * int(tip_percentage) * 0.01 - File: BDD-Behave-Flask/app.py - > Line 23: ret_MAYBE_FUNCTION_NAME = render_template('home.html',again=try_again) - File: BDD-Behave-Flask/app.py - > Line 17: ret_MAYBE_FUNCTION_NAME = render_template('home.html',again=try_again) -File: BDD-Behave-Flask/app.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',meal_cost=meal_cost, tip_percentage=tip_percentage, tip_cost=tip_cost) - -Vulnerability 2: -File: BDD-Behave-Flask/app.py - > User input at line 13, trigger word "form[": - tip_percentage = int(request.form['tip_percentage']) -Reassigned in: - File: BDD-Behave-Flask/app.py - > Line 14: tip_cost = int(meal_cost) * int(tip_percentage) * 0.01 - File: BDD-Behave-Flask/app.py - > Line 23: ret_MAYBE_FUNCTION_NAME = render_template('home.html',again=try_again) - File: BDD-Behave-Flask/app.py - > Line 17: ret_MAYBE_FUNCTION_NAME = render_template('home.html',again=try_again) -File: BDD-Behave-Flask/app.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',meal_cost=meal_cost, tip_percentage=tip_percentage, tip_cost=tip_cost) - - - -kevinchenxyz/Flask_unit_test -https://github.com/kevinchenxyz/Flask_unit_test -Entry file: Flask_unit_test/Flask_openid/app/__init__.py -Scanned: 2016-10-19 12:58:54.333508 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Graham42/flask-prototype-base -https://github.com/Graham42/flask-prototype-base -Entry file: flask-prototype-base/app_name/__init__.py -Scanned: 2016-10-19 12:58:56.651858 -No vulnerabilities found. - - -shbhrsaha/flask-heroku-boilerplate -https://github.com/shbhrsaha/flask-heroku-boilerplate -Entry file: flask-heroku-boilerplate/app.py -Scanned: 2016-10-19 12:59:01.003763 -No vulnerabilities found. - - -fixxxerTachi/blog_flaskr -https://github.com/fixxxerTachi/blog_flaskr -Entry file: None -Scanned: 2016-10-19 12:59:12.465190 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fixxxerTachi/blog_flaskr. - -todo1991/doanpython -https://github.com/todo1991/doanpython -Entry file: doanpython/app/__init__.py -Scanned: 2016-10-19 12:59:15.833279 -Vulnerability 1: -File: doanpython/app/views.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: doanpython/app/views.py - > Line 54: ret_MAYBE_FUNCTION_NAME = error - File: doanpython/app/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: doanpython/app/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: doanpython/app/views.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(page)) - -Vulnerability 2: -File: doanpython/app/views.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: doanpython/app/views.py - > Line 54: ret_MAYBE_FUNCTION_NAME = error - File: doanpython/app/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: doanpython/app/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: doanpython/app/views.py - > reaches line 44, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(page)) - -Vulnerability 3: -File: doanpython/app/views.py - > User input at line 47, trigger word "form[": - username = request.form['user'] -File: doanpython/app/views.py - > reaches line 50, trigger word "execute(": - cursor.execute('SELECT * from user where username='' + username + '' and password='' + password + '' ') - -Vulnerability 4: -File: doanpython/app/views.py - > User input at line 48, trigger word "form[": - password = request.form['pass'] -File: doanpython/app/views.py - > reaches line 50, trigger word "execute(": - cursor.execute('SELECT * from user where username='' + username + '' and password='' + password + '' ') - -Vulnerability 5: -File: doanpython/app/views.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 'index') -Reassigned in: - File: doanpython/app/views.py - > Line 54: ret_MAYBE_FUNCTION_NAME = error - File: doanpython/app/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: doanpython/app/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: doanpython/app/views.py - > reaches line 58, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',error=error, page=page) - - - -tmblweed/Blog -https://github.com/tmblweed/Blog -Entry file: Blog/flaskr.py -Scanned: 2016-10-19 12:59:17.184689 -No vulnerabilities found. - - -dcrn/restcal -https://github.com/dcrn/restcal -Entry file: restcal/restcal.py -Scanned: 2016-10-19 12:59:18.621585 -No vulnerabilities found. - - -lavriv92/blog_f -https://github.com/lavriv92/blog_f -Entry file: blog_f/application/__init__.py -Scanned: 2016-10-19 12:59:20.365153 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ryan-lane/together-video -https://github.com/ryan-lane/together-video -Entry file: together-video/tv/__init__.py -Scanned: 2016-10-19 12:59:23.850058 -No vulnerabilities found. - - -zyhazwraith/quick -https://github.com/zyhazwraith/quick -Entry file: quick/application.py -Scanned: 2016-10-19 12:59:26.512191 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregimba/WhoRu -https://github.com/gregimba/WhoRu -Entry file: WhoRu/app.py -Scanned: 2016-10-19 12:59:27.733577 -Vulnerability 1: -File: WhoRu/app.py - > User input at line 18, trigger word "form[": - email = ark.email(request.form['email']) -Reassigned in: - File: WhoRu/app.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('person.html',data=twitter) - File: WhoRu/app.py - > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: WhoRu/app.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('person.html',data=email) - -Vulnerability 2: -File: WhoRu/app.py - > User input at line 24, trigger word "form[": - twitter = ark.twitter(request.form['handle']) -Reassigned in: - File: WhoRu/app.py - > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: WhoRu/app.py - > Line 21: ret_MAYBE_FUNCTION_NAME = render_template('person.html',data=email) -File: WhoRu/app.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('person.html',data=twitter) - - - -brianfarris/simplelogin-form-db -https://github.com/brianfarris/simplelogin-form-db -Entry file: simplelogin-form-db/app/__init__.py -Scanned: 2016-10-19 12:59:34.775475 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vickyi/microblog -https://github.com/vickyi/microblog -Entry file: None -Scanned: 2016-10-19 12:59:35.306978 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -salmanwahed/wecare -https://github.com/salmanwahed/wecare -Entry file: wecare/wecareapi.py -Scanned: 2016-10-19 12:59:37.949853 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: wecare/venv/lib/python2.7/genericpath.py - -Albertorio/tweetBot -https://github.com/Albertorio/tweetBot -Entry file: tweetBot/app.py -Scanned: 2016-10-19 12:59:39.325871 -Vulnerability 1: -File: tweetBot/app.py - > User input at line 16, trigger word "form[": - newtweet = 'id''text'randint(0, 256)request_form['tweet'] -Reassigned in: - File: tweetBot/app.py - > Line 22: ret_MAYBE_FUNCTION_NAME = jsonify('tweets'tweets) -File: tweetBot/app.py - > reaches line 18, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(newtweet) - - - -aguegu/lunchorder -https://github.com/aguegu/lunchorder -Entry file: lunchorder/app/__init__.py -Scanned: 2016-10-19 12:59:42.976683 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -richstoner/image_review -https://github.com/richstoner/image_review -Entry file: image_review/app/app.py -Scanned: 2016-10-19 12:59:45.660094 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -CodeNowOrg/student_registration -https://github.com/CodeNowOrg/student_registration -Entry file: student_registration/main.py -Scanned: 2016-10-19 12:59:47.476464 -No vulnerabilities found. - - -jorgen99/smarthus -https://github.com/jorgen99/smarthus -Entry file: smarthus/smarthus.py -Scanned: 2016-10-19 12:59:48.784710 -No vulnerabilities found. - - -paddycarey/speelchecker -https://github.com/paddycarey/speelchecker -Entry file: speelchecker/app.py -Scanned: 2016-10-19 12:59:50.071219 -Vulnerability 1: -File: speelchecker/app.py - > User input at line 28, trigger word "get(": - text = request.args.get('text', '') -Reassigned in: - File: speelchecker/app.py - > Line 29: text = TextBlob(text) -File: speelchecker/app.py - > reaches line 30, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(text=unicode(text.correct())) - - - -balloonsys/newsapi -https://github.com/balloonsys/newsapi -Entry file: newsapi/app.py -Scanned: 2016-10-19 12:59:56.185369 -No vulnerabilities found. - - -thisissoon/pravis -https://github.com/thisissoon/pravis -Entry file: pravis/pravis/app.py -Scanned: 2016-10-19 12:59:57.853641 -No vulnerabilities found. - - -trigunshin/interview_questions -https://github.com/trigunshin/interview_questions -Entry file: interview_questions/app.py -Scanned: 2016-10-19 12:59:59.150710 -No vulnerabilities found. - - -gabalese/isbn-checker -https://github.com/gabalese/isbn-checker -Entry file: isbn-checker/isbn-checker.py -Scanned: 2016-10-19 13:00:00.569491 -No vulnerabilities found. - - -j-burgos/musiclib -https://github.com/j-burgos/musiclib -Entry file: musiclib/musiclib.py -Scanned: 2016-10-19 13:00:02.112030 -No vulnerabilities found. - - -dedalusj/ECIdenticon -https://github.com/dedalusj/ECIdenticon -Entry file: ECIdenticon/ECIdenticon.py -Scanned: 2016-10-19 13:00:03.789664 -No vulnerabilities found. - - -vrk7bp/OneDir -https://github.com/vrk7bp/OneDir -Entry file: OneDir/Flask.py -Scanned: 2016-10-19 13:00:05.342413 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bouncer-app/flask-bouncer -https://github.com/bouncer-app/flask-bouncer -Entry file: flask-bouncer/test_flask_bouncer/test_base.py -Scanned: 2016-10-19 13:00:08.183612 -No vulnerabilities found. - - -googlearchive/appengine-try-python-flask -https://github.com/googlearchive/appengine-try-python-flask -Entry file: appengine-try-python-flask/main.py -Scanned: 2016-10-19 13:00:14.469237 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sixu05202004/async-flask-sqlalchemy-postgresql -https://github.com/sixu05202004/async-flask-sqlalchemy-postgresql -Entry file: async-flask-sqlalchemy-postgresql/app.py -Scanned: 2016-10-19 13:00:16.796399 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -inveniosoftware-attic/flask-ratelimiter -https://github.com/inveniosoftware-attic/flask-ratelimiter -Entry file: flask-ratelimiter/examples/simple/app.py -Scanned: 2016-10-19 13:00:19.263587 -No vulnerabilities found. - - -thisissoon/flask-template -https://github.com/thisissoon/flask-template -Entry file: None -Scanned: 2016-10-19 13:00:20.245090 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/thisissoon/flask-template. - -iiSeymour/flasked-vincent -https://github.com/iiSeymour/flasked-vincent -Entry file: flasked-vincent/app.py -Scanned: 2016-10-19 13:00:23.635002 -No vulnerabilities found. - - -ellisonleao/flask-mistune -https://github.com/ellisonleao/flask-mistune -Entry file: flask-mistune/tests.py -Scanned: 2016-10-19 13:00:26.884693 -No vulnerabilities found. - - -stfp/flask-presst -https://github.com/stfp/flask-presst -Entry file: flask-presst/examples/quickstart_api_resource_method.py -Scanned: 2016-10-19 13:00:28.474520 -No vulnerabilities found. - - -SaintDako/nginx-flask -https://github.com/SaintDako/nginx-flask -Entry file: nginx-flask/domainBscript.py -Scanned: 2016-10-19 13:00:29.747067 -No vulnerabilities found. - - -mbr/Flask-Debug -https://github.com/mbr/Flask-Debug -Entry file: Flask-Debug/tests/test_client.py -Scanned: 2016-10-19 13:00:31.964672 -No vulnerabilities found. - - -zyhazwraith/flaskr -https://github.com/zyhazwraith/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:00:32.478948 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davenportw15/FlaskPost -https://github.com/davenportw15/FlaskPost -Entry file: FlaskPost/application.py -Scanned: 2016-10-19 13:00:37.457037 -No vulnerabilities found. - - -Jpadilla1/flask-site -https://github.com/Jpadilla1/flask-site -Entry file: None -Scanned: 2016-10-19 13:00:38.023080 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -oceanboy2012/flask-dev -https://github.com/oceanboy2012/flask-dev -Entry file: flask-dev/app.py -Scanned: 2016-10-19 13:00:40.325553 -Vulnerability 1: -File: flask-dev/app.py - > User input at line 32, trigger word "get(": - a = request.args.get('a', 0,type=int) -File: flask-dev/app.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result=a + b) - -Vulnerability 2: -File: flask-dev/app.py - > User input at line 33, trigger word "get(": - b = request.args.get('b', 0,type=int) -File: flask-dev/app.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result=a + b) - - - -ochen/flask-notification -https://github.com/ochen/flask-notification -Entry file: flask-notification/app/__init__.py -Scanned: 2016-10-19 13:00:41.773718 -Vulnerability 1: -File: flask-notification/app/views.py - > User input at line 43, trigger word ".data": - nickname = form.nickname.data -Reassigned in: - File: flask-notification/app/views.py - > Line 48: user = User(nickname=nickname, email=form.email.data, mobile=form.mobile.data, email_notification=form.email_notification.data, sms_notification=form.sms_notification.data, app_notification=form.app_notification.data) - File: flask-notification/app/views.py - > Line 44: user = User.query.filter_by(nickname=nickname).first() -File: flask-notification/app/views.py - > reaches line 55, trigger word "flash(": - flash('User {} added.'.format(nickname)) - -Vulnerability 2: -File: flask-notification/app/views.py - > User input at line 139, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask-notification/app/views.py - > Line 140: template = Template(name=name, email_subject=form.email_subject.data, email=form.email.data, sms=form.sms.data, app=form.app.data) - File: flask-notification/app/views.py - > Line 134: template = Template.query.filter_by(name=form.name.data).first() -File: flask-notification/app/views.py - > reaches line 144, trigger word "flash(": - flash('Template for notification type {} added.'.format(name)) - - - -jaychoo/flask-baseapp -https://github.com/jaychoo/flask-baseapp -Entry file: None -Scanned: 2016-10-19 13:00:43.296608 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bearzk/flask-microblog -https://github.com/bearzk/flask-microblog -Entry file: None -Scanned: 2016-10-19 13:00:47.273663 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rsj217/dtapi-flask -https://github.com/rsj217/dtapi-flask -Entry file: dtapi-flask/dtapi/api/__init__.py -Scanned: 2016-10-19 13:00:51.068367 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -im-auld/simple_flask -https://github.com/im-auld/simple_flask -Entry file: simple_flask/simple_flask.py -Scanned: 2016-10-19 13:00:52.673604 -No vulnerabilities found. - - -BlaXpirit/flask-simplesqla -https://github.com/BlaXpirit/flask-simplesqla -Entry file: None -Scanned: 2016-10-19 13:00:54.020482 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/BlaXpirit/flask-simplesqla. - -claudyus/flask-sql -https://github.com/claudyus/flask-sql -Entry file: flask-sql/app.py -Scanned: 2016-10-19 13:00:59.323778 -No vulnerabilities found. - - -sunilgopinath/flask_experiments -https://github.com/sunilgopinath/flask_experiments -Entry file: flask_experiments/main.py -Scanned: 2016-10-19 13:00:59.839934 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -j-burgos/ejemplo-flask -https://github.com/j-burgos/ejemplo-flask -Entry file: ejemplo-flask/app.py -Scanned: 2016-10-19 13:01:05.691314 -No vulnerabilities found. - - -brijeshb42/flask-app -https://github.com/brijeshb42/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-19 13:01:06.200246 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ffeast/flask-dbshell -https://github.com/ffeast/flask-dbshell -Entry file: flask-dbshell/example/manage.py -Scanned: 2016-10-19 13:01:08.420254 -No vulnerabilities found. - - -codebynumbers/flask-base-project -https://github.com/codebynumbers/flask-base-project -Entry file: flask-base-project/dashboard/server/app.py -Scanned: 2016-10-19 13:01:15.249585 -No vulnerabilities found. - - -andriy-kulish/flask-book-library -https://github.com/andriy-kulish/flask-book-library -Entry file: flask-book-library/app/__init__.py -Scanned: 2016-10-19 13:01:18.946538 -Vulnerability 1: -File: flask-book-library/app/views.py - > User input at line 50, trigger word "get(": - book = db_session.query(Book).get(id) -Reassigned in: - File: flask-book-library/app/views.py - > Line 51: book_form = BookForm(request.form,obj=book) - File: flask-book-library/app/views.py - > Line 55: book = db_session.query(Book).get(id) - File: flask-book-library/app/views.py - > Line 56: book.title = book_form.title.data - File: flask-book-library/app/views.py - > Line 57: book.authors = [db_session.query(Author).get(o) for o in book_form.authors.data] - File: flask-book-library/app/views.py - > Line 62: book_form.authors.data = [p.id for p in book.authors] - File: flask-book-library/app/views.py - > Line 60: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask-book-library/app/views.py - > reaches line 63, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book.html',bform=book_form, form=form, book=book, user=current_user, is_authenticated=True) - -Vulnerability 2: -File: flask-book-library/app/views.py - > User input at line 55, trigger word "get(": - book = db_session.query(Book).get(id) -Reassigned in: - File: flask-book-library/app/views.py - > Line 50: book = db_session.query(Book).get(id) - File: flask-book-library/app/views.py - > Line 51: book_form = BookForm(request.form,obj=book) - File: flask-book-library/app/views.py - > Line 56: book.title = book_form.title.data - File: flask-book-library/app/views.py - > Line 57: book.authors = [db_session.query(Author).get(o) for o in book_form.authors.data] - File: flask-book-library/app/views.py - > Line 62: book_form.authors.data = [p.id for p in book.authors] - File: flask-book-library/app/views.py - > Line 60: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask-book-library/app/views.py - > reaches line 63, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book.html',bform=book_form, form=form, book=book, user=current_user, is_authenticated=True) - -Vulnerability 3: -File: flask-book-library/app/views.py - > User input at line 100, trigger word "get(": - author = db_session.query(Author).get(id) -Reassigned in: - File: flask-book-library/app/views.py - > Line 101: author_form = AuthorForm(request.form,obj=author) - File: flask-book-library/app/views.py - > Line 105: author = db_session.query(Author).get(id) - File: flask-book-library/app/views.py - > Line 106: author.name = author_form.name.data - File: flask-book-library/app/views.py - > Line 107: author.books = [db_session.query(Book).get(o) for o in author_form.books.data] - File: flask-book-library/app/views.py - > Line 112: author_form.books.data = [p.id for p in author.books] - File: flask-book-library/app/views.py - > Line 110: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask-book-library/app/views.py - > reaches line 113, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('author.html',bform=author_form, form=form, author=author, user=current_user, is_authenticated=True) - -Vulnerability 4: -File: flask-book-library/app/views.py - > User input at line 105, trigger word "get(": - author = db_session.query(Author).get(id) -Reassigned in: - File: flask-book-library/app/views.py - > Line 100: author = db_session.query(Author).get(id) - File: flask-book-library/app/views.py - > Line 101: author_form = AuthorForm(request.form,obj=author) - File: flask-book-library/app/views.py - > Line 106: author.name = author_form.name.data - File: flask-book-library/app/views.py - > Line 107: author.books = [db_session.query(Book).get(o) for o in author_form.books.data] - File: flask-book-library/app/views.py - > Line 112: author_form.books.data = [p.id for p in author.books] - File: flask-book-library/app/views.py - > Line 110: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask-book-library/app/views.py - > reaches line 113, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('author.html',bform=author_form, form=form, author=author, user=current_user, is_authenticated=True) - - - -ararog/TodoOnFlask -https://github.com/ararog/TodoOnFlask -Entry file: TodoOnFlask/todo.py -Scanned: 2016-10-19 13:01:20.228427 -No vulnerabilities found. - - -leoleozhu/flask_gfwlist2pac -https://github.com/leoleozhu/flask_gfwlist2pac -Entry file: flask_gfwlist2pac/examples/heroku/app.py -Scanned: 2016-10-19 13:01:23.098287 -No vulnerabilities found. - - -x/Simple-Flask-Guest-Book -https://github.com/x/Simple-Flask-Guest-Book -Entry file: Simple-Flask-Guest-Book/app.py -Scanned: 2016-10-19 13:01:25.376840 -No vulnerabilities found. - - -Graham42/flask-prototype-base -https://github.com/Graham42/flask-prototype-base -Entry file: flask-prototype-base/app_name/__init__.py -Scanned: 2016-10-19 13:01:28.627057 -No vulnerabilities found. - - -bskari/libraries-cache-flask -https://github.com/bskari/libraries-cache-flask -Entry file: libraries-cache-flask/libraries_cache.py -Scanned: 2016-10-19 13:01:29.925128 -No vulnerabilities found. - - -hmdavis/flask-mega-tutorial -https://github.com/hmdavis/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 13:01:30.440253 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -basilleaf/base_flask_redis_app -https://github.com/basilleaf/base_flask_redis_app -Entry file: base_flask_redis_app/hello.py -Scanned: 2016-10-19 13:01:33.122519 -No vulnerabilities found. - - -sudaraka/flask-form-demo -https://github.com/sudaraka/flask-form-demo -Entry file: flask-form-demo/manage.py -Scanned: 2016-10-19 13:01:35.710273 -No vulnerabilities found. - - -Third9/flask-login_test -https://github.com/Third9/flask-login_test -Entry file: flask-login_test/login.py -Scanned: 2016-10-19 13:01:37.305401 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rileonard15/python-gae-flask-classy -https://github.com/rileonard15/python-gae-flask-classy -Entry file: python-gae-flask-classy/main.py -Scanned: 2016-10-19 13:01:39.549978 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fixxxerTachi/blog_flaskr -https://github.com/fixxxerTachi/blog_flaskr -Entry file: None -Scanned: 2016-10-19 13:01:40.112343 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fixxxerTachi/blog_flaskr. - -ras3638/FinalBoss -https://github.com/ras3638/FinalBoss -Entry file: FinalBoss/ToDo-List/__init__.py -Scanned: 2016-10-19 13:01:41.808026 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dcrn/restcal -https://github.com/dcrn/restcal -Entry file: restcal/restcal.py -Scanned: 2016-10-19 13:01:43.245517 -No vulnerabilities found. - - -asserchiu/RESTful-example-in-pure-Flask -https://github.com/asserchiu/RESTful-example-in-pure-Flask -Entry file: RESTful-example-in-pure-Flask/app/__init__.py -Scanned: 2016-10-19 13:01:49.613907 -No vulnerabilities found. - - -jettagozoom/microblog -https://github.com/jettagozoom/microblog -Entry file: None -Scanned: 2016-10-19 13:01:51.137538 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -JPWKU/microblog -https://github.com/JPWKU/microblog -Entry file: None -Scanned: 2016-10-19 13:01:52.634966 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -arloft/Flaskapp-Microblog-Tutorial -https://github.com/arloft/Flaskapp-Microblog-Tutorial -Entry file: None -Scanned: 2016-10-19 13:01:59.975617 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aguegu/lunchorder -https://github.com/aguegu/lunchorder -Entry file: lunchorder/app/__init__.py -Scanned: 2016-10-19 13:02:00.943405 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ryanprater/weight_tracker -https://github.com/ryanprater/weight_tracker -Entry file: weight_tracker/weighttracker.py -Scanned: 2016-10-19 13:02:03.244716 -No vulnerabilities found. - - -lolyzor/pushnotifications-server -https://github.com/lolyzor/pushnotifications-server -Entry file: pushnotifications-server/main.py -Scanned: 2016-10-19 13:02:05.877173 -No vulnerabilities found. - - -irdan/valorem-vis -https://github.com/irdan/valorem-vis -Entry file: valorem-vis/valoremvis/main.py -Scanned: 2016-10-19 13:02:07.590488 -Vulnerability 1: -File: valorem-vis/valoremvis/main.py - > User input at line 15, trigger word "get(": - value = app.config['CACHE'].get(key) -Reassigned in: - File: valorem-vis/valoremvis/main.py - > Line 21: ret_MAYBE_FUNCTION_NAME = jsonify('success'True) -File: valorem-vis/valoremvis/main.py - > reaches line 18, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('value'value) - - - -aaronroe/vid2gifweb -https://github.com/aaronroe/vid2gifweb -Entry file: vid2gifweb/vid2gifweb.py -Scanned: 2016-10-19 13:02:10.392385 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -distortedsignal/python-sample -https://github.com/distortedsignal/python-sample -Entry file: python-sample/hello.py -Scanned: 2016-10-19 13:02:11.686954 -No vulnerabilities found. - - -rnowling/py-notes -https://github.com/rnowling/py-notes -Entry file: py-notes/py-notes/py-notes.py -Scanned: 2016-10-19 13:02:20.596185 -No vulnerabilities found. - - -cswank/hello-candidate -https://github.com/cswank/hello-candidate -Entry file: hello-candidate/hello/app.py -Scanned: 2016-10-19 13:02:22.015465 -No vulnerabilities found. - - -tottaz/Basic-Python-RESTful-Server -https://github.com/tottaz/Basic-Python-RESTful-Server -Entry file: None -Scanned: 2016-10-19 13:02:26.503083 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mjp2220/PlanMyNY-Backend -https://github.com/mjp2220/PlanMyNY-Backend -Entry file: PlanMyNY-Backend/__init__.py -Scanned: 2016-10-19 13:02:27.854299 -No vulnerabilities found. - - -JoeOBrien/tvLinks -https://github.com/JoeOBrien/tvLinks -Entry file: tvLinks/routes.py -Scanned: 2016-10-19 13:02:29.256163 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -igleyy/rabbit-eats-python -https://github.com/igleyy/rabbit-eats-python -Entry file: rabbit-eats-python/api/app.py -Scanned: 2016-10-19 13:02:31.694761 -No vulnerabilities found. - - -cameronbwhite/Flask-CAS -https://github.com/cameronbwhite/Flask-CAS -Entry file: Flask-CAS/setup.py -Scanned: 2016-10-19 13:02:34.449094 -No vulnerabilities found. - - -ejkul/flask -https://github.com/ejkul/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:02:41.590578 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -miguelgrinberg/api-pycon2014 -https://github.com/miguelgrinberg/api-pycon2014 -Entry file: api-pycon2014/api/app.py -Scanned: 2016-10-19 13:02:43.018651 -No vulnerabilities found. - - -iiSeymour/flasked-vincent -https://github.com/iiSeymour/flasked-vincent -Entry file: flasked-vincent/app.py -Scanned: 2016-10-19 13:02:44.490374 -No vulnerabilities found. - - -timeartist/flask_chutes -https://github.com/timeartist/flask_chutes -Entry file: flask_chutes/example/__init__.py -Scanned: 2016-10-19 13:02:48.401953 -No vulnerabilities found. - - -ltanady/flasktask -https://github.com/ltanady/flasktask -Entry file: flasktask/client.py -Scanned: 2016-10-19 13:02:53.120500 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pahaz/FaceMash-flask -https://github.com/pahaz/FaceMash-flask -Entry file: FaceMash-flask/_old/f_mash.py -Scanned: 2016-10-19 13:02:55.150593 -Vulnerability 1: -File: FaceMash-flask/_old/f_mash.py - > User input at line 87, trigger word "form[": - win_id = request.form['win_id'] -File: FaceMash-flask/_old/f_mash.py - > reaches line 88, trigger word "execute(": - cur = db.execute('select elo, times from users where id = %s' % win_id) - -Vulnerability 2: -File: FaceMash-flask/_old/f_mash.py - > User input at line 91, trigger word "form[": - lose_id = request.form['lose_id'] -File: FaceMash-flask/_old/f_mash.py - > reaches line 88, trigger word "execute(": - cur = db.execute('select elo, times from users where id = %s' % win_id) - -Vulnerability 3: -File: FaceMash-flask/_old/f_mash.py - > User input at line 87, trigger word "form[": - win_id = request.form['win_id'] -File: FaceMash-flask/_old/f_mash.py - > reaches line 92, trigger word "execute(": - cur = db.execute('select elo, times from users where id = %s' % lose_id) - -Vulnerability 4: -File: FaceMash-flask/_old/f_mash.py - > User input at line 91, trigger word "form[": - lose_id = request.form['lose_id'] -File: FaceMash-flask/_old/f_mash.py - > reaches line 92, trigger word "execute(": - cur = db.execute('select elo, times from users where id = %s' % lose_id) - -Vulnerability 5: -File: FaceMash-flask/_old/f_mash.py - > User input at line 87, trigger word "form[": - win_id = request.form['win_id'] -File: FaceMash-flask/_old/f_mash.py - > reaches line 101, trigger word "execute(": - db.execute('update users set elo = %f, times = %d where id = %s' % (win_elo, int(win_times) + 1, win_id)) - -Vulnerability 6: -File: FaceMash-flask/_old/f_mash.py - > User input at line 91, trigger word "form[": - lose_id = request.form['lose_id'] -File: FaceMash-flask/_old/f_mash.py - > reaches line 102, trigger word "execute(": - db.execute('update users set elo = %f, times = %s where id = %s' % (lose_elo, lose_times, lose_id)) - - - -masud/flaskblog -https://github.com/masud/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 13:02:56.713731 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -yuchixing/flaskApp -https://github.com/yuchixing/flaskApp -Entry file: flaskApp/apiApp_new.py -Scanned: 2016-10-19 13:03:03.043247 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mcardillo55/unfriended-flask -https://github.com/mcardillo55/unfriended-flask -Entry file: unfriended-flask/unfriended-flask/app.py -Scanned: 2016-10-19 13:03:04.964014 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bVector/bribe-flask -https://github.com/bVector/bribe-flask -Entry file: bribe-flask/wsgi/bribe.py -Scanned: 2016-10-19 13:03:09.030743 -No vulnerabilities found. - - -rmar89/gae-flask -https://github.com/rmar89/gae-flask -Entry file: gae-flask/main.py -Scanned: 2016-10-19 13:03:11.289360 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -rsj217/dtapi-flask -https://github.com/rsj217/dtapi-flask -Entry file: dtapi-flask/dtapi/api/__init__.py -Scanned: 2016-10-19 13:03:11.799928 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alpaca/flask-template -https://github.com/alpaca/flask-template -Entry file: None -Scanned: 2016-10-19 13:03:12.790985 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/alpaca/flask-template. - -saml/flask_contentnego -https://github.com/saml/flask_contentnego -Entry file: flask_contentnego/app.py -Scanned: 2016-10-19 13:03:18.132857 -Vulnerability 1: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 82, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 2: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 82, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 3: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 84, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',key=key, val=val) - -Vulnerability 4: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 84, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',key=key, val=val) - -Vulnerability 5: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 85, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 6: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 85, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 7: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 112, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 8: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 112, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 9: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 114, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',key=key, val=val) - -Vulnerability 10: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 114, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',key=key, val=val) - -Vulnerability 11: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 115, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 12: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 115, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 13: -File: flask_contentnego/test.py - > User input at line 23, trigger word "get(": - resp = self.client.get(url_for('classes.list')) -File: flask_contentnego/test.py - > reaches line 23, trigger word "url_for(": - resp = self.client.get(url_for('classes.list')) - -Vulnerability 14: -File: flask_contentnego/test.py - > User input at line 26, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 23, trigger word "url_for(": - resp = self.client.get(url_for('classes.list')) - -Vulnerability 15: -File: flask_contentnego/test.py - > User input at line 29, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 23, trigger word "url_for(": - resp = self.client.get(url_for('classes.list')) - -Vulnerability 16: -File: flask_contentnego/test.py - > User input at line 23, trigger word "get(": - resp = self.client.get(url_for('classes.list')) -File: flask_contentnego/test.py - > reaches line 26, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') - -Vulnerability 17: -File: flask_contentnego/test.py - > User input at line 26, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 26, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') - -Vulnerability 18: -File: flask_contentnego/test.py - > User input at line 29, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 26, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') - -Vulnerability 19: -File: flask_contentnego/test.py - > User input at line 23, trigger word "get(": - resp = self.client.get(url_for('classes.list')) -File: flask_contentnego/test.py - > reaches line 29, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') - -Vulnerability 20: -File: flask_contentnego/test.py - > User input at line 26, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 29, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') - -Vulnerability 21: -File: flask_contentnego/test.py - > User input at line 29, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 29, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') - - - -jlock6/Flask_Practice -https://github.com/jlock6/Flask_Practice -Entry file: Flask_Practice/hello.py -Scanned: 2016-10-19 13:03:22.469423 -No vulnerabilities found. - - -digaxfr/dhcpd-flask -https://github.com/digaxfr/dhcpd-flask -Entry file: None -Scanned: 2016-10-19 13:03:23.745454 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/digaxfr/dhcpd-flask. - -necavi/flask-test -https://github.com/necavi/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-19 13:03:25.277751 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -ffeast/flask-dbshell -https://github.com/ffeast/flask-dbshell -Entry file: flask-dbshell/example/manage.py -Scanned: 2016-10-19 13:03:31.958829 -No vulnerabilities found. - - -blastokid/Barebone-Flask-Template -https://github.com/blastokid/Barebone-Flask-Template -Entry file: Barebone-Flask-Template/app.py -Scanned: 2016-10-19 13:03:33.743754 -No vulnerabilities found. - - -davedg629/RedditRatings -https://github.com/davedg629/RedditRatings -Entry file: RedditRatings/app/__init__.py -Scanned: 2016-10-19 13:03:35.557510 -Vulnerability 1: -File: RedditRatings/app/views.py - > User input at line 132, trigger word "get(": - code = request.args.get('code', '') -Reassigned in: - File: RedditRatings/app/views.py - > Line 133: access_info = r.get_access_information(code) - File: RedditRatings/app/views.py - > Line 139: user = User(username=user_reddit.name, role_id=2, refresh_token=access_info['refresh_token']) - File: RedditRatings/app/views.py - > Line 147: user.refresh_token = access_info['refresh_token'] - File: RedditRatings/app/views.py - > Line 135: user = db.session.query(User).filter_by(username=user_reddit.name).first() -File: RedditRatings/app/views.py - > reaches line 150, trigger word "flash(": - flash('Hi ' + user.username + '! You have successfully' + ' logged in with your reddit account.') - -Vulnerability 2: -File: RedditRatings/app/views.py - > User input at line 391, trigger word ".data": - reddit_post = r.submit(form.subreddit.data, '[Community Rating] ' + form.reddit_title.data, reddit_body(form.description.data, form.title.data)) -Reassigned in: - File: RedditRatings/app/views.py - > Line 387: reddit_post = None - File: RedditRatings/app/views.py - > Line 401: new_thread = Thread(user_id=g.user.id, title=form.title.data, slug=make_slug(form.title.data), category_id=form.category.data, reddit_id=reddit_post.id, reddit_permalink=reddit_post.permalink, subreddit=form.subreddit.data, date_posted=datetime.now(), open_for_comments=True, last_crawl=datetime.now()) - File: RedditRatings/app/views.py - > Line 415: success_message = Markup('Your rating thread has been posted to reddit here.') - File: RedditRatings/app/views.py - > Line 455: new_thread = Thread(user_id=g.user.id, title=form.title.data, category_id=form.category.data, subreddit=form.subreddit.data, date_posted=datetime.now(), open_for_comments=True) -File: RedditRatings/app/views.py - > reaches line 421, trigger word "flash(": - flash(success_message) - -Vulnerability 3: -File: RedditRatings/app/views.py - > User input at line 415, trigger word "Markup(": - success_message = Markup('Your rating thread has been posted to reddit here.') -File: RedditRatings/app/views.py - > reaches line 421, trigger word "flash(": - flash(success_message) - -Vulnerability 4: -File: RedditRatings/app/views.py - > User input at line 467, trigger word ".data": - this_thread = db.session.query(Thread).filter_by(category_id=form.category.data).filter_by(title=form.title.data).first() -Reassigned in: - File: RedditRatings/app/views.py - > Line 423: this_thread = db.session.query(Thread).filter_by(reddit_id=reddit_post.id).first() - File: RedditRatings/app/views.py - > Line 479: ret_MAYBE_FUNCTION_NAME = render_template('create_thread.html',title='Create a Community Rating on reddit', page_title='Create a Community Rating on reddit', form=form) - File: RedditRatings/app/views.py - > Line 375: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: RedditRatings/app/views.py - > reaches line 427, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('thread',category_slug=this_thread.category.slug, thread_slug=this_thread.slug, thread_id=this_thread.id)) - -Vulnerability 5: -File: RedditRatings/app/views.py - > User input at line 467, trigger word ".data": - this_thread = db.session.query(Thread).filter_by(category_id=form.category.data).filter_by(title=form.title.data).first() -Reassigned in: - File: RedditRatings/app/views.py - > Line 423: this_thread = db.session.query(Thread).filter_by(reddit_id=reddit_post.id).first() - File: RedditRatings/app/views.py - > Line 479: ret_MAYBE_FUNCTION_NAME = render_template('create_thread.html',title='Create a Community Rating on reddit', page_title='Create a Community Rating on reddit', form=form) - File: RedditRatings/app/views.py - > Line 375: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: RedditRatings/app/views.py - > reaches line 427, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('thread',category_slug=this_thread.category.slug, thread_slug=this_thread.slug, thread_id=this_thread.id)) - -Vulnerability 6: -File: RedditRatings/app/views.py - > User input at line 447, trigger word "Markup(": - error_message = Markup('Something went wrong. Please try again or submit an [Issue] to /r/RedditRatings.') -File: RedditRatings/app/views.py - > reaches line 453, trigger word "flash(": - flash(error_message) - -Vulnerability 7: -File: RedditRatings/app/views.py - > User input at line 467, trigger word ".data": - this_thread = db.session.query(Thread).filter_by(category_id=form.category.data).filter_by(title=form.title.data).first() -Reassigned in: - File: RedditRatings/app/views.py - > Line 423: this_thread = db.session.query(Thread).filter_by(reddit_id=reddit_post.id).first() - File: RedditRatings/app/views.py - > Line 479: ret_MAYBE_FUNCTION_NAME = render_template('create_thread.html',title='Create a Community Rating on reddit', page_title='Create a Community Rating on reddit', form=form) - File: RedditRatings/app/views.py - > Line 375: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: RedditRatings/app/views.py - > reaches line 472, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('thread',category_slug=this_thread.category.slug, thread_slug=this_thread.slug, thread_id=this_thread.id)) - -Vulnerability 8: -File: RedditRatings/app/views.py - > User input at line 467, trigger word ".data": - this_thread = db.session.query(Thread).filter_by(category_id=form.category.data).filter_by(title=form.title.data).first() -Reassigned in: - File: RedditRatings/app/views.py - > Line 423: this_thread = db.session.query(Thread).filter_by(reddit_id=reddit_post.id).first() - File: RedditRatings/app/views.py - > Line 479: ret_MAYBE_FUNCTION_NAME = render_template('create_thread.html',title='Create a Community Rating on reddit', page_title='Create a Community Rating on reddit', form=form) - File: RedditRatings/app/views.py - > Line 375: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: RedditRatings/app/views.py - > reaches line 472, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('thread',category_slug=this_thread.category.slug, thread_slug=this_thread.slug, thread_id=this_thread.id)) - -Vulnerability 9: -File: RedditRatings/app/views.py - > User input at line 571, trigger word "Markup(": - success_message = Markup('This rating has been closed and updated on reddit.') -File: RedditRatings/app/views.py - > reaches line 578, trigger word "flash(": - flash(success_message) - - - -MattyO/flask-integration-demo -https://github.com/MattyO/flask-integration-demo -Entry file: flask-integration-demo/app.py -Scanned: 2016-10-19 13:03:37.408062 -No vulnerabilities found. - - -corbinbs/flask-api-talk -https://github.com/corbinbs/flask-api-talk -Entry file: flask-api-talk/classy-api/hubology/__init__.py -Scanned: 2016-10-19 13:03:38.767654 -No vulnerabilities found. - - -lucasnewman11/url-shortener-flask -https://github.com/lucasnewman11/url-shortener-flask -Entry file: url-shortener-flask/main.py -Scanned: 2016-10-19 13:03:41.606244 -No vulnerabilities found. - - -HelderVieira/flask_master_detail -https://github.com/HelderVieira/flask_master_detail -Entry file: flask_master_detail/app.py -Scanned: 2016-10-19 13:03:44.632289 -No vulnerabilities found. - - -pmccavana/chrisarcand.com-flask -https://github.com/pmccavana/chrisarcand.com-flask -Entry file: None -Scanned: 2016-10-19 13:03:50.822798 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pmccavana/chrisarcand.com-flask. - -ashleymcnamara/social_project_flask -https://github.com/ashleymcnamara/social_project_flask -Entry file: social_project_flask/app.py -Scanned: 2016-10-19 13:03:52.138713 -Vulnerability 1: -File: social_project_flask/app.py - > User input at line 36, trigger word "get(": - next_url = request.args.get('next') or url_for('hello_world') -File: social_project_flask/app.py - > reaches line 36, trigger word "url_for(": - next_url = request.args.get('next') or url_for('hello_world') - -Vulnerability 2: -File: social_project_flask/app.py - > User input at line 36, trigger word "get(": - next_url = request.args.get('next') or url_for('hello_world') -File: social_project_flask/app.py - > reaches line 39, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 3: -File: social_project_flask/app.py - > User input at line 36, trigger word "get(": - next_url = request.args.get('next') or url_for('hello_world') -File: social_project_flask/app.py - > reaches line 48, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - - - -rileonard15/python-gae-flask-classy -https://github.com/rileonard15/python-gae-flask-classy -Entry file: python-gae-flask-classy/main.py -Scanned: 2016-10-19 13:03:52.920110 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Gcav66/helloflask -https://github.com/Gcav66/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 13:03:55.468653 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -JPWKU/microblog -https://github.com/JPWKU/microblog -Entry file: None -Scanned: 2016-10-19 13:03:58.456919 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -michalskuza/pronunciation-finder -https://github.com/michalskuza/pronunciation-finder -Entry file: None -Scanned: 2016-10-19 13:04:05.574617 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/michalskuza/pronunciation-finder. - -max-k/pynauth -https://github.com/max-k/pynauth -Entry file: pynauth/pynauth.py -Scanned: 2016-10-19 13:04:07.028740 -No vulnerabilities found. - - -danilobellini/pyturing -https://github.com/danilobellini/pyturing -Entry file: pyturing/main.py -Scanned: 2016-10-19 13:04:08.902463 -Vulnerability 1: -File: pyturing/main.py - > User input at line 18, trigger word "form[": - tm = TuringMachine(request.form['machine']) -File: pyturing/main.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(tm.tape) - - - -mdutia/web -https://github.com/mdutia/web -Entry file: web/app/__init__.py -Scanned: 2016-10-19 13:04:10.343369 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lolyzor/pushnotifications-server -https://github.com/lolyzor/pushnotifications-server -Entry file: pushnotifications-server/main.py -Scanned: 2016-10-19 13:04:12.097563 -No vulnerabilities found. - - -droopy4096/fliki -https://github.com/droopy4096/fliki -Entry file: fliki/wiki.py -Scanned: 2016-10-19 13:04:14.526552 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -housne/pavements -https://github.com/housne/pavements -Entry file: pavements/apps/__init__.py -Scanned: 2016-10-19 13:04:16.316939 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -irdan/valorem-vis -https://github.com/irdan/valorem-vis -Entry file: valorem-vis/valoremvis/main.py -Scanned: 2016-10-19 13:04:17.918394 -Vulnerability 1: -File: valorem-vis/valoremvis/main.py - > User input at line 15, trigger word "get(": - value = app.config['CACHE'].get(key) -Reassigned in: - File: valorem-vis/valoremvis/main.py - > Line 21: ret_MAYBE_FUNCTION_NAME = jsonify('success'True) -File: valorem-vis/valoremvis/main.py - > reaches line 18, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('value'value) - - - -paylogic/settei-example -https://github.com/paylogic/settei-example -Entry file: settei-example/main.py -Scanned: 2016-10-19 13:04:19.242572 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marksamman/pylinkshortener -https://github.com/marksamman/pylinkshortener -Entry file: pylinkshortener/app/__init__.py -Scanned: 2016-10-19 13:04:23.663629 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -tkinst/hero-counters -https://github.com/tkinst/hero-counters -Entry file: hero-counters/__init__.py -Scanned: 2016-10-19 13:04:27.695785 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pallets/flask-website -https://github.com/pallets/flask-website -Entry file: flask-website/flask_website/__init__.py -Scanned: 2016-10-19 13:04:33.662683 -Vulnerability 1: -File: flask-website/flask_website/views/general.py - > User input at line 29, trigger word "get(": - q = request.args.get('q') or '' -Reassigned in: - File: flask-website/flask_website/views/general.py - > Line 33: results = perform_search(q,page=page) - File: flask-website/flask_website/views/general.py - > Line 31: results = None -File: flask-website/flask_website/views/general.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('general/search.html',results=results, q=q) - -Vulnerability 2: -File: flask-website/flask_website/views/general.py - > User input at line 30, trigger word "get(": - page = request.args.get('page',type=int) or 1 -Reassigned in: - File: flask-website/flask_website/views/general.py - > Line 33: results = perform_search(q,page=page) - File: flask-website/flask_website/views/general.py - > Line 31: results = None -File: flask-website/flask_website/views/general.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('general/search.html',results=results, q=q) - -Vulnerability 3: -File: flask-website/flask_website/views/general.py - > User input at line 89, trigger word "form[": - name = request.form['name'].strip() -Reassigned in: - File: flask-website/flask_website/views/general.py - > Line 87: name = g.user.name - File: flask-website/flask_website/views/general.py - > Line 93: g.user.name = name - File: flask-website/flask_website/views/general.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-website/flask_website/views/general.py - > reaches line 97, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('general/profile.html',name=name) - -Vulnerability 4: -File: flask-website/flask_website/views/snippets.py - > User input at line 30, trigger word "get(": - category_id = request.form.get('category',type=int) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 23: category_id = None - File: flask-website/flask_website/views/snippets.py - > Line 28: category_id = rv.id - File: flask-website/flask_website/views/snippets.py - > Line 39: category = Category.query.get(category_id) - File: flask-website/flask_website/views/snippets.py - > Line 41: snippet = Snippet(g.user, title, body, category) -File: flask-website/flask_website/views/snippets.py - > reaches line 45, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 5: -File: flask-website/flask_website/views/snippets.py - > User input at line 34, trigger word "form[": - title = request.form['title'] -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 41: snippet = Snippet(g.user, title, body, category) - File: flask-website/flask_website/views/snippets.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('snippets/new.html',categories=Category.query.order_by(Category.name).all(), active_category=category_id, preview=preview) -File: flask-website/flask_website/views/snippets.py - > reaches line 45, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 6: -File: flask-website/flask_website/views/snippets.py - > User input at line 35, trigger word "form[": - body = request.form['body'] -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 41: snippet = Snippet(g.user, title, body, category) - File: flask-website/flask_website/views/snippets.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('snippets/new.html',categories=Category.query.order_by(Category.name).all(), active_category=category_id, preview=preview) -File: flask-website/flask_website/views/snippets.py - > reaches line 45, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 7: -File: flask-website/flask_website/views/snippets.py - > User input at line 39, trigger word "get(": - category = Category.query.get(category_id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 41: snippet = Snippet(g.user, title, body, category) - File: flask-website/flask_website/views/snippets.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('snippets/new.html',categories=Category.query.order_by(Category.name).all(), active_category=category_id, preview=preview) -File: flask-website/flask_website/views/snippets.py - > reaches line 45, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 8: -File: flask-website/flask_website/views/snippets.py - > User input at line 30, trigger word "get(": - category_id = request.form.get('category',type=int) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 23: category_id = None - File: flask-website/flask_website/views/snippets.py - > Line 28: category_id = rv.id - File: flask-website/flask_website/views/snippets.py - > Line 39: category = Category.query.get(category_id) - File: flask-website/flask_website/views/snippets.py - > Line 41: snippet = Snippet(g.user, title, body, category) -File: flask-website/flask_website/views/snippets.py - > reaches line 46, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/new.html',categories=Category.query.order_by(Category.name).all(), active_category=category_id, preview=preview) - -Vulnerability 9: -File: flask-website/flask_website/views/snippets.py - > User input at line 32, trigger word "form[": - preview = format_creole(request.form['body']) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 24: preview = None - File: flask-website/flask_website/views/snippets.py - > Line 45: ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) -File: flask-website/flask_website/views/snippets.py - > reaches line 46, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/new.html',categories=Category.query.order_by(Category.name).all(), active_category=category_id, preview=preview) - -Vulnerability 10: -File: flask-website/flask_website/views/snippets.py - > User input at line 53, trigger word "get(": - snippet = Snippet.query.get(id) -File: flask-website/flask_website/views/snippets.py - > reaches line 57, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(snippet=snippet.to_json()) - -Vulnerability 11: -File: flask-website/flask_website/views/snippets.py - > User input at line 53, trigger word "get(": - snippet = Snippet.query.get(id) -File: flask-website/flask_website/views/snippets.py - > reaches line 65, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 12: -File: flask-website/flask_website/views/snippets.py - > User input at line 53, trigger word "get(": - snippet = Snippet.query.get(id) -File: flask-website/flask_website/views/snippets.py - > reaches line 66, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/show.html',snippet=snippet) - -Vulnerability 13: -File: flask-website/flask_website/views/snippets.py - > User input at line 72, trigger word "get(": - comment = Comment.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 75: form = dict(title=comment.title, text=comment.text) - File: flask-website/flask_website/views/snippets.py - > Line 89: comment.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 90: comment.text = form['text'] -File: flask-website/flask_website/views/snippets.py - > reaches line 81, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(comment.snippet.url) - -Vulnerability 14: -File: flask-website/flask_website/views/snippets.py - > User input at line 72, trigger word "get(": - comment = Comment.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 75: form = dict(title=comment.title, text=comment.text) - File: flask-website/flask_website/views/snippets.py - > Line 89: comment.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 90: comment.text = form['text'] -File: flask-website/flask_website/views/snippets.py - > reaches line 83, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(comment.snippet.url) - -Vulnerability 15: -File: flask-website/flask_website/views/snippets.py - > User input at line 72, trigger word "get(": - comment = Comment.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 75: form = dict(title=comment.title, text=comment.text) - File: flask-website/flask_website/views/snippets.py - > Line 89: comment.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 90: comment.text = form['text'] -File: flask-website/flask_website/views/snippets.py - > reaches line 93, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(comment.snippet.url) - -Vulnerability 16: -File: flask-website/flask_website/views/snippets.py - > User input at line 72, trigger word "get(": - comment = Comment.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 75: form = dict(title=comment.title, text=comment.text) - File: flask-website/flask_website/views/snippets.py - > Line 89: comment.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 90: comment.text = form['text'] -File: flask-website/flask_website/views/snippets.py - > reaches line 94, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/edit_comment.html',form=form, comment=comment) - -Vulnerability 17: -File: flask-website/flask_website/views/snippets.py - > User input at line 101, trigger word "get(": - snippet = Snippet.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 107: form = dict(title=snippet.title, body=snippet.body, category=snippet.category.id) - File: flask-website/flask_website/views/snippets.py - > Line 129: snippet.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 130: snippet.body = form['body'] - File: flask-website/flask_website/views/snippets.py - > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('snippets.index')) -File: flask-website/flask_website/views/snippets.py - > reaches line 134, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 18: -File: flask-website/flask_website/views/snippets.py - > User input at line 101, trigger word "get(": - snippet = Snippet.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 107: form = dict(title=snippet.title, body=snippet.body, category=snippet.category.id) - File: flask-website/flask_website/views/snippets.py - > Line 129: snippet.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 130: snippet.body = form['body'] - File: flask-website/flask_website/views/snippets.py - > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('snippets.index')) -File: flask-website/flask_website/views/snippets.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/edit.html',snippet=snippet, preview=preview, form=form, categories=Category.query.order_by(Category.name).all()) - -Vulnerability 19: -File: flask-website/flask_website/views/snippets.py - > User input at line 114, trigger word "form[": - preview = format_creole(request.form['body']) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 106: preview = None - File: flask-website/flask_website/views/snippets.py - > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('snippets.index')) - File: flask-website/flask_website/views/snippets.py - > Line 134: ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) -File: flask-website/flask_website/views/snippets.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/edit.html',snippet=snippet, preview=preview, form=form, categories=Category.query.order_by(Category.name).all()) - -Vulnerability 20: -File: flask-website/flask_website/views/snippets.py - > User input at line 171, trigger word "form[": - category = Category(name=request.form['name']) -File: flask-website/flask_website/views/snippets.py - > reaches line 174, trigger word "flash(": - flash('Category %s created.' % category.name) - -Vulnerability 21: -File: flask-website/flask_website/views/snippets.py - > User input at line 181, trigger word "get(": - category = Category.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) - File: flask-website/flask_website/views/snippets.py - > Line 204: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) -File: flask-website/flask_website/views/snippets.py - > reaches line 197, trigger word "flash(": - flash('Category %s deleted and entries moved to %s.' % (category.name, move_to.name)) - -Vulnerability 22: -File: flask-website/flask_website/views/snippets.py - > User input at line 188, trigger word "get(": - move_to_id = request.form.get('move_to',type=int) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 190: move_to = Category.query.get(move_to_id) - File: flask-website/flask_website/views/snippets.py - > Line 195: snippet.category = move_to -File: flask-website/flask_website/views/snippets.py - > reaches line 197, trigger word "flash(": - flash('Category %s deleted and entries moved to %s.' % (category.name, move_to.name)) - -Vulnerability 23: -File: flask-website/flask_website/views/snippets.py - > User input at line 190, trigger word "get(": - move_to = Category.query.get(move_to_id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 195: snippet.category = move_to -File: flask-website/flask_website/views/snippets.py - > reaches line 197, trigger word "flash(": - flash('Category %s deleted and entries moved to %s.' % (category.name, move_to.name)) - -Vulnerability 24: -File: flask-website/flask_website/views/snippets.py - > User input at line 181, trigger word "get(": - category = Category.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) - File: flask-website/flask_website/views/snippets.py - > Line 204: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) -File: flask-website/flask_website/views/snippets.py - > reaches line 202, trigger word "flash(": - flash('Category %s deleted' % category.name) - -Vulnerability 25: -File: flask-website/flask_website/views/snippets.py - > User input at line 181, trigger word "get(": - category = Category.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) - File: flask-website/flask_website/views/snippets.py - > Line 204: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) -File: flask-website/flask_website/views/snippets.py - > reaches line 205, trigger word "filter(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/delete_category.html',category=category, other_categories=Category.query.filter(Category.id != category.id).all()) - -Vulnerability 26: -File: flask-website/flask_website/views/snippets.py - > User input at line 181, trigger word "get(": - category = Category.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) - File: flask-website/flask_website/views/snippets.py - > Line 204: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) -File: flask-website/flask_website/views/snippets.py - > reaches line 205, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/delete_category.html',category=category, other_categories=Category.query.filter(Category.id != category.id).all()) - - - -tonyseek/flask-navigation -https://github.com/tonyseek/flask-navigation -Entry file: flask-navigation/examples/nested.py -Scanned: 2016-10-19 13:04:35.266877 -No vulnerabilities found. - - -gilles/flask-apns -https://github.com/gilles/flask-apns -Entry file: flask-apns/tests/__init__.py -Scanned: 2016-10-19 13:04:38.207536 -No vulnerabilities found. - - -hartleybrody/web_starter -https://github.com/hartleybrody/web_starter -Entry file: web_starter/app.py -Scanned: 2016-10-19 13:04:39.663688 -No vulnerabilities found. - - -switham/flask_via_fcgi -https://github.com/switham/flask_via_fcgi -Entry file: flask_via_fcgi/sponge.py -Scanned: 2016-10-19 13:04:41.571958 -No vulnerabilities found. - - -janmtl/flaskenberg -https://github.com/janmtl/flaskenberg -Entry file: None -Scanned: 2016-10-19 13:04:43.200797 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/janmtl/flaskenberg. - -dashdanw/flaskbook -https://github.com/dashdanw/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-19 13:04:43.752856 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -douglarek/restful -https://github.com/douglarek/restful -Entry file: restful/restful/__init__.py -Scanned: 2016-10-19 13:04:44.987821 -No vulnerabilities found. - - -abhijit148/FlaskREST -https://github.com/abhijit148/FlaskREST -Entry file: None -Scanned: 2016-10-19 13:04:46.212607 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/abhijit148/FlaskREST. - -mattkgross/flaskTest -https://github.com/mattkgross/flaskTest -Entry file: flaskTest/url.py -Scanned: 2016-10-19 13:04:46.718808 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cwmat/flask_test -https://github.com/cwmat/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 13:04:52.801208 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -disavowd/flask-pastebin -https://github.com/disavowd/flask-pastebin -Entry file: flask-pastebin/pastebin.py -Scanned: 2016-10-19 13:04:54.353248 -Vulnerability 1: -File: flask-pastebin/pastebin.py - > User input at line 79, trigger word "get(": - reply_to = request.args.get('reply_to',type=int) -Reassigned in: - File: flask-pastebin/pastebin.py - > Line 81: parent = Paste.query.get(reply_to) - File: flask-pastebin/pastebin.py - > Line 83: paste = Paste(g.user, request.form['code'],parent=parent) - File: flask-pastebin/pastebin.py - > Line 78: parent = None -File: flask-pastebin/pastebin.py - > reaches line 88, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_paste',paste_id=paste.id)) - -Vulnerability 2: -File: flask-pastebin/pastebin.py - > User input at line 81, trigger word "get(": - parent = Paste.query.get(reply_to) -Reassigned in: - File: flask-pastebin/pastebin.py - > Line 78: parent = None - File: flask-pastebin/pastebin.py - > Line 83: paste = Paste(g.user, request.form['code'],parent=parent) -File: flask-pastebin/pastebin.py - > reaches line 88, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_paste',paste_id=paste.id)) - -Vulnerability 3: -File: flask-pastebin/pastebin.py - > User input at line 83, trigger word "form[": - paste = Paste(g.user, request.form['code'],parent=parent) -Reassigned in: - File: flask-pastebin/pastebin.py - > Line 89: ret_MAYBE_FUNCTION_NAME = render_template('new_paste.html',parent=parent) -File: flask-pastebin/pastebin.py - > reaches line 88, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_paste',paste_id=paste.id)) - -Vulnerability 4: -File: flask-pastebin/pastebin.py - > User input at line 79, trigger word "get(": - reply_to = request.args.get('reply_to',type=int) -Reassigned in: - File: flask-pastebin/pastebin.py - > Line 81: parent = Paste.query.get(reply_to) - File: flask-pastebin/pastebin.py - > Line 83: paste = Paste(g.user, request.form['code'],parent=parent) - File: flask-pastebin/pastebin.py - > Line 78: parent = None -File: flask-pastebin/pastebin.py - > reaches line 88, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_paste',paste_id=paste.id)) - -Vulnerability 5: -File: flask-pastebin/pastebin.py - > User input at line 81, trigger word "get(": - parent = Paste.query.get(reply_to) -Reassigned in: - File: flask-pastebin/pastebin.py - > Line 78: parent = None - File: flask-pastebin/pastebin.py - > Line 83: paste = Paste(g.user, request.form['code'],parent=parent) -File: flask-pastebin/pastebin.py - > reaches line 88, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_paste',paste_id=paste.id)) - -Vulnerability 6: -File: flask-pastebin/pastebin.py - > User input at line 83, trigger word "form[": - paste = Paste(g.user, request.form['code'],parent=parent) -Reassigned in: - File: flask-pastebin/pastebin.py - > Line 89: ret_MAYBE_FUNCTION_NAME = render_template('new_paste.html',parent=parent) -File: flask-pastebin/pastebin.py - > reaches line 88, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_paste',paste_id=paste.id)) - -Vulnerability 7: -File: flask-pastebin/pastebin.py - > User input at line 79, trigger word "get(": - reply_to = request.args.get('reply_to',type=int) -Reassigned in: - File: flask-pastebin/pastebin.py - > Line 81: parent = Paste.query.get(reply_to) - File: flask-pastebin/pastebin.py - > Line 83: paste = Paste(g.user, request.form['code'],parent=parent) - File: flask-pastebin/pastebin.py - > Line 78: parent = None -File: flask-pastebin/pastebin.py - > reaches line 89, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('new_paste.html',parent=parent) - -Vulnerability 8: -File: flask-pastebin/pastebin.py - > User input at line 81, trigger word "get(": - parent = Paste.query.get(reply_to) -Reassigned in: - File: flask-pastebin/pastebin.py - > Line 78: parent = None - File: flask-pastebin/pastebin.py - > Line 83: paste = Paste(g.user, request.form['code'],parent=parent) -File: flask-pastebin/pastebin.py - > reaches line 89, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('new_paste.html',parent=parent) - -Vulnerability 9: -File: flask-pastebin/pastebin.py - > User input at line 140, trigger word "get(": - next_url = request.args.get('next') or url_for('new_paste') -File: flask-pastebin/pastebin.py - > reaches line 140, trigger word "url_for(": - next_url = request.args.get('next') or url_for('new_paste') - -Vulnerability 10: -File: flask-pastebin/pastebin.py - > User input at line 140, trigger word "get(": - next_url = request.args.get('next') or url_for('new_paste') -File: flask-pastebin/pastebin.py - > reaches line 143, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 11: -File: flask-pastebin/pastebin.py - > User input at line 148, trigger word ".data": - user = User.query.filter_by(fb_id=me.data['id']).first() -Reassigned in: - File: flask-pastebin/pastebin.py - > Line 150: user = User() - File: flask-pastebin/pastebin.py - > Line 156: session['user_id'] = user.id - File: flask-pastebin/pastebin.py - > Line 145: session['fb_access_token'] = (resp['access_token'], '') -File: flask-pastebin/pastebin.py - > reaches line 158, trigger word "flash(": - flash('You are now logged in as %s' % user.display_name) - -Vulnerability 12: -File: flask-pastebin/pastebin.py - > User input at line 140, trigger word "get(": - next_url = request.args.get('next') or url_for('new_paste') -File: flask-pastebin/pastebin.py - > reaches line 159, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - - - -bjpcjp/flask-demo -https://github.com/bjpcjp/flask-demo -Entry file: None -Scanned: 2016-10-19 13:04:56.889995 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bjpcjp/flask-demo. - -saml/flask_contentnego -https://github.com/saml/flask_contentnego -Entry file: flask_contentnego/app.py -Scanned: 2016-10-19 13:04:58.365597 -Vulnerability 1: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 82, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 2: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 82, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 3: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 84, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',key=key, val=val) - -Vulnerability 4: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 84, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',key=key, val=val) - -Vulnerability 5: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 85, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 6: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 85, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 7: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 112, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 8: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 112, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 9: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 114, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',key=key, val=val) - -Vulnerability 10: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 114, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',key=key, val=val) - -Vulnerability 11: -File: flask_contentnego/flask_contentnego.py - > User input at line 70, trigger word "get(": - val = db.get(key) -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 106: val = request.form['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 115, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 12: -File: flask_contentnego/flask_contentnego.py - > User input at line 106, trigger word "form[": - val = request.form['val'] -Reassigned in: - File: flask_contentnego/flask_contentnego.py - > Line 70: val = db.get(key) - File: flask_contentnego/flask_contentnego.py - > Line 95: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 97: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 98: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 405) - File: flask_contentnego/flask_contentnego.py - > Line 101: val = None - File: flask_contentnego/flask_contentnego.py - > Line 104: val = d['val'] - File: flask_contentnego/flask_contentnego.py - > Line 123: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 125: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 126: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 200) - File: flask_contentnego/flask_contentnego.py - > Line 130: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 132: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 133: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 75: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 77: ret_MAYBE_FUNCTION_NAME = (render_template('base.html',msg=msg), 404) - File: flask_contentnego/flask_contentnego.py - > Line 78: ret_MAYBE_FUNCTION_NAME = (jsonify(msg=msg), 404) -File: flask_contentnego/flask_contentnego.py - > reaches line 115, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(key=key, val=val) - -Vulnerability 13: -File: flask_contentnego/test.py - > User input at line 23, trigger word "get(": - resp = self.client.get(url_for('classes.list')) -File: flask_contentnego/test.py - > reaches line 23, trigger word "url_for(": - resp = self.client.get(url_for('classes.list')) - -Vulnerability 14: -File: flask_contentnego/test.py - > User input at line 26, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 23, trigger word "url_for(": - resp = self.client.get(url_for('classes.list')) - -Vulnerability 15: -File: flask_contentnego/test.py - > User input at line 29, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 23, trigger word "url_for(": - resp = self.client.get(url_for('classes.list')) - -Vulnerability 16: -File: flask_contentnego/test.py - > User input at line 23, trigger word "get(": - resp = self.client.get(url_for('classes.list')) -File: flask_contentnego/test.py - > reaches line 26, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') - -Vulnerability 17: -File: flask_contentnego/test.py - > User input at line 26, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 26, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') - -Vulnerability 18: -File: flask_contentnego/test.py - > User input at line 29, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 26, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') - -Vulnerability 19: -File: flask_contentnego/test.py - > User input at line 23, trigger word "get(": - resp = self.client.get(url_for('classes.list')) -File: flask_contentnego/test.py - > reaches line 29, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') - -Vulnerability 20: -File: flask_contentnego/test.py - > User input at line 26, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.2,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 29, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') - -Vulnerability 21: -File: flask_contentnego/test.py - > User input at line 29, trigger word "get(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') -File: flask_contentnego/test.py - > reaches line 29, trigger word "url_for(": - resp = self.client.get(url_for('classes.list'),headers='Accept''text/html;q=0.5,application/json;q=0.3') - - - -digaxfr/dhcpd-flask -https://github.com/digaxfr/dhcpd-flask -Entry file: None -Scanned: 2016-10-19 13:04:59.871935 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/digaxfr/dhcpd-flask. - -FGtatsuro/flask-boilerplate -https://github.com/FGtatsuro/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 13:05:05.386330 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/FGtatsuro/flask-boilerplate. - -mkaplenko/flask-dynstatic -https://github.com/mkaplenko/flask-dynstatic -Entry file: flask-dynstatic/test.py -Scanned: 2016-10-19 13:05:08.740456 -No vulnerabilities found. - - -yxssfxwzy/LabMeeting -https://github.com/yxssfxwzy/LabMeeting -Entry file: LabMeeting/flaskr.py -Scanned: 2016-10-19 13:05:10.311239 -No vulnerabilities found. - - -harokb/FlaskBootstrapStarterPack -https://github.com/harokb/FlaskBootstrapStarterPack -Entry file: FlaskBootstrapStarterPack/FlaskApp.py -Scanned: 2016-10-19 13:05:11.589544 -No vulnerabilities found. - - -mattkoskela/py-flask-auth -https://github.com/mattkoskela/py-flask-auth -Entry file: py-flask-auth/example/app.py -Scanned: 2016-10-19 13:05:13.038056 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Danielp3/flask-sql-example -https://github.com/Danielp3/flask-sql-example -Entry file: flask-sql-example/example_app/__init__.py -Scanned: 2016-10-19 13:05:16.318646 -No vulnerabilities found. - - -Chavjoh/PollFlaskPython -https://github.com/Chavjoh/PollFlaskPython -Entry file: PollFlaskPython/SpreadPoll.py -Scanned: 2016-10-19 13:05:17.736098 -No vulnerabilities found. - - -Avinash9/flask_rest_api -https://github.com/Avinash9/flask_rest_api -Entry file: flask_rest_api/app.py -Scanned: 2016-10-19 13:05:19.029224 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kholidfu/flask_login_mail -https://github.com/kholidfu/flask_login_mail -Entry file: None -Scanned: 2016-10-19 13:05:20.456618 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kholidfu/flask_login_mail. - -corbinbs/flask-api-talk -https://github.com/corbinbs/flask-api-talk -Entry file: flask-api-talk/classy-api/hubology/__init__.py -Scanned: 2016-10-19 13:05:24.754874 -No vulnerabilities found. - - -nickcharlton/empty-flask-app -https://github.com/nickcharlton/empty-flask-app -Entry file: empty-flask-app/example/__init__.py -Scanned: 2016-10-19 13:05:26.192801 -No vulnerabilities found. - - -eikonomega/flask-api-awesomesauce -https://github.com/eikonomega/flask-api-awesomesauce -Entry file: flask-api-awesomesauce/flask_api_awesomesauce/tests/test_api_decorators.py -Scanned: 2016-10-19 13:05:28.619990 -No vulnerabilities found. - - -eikonomega/flask-authorization-panda -https://github.com/eikonomega/flask-authorization-panda -Entry file: flask-authorization-panda/flask_authorization_panda/__init__.py -Scanned: 2016-10-19 13:05:33.195219 -No vulnerabilities found. - - -nfoonf/flask_auth_wrapper -https://github.com/nfoonf/flask_auth_wrapper -Entry file: flask_auth_wrapper/auth_wrapper/app.py -Scanned: 2016-10-19 13:05:34.484936 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shrayasr/learning-flask-login -https://github.com/shrayasr/learning-flask-login -Entry file: learning-flask-login/server.py -Scanned: 2016-10-19 13:05:38.547035 -No vulnerabilities found. - - -davidtwco/flask-markdown-app -https://github.com/davidtwco/flask-markdown-app -Entry file: flask-markdown-app/app/__init__.py -Scanned: 2016-10-19 13:05:40.368531 -Vulnerability 1: -File: flask-markdown-app/app/views.py - > User input at line 70, trigger word ".data": - e = Entry(form.article.data, form.title.data, datetime.date.today(), current_user) -Reassigned in: - File: flask-markdown-app/app/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('pages/new.html',form=form) -File: flask-markdown-app/app/views.py - > reaches line 73, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',id=e.id)) - -Vulnerability 2: -File: flask-markdown-app/app/views.py - > User input at line 70, trigger word ".data": - e = Entry(form.article.data, form.title.data, datetime.date.today(), current_user) -Reassigned in: - File: flask-markdown-app/app/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('pages/new.html',form=form) -File: flask-markdown-app/app/views.py - > reaches line 73, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',id=e.id)) - - - -Jayin/python-microblog -https://github.com/Jayin/python-microblog -Entry file: python-microblog/app/__init__.py -Scanned: 2016-10-19 13:05:41.681927 -No vulnerabilities found. - - -tim-tang/arctic-bear -https://github.com/tim-tang/arctic-bear -Entry file: None -Scanned: 2016-10-19 13:05:43.653915 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tim-tang/arctic-bear. - -asen6/fl_amartyasenguptadotcom -https://github.com/asen6/fl_amartyasenguptadotcom -Entry file: fl_amartyasenguptadotcom/fl_amartyasenguptadotcom/__init__.py -Scanned: 2016-10-19 13:05:50.251027 -No vulnerabilities found. - - -lizrush/webmap-app -https://github.com/lizrush/webmap-app -Entry file: webmap-app/app.py -Scanned: 2016-10-19 13:05:51.576638 -No vulnerabilities found. - - -nottings/flask_wsgi_nginx_app_skeleton -https://github.com/nottings/flask_wsgi_nginx_app_skeleton -Entry file: flask_wsgi_nginx_app_skeleton/module/__init__.py -Scanned: 2016-10-19 13:05:53.223691 -No vulnerabilities found. - - -xsteadfastx/fackernews -https://github.com/xsteadfastx/fackernews -Entry file: fackernews/app/app.py -Scanned: 2016-10-19 13:05:54.664991 -No vulnerabilities found. - - -sirfilip/microblog -https://github.com/sirfilip/microblog -Entry file: None -Scanned: 2016-10-19 13:05:55.178806 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nicholsonjf/abacus -https://github.com/nicholsonjf/abacus -Entry file: abacus/abacus.py -Scanned: 2016-10-19 13:05:56.585659 -Vulnerability 1: -File: abacus/abacus.py - > User input at line 74, trigger word "get(": - a = request.args.get('a', 0,type=int) -Reassigned in: - File: abacus/abacus.py - > Line 76: my_nums = Nums(num1=a, num2=b) -File: abacus/abacus.py - > reaches line 80, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result=my_nums.num3) - -Vulnerability 2: -File: abacus/abacus.py - > User input at line 75, trigger word "get(": - b = request.args.get('b', 0,type=int) -Reassigned in: - File: abacus/abacus.py - > Line 76: my_nums = Nums(num1=a, num2=b) -File: abacus/abacus.py - > reaches line 80, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result=my_nums.num3) - - - -relsqui/openqdb -https://github.com/relsqui/openqdb -Entry file: openqdb/app/__init__.py -Scanned: 2016-10-19 13:05:58.018773 -Vulnerability 1: -File: openqdb/app/views.py - > User input at line 35, trigger word ".data": - quote = Quotes(quote=form.quote.data, by=form.submitter.data) -File: openqdb/app/views.py - > reaches line 39, trigger word "flash(": - flash('Submitted quote #{}'.format(quote.id)) - - - -kxxoling/chatroom -https://github.com/kxxoling/chatroom -Entry file: chatroom/chatroom/views.py -Scanned: 2016-10-19 13:05:59.324083 -No vulnerabilities found. - - -DMzda/tilbot -https://github.com/DMzda/tilbot -Entry file: tilbot/tilbot/__init__.py -Scanned: 2016-10-19 13:06:00.750118 -No vulnerabilities found. - - -marksamman/pylinkshortener -https://github.com/marksamman/pylinkshortener -Entry file: pylinkshortener/app/__init__.py -Scanned: 2016-10-19 13:06:01.281149 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -CMThF/microblog -https://github.com/CMThF/microblog -Entry file: None -Scanned: 2016-10-19 13:06:01.779728 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mhaseebtariq/restful_oauth -https://github.com/mhaseebtariq/restful_oauth -Entry file: restful_oauth/urls.py -Scanned: 2016-10-19 13:06:08.339105 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mramirezmendez/python -https://github.com/mramirezmendez/python -Entry file: python/flask/microblog/app/__init__.py -Scanned: 2016-10-19 13:06:10.776324 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fubuki/python-bookmark-service -https://github.com/fubuki/python-bookmark-service -Entry file: python-bookmark-service/app.py -Scanned: 2016-10-19 13:06:12.429120 -Vulnerability 1: -File: python-bookmark-service/app.py - > User input at line 57, trigger word "get(": - url = request.args.get('url') -Reassigned in: - File: python-bookmark-service/app.py - > Line 59: bookmark = Bookmark(url=url) -File: python-bookmark-service/app.py - > reaches line 62, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - - - -bezineb5/ImageMatcher -https://github.com/bezineb5/ImageMatcher -Entry file: ImageMatcher/imagematcher.py -Scanned: 2016-10-19 13:06:13.932235 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pallets/flask-website -https://github.com/pallets/flask-website -Entry file: flask-website/flask_website/__init__.py -Scanned: 2016-10-19 13:06:19.466292 -Vulnerability 1: -File: flask-website/flask_website/views/general.py - > User input at line 29, trigger word "get(": - q = request.args.get('q') or '' -Reassigned in: - File: flask-website/flask_website/views/general.py - > Line 33: results = perform_search(q,page=page) - File: flask-website/flask_website/views/general.py - > Line 31: results = None -File: flask-website/flask_website/views/general.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('general/search.html',results=results, q=q) - -Vulnerability 2: -File: flask-website/flask_website/views/general.py - > User input at line 30, trigger word "get(": - page = request.args.get('page',type=int) or 1 -Reassigned in: - File: flask-website/flask_website/views/general.py - > Line 33: results = perform_search(q,page=page) - File: flask-website/flask_website/views/general.py - > Line 31: results = None -File: flask-website/flask_website/views/general.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('general/search.html',results=results, q=q) - -Vulnerability 3: -File: flask-website/flask_website/views/general.py - > User input at line 89, trigger word "form[": - name = request.form['name'].strip() -Reassigned in: - File: flask-website/flask_website/views/general.py - > Line 87: name = g.user.name - File: flask-website/flask_website/views/general.py - > Line 93: g.user.name = name - File: flask-website/flask_website/views/general.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-website/flask_website/views/general.py - > reaches line 97, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('general/profile.html',name=name) - -Vulnerability 4: -File: flask-website/flask_website/views/snippets.py - > User input at line 30, trigger word "get(": - category_id = request.form.get('category',type=int) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 23: category_id = None - File: flask-website/flask_website/views/snippets.py - > Line 28: category_id = rv.id - File: flask-website/flask_website/views/snippets.py - > Line 39: category = Category.query.get(category_id) - File: flask-website/flask_website/views/snippets.py - > Line 41: snippet = Snippet(g.user, title, body, category) -File: flask-website/flask_website/views/snippets.py - > reaches line 45, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 5: -File: flask-website/flask_website/views/snippets.py - > User input at line 34, trigger word "form[": - title = request.form['title'] -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 41: snippet = Snippet(g.user, title, body, category) - File: flask-website/flask_website/views/snippets.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('snippets/new.html',categories=Category.query.order_by(Category.name).all(), active_category=category_id, preview=preview) -File: flask-website/flask_website/views/snippets.py - > reaches line 45, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 6: -File: flask-website/flask_website/views/snippets.py - > User input at line 35, trigger word "form[": - body = request.form['body'] -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 41: snippet = Snippet(g.user, title, body, category) - File: flask-website/flask_website/views/snippets.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('snippets/new.html',categories=Category.query.order_by(Category.name).all(), active_category=category_id, preview=preview) -File: flask-website/flask_website/views/snippets.py - > reaches line 45, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 7: -File: flask-website/flask_website/views/snippets.py - > User input at line 39, trigger word "get(": - category = Category.query.get(category_id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 41: snippet = Snippet(g.user, title, body, category) - File: flask-website/flask_website/views/snippets.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('snippets/new.html',categories=Category.query.order_by(Category.name).all(), active_category=category_id, preview=preview) -File: flask-website/flask_website/views/snippets.py - > reaches line 45, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 8: -File: flask-website/flask_website/views/snippets.py - > User input at line 30, trigger word "get(": - category_id = request.form.get('category',type=int) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 23: category_id = None - File: flask-website/flask_website/views/snippets.py - > Line 28: category_id = rv.id - File: flask-website/flask_website/views/snippets.py - > Line 39: category = Category.query.get(category_id) - File: flask-website/flask_website/views/snippets.py - > Line 41: snippet = Snippet(g.user, title, body, category) -File: flask-website/flask_website/views/snippets.py - > reaches line 46, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/new.html',categories=Category.query.order_by(Category.name).all(), active_category=category_id, preview=preview) - -Vulnerability 9: -File: flask-website/flask_website/views/snippets.py - > User input at line 32, trigger word "form[": - preview = format_creole(request.form['body']) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 24: preview = None - File: flask-website/flask_website/views/snippets.py - > Line 45: ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) -File: flask-website/flask_website/views/snippets.py - > reaches line 46, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/new.html',categories=Category.query.order_by(Category.name).all(), active_category=category_id, preview=preview) - -Vulnerability 10: -File: flask-website/flask_website/views/snippets.py - > User input at line 53, trigger word "get(": - snippet = Snippet.query.get(id) -File: flask-website/flask_website/views/snippets.py - > reaches line 57, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(snippet=snippet.to_json()) - -Vulnerability 11: -File: flask-website/flask_website/views/snippets.py - > User input at line 53, trigger word "get(": - snippet = Snippet.query.get(id) -File: flask-website/flask_website/views/snippets.py - > reaches line 65, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 12: -File: flask-website/flask_website/views/snippets.py - > User input at line 53, trigger word "get(": - snippet = Snippet.query.get(id) -File: flask-website/flask_website/views/snippets.py - > reaches line 66, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/show.html',snippet=snippet) - -Vulnerability 13: -File: flask-website/flask_website/views/snippets.py - > User input at line 72, trigger word "get(": - comment = Comment.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 75: form = dict(title=comment.title, text=comment.text) - File: flask-website/flask_website/views/snippets.py - > Line 89: comment.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 90: comment.text = form['text'] -File: flask-website/flask_website/views/snippets.py - > reaches line 81, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(comment.snippet.url) - -Vulnerability 14: -File: flask-website/flask_website/views/snippets.py - > User input at line 72, trigger word "get(": - comment = Comment.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 75: form = dict(title=comment.title, text=comment.text) - File: flask-website/flask_website/views/snippets.py - > Line 89: comment.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 90: comment.text = form['text'] -File: flask-website/flask_website/views/snippets.py - > reaches line 83, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(comment.snippet.url) - -Vulnerability 15: -File: flask-website/flask_website/views/snippets.py - > User input at line 72, trigger word "get(": - comment = Comment.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 75: form = dict(title=comment.title, text=comment.text) - File: flask-website/flask_website/views/snippets.py - > Line 89: comment.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 90: comment.text = form['text'] -File: flask-website/flask_website/views/snippets.py - > reaches line 93, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(comment.snippet.url) - -Vulnerability 16: -File: flask-website/flask_website/views/snippets.py - > User input at line 72, trigger word "get(": - comment = Comment.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 75: form = dict(title=comment.title, text=comment.text) - File: flask-website/flask_website/views/snippets.py - > Line 89: comment.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 90: comment.text = form['text'] -File: flask-website/flask_website/views/snippets.py - > reaches line 94, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/edit_comment.html',form=form, comment=comment) - -Vulnerability 17: -File: flask-website/flask_website/views/snippets.py - > User input at line 101, trigger word "get(": - snippet = Snippet.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 107: form = dict(title=snippet.title, body=snippet.body, category=snippet.category.id) - File: flask-website/flask_website/views/snippets.py - > Line 129: snippet.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 130: snippet.body = form['body'] - File: flask-website/flask_website/views/snippets.py - > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('snippets.index')) -File: flask-website/flask_website/views/snippets.py - > reaches line 134, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) - -Vulnerability 18: -File: flask-website/flask_website/views/snippets.py - > User input at line 101, trigger word "get(": - snippet = Snippet.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 107: form = dict(title=snippet.title, body=snippet.body, category=snippet.category.id) - File: flask-website/flask_website/views/snippets.py - > Line 129: snippet.title = form['title'] - File: flask-website/flask_website/views/snippets.py - > Line 130: snippet.body = form['body'] - File: flask-website/flask_website/views/snippets.py - > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('snippets.index')) -File: flask-website/flask_website/views/snippets.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/edit.html',snippet=snippet, preview=preview, form=form, categories=Category.query.order_by(Category.name).all()) - -Vulnerability 19: -File: flask-website/flask_website/views/snippets.py - > User input at line 114, trigger word "form[": - preview = format_creole(request.form['body']) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 106: preview = None - File: flask-website/flask_website/views/snippets.py - > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('snippets.index')) - File: flask-website/flask_website/views/snippets.py - > Line 134: ret_MAYBE_FUNCTION_NAME = redirect(snippet.url) -File: flask-website/flask_website/views/snippets.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/edit.html',snippet=snippet, preview=preview, form=form, categories=Category.query.order_by(Category.name).all()) - -Vulnerability 20: -File: flask-website/flask_website/views/snippets.py - > User input at line 171, trigger word "form[": - category = Category(name=request.form['name']) -File: flask-website/flask_website/views/snippets.py - > reaches line 174, trigger word "flash(": - flash('Category %s created.' % category.name) - -Vulnerability 21: -File: flask-website/flask_website/views/snippets.py - > User input at line 181, trigger word "get(": - category = Category.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) - File: flask-website/flask_website/views/snippets.py - > Line 204: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) -File: flask-website/flask_website/views/snippets.py - > reaches line 197, trigger word "flash(": - flash('Category %s deleted and entries moved to %s.' % (category.name, move_to.name)) - -Vulnerability 22: -File: flask-website/flask_website/views/snippets.py - > User input at line 188, trigger word "get(": - move_to_id = request.form.get('move_to',type=int) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 190: move_to = Category.query.get(move_to_id) - File: flask-website/flask_website/views/snippets.py - > Line 195: snippet.category = move_to -File: flask-website/flask_website/views/snippets.py - > reaches line 197, trigger word "flash(": - flash('Category %s deleted and entries moved to %s.' % (category.name, move_to.name)) - -Vulnerability 23: -File: flask-website/flask_website/views/snippets.py - > User input at line 190, trigger word "get(": - move_to = Category.query.get(move_to_id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 195: snippet.category = move_to -File: flask-website/flask_website/views/snippets.py - > reaches line 197, trigger word "flash(": - flash('Category %s deleted and entries moved to %s.' % (category.name, move_to.name)) - -Vulnerability 24: -File: flask-website/flask_website/views/snippets.py - > User input at line 181, trigger word "get(": - category = Category.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) - File: flask-website/flask_website/views/snippets.py - > Line 204: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) -File: flask-website/flask_website/views/snippets.py - > reaches line 202, trigger word "flash(": - flash('Category %s deleted' % category.name) - -Vulnerability 25: -File: flask-website/flask_website/views/snippets.py - > User input at line 181, trigger word "get(": - category = Category.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) - File: flask-website/flask_website/views/snippets.py - > Line 204: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) -File: flask-website/flask_website/views/snippets.py - > reaches line 205, trigger word "filter(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/delete_category.html',category=category, other_categories=Category.query.filter(Category.id != category.id).all()) - -Vulnerability 26: -File: flask-website/flask_website/views/snippets.py - > User input at line 181, trigger word "get(": - category = Category.query.get(id) -Reassigned in: - File: flask-website/flask_website/views/snippets.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) - File: flask-website/flask_website/views/snippets.py - > Line 204: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.manage_categories')) -File: flask-website/flask_website/views/snippets.py - > reaches line 205, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('snippets/delete_category.html',category=category, other_categories=Category.query.filter(Category.id != category.id).all()) - - - -wooyek/flask-social-blueprint -https://github.com/wooyek/flask-social-blueprint -Entry file: None -Scanned: 2016-10-19 13:06:22.643626 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wooyek/flask-social-blueprint. - -sasaporta/flask-security-admin-example -https://github.com/sasaporta/flask-security-admin-example -Entry file: flask-security-admin-example/main.py -Scanned: 2016-10-19 13:06:23.973221 -No vulnerabilities found. - - -thisissoon/Flask-Velox -https://github.com/thisissoon/Flask-Velox -Entry file: Flask-Velox/flask_velox/mixins/context.py -Scanned: 2016-10-19 13:06:26.605220 -No vulnerabilities found. - - -areski/a2billing-flask-api -https://github.com/areski/a2billing-flask-api -Entry file: a2billing-flask-api/a2billing_flask_api/app.py -Scanned: 2016-10-19 13:06:31.247241 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pbt-templates/flask -https://github.com/pbt-templates/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:06:33.833689 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -gblanchard4/flask -https://github.com/gblanchard4/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:06:35.369595 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -ellisonleao/Flask-Gist -https://github.com/ellisonleao/Flask-Gist -Entry file: None -Scanned: 2016-10-19 13:06:40.243323 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ellisonleao/Flask-Gist. - -ryanj/flask-hbase-todos -https://github.com/ryanj/flask-hbase-todos -Entry file: flask-hbase-todos/todoapp.py -Scanned: 2016-10-19 13:06:41.896080 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -plredmond-archive/flask-oauth-hackerschool-py -https://github.com/plredmond-archive/flask-oauth-hackerschool-py -Entry file: flask-oauth-hackerschool-py/example.py -Scanned: 2016-10-19 13:06:43.430963 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -xsleonard/flask-dogstatsd -https://github.com/xsleonard/flask-dogstatsd -Entry file: flask-dogstatsd/tests/test_flask_dogstatsd.py -Scanned: 2016-10-19 13:06:44.764730 -No vulnerabilities found. - - -GordonsBeard/cafe-flask -https://github.com/GordonsBeard/cafe-flask -Entry file: cafe-flask/cafesite.py -Scanned: 2016-10-19 13:06:46.641809 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ranom123/flaskdump -https://github.com/ranom123/flaskdump -Entry file: flaskdump/venv/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 13:06:55.679714 -No vulnerabilities found. - - -mvrmoreira/flaskr -https://github.com/mvrmoreira/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:06:56.223738 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kevmo/flaskr -https://github.com/kevmo/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:06:56.714277 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MatthewJWalls/FlaskStrap -https://github.com/MatthewJWalls/FlaskStrap -Entry file: FlaskStrap/app.py -Scanned: 2016-10-19 13:06:58.078650 -No vulnerabilities found. - - -hiroaki-yamamoto/flask-error -https://github.com/hiroaki-yamamoto/flask-error -Entry file: flask-error/test.py -Scanned: 2016-10-19 13:06:59.412894 -No vulnerabilities found. - - -Risto-Stevcev/flask-mongodb -https://github.com/Risto-Stevcev/flask-mongodb -Entry file: flask-mongodb/tumblelog/tumblelog/__init__.py -Scanned: 2016-10-19 13:07:01.126015 -No vulnerabilities found. - - -zlkca/flask-cms -https://github.com/zlkca/flask-cms -Entry file: flask-cms/flaskCMS/flaskCMS/__init__.py -Scanned: 2016-10-19 13:07:01.692786 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nikhilalmeida/flask-template -https://github.com/nikhilalmeida/flask-template -Entry file: None -Scanned: 2016-10-19 13:07:03.185179 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nikhilalmeida/flask-template. - -gblanchard4/keg_flask -https://github.com/gblanchard4/keg_flask -Entry file: keg_flask/keg_flask.py -Scanned: 2016-10-19 13:07:04.550396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -php-technolog/flask-uniteller -https://github.com/php-technolog/flask-uniteller -Entry file: flask-uniteller/console/__init__.py -Scanned: 2016-10-19 13:07:09.955454 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -almeida-marcusaf/estudos-Flask -https://github.com/almeida-marcusaf/estudos-Flask -Entry file: None -Scanned: 2016-10-19 13:07:12.210389 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/almeida-marcusaf/estudos-Flask. - -mkaplenko/flask-dynstatic -https://github.com/mkaplenko/flask-dynstatic -Entry file: flask-dynstatic/test.py -Scanned: 2016-10-19 13:07:16.506533 -No vulnerabilities found. - - -sionc/microblog -https://github.com/sionc/microblog -Entry file: None -Scanned: 2016-10-19 13:07:19.021401 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pellenberger/FlaskNetworkAnalyzer -https://github.com/pellenberger/FlaskNetworkAnalyzer -Entry file: FlaskNetworkAnalyzer/flaskNetworkAnalyzer.py -Scanned: 2016-10-19 13:07:22.487237 -No vulnerabilities found. - - -harokb/FlaskBootstrapStarterPack -https://github.com/harokb/FlaskBootstrapStarterPack -Entry file: FlaskBootstrapStarterPack/FlaskApp.py -Scanned: 2016-10-19 13:07:23.703478 -No vulnerabilities found. - - -smholloway/toopher-iframe-example-in-python -https://github.com/smholloway/toopher-iframe-example-in-python -Entry file: toopher-iframe-example-in-python/app.py -Scanned: 2016-10-19 13:07:24.932739 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -her0e1c1/gae-flask-tamplae -https://github.com/her0e1c1/gae-flask-tamplae -Entry file: gae-flask-tamplae/gae/application/__init__.py -Scanned: 2016-10-19 13:07:29.020870 -No vulnerabilities found. - - -GDG-DAKAR/webservices_python_flask -https://github.com/GDG-DAKAR/webservices_python_flask -Entry file: webservices_python_flask/main.py -Scanned: 2016-10-19 13:07:30.529012 -No vulnerabilities found. - - -Wolniewicz/Flask_And_Robot -https://github.com/Wolniewicz/Flask_And_Robot -Entry file: Flask_And_Robot/app.py -Scanned: 2016-10-19 13:07:34.893194 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -robsugar/MyFlaskRepo -https://github.com/robsugar/MyFlaskRepo -Entry file: MyFlaskRepo/appHandle.py -Scanned: 2016-10-19 13:07:36.613901 -No vulnerabilities found. - - -biilmann/flask-token-auth -https://github.com/biilmann/flask-token-auth -Entry file: flask-token-auth/app.py -Scanned: 2016-10-19 13:07:40.430071 -No vulnerabilities found. - - -ANB2/flask-basic-template -https://github.com/ANB2/flask-basic-template -Entry file: flask-basic-template/app.py -Scanned: 2016-10-19 13:07:43.331317 -No vulnerabilities found. - - -erm1lov/py-microblog -https://github.com/erm1lov/py-microblog -Entry file: py-microblog/app/__init__.py -Scanned: 2016-10-19 13:07:46.432535 -No vulnerabilities found. - - -dharmit/microblog -https://github.com/dharmit/microblog -Entry file: None -Scanned: 2016-10-19 13:07:46.932132 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tejovanthn/tejovanthn -https://github.com/tejovanthn/tejovanthn -Entry file: tejovanthn/routes.py -Scanned: 2016-10-19 13:07:54.168649 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ppmi-bsu/belt-server -https://github.com/ppmi-bsu/belt-server -Entry file: belt-server/src/main.py -Scanned: 2016-10-19 13:07:58.597147 -Vulnerability 1: -File: belt-server/src/main.py - > User input at line 15, trigger word "form[": - length = request.method == 'POST'request.form['length']128 -Reassigned in: - File: belt-server/src/main.py - > Line 17: keys = jbelt.genKeys(int(length)) - File: belt-server/src/main.py - > Line 19: keys['priv'] = base64.b64encode(str(keys['priv'])) - File: belt-server/src/main.py - > Line 20: keys['pub'] = base64.b64encode(str(keys['pub'])) -File: belt-server/src/main.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('keys.html',keys) - -Vulnerability 2: -File: belt-server/src/main.py - > User input at line 36, trigger word "form[": - key = request.form['key'].strip() -Reassigned in: - File: belt-server/src/main.py - > Line 38: encrypted = jbelt.enc(xml, base64.b64decode(key)) - File: belt-server/src/main.py - > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('enc.html') -File: belt-server/src/main.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dec.html',xml=prettify(encrypted), button_label='Зашифровать') - -Vulnerability 3: -File: belt-server/src/main.py - > User input at line 37, trigger word "form[": - xml = request.form['xml'].strip() -Reassigned in: - File: belt-server/src/main.py - > Line 38: encrypted = jbelt.enc(xml, base64.b64decode(key)) - File: belt-server/src/main.py - > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('enc.html') -File: belt-server/src/main.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dec.html',xml=prettify(encrypted), button_label='Зашифровать') - -Vulnerability 4: -File: belt-server/src/main.py - > User input at line 44, trigger word "form[": - key = request.form['key'].strip() -Reassigned in: - File: belt-server/src/main.py - > Line 46: decrypted = jbelt.dec(xml, base64.b64decode(key)) -File: belt-server/src/main.py - > reaches line 47, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('enc.html',xml=decrypted) - -Vulnerability 5: -File: belt-server/src/main.py - > User input at line 45, trigger word "form[": - xml = request.form['xml'].strip() -Reassigned in: - File: belt-server/src/main.py - > Line 46: decrypted = jbelt.dec(xml, base64.b64decode(key)) -File: belt-server/src/main.py - > reaches line 47, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('enc.html',xml=decrypted) - -Vulnerability 6: -File: belt-server/src/main.py - > User input at line 54, trigger word "form[": - key = request.form['key'].strip() -Reassigned in: - File: belt-server/src/main.py - > Line 60: key = request.form['key'].strip() - File: belt-server/src/main.py - > Line 67: signed = jbelt.sign(xml,keys=jbelt.calc_keys(base64.b64decode(key))) - File: belt-server/src/main.py - > Line 68: is_valid = jbelt.verify(signed) - File: belt-server/src/main.py - > Line 71: ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml='', signed='', key=base64.b64encode(str(jbelt.genKeys()['priv']))) - File: belt-server/src/main.py - > Line 62: signed = request.form['signed'].strip() - File: belt-server/src/main.py - > Line 63: is_valid = False - File: belt-server/src/main.py - > Line 65: is_valid = jbelt.verify(signed) -File: belt-server/src/main.py - > reaches line 58, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml=file.read(), signed='', key=key, is_valid=True) - -Vulnerability 7: -File: belt-server/src/main.py - > User input at line 57, trigger word "files[": - file = request.files['file'] -File: belt-server/src/main.py - > reaches line 58, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml=file.read(), signed='', key=key, is_valid=True) - -Vulnerability 8: -File: belt-server/src/main.py - > User input at line 60, trigger word "form[": - key = request.form['key'].strip() -Reassigned in: - File: belt-server/src/main.py - > Line 54: key = request.form['key'].strip() - File: belt-server/src/main.py - > Line 67: signed = jbelt.sign(xml,keys=jbelt.calc_keys(base64.b64decode(key))) - File: belt-server/src/main.py - > Line 68: is_valid = jbelt.verify(signed) - File: belt-server/src/main.py - > Line 71: ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml='', signed='', key=base64.b64encode(str(jbelt.genKeys()['priv']))) - File: belt-server/src/main.py - > Line 62: signed = request.form['signed'].strip() - File: belt-server/src/main.py - > Line 63: is_valid = False - File: belt-server/src/main.py - > Line 65: is_valid = jbelt.verify(signed) -File: belt-server/src/main.py - > reaches line 58, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml=file.read(), signed='', key=key, is_valid=True) - -Vulnerability 9: -File: belt-server/src/main.py - > User input at line 54, trigger word "form[": - key = request.form['key'].strip() -Reassigned in: - File: belt-server/src/main.py - > Line 60: key = request.form['key'].strip() - File: belt-server/src/main.py - > Line 67: signed = jbelt.sign(xml,keys=jbelt.calc_keys(base64.b64decode(key))) - File: belt-server/src/main.py - > Line 68: is_valid = jbelt.verify(signed) - File: belt-server/src/main.py - > Line 71: ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml='', signed='', key=base64.b64encode(str(jbelt.genKeys()['priv']))) - File: belt-server/src/main.py - > Line 62: signed = request.form['signed'].strip() - File: belt-server/src/main.py - > Line 63: is_valid = False - File: belt-server/src/main.py - > Line 65: is_valid = jbelt.verify(signed) -File: belt-server/src/main.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml=xml, signed=signed, key=key, is_valid=is_valid) - -Vulnerability 10: -File: belt-server/src/main.py - > User input at line 60, trigger word "form[": - key = request.form['key'].strip() -Reassigned in: - File: belt-server/src/main.py - > Line 54: key = request.form['key'].strip() - File: belt-server/src/main.py - > Line 67: signed = jbelt.sign(xml,keys=jbelt.calc_keys(base64.b64decode(key))) - File: belt-server/src/main.py - > Line 68: is_valid = jbelt.verify(signed) - File: belt-server/src/main.py - > Line 71: ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml='', signed='', key=base64.b64encode(str(jbelt.genKeys()['priv']))) - File: belt-server/src/main.py - > Line 62: signed = request.form['signed'].strip() - File: belt-server/src/main.py - > Line 63: is_valid = False - File: belt-server/src/main.py - > Line 65: is_valid = jbelt.verify(signed) -File: belt-server/src/main.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml=xml, signed=signed, key=key, is_valid=is_valid) - -Vulnerability 11: -File: belt-server/src/main.py - > User input at line 61, trigger word "form[": - xml = request.form['xml'].strip() -Reassigned in: - File: belt-server/src/main.py - > Line 67: signed = jbelt.sign(xml,keys=jbelt.calc_keys(base64.b64decode(key))) - File: belt-server/src/main.py - > Line 68: is_valid = jbelt.verify(signed) - File: belt-server/src/main.py - > Line 71: ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml='', signed='', key=base64.b64encode(str(jbelt.genKeys()['priv']))) - File: belt-server/src/main.py - > Line 58: ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml=file.read(), signed='', key=key, is_valid=True) - File: belt-server/src/main.py - > Line 62: signed = request.form['signed'].strip() - File: belt-server/src/main.py - > Line 63: is_valid = False - File: belt-server/src/main.py - > Line 65: is_valid = jbelt.verify(signed) -File: belt-server/src/main.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml=xml, signed=signed, key=key, is_valid=is_valid) - -Vulnerability 12: -File: belt-server/src/main.py - > User input at line 62, trigger word "form[": - signed = request.form['signed'].strip() -Reassigned in: - File: belt-server/src/main.py - > Line 65: is_valid = jbelt.verify(signed) - File: belt-server/src/main.py - > Line 67: signed = jbelt.sign(xml,keys=jbelt.calc_keys(base64.b64decode(key))) - File: belt-server/src/main.py - > Line 68: is_valid = jbelt.verify(signed) - File: belt-server/src/main.py - > Line 71: ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml='', signed='', key=base64.b64encode(str(jbelt.genKeys()['priv']))) - File: belt-server/src/main.py - > Line 58: ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml=file.read(), signed='', key=key, is_valid=True) - File: belt-server/src/main.py - > Line 63: is_valid = False -File: belt-server/src/main.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sign.html',xml=xml, signed=signed, key=key, is_valid=is_valid) - - - -yhfyhf/yhfWeibo -https://github.com/yhfyhf/yhfWeibo -Entry file: yhfWeibo/yhfWeibo.py -Scanned: 2016-10-19 13:08:00.731180 -No vulnerabilities found. - - -r0rshark/iOccupancyServer -https://github.com/r0rshark/iOccupancyServer -Entry file: iOccupancyServer/app.py -Scanned: 2016-10-19 13:08:02.293713 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mskog/cheapskate -https://github.com/mskog/cheapskate -Entry file: cheapskate/cheapskate.py -Scanned: 2016-10-19 13:08:03.555806 -Vulnerability 1: -File: cheapskate/cheapskate.py - > User input at line 15, trigger word "get(": - url = request.args.get('url', '') -Reassigned in: - File: cheapskate/cheapskate.py - > Line 20: result = 'url''top_image''text'urlurl'' - File: cheapskate/cheapskate.py - > Line 27: article = Article(url) - File: cheapskate/cheapskate.py - > Line 33: ret_MAYBE_FUNCTION_NAME = ('', 422) - File: cheapskate/cheapskate.py - > Line 40: result = 'url''top_image''text'urltop_imagearticle.text -File: cheapskate/cheapskate.py - > reaches line 25, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 2: -File: cheapskate/cheapskate.py - > User input at line 15, trigger word "get(": - url = request.args.get('url', '') -Reassigned in: - File: cheapskate/cheapskate.py - > Line 20: result = 'url''top_image''text'urlurl'' - File: cheapskate/cheapskate.py - > Line 27: article = Article(url) - File: cheapskate/cheapskate.py - > Line 33: ret_MAYBE_FUNCTION_NAME = ('', 422) - File: cheapskate/cheapskate.py - > Line 40: result = 'url''top_image''text'urltop_imagearticle.text -File: cheapskate/cheapskate.py - > reaches line 46, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(result) - -Vulnerability 3: -File: cheapskate/cheapskate.py - > User input at line 50, trigger word "get(": - url = request.args.get('url', '') -Reassigned in: - File: cheapskate/cheapskate.py - > Line 57: article = Article(url) - File: cheapskate/cheapskate.py - > Line 63: ret_MAYBE_FUNCTION_NAME = ('', 422) - File: cheapskate/cheapskate.py - > Line 71: ret_MAYBE_FUNCTION_NAME = redirect(top_image) - File: cheapskate/cheapskate.py - > Line 73: ret_MAYBE_FUNCTION_NAME = ('', 422) -File: cheapskate/cheapskate.py - > reaches line 55, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - - - -lindseybrockman/api-cache -https://github.com/lindseybrockman/api-cache -Entry file: api-cache/models.py -Scanned: 2016-10-19 13:08:05.979411 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gchacaltana/APIFlaskPython -https://github.com/gchacaltana/APIFlaskPython -Entry file: APIFlaskPython/api.py -Scanned: 2016-10-19 13:08:07.283531 -No vulnerabilities found. - - -kxxoling/chatroom -https://github.com/kxxoling/chatroom -Entry file: chatroom/chatroom/views.py -Scanned: 2016-10-19 13:08:08.606032 -No vulnerabilities found. - - -jonwalch/littleURL -https://github.com/jonwalch/littleURL -Entry file: littleURL/shortener.py -Scanned: 2016-10-19 13:08:11.789268 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: littleURL/lib/python3.3/struct.py - -PyPanel/testflaskapp -https://github.com/PyPanel/testflaskapp -Entry file: testflaskapp/testflaskapp/__init__.py -Scanned: 2016-10-19 13:08:13.120666 -No vulnerabilities found. - - -rfaugeroux/instant_server -https://github.com/rfaugeroux/instant_server -Entry file: instant_server/auth_server/server/__init__.py -Scanned: 2016-10-19 13:08:14.653099 -No vulnerabilities found. - - -vbshah1992/microblog -https://github.com/vbshah1992/microblog -Entry file: None -Scanned: 2016-10-19 13:08:15.645735 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -subsetpark/pyACH -https://github.com/subsetpark/pyACH -Entry file: pyACH/ach_web.py -Scanned: 2016-10-19 13:08:17.072194 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -pigeonflight/ughchat -https://github.com/pigeonflight/ughchat -Entry file: ughchat/main.py -Scanned: 2016-10-19 13:08:18.812773 -No vulnerabilities found. - - -areski/a2billing-flask-api -https://github.com/areski/a2billing-flask-api -Entry file: a2billing-flask-api/a2billing_flask_api/app.py -Scanned: 2016-10-19 13:08:23.422735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mastersoftwaresolutions/flask -https://github.com/mastersoftwaresolutions/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:08:24.962320 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -pbt-templates/flask -https://github.com/pbt-templates/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:08:25.553069 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -dlbewley/flask-todo -https://github.com/dlbewley/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-19 13:08:29.078683 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ranom123/flaskdump -https://github.com/ranom123/flaskdump -Entry file: flaskdump/venv/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-19 13:08:35.649176 -No vulnerabilities found. - - -neukzhou/flaskblog -https://github.com/neukzhou/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 13:08:36.222825 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -aphivantrakul/flaskr -https://github.com/aphivantrakul/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:08:36.784418 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joseph8th/flaskapp -https://github.com/joseph8th/flaskapp -Entry file: None -Scanned: 2016-10-19 13:08:38.300738 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/joseph8th/flaskapp. - -lkbm/flaskr -https://github.com/lkbm/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:08:40.862229 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Ideabin/Ideabin -https://github.com/Ideabin/Ideabin -Entry file: Ideabin/frontend/__init__.py -Scanned: 2016-10-19 13:08:43.737372 -No vulnerabilities found. - - -simonm/flaskCamel -https://github.com/simonm/flaskCamel -Entry file: flaskCamel/flaskcamel/__init__.py -Scanned: 2016-10-19 13:08:45.207384 -Vulnerability 1: -File: flaskCamel/flaskcamel/views.py - > User input at line 162, trigger word ".data": - admin = Users.query.filter_by(username=form.username.data).first() -File: flaskCamel/flaskcamel/views.py - > reaches line 166, trigger word "flash(": - flash(admin.username + ' logged in') - -Vulnerability 2: -File: flaskCamel/flaskcamel/views.py - > User input at line 183, trigger word ".data": - user = Users.query.filter_by(username=form.username.data).first() -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 185: user = Users.query.filter_by(email=form.email.data).first() - File: flaskCamel/flaskcamel/views.py - > Line 192: key = s.dumps([user.username, user.email]) - File: flaskCamel/flaskcamel/views.py - > Line 194: msg = Message('Password reset',sender='your_id@your_host.com', recipients=[user.email]) - File: flaskCamel/flaskcamel/views.py - > Line 195: msg.html = 'Click on this link to reset your password. #http://127.0.0.1:5000/passwordreset/ ' + key + '' -File: flaskCamel/flaskcamel/views.py - > reaches line 202, trigger word "flash(": - flash('Email sent to: ' + user.email) - -Vulnerability 3: -File: flaskCamel/flaskcamel/views.py - > User input at line 185, trigger word ".data": - user = Users.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 183: user = Users.query.filter_by(username=form.username.data).first() - File: flaskCamel/flaskcamel/views.py - > Line 192: key = s.dumps([user.username, user.email]) - File: flaskCamel/flaskcamel/views.py - > Line 194: msg = Message('Password reset',sender='your_id@your_host.com', recipients=[user.email]) - File: flaskCamel/flaskcamel/views.py - > Line 195: msg.html = 'Click on this link to reset your password. #http://127.0.0.1:5000/passwordreset/ ' + key + '' -File: flaskCamel/flaskcamel/views.py - > reaches line 202, trigger word "flash(": - flash('Email sent to: ' + user.email) - -Vulnerability 4: -File: flaskCamel/flaskcamel/views.py - > User input at line 252, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 280: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flaskCamel/flaskcamel/views.py - > reaches line 252, trigger word "url_for(": - next_url = request.args.get('next') or url_for('index') - -Vulnerability 5: -File: flaskCamel/flaskcamel/views.py - > User input at line 252, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 280: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flaskCamel/flaskcamel/views.py - > reaches line 255, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 6: -File: flaskCamel/flaskcamel/views.py - > User input at line 259, trigger word "get(": - me = facebook.get('/me') -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 264: fb_username = me.data['username'] - File: flaskCamel/flaskcamel/views.py - > Line 266: fb_username = me.data['name'] - File: flaskCamel/flaskcamel/views.py - > Line 268: fb_email = me.data['email'] - File: flaskCamel/flaskcamel/views.py - > Line 271: user = Users(fb_username, 'temp', fb_email, role) - File: flaskCamel/flaskcamel/views.py - > Line 272: user.fb_id = me.data['id'] - File: flaskCamel/flaskcamel/views.py - > Line 277: session['user_id'] = user.uid - File: flaskCamel/flaskcamel/views.py - > Line 257: session['fb_access_token'] = (resp['access_token'], '') - File: flaskCamel/flaskcamel/views.py - > Line 260: user = Users.query.filter_by(fb_id=me.data['id']).first() -File: flaskCamel/flaskcamel/views.py - > reaches line 279, trigger word "flash(": - flash('You are now logged in as %s' % user.username) - -Vulnerability 7: -File: flaskCamel/flaskcamel/views.py - > User input at line 260, trigger word ".data": - user = Users.query.filter_by(fb_id=me.data['id']).first() -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 271: user = Users(fb_username, 'temp', fb_email, role) - File: flaskCamel/flaskcamel/views.py - > Line 277: session['user_id'] = user.uid - File: flaskCamel/flaskcamel/views.py - > Line 257: session['fb_access_token'] = (resp['access_token'], '') -File: flaskCamel/flaskcamel/views.py - > reaches line 279, trigger word "flash(": - flash('You are now logged in as %s' % user.username) - -Vulnerability 8: -File: flaskCamel/flaskcamel/views.py - > User input at line 264, trigger word ".data": - fb_username = me.data['username'] -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 266: fb_username = me.data['name'] - File: flaskCamel/flaskcamel/views.py - > Line 271: user = Users(fb_username, 'temp', fb_email, role) - File: flaskCamel/flaskcamel/views.py - > Line 277: session['user_id'] = user.uid - File: flaskCamel/flaskcamel/views.py - > Line 257: session['fb_access_token'] = (resp['access_token'], '') - File: flaskCamel/flaskcamel/views.py - > Line 260: user = Users.query.filter_by(fb_id=me.data['id']).first() -File: flaskCamel/flaskcamel/views.py - > reaches line 279, trigger word "flash(": - flash('You are now logged in as %s' % user.username) - -Vulnerability 9: -File: flaskCamel/flaskcamel/views.py - > User input at line 266, trigger word ".data": - fb_username = me.data['name'] -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 264: fb_username = me.data['username'] - File: flaskCamel/flaskcamel/views.py - > Line 271: user = Users(fb_username, 'temp', fb_email, role) - File: flaskCamel/flaskcamel/views.py - > Line 277: session['user_id'] = user.uid - File: flaskCamel/flaskcamel/views.py - > Line 257: session['fb_access_token'] = (resp['access_token'], '') - File: flaskCamel/flaskcamel/views.py - > Line 260: user = Users.query.filter_by(fb_id=me.data['id']).first() -File: flaskCamel/flaskcamel/views.py - > reaches line 279, trigger word "flash(": - flash('You are now logged in as %s' % user.username) - -Vulnerability 10: -File: flaskCamel/flaskcamel/views.py - > User input at line 268, trigger word ".data": - fb_email = me.data['email'] -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 271: user = Users(fb_username, 'temp', fb_email, role) - File: flaskCamel/flaskcamel/views.py - > Line 277: session['user_id'] = user.uid - File: flaskCamel/flaskcamel/views.py - > Line 257: session['fb_access_token'] = (resp['access_token'], '') - File: flaskCamel/flaskcamel/views.py - > Line 260: user = Users.query.filter_by(fb_id=me.data['id']).first() -File: flaskCamel/flaskcamel/views.py - > reaches line 279, trigger word "flash(": - flash('You are now logged in as %s' % user.username) - - - -colehudson/flaskApp -https://github.com/colehudson/flaskApp -Entry file: flaskApp/apiApp_new.py -Scanned: 2016-10-19 13:08:45.747491 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DoubleSpout/flask_mvc -https://github.com/DoubleSpout/flask_mvc -Entry file: flask_mvc/trymenu/__init__.py -Scanned: 2016-10-19 13:08:49.639906 -No vulnerabilities found. - - -stroud109/flask_data -https://github.com/stroud109/flask_data -Entry file: flask_data/flask_data.py -Scanned: 2016-10-19 13:08:55.872821 -No vulnerabilities found. - - -Risto-Stevcev/flask-mongodb -https://github.com/Risto-Stevcev/flask-mongodb -Entry file: flask-mongodb/tumblelog/tumblelog/__init__.py -Scanned: 2016-10-19 13:09:00.184284 -No vulnerabilities found. - - -marcelrieger/Flask-Openshift -https://github.com/marcelrieger/Flask-Openshift -Entry file: Flask-Openshift/wsgi/app/__init__.py -Scanned: 2016-10-19 13:09:01.613401 -No vulnerabilities found. - - -infecto/flask-tutorial -https://github.com/infecto/flask-tutorial -Entry file: None -Scanned: 2016-10-19 13:09:03.114436 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -almeida-marcusaf/estudos-Flask -https://github.com/almeida-marcusaf/estudos-Flask -Entry file: None -Scanned: 2016-10-19 13:09:04.626263 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/almeida-marcusaf/estudos-Flask. - -steven-mercatante/Flask-sandbox -https://github.com/steven-mercatante/Flask-sandbox -Entry file: Flask-sandbox/app/__init__.py -Scanned: 2016-10-19 13:09:08.874815 -No vulnerabilities found. - - -stroud109/flask_galore -https://github.com/stroud109/flask_galore -Entry file: flask_galore/flask_galore.py -Scanned: 2016-10-19 13:09:10.088666 -No vulnerabilities found. - - -agutoli/flask-easy -https://github.com/agutoli/flask-easy -Entry file: flask-easy/examples/rest_api/server.py -Scanned: 2016-10-19 13:09:11.336769 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mictadlo/flask-examples -https://github.com/mictadlo/flask-examples -Entry file: flask-examples/Guestbook/app.py -Scanned: 2016-10-19 13:09:14.581680 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aberle/robo-flask -https://github.com/aberle/robo-flask -Entry file: robo-flask/robo.py -Scanned: 2016-10-19 13:09:15.818163 -No vulnerabilities found. - - -menglewis/cookiecutter-flask -https://github.com/menglewis/cookiecutter-flask -Entry file: None -Scanned: 2016-10-19 13:09:16.320912 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/menglewis/cookiecutter-flask. - -dastagg/flask-talk -https://github.com/dastagg/flask-talk -Entry file: flask-talk/app/__init__.py -Scanned: 2016-10-19 13:09:17.537876 -No vulnerabilities found. - - -chiangf/flask-boiler -https://github.com/chiangf/flask-boiler -Entry file: None -Scanned: 2016-10-19 13:09:18.047529 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ISEAGE-ISU/itocdc-2014-www -https://github.com/ISEAGE-ISU/itocdc-2014-www -Entry file: itocdc-2014-www/webapp.py -Scanned: 2016-10-19 13:09:20.662092 -No vulnerabilities found. - - -Wolniewicz/Flask_And_Robot -https://github.com/Wolniewicz/Flask_And_Robot -Entry file: Flask_And_Robot/app.py -Scanned: 2016-10-19 13:09:22.263081 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GDG-DAKAR/webservices_python_flask -https://github.com/GDG-DAKAR/webservices_python_flask -Entry file: webservices_python_flask/main.py -Scanned: 2016-10-19 13:09:25.544001 -No vulnerabilities found. - - -Bloodevil/flask_cache_server -https://github.com/Bloodevil/flask_cache_server -Entry file: flask_cache_server/main.py -Scanned: 2016-10-19 13:09:26.849294 -Vulnerability 1: -File: flask_cache_server/cached/tumblr.py - > User input at line 7, trigger word "get(": - r = requests.get(url) -Reassigned in: - File: flask_cache_server/cached/tumblr.py - > Line 16: content = r.content - File: flask_cache_server/cached/tumblr.py - > Line 17: ret_MAYBE_FUNCTION_NAME = content - File: flask_cache_server/cached/tumblr.py - > Line 10: post = 'created''modified''url''content'datetime.now()Noneurlcontent -File: flask_cache_server/cached/tumblr.py - > reaches line 9, trigger word "replace(": - content = r.content.replace(app.config['target_domain'], app.config['server']) - - - -biilmann/flask-token-auth -https://github.com/biilmann/flask-token-auth -Entry file: flask-token-auth/app.py -Scanned: 2016-10-19 13:09:28.128811 -No vulnerabilities found. - - -hnphan/wtf-server-flask -https://github.com/hnphan/wtf-server-flask -Entry file: wtf-server-flask/app.py -Scanned: 2016-10-19 13:09:32.225916 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PuZheng/Flask-DataBrowser -https://github.com/PuZheng/Flask-DataBrowser -Entry file: Flask-DataBrowser/flask_databrowser/test/basetest.py -Scanned: 2016-10-19 13:09:32.753588 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vosahloj/flasky_original -https://github.com/vosahloj/flasky_original -Entry file: flasky_original/hello.py -Scanned: 2016-10-19 13:09:38.111536 -No vulnerabilities found. - - -tejovanthn/tejovanthn -https://github.com/tejovanthn/tejovanthn -Entry file: tejovanthn/routes.py -Scanned: 2016-10-19 13:09:38.610553 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mixedmedia/WebApp -https://github.com/mixedmedia/WebApp -Entry file: WebApp/hello.py -Scanned: 2016-10-19 13:09:40.839476 -No vulnerabilities found. - - -r0rshark/iOccupancyServer -https://github.com/r0rshark/iOccupancyServer -Entry file: iOccupancyServer/app.py -Scanned: 2016-10-19 13:09:42.380785 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aliyarahman/community-learning-site -https://github.com/aliyarahman/community-learning-site -Entry file: community-learning-site/app/__init__.py -Scanned: 2016-10-19 13:09:48.656159 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lindseybrockman/api-cache -https://github.com/lindseybrockman/api-cache -Entry file: api-cache/models.py -Scanned: 2016-10-19 13:09:49.145139 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Dinoshauer/img-resize -https://github.com/Dinoshauer/img-resize -Entry file: img-resize/app.py -Scanned: 2016-10-19 13:09:50.830467 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andreagrandi/floggr -https://github.com/andreagrandi/floggr -Entry file: floggr/floggr.py -Scanned: 2016-10-19 13:09:52.144955 -No vulnerabilities found. - - -bloy/contact-potion -https://github.com/bloy/contact-potion -Entry file: contact-potion/contact_potion/app.py -Scanned: 2016-10-19 13:09:53.476202 -No vulnerabilities found. - - -jonwalch/littleURL -https://github.com/jonwalch/littleURL -Entry file: littleURL/shortener.py -Scanned: 2016-10-19 13:09:57.061076 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: littleURL/lib/python3.3/struct.py - -bw-giraffe/Venus -https://github.com/bw-giraffe/Venus -Entry file: Venus/venusapp.py -Scanned: 2016-10-19 13:10:01.293878 -No vulnerabilities found. - - -dastagg/microblog -https://github.com/dastagg/microblog -Entry file: None -Scanned: 2016-10-19 13:10:01.782288 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lazy-night/yukkuri-server -https://github.com/lazy-night/yukkuri-server -Entry file: yukkuri-server/app.py -Scanned: 2016-10-19 13:10:06.904849 -No vulnerabilities found. - - -vbshah1992/microblog -https://github.com/vbshah1992/microblog -Entry file: None -Scanned: 2016-10-19 13:10:07.446329 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Rorosha/sqlApp -https://github.com/Rorosha/sqlApp -Entry file: sqlApp/app.py -Scanned: 2016-10-19 13:10:08.770984 -No vulnerabilities found. - - -DMzda/cann-tables -https://github.com/DMzda/cann-tables -Entry file: cann-tables/cann_tables/__init__.py -Scanned: 2016-10-19 13:10:10.130810 -Vulnerability 1: -File: cann-tables/cann_tables/views.py - > User input at line 32, trigger word "get(": - wanted_leagues = request.cookies.get('leagues').split(',') -Reassigned in: - File: cann-tables/cann_tables/views.py - > Line 16: wanted_leagues = None - File: cann-tables/cann_tables/views.py - > Line 22: wanted_leagues = request.form.getlist('league') - File: cann-tables/cann_tables/views.py - > Line 35: leagues = [league for league in all_leagues] - File: cann-tables/cann_tables/views.py - > Line 39: leagues = all_leagues - File: cann-tables/cann_tables/views.py - > Line 63: ret_MAYBE_FUNCTION_NAME = response - File: cann-tables/cann_tables/views.py - > Line 15: leagues = None - File: cann-tables/cann_tables/views.py - > Line 25: leagues = all_leagues -File: cann-tables/cann_tables/views.py - > reaches line 53, trigger word "render_template(": - response = make_response(render_template('index.html',all_leagues=all_leagues, leagues=leagues, data=data, filtered=filtered)) - -Vulnerability 2: -File: cann-tables/cann_tables/views.py - > User input at line 32, trigger word "get(": - wanted_leagues = request.cookies.get('leagues').split(',') -Reassigned in: - File: cann-tables/cann_tables/views.py - > Line 16: wanted_leagues = None - File: cann-tables/cann_tables/views.py - > Line 22: wanted_leagues = request.form.getlist('league') - File: cann-tables/cann_tables/views.py - > Line 35: leagues = [league for league in all_leagues] - File: cann-tables/cann_tables/views.py - > Line 39: leagues = all_leagues - File: cann-tables/cann_tables/views.py - > Line 63: ret_MAYBE_FUNCTION_NAME = response - File: cann-tables/cann_tables/views.py - > Line 15: leagues = None - File: cann-tables/cann_tables/views.py - > Line 25: leagues = all_leagues -File: cann-tables/cann_tables/views.py - > reaches line 61, trigger word "set_cookie(": - response.set_cookie('leagues', ','.join(wanted_leagues),expires=expires) - -Vulnerability 3: -File: cann-tables/cann_tables/views.py - > User input at line 84, trigger word ".data": - user = User.query.filter(User.username == form.username.data).first() -File: cann-tables/cann_tables/views.py - > reaches line 84, trigger word "filter(": - user = User.query.filter(User.username == form.username.data).first() - - - -pigeonflight/ughchat -https://github.com/pigeonflight/ughchat -Entry file: ughchat/main.py -Scanned: 2016-10-19 13:10:11.658776 -No vulnerabilities found. - - -elvinyung/quimbu -https://github.com/elvinyung/quimbu -Entry file: quimbu/quimbu.py -Scanned: 2016-10-19 13:10:12.984531 -Vulnerability 1: -File: quimbu/quimbu.py - > User input at line 64, trigger word "form[": - username = request.form['username'] -File: quimbu/quimbu.py - > reaches line 67, trigger word "execute(": - elif db.execute('select * from accounts where username=?', (username)).fetchone(): - -Vulnerability 2: -File: quimbu/quimbu.py - > User input at line 64, trigger word "form[": - username = request.form['username'] -File: quimbu/quimbu.py - > reaches line 77, trigger word "execute(": - db.execute('insert into accounts (username, password, acctType) values (?, ?, ?)', (username, password, acct_type)) - -Vulnerability 3: -File: quimbu/quimbu.py - > User input at line 71, trigger word "form[": - password = request.form['password'] -File: quimbu/quimbu.py - > reaches line 77, trigger word "execute(": - db.execute('insert into accounts (username, password, acctType) values (?, ?, ?)', (username, password, acct_type)) - -Vulnerability 4: -File: quimbu/quimbu.py - > User input at line 89, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: quimbu/quimbu.py - > Line 99: session['username'] = username - File: quimbu/quimbu.py - > Line 98: session['logged_in'] = True -File: quimbu/quimbu.py - > reaches line 90, trigger word "execute(": - username_row = db.execute('select * from accounts where username=?', (username)).fetchone() - -Vulnerability 5: -File: quimbu/quimbu.py - > User input at line 127, trigger word "form[": - post_title = request.form['title'] -File: quimbu/quimbu.py - > reaches line 136, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - -Vulnerability 6: -File: quimbu/quimbu.py - > User input at line 131, trigger word "form[": - post_link = request.form['link'] -File: quimbu/quimbu.py - > reaches line 136, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - -Vulnerability 7: -File: quimbu/quimbu.py - > User input at line 132, trigger word "form[": - post_content = request.form['content'] -File: quimbu/quimbu.py - > reaches line 136, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - - - -csu/IdeaDB -https://github.com/csu/IdeaDB -Entry file: IdeaDB/server.py -Scanned: 2016-10-19 13:10:16.385613 -No vulnerabilities found. - - -baliga-lab/mtbwebtools -https://github.com/baliga-lab/mtbwebtools -Entry file: mtbwebtools/app/__init__.py -Scanned: 2016-10-19 13:10:18.603320 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Rosk/flasqlite -https://github.com/Rosk/flasqlite -Entry file: flasqlite/app/__init__.py -Scanned: 2016-10-19 13:10:20.079530 -Vulnerability 1: -File: flasqlite/app/__init__.py - > User input at line 159, trigger word "form[": - user = query_db('select * from user where user_name = ?', [request.form['username']],one=True) -Reassigned in: - File: flasqlite/app/__init__.py - > Line 167: session['user_id'] = user['user_id'] - File: flasqlite/app/__init__.py - > Line 168: session['user_name'] = user['user_name'] - File: flasqlite/app/__init__.py - > Line 169: session['user_status'] = user['user_status'] - File: flasqlite/app/__init__.py - > Line 170: session['user_points'] = user['user_points'] -File: flasqlite/app/__init__.py - > reaches line 165, trigger word "flash(": - flash('Sie sind jetzt eingeloggt. Herzlich Willkommen, ' + user['user_name'] + '!', 'hinweis') - -Vulnerability 2: -File: flasqlite/app/__init__.py - > User input at line 203, trigger word "form[": - uname = request.form['user_name'] -Reassigned in: - File: flasqlite/app/__init__.py - > Line 225: session['user_name'] = uname - File: flasqlite/app/__init__.py - > Line 226: session['user_edit'] = True - File: flasqlite/app/__init__.py - > Line 201: session['user_edit'] = False -File: flasqlite/app/__init__.py - > reaches line 222, trigger word "execute(": - db.execute('UPDATE user SET user_name=?, user_email=?, user_land=? WHERE user_id=?', [uname, uemail, uland, uid]) - -Vulnerability 3: -File: flasqlite/app/__init__.py - > User input at line 204, trigger word "form[": - uemail = request.form['user_email'] -File: flasqlite/app/__init__.py - > reaches line 222, trigger word "execute(": - db.execute('UPDATE user SET user_name=?, user_email=?, user_land=? WHERE user_id=?', [uname, uemail, uland, uid]) - -Vulnerability 4: -File: flasqlite/app/__init__.py - > User input at line 205, trigger word "form[": - uland = request.form['user_land'] -File: flasqlite/app/__init__.py - > reaches line 222, trigger word "execute(": - db.execute('UPDATE user SET user_name=?, user_email=?, user_land=? WHERE user_id=?', [uname, uemail, uland, uid]) - -Vulnerability 5: -File: flasqlite/app/jscripts.py - > User input at line 14, trigger word "get(": - a = request.args.get('a', 0,type=int) -Reassigned in: - File: flasqlite/app/jscripts.py - > Line 16: res = a + b -File: flasqlite/app/jscripts.py - > reaches line 17, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(ergebnis=res) - -Vulnerability 6: -File: flasqlite/app/jscripts.py - > User input at line 15, trigger word "get(": - b = request.args.get('b', 0,type=int) -Reassigned in: - File: flasqlite/app/jscripts.py - > Line 16: res = a + b -File: flasqlite/app/jscripts.py - > reaches line 17, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(ergebnis=res) - - - -fengsp/flask-session -https://github.com/fengsp/flask-session -Entry file: flask-session/examples/hello.py -Scanned: 2016-10-19 13:10:22.635967 -No vulnerabilities found. - - -marshmallow-code/flask-marshmallow -https://github.com/marshmallow-code/flask-marshmallow -Entry file: flask-marshmallow/flask_marshmallow/__init__.py -Scanned: 2016-10-19 13:10:24.193695 -Vulnerability 1: -File: flask-marshmallow/flask_marshmallow/schema.py - > User input at line 35, trigger word ".data": - data = self.dump(obj,many=many).data -File: flask-marshmallow/flask_marshmallow/schema.py - > reaches line 36, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = flask.jsonify(data, args,kwargs) - - - -alyssaq/celery-flask-demo -https://github.com/alyssaq/celery-flask-demo -Entry file: celery-flask-demo/app.py -Scanned: 2016-10-19 13:10:25.494809 -Vulnerability 1: -File: celery-flask-demo/app.py - > User input at line 14, trigger word "get(": - res = tasks.add.delay(int(request.form.get('num1', 0)), int(request.form.get('num2', 0))) -File: celery-flask-demo/app.py - > reaches line 18, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/result/' + res.id) - - - -dlbewley/flask-todo -https://github.com/dlbewley/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-19 13:10:25.989646 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jbn/cssbloggers -https://github.com/jbn/cssbloggers -Entry file: cssbloggers/main.py -Scanned: 2016-10-19 13:10:28.436591 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bmcharek/flaskapp -https://github.com/bmcharek/flaskapp -Entry file: None -Scanned: 2016-10-19 13:10:32.447913 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bmcharek/flaskapp. - -dk-da/flaskr -https://github.com/dk-da/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:10:33.949596 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joseph8th/flaskapp -https://github.com/joseph8th/flaskapp -Entry file: None -Scanned: 2016-10-19 13:10:38.435000 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/joseph8th/flaskapp. - -harisubramaniam/flaskr -https://github.com/harisubramaniam/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:10:39.922046 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sasaporta/s3multifile -https://github.com/sasaporta/s3multifile -Entry file: s3multifile/test.py -Scanned: 2016-10-19 13:10:42.161778 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simonm/flaskCamel -https://github.com/simonm/flaskCamel -Entry file: flaskCamel/flaskcamel/__init__.py -Scanned: 2016-10-19 13:10:44.630073 -Vulnerability 1: -File: flaskCamel/flaskcamel/views.py - > User input at line 162, trigger word ".data": - admin = Users.query.filter_by(username=form.username.data).first() -File: flaskCamel/flaskcamel/views.py - > reaches line 166, trigger word "flash(": - flash(admin.username + ' logged in') - -Vulnerability 2: -File: flaskCamel/flaskcamel/views.py - > User input at line 183, trigger word ".data": - user = Users.query.filter_by(username=form.username.data).first() -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 185: user = Users.query.filter_by(email=form.email.data).first() - File: flaskCamel/flaskcamel/views.py - > Line 192: key = s.dumps([user.username, user.email]) - File: flaskCamel/flaskcamel/views.py - > Line 194: msg = Message('Password reset',sender='your_id@your_host.com', recipients=[user.email]) - File: flaskCamel/flaskcamel/views.py - > Line 195: msg.html = 'Click on this link to reset your password. #http://127.0.0.1:5000/passwordreset/ ' + key + '' -File: flaskCamel/flaskcamel/views.py - > reaches line 202, trigger word "flash(": - flash('Email sent to: ' + user.email) - -Vulnerability 3: -File: flaskCamel/flaskcamel/views.py - > User input at line 185, trigger word ".data": - user = Users.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 183: user = Users.query.filter_by(username=form.username.data).first() - File: flaskCamel/flaskcamel/views.py - > Line 192: key = s.dumps([user.username, user.email]) - File: flaskCamel/flaskcamel/views.py - > Line 194: msg = Message('Password reset',sender='your_id@your_host.com', recipients=[user.email]) - File: flaskCamel/flaskcamel/views.py - > Line 195: msg.html = 'Click on this link to reset your password. #http://127.0.0.1:5000/passwordreset/ ' + key + '' -File: flaskCamel/flaskcamel/views.py - > reaches line 202, trigger word "flash(": - flash('Email sent to: ' + user.email) - -Vulnerability 4: -File: flaskCamel/flaskcamel/views.py - > User input at line 252, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 280: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flaskCamel/flaskcamel/views.py - > reaches line 252, trigger word "url_for(": - next_url = request.args.get('next') or url_for('index') - -Vulnerability 5: -File: flaskCamel/flaskcamel/views.py - > User input at line 252, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 280: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flaskCamel/flaskcamel/views.py - > reaches line 255, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 6: -File: flaskCamel/flaskcamel/views.py - > User input at line 259, trigger word "get(": - me = facebook.get('/me') -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 264: fb_username = me.data['username'] - File: flaskCamel/flaskcamel/views.py - > Line 266: fb_username = me.data['name'] - File: flaskCamel/flaskcamel/views.py - > Line 268: fb_email = me.data['email'] - File: flaskCamel/flaskcamel/views.py - > Line 271: user = Users(fb_username, 'temp', fb_email, role) - File: flaskCamel/flaskcamel/views.py - > Line 272: user.fb_id = me.data['id'] - File: flaskCamel/flaskcamel/views.py - > Line 277: session['user_id'] = user.uid - File: flaskCamel/flaskcamel/views.py - > Line 257: session['fb_access_token'] = (resp['access_token'], '') - File: flaskCamel/flaskcamel/views.py - > Line 260: user = Users.query.filter_by(fb_id=me.data['id']).first() -File: flaskCamel/flaskcamel/views.py - > reaches line 279, trigger word "flash(": - flash('You are now logged in as %s' % user.username) - -Vulnerability 7: -File: flaskCamel/flaskcamel/views.py - > User input at line 260, trigger word ".data": - user = Users.query.filter_by(fb_id=me.data['id']).first() -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 271: user = Users(fb_username, 'temp', fb_email, role) - File: flaskCamel/flaskcamel/views.py - > Line 277: session['user_id'] = user.uid - File: flaskCamel/flaskcamel/views.py - > Line 257: session['fb_access_token'] = (resp['access_token'], '') -File: flaskCamel/flaskcamel/views.py - > reaches line 279, trigger word "flash(": - flash('You are now logged in as %s' % user.username) - -Vulnerability 8: -File: flaskCamel/flaskcamel/views.py - > User input at line 264, trigger word ".data": - fb_username = me.data['username'] -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 266: fb_username = me.data['name'] - File: flaskCamel/flaskcamel/views.py - > Line 271: user = Users(fb_username, 'temp', fb_email, role) - File: flaskCamel/flaskcamel/views.py - > Line 277: session['user_id'] = user.uid - File: flaskCamel/flaskcamel/views.py - > Line 257: session['fb_access_token'] = (resp['access_token'], '') - File: flaskCamel/flaskcamel/views.py - > Line 260: user = Users.query.filter_by(fb_id=me.data['id']).first() -File: flaskCamel/flaskcamel/views.py - > reaches line 279, trigger word "flash(": - flash('You are now logged in as %s' % user.username) - -Vulnerability 9: -File: flaskCamel/flaskcamel/views.py - > User input at line 266, trigger word ".data": - fb_username = me.data['name'] -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 264: fb_username = me.data['username'] - File: flaskCamel/flaskcamel/views.py - > Line 271: user = Users(fb_username, 'temp', fb_email, role) - File: flaskCamel/flaskcamel/views.py - > Line 277: session['user_id'] = user.uid - File: flaskCamel/flaskcamel/views.py - > Line 257: session['fb_access_token'] = (resp['access_token'], '') - File: flaskCamel/flaskcamel/views.py - > Line 260: user = Users.query.filter_by(fb_id=me.data['id']).first() -File: flaskCamel/flaskcamel/views.py - > reaches line 279, trigger word "flash(": - flash('You are now logged in as %s' % user.username) - -Vulnerability 10: -File: flaskCamel/flaskcamel/views.py - > User input at line 268, trigger word ".data": - fb_email = me.data['email'] -Reassigned in: - File: flaskCamel/flaskcamel/views.py - > Line 271: user = Users(fb_username, 'temp', fb_email, role) - File: flaskCamel/flaskcamel/views.py - > Line 277: session['user_id'] = user.uid - File: flaskCamel/flaskcamel/views.py - > Line 257: session['fb_access_token'] = (resp['access_token'], '') - File: flaskCamel/flaskcamel/views.py - > Line 260: user = Users.query.filter_by(fb_id=me.data['id']).first() -File: flaskCamel/flaskcamel/views.py - > reaches line 279, trigger word "flash(": - flash('You are now logged in as %s' % user.username) - - - -smockoro/FlaskSample -https://github.com/smockoro/FlaskSample -Entry file: FlaskSample/sample2.py -Scanned: 2016-10-19 13:10:45.879146 -No vulnerabilities found. - - -balaaagi/FlaskTuts -https://github.com/balaaagi/FlaskTuts -Entry file: FlaskTuts/app/__init__.py -Scanned: 2016-10-19 13:10:51.104239 -No vulnerabilities found. - - -vatslav/flask1 -https://github.com/vatslav/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-19 13:10:51.778556 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -mjegilbert/blank-flask -https://github.com/mjegilbert/blank-flask -Entry file: blank-flask/project/__init__.py -Scanned: 2016-10-19 13:10:54.841017 -No vulnerabilities found. - - -garynakanelua/hello-flask -https://github.com/garynakanelua/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-19 13:10:58.480511 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -jaapverloop/flask-knot -https://github.com/jaapverloop/flask-knot -Entry file: flask-knot/test_knot.py -Scanned: 2016-10-19 13:11:02.719142 -No vulnerabilities found. - - -Shidima/flask-skeleton -https://github.com/Shidima/flask-skeleton -Entry file: None -Scanned: 2016-10-19 13:11:03.230894 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Shidima/flask-skeleton. - -robschwartz/flask_hello -https://github.com/robschwartz/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-19 13:11:05.858303 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danielsamuels/gantt-flask -https://github.com/danielsamuels/gantt-flask -Entry file: gantt-flask/gantt/app.py -Scanned: 2016-10-19 13:11:10.079119 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -timtan/flask-starter -https://github.com/timtan/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-19 13:11:10.573367 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -binishbaig/flask_hello -https://github.com/binishbaig/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-19 13:11:11.170027 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -azach/flask-todo -https://github.com/azach/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-19 13:11:14.157379 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -segof/flask_Flitter -https://github.com/segof/flask_Flitter -Entry file: flask_Flitter/flitter_db.py -Scanned: 2016-10-19 13:11:17.507237 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AlexFrazer/flask_tutorial -https://github.com/AlexFrazer/flask_tutorial -Entry file: None -Scanned: 2016-10-19 13:11:18.006050 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sbrother/dsla-web-service -https://github.com/sbrother/dsla-web-service -Entry file: dsla-web-service/times_tracker/main.py -Scanned: 2016-10-19 13:11:21.391747 -No vulnerabilities found. - - -cz0930/funtyping -https://github.com/cz0930/funtyping -Entry file: funtyping/flask_learn/httpserver.py -Scanned: 2016-10-19 13:11:23.044704 -No vulnerabilities found. - - -ISEAGE-ISU/itocdc-2014-www -https://github.com/ISEAGE-ISU/itocdc-2014-www -Entry file: itocdc-2014-www/webapp.py -Scanned: 2016-10-19 13:11:24.592598 -No vulnerabilities found. - - -FLEXSIS/FlaskMongoBootstrap -https://github.com/FLEXSIS/FlaskMongoBootstrap -Entry file: FlaskMongoBootstrap/flask_application/__init__.py -Scanned: 2016-10-19 13:11:26.162556 -No vulnerabilities found. - - -Fingel/flaskImageUploader -https://github.com/Fingel/flaskImageUploader -Entry file: flaskImageUploader/app.py -Scanned: 2016-10-19 13:11:27.521341 -No vulnerabilities found. - - -ashifkalladi/Quiz-Application-in-flask -https://github.com/ashifkalladi/Quiz-Application-in-flask -Entry file: Quiz-Application-in-flask/app.py -Scanned: 2016-10-19 13:11:28.807354 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joastbg/python-flask-skeleton -https://github.com/joastbg/python-flask-skeleton -Entry file: None -Scanned: 2016-10-19 13:11:29.377802 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/joastbg/python-flask-skeleton. - -Little--ZM/test_flask_blog -https://github.com/Little--ZM/test_flask_blog -Entry file: test_flask_blog/modules/app.py -Scanned: 2016-10-19 13:11:32.524328 -No vulnerabilities found. - - -amygdalama/flask-mega-tutorial -https://github.com/amygdalama/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 13:11:34.029435 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Data-drone/test_flaskapp -https://github.com/Data-drone/test_flaskapp -Entry file: test_flaskapp/routes.py -Scanned: 2016-10-19 13:11:40.839808 -No vulnerabilities found. - - -dn-aoi23/python-git -https://github.com/dn-aoi23/python-git -Entry file: None -Scanned: 2016-10-19 13:11:42.155819 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dn-aoi23/python-git. - -morgan-del/ft-tutorial -https://github.com/morgan-del/ft-tutorial -Entry file: None -Scanned: 2016-10-19 13:11:43.548080 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/morgan-del/ft-tutorial. - -tlukasiak/yolo-avenger -https://github.com/tlukasiak/yolo-avenger -Entry file: None -Scanned: 2016-10-19 13:11:46.361667 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tlukasiak/yolo-avenger. - -kumaranzone/myflaskblogger -https://github.com/kumaranzone/myflaskblogger -Entry file: myflaskblogger/app/__init__.py -Scanned: 2016-10-19 13:11:47.969630 -No vulnerabilities found. - - -tasti/Twittre -https://github.com/tasti/Twittre -Entry file: Twittre/twittre.py -Scanned: 2016-10-19 13:11:54.826763 -Vulnerability 1: -File: Twittre/twittre.py - > User input at line 217, trigger word "form[": - username = request.form['username'].strip() -Reassigned in: - File: Twittre/twittre.py - > Line 239: session['username'] = username - File: Twittre/twittre.py - > Line 240: session['admin'] = False - File: Twittre/twittre.py - > Line 238: session['logged_in'] = True -File: Twittre/twittre.py - > reaches line 235, trigger word "execute(": - db.execute('insert into users (username, username_lower, password, salt, admin) values (?, ?, ?, ?, ?)', [username, username_lower, hashPassword, salt, 0]) - - - -modbert/Robot_Challenge_Repository -https://github.com/modbert/Robot_Challenge_Repository -Entry file: None -Scanned: 2016-10-19 13:11:56.113630 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/modbert/Robot_Challenge_Repository. - -Dinoshauer/img-resize -https://github.com/Dinoshauer/img-resize -Entry file: img-resize/app.py -Scanned: 2016-10-19 13:11:56.617421 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Gentle/quasselflask -https://github.com/Gentle/quasselflask -Entry file: quasselflask/main.py -Scanned: 2016-10-19 13:12:03.870248 -No vulnerabilities found. - - -mariofix/ad-login -https://github.com/mariofix/ad-login -Entry file: ad-login/adlogin.py -Scanned: 2016-10-19 13:12:05.195594 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jimbog/blogger -https://github.com/jimbog/blogger -Entry file: blogger/generator.py -Scanned: 2016-10-19 13:12:08.405136 -No vulnerabilities found. - - -jespino/foobadges -https://github.com/jespino/foobadges -Entry file: foobadges/foobadges.py -Scanned: 2016-10-19 13:12:11.657249 -No vulnerabilities found. - - -burck1/sam-website -https://github.com/burck1/sam-website -Entry file: sam-website/__init__.py -Scanned: 2016-10-19 13:12:13.014267 -No vulnerabilities found. - - -tristaneuan/microblog -https://github.com/tristaneuan/microblog -Entry file: None -Scanned: 2016-10-19 13:12:13.512665 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -elvinyung/quimbu -https://github.com/elvinyung/quimbu -Entry file: quimbu/quimbu.py -Scanned: 2016-10-19 13:12:14.838621 -Vulnerability 1: -File: quimbu/quimbu.py - > User input at line 64, trigger word "form[": - username = request.form['username'] -File: quimbu/quimbu.py - > reaches line 67, trigger word "execute(": - elif db.execute('select * from accounts where username=?', (username)).fetchone(): - -Vulnerability 2: -File: quimbu/quimbu.py - > User input at line 64, trigger word "form[": - username = request.form['username'] -File: quimbu/quimbu.py - > reaches line 77, trigger word "execute(": - db.execute('insert into accounts (username, password, acctType) values (?, ?, ?)', (username, password, acct_type)) - -Vulnerability 3: -File: quimbu/quimbu.py - > User input at line 71, trigger word "form[": - password = request.form['password'] -File: quimbu/quimbu.py - > reaches line 77, trigger word "execute(": - db.execute('insert into accounts (username, password, acctType) values (?, ?, ?)', (username, password, acct_type)) - -Vulnerability 4: -File: quimbu/quimbu.py - > User input at line 89, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: quimbu/quimbu.py - > Line 99: session['username'] = username - File: quimbu/quimbu.py - > Line 98: session['logged_in'] = True -File: quimbu/quimbu.py - > reaches line 90, trigger word "execute(": - username_row = db.execute('select * from accounts where username=?', (username)).fetchone() - -Vulnerability 5: -File: quimbu/quimbu.py - > User input at line 127, trigger word "form[": - post_title = request.form['title'] -File: quimbu/quimbu.py - > reaches line 136, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - -Vulnerability 6: -File: quimbu/quimbu.py - > User input at line 131, trigger word "form[": - post_link = request.form['link'] -File: quimbu/quimbu.py - > reaches line 136, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - -Vulnerability 7: -File: quimbu/quimbu.py - > User input at line 132, trigger word "form[": - post_content = request.form['content'] -File: quimbu/quimbu.py - > reaches line 136, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - - - -zzdoo/trello-service -https://github.com/zzdoo/trello-service -Entry file: trello-service/trello_wrapper_test.py -Scanned: 2016-10-19 13:12:16.078977 -No vulnerabilities found. - - -kirang89/flappi -https://github.com/kirang89/flappi -Entry file: flappi/api/__init__.py -Scanned: 2016-10-19 13:12:19.415435 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Amanda-Clark/BartStats -https://github.com/Amanda-Clark/BartStats -Entry file: BartStats/BartStats/BartStats/BartStats.py -Scanned: 2016-10-19 13:12:20.741391 -Vulnerability 1: -File: BartStats/BartStats/BartStats/BartStats.py - > User input at line 35, trigger word "form[": - station = request.form['station'] -Reassigned in: - File: BartStats/BartStats/BartStats/BartStats.py - > Line 36: query = 'SELECT * FROM stats WHERE station_name='%s'' % station - File: BartStats/BartStats/BartStats/BartStats.py - > Line 40: img = showGraph(row, num, station) - File: BartStats/BartStats/BartStats/BartStats.py - > Line 41: ret_MAYBE_FUNCTION_NAME = img -File: BartStats/BartStats/BartStats/BartStats.py - > reaches line 37, trigger word "execute(": - cursor.execute(query) - - - -ISEAGE-ISU/voting-wars -https://github.com/ISEAGE-ISU/voting-wars -Entry file: voting-wars/webapp.py -Scanned: 2016-10-19 13:12:23.073841 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -plumdog/flask_table -https://github.com/plumdog/flask_table -Entry file: flask_table/examples/simple_app.py -Scanned: 2016-10-19 13:12:25.742472 -No vulnerabilities found. - - -jeffknupp/flask_sandboy -https://github.com/jeffknupp/flask_sandboy -Entry file: flask_sandboy/tests/test_sandboy.py -Scanned: 2016-10-19 13:12:27.417457 -No vulnerabilities found. - - -sh4nks/flask-plugins -https://github.com/sh4nks/flask-plugins -Entry file: flask-plugins/tests/pluginmanager_tests.py -Scanned: 2016-10-19 13:12:28.858646 -No vulnerabilities found. - - -miguelgrinberg/flask-webcast -https://github.com/miguelgrinberg/flask-webcast -Entry file: flask-webcast/03-forms/hello.py -Scanned: 2016-10-19 13:12:30.191157 -Vulnerability 1: -File: flask-webcast/03-forms/hello.py - > User input at line 8, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-webcast/03-forms/hello.py - > Line 6: name = None -File: flask-webcast/03-forms/hello.py - > reaches line 9, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',name=name) - - - -thisissoon/Flask-Via -https://github.com/thisissoon/Flask-Via -Entry file: Flask-Via/flask_via/__init__.py -Scanned: 2016-10-19 13:12:32.460641 -No vulnerabilities found. - - -iiSeymour/Flasked-Notebooks -https://github.com/iiSeymour/Flasked-Notebooks -Entry file: Flasked-Notebooks/app.py -Scanned: 2016-10-19 13:12:33.782762 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tornadotbh/flask -https://github.com/tornadotbh/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:12:35.316570 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -jbn/cssbloggers -https://github.com/jbn/cssbloggers -Entry file: cssbloggers/main.py -Scanned: 2016-10-19 13:12:41.293542 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhoufeng1989/flaskr -https://github.com/zhoufeng1989/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:12:44.287984 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ozgebascil/flaskr -https://github.com/ozgebascil/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:12:46.814839 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vosahloj/flasky -https://github.com/vosahloj/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 13:12:48.329377 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brianjgeiger/flaskpractice -https://github.com/brianjgeiger/flaskpractice -Entry file: None -Scanned: 2016-10-19 13:12:52.826836 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yjroot/domainserver -https://github.com/yjroot/domainserver -Entry file: domainserver/dnsserver/__init__.py -Scanned: 2016-10-19 13:12:58.665338 -Vulnerability 1: -File: domainserver/dnsserver/account.py - > User input at line 57, trigger word ".data": - user = g.session.query(User).filter(User.email == field.data).first() -File: domainserver/dnsserver/account.py - > reaches line 57, trigger word "filter(": - user = g.session.query(User).filter(User.email == field.data).first() - -Vulnerability 2: -File: domainserver/dnsserver/account.py - > User input at line 76, trigger word ".data": - user = g.session.query(User).filter(User.email == form.email.data).first() -File: domainserver/dnsserver/account.py - > reaches line 76, trigger word "filter(": - user = g.session.query(User).filter(User.email == form.email.data).first() - -Vulnerability 3: -File: domainserver/dnsserver/domain_cname.py - > User input at line 95, trigger word ".data": - record = g.session.query(RecordCNAME).filter(RecordCNAME.domain == domain).filter(RecordCNAME.name.like(form.name.data)).first() -File: domainserver/dnsserver/domain_cname.py - > reaches line 95, trigger word "filter(": - record = g.session.query(RecordCNAME).filter(RecordCNAME.domain == domain).filter(RecordCNAME.name.like(form.name.data)).first() - -Vulnerability 4: -File: domainserver/dnsserver/domain.py - > User input at line 28, trigger word "form[": - domains = request.form['domain'].split() -Reassigned in: - File: domainserver/dnsserver/domain.py - > Line 30: domains = [] - File: domainserver/dnsserver/domain.py - > Line 54: ret_MAYBE_FUNCTION_NAME = redirect(url_for('domain.index')) -File: domainserver/dnsserver/domain.py - > reaches line 50, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('domain_new.html',error_domains=error_domains, domains=domains) - - - -vatslav/flask1 -https://github.com/vatslav/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-19 13:12:59.290883 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -0xPr0xy/flask-torrent -https://github.com/0xPr0xy/flask-torrent -Entry file: flask-torrent/app/__init__.py -Scanned: 2016-10-19 13:13:02.558389 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaapverloop/flask-knot -https://github.com/jaapverloop/flask-knot -Entry file: flask-knot/test_knot.py -Scanned: 2016-10-19 13:13:05.858402 -No vulnerabilities found. - - -plumdog/flask_boilerplate -https://github.com/plumdog/flask_boilerplate -Entry file: flask_boilerplate/application/__init__.py -Scanned: 2016-10-19 13:13:06.387733 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mlautman/flask_scaffold -https://github.com/mlautman/flask_scaffold -Entry file: flask_scaffold/app/__init__.py -Scanned: 2016-10-19 13:13:09.966674 -No vulnerabilities found. - - -jstacoder/flask-basehead -https://github.com/jstacoder/flask-basehead -Entry file: flask-basehead/flask_basehead/app.py -Scanned: 2016-10-19 13:13:16.334598 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rsirres/Flask-Generator -https://github.com/rsirres/Flask-Generator -Entry file: Flask-Generator/generate.py -Scanned: 2016-10-19 13:13:17.606962 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cyphirx/generic_flask -https://github.com/cyphirx/generic_flask -Entry file: generic_flask/generic_flask/__init__.py -Scanned: 2016-10-19 13:13:18.963597 -No vulnerabilities found. - - -picwell/flask-tutorial -https://github.com/picwell/flask-tutorial -Entry file: None -Scanned: 2016-10-19 13:13:20.946602 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -azach/flask-todo -https://github.com/azach/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-19 13:13:26.405278 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kubkon/flask-uploads -https://github.com/kubkon/flask-uploads -Entry file: flask-uploads/tests.py -Scanned: 2016-10-19 13:13:28.885271 -No vulnerabilities found. - - -crakins/microblog -https://github.com/crakins/microblog -Entry file: None -Scanned: 2016-10-19 13:13:29.401332 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cdtavijit/microblog -https://github.com/cdtavijit/microblog -Entry file: None -Scanned: 2016-10-19 13:13:30.901725 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -danielthiel/FlaskFactoryBone -https://github.com/danielthiel/FlaskFactoryBone -Entry file: FlaskFactoryBone/server.py -Scanned: 2016-10-19 13:13:33.624388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -infothrill/cookiecutter-flask-foundation -https://github.com/infothrill/cookiecutter-flask-foundation -Entry file: cookiecutter-flask-foundation/{{cookiecutter.project_name}}/{{ cookiecutter.repo_name }}/__init__.py -Scanned: 2016-10-19 13:13:37.560077 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Little--ZM/test_flask_blog -https://github.com/Little--ZM/test_flask_blog -Entry file: test_flask_blog/modules/app.py -Scanned: 2016-10-19 13:13:39.105426 -No vulnerabilities found. - - -crisbal/NoteApp-with-Flask -https://github.com/crisbal/NoteApp-with-Flask -Entry file: NoteApp-with-Flask/Main.py -Scanned: 2016-10-19 13:13:43.328302 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -krobe/Flask-SurvivorApp -https://github.com/krobe/Flask-SurvivorApp -Entry file: Flask-SurvivorApp/survivorapp/__init__.py -Scanned: 2016-10-19 13:13:44.967637 -No vulnerabilities found. - - -RichardJTorres/flask-mega-tutorial -https://github.com/RichardJTorres/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 13:13:45.478705 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ashifkalladi/facebook-application-in-flask -https://github.com/ashifkalladi/facebook-application-in-flask -Entry file: facebook-application-in-flask/facebook.py -Scanned: 2016-10-19 13:13:48.815316 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amygdalama/flask-mega-tutorial -https://github.com/amygdalama/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 13:13:50.316112 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MDCox/EpiAPy -https://github.com/MDCox/EpiAPy -Entry file: None -Scanned: 2016-10-19 13:13:58.019388 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dariusdunlap/flasky-darius -https://github.com/dariusdunlap/flasky-darius -Entry file: None -Scanned: 2016-10-19 13:13:59.315258 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dariusdunlap/flasky-darius. - -ashifkalladi/media-player-application-using-flask -https://github.com/ashifkalladi/media-player-application-using-flask -Entry file: media-player-application-using-flask/run.py -Scanned: 2016-10-19 13:14:09.668249 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xulianghong/picshare -https://github.com/xulianghong/picshare -Entry file: None -Scanned: 2016-10-19 13:14:10.982729 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xulianghong/picshare. - -tallus/monomatapa -https://github.com/tallus/monomatapa -Entry file: monomatapa/monomotapa/__init__.py -Scanned: 2016-10-19 13:14:12.531332 -No vulnerabilities found. - - -yabalaban/noodle-cocaine-app -https://github.com/yabalaban/noodle-cocaine-app -Entry file: noodle-cocaine-app/app.py -Scanned: 2016-10-19 13:14:13.872620 -No vulnerabilities found. - - -plumdog/recipe-for-delicious -https://github.com/plumdog/recipe-for-delicious -Entry file: recipe-for-delicious/recipe/__init__.py -Scanned: 2016-10-19 13:14:15.208254 -No vulnerabilities found. - - -frimmy/helloflask-heroku -https://github.com/frimmy/helloflask-heroku -Entry file: helloflask-heroku/hello.py -Scanned: 2016-10-19 13:14:16.398786 -No vulnerabilities found. - - -sayganesha/betting_pool_web_app -https://github.com/sayganesha/betting_pool_web_app -Entry file: betting_pool_web_app/main_app.py -Scanned: 2016-10-19 13:14:20.586404 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -britalmeida/test-assoc -https://github.com/britalmeida/test-assoc -Entry file: None -Scanned: 2016-10-19 13:14:21.782494 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/britalmeida/test-assoc. - -nyakiss/nyanblog -https://github.com/nyakiss/nyanblog -Entry file: nyanblog/blogpy/__init__.py -Scanned: 2016-10-19 13:14:23.697475 -Vulnerability 1: -File: nyanblog/blogpy/views.py - > User input at line 37, trigger word "get(": - url = request.args.get('next', '') or url_for('home') -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('login.html',ulogin_url=ulogin_url) -File: nyanblog/blogpy/views.py - > reaches line 37, trigger word "url_for(": - url = request.args.get('next', '') or url_for('home') - -Vulnerability 2: -File: nyanblog/blogpy/views.py - > User input at line 37, trigger word "get(": - url = request.args.get('next', '') or url_for('home') -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('login.html',ulogin_url=ulogin_url) -File: nyanblog/blogpy/views.py - > reaches line 39, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - -Vulnerability 3: -File: nyanblog/blogpy/views.py - > User input at line 37, trigger word "get(": - url = request.args.get('next', '') or url_for('home') -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('login.html',ulogin_url=ulogin_url) -File: nyanblog/blogpy/views.py - > reaches line 63, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - -Vulnerability 4: -File: nyanblog/blogpy/views.py - > User input at line 71, trigger word "get(": - url = request.args.get('next', url_for('home')) -File: nyanblog/blogpy/views.py - > reaches line 71, trigger word "url_for(": - url = request.args.get('next', url_for('home')) - -Vulnerability 5: -File: nyanblog/blogpy/views.py - > User input at line 71, trigger word "get(": - url = request.args.get('next', url_for('home')) -File: nyanblog/blogpy/views.py - > reaches line 72, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - -Vulnerability 6: -File: nyanblog/blogpy/views.py - > User input at line 115, trigger word ".data": - post = Post(g.user, form.text.data, get_tags(form.tags.data.strip())) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 123: ret_MAYBE_FUNCTION_NAME = render_template('new.html',form=form) -File: nyanblog/blogpy/views.py - > reaches line 119, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('post',id=post.id)) - -Vulnerability 7: -File: nyanblog/blogpy/views.py - > User input at line 115, trigger word ".data": - post = Post(g.user, form.text.data, get_tags(form.tags.data.strip())) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 123: ret_MAYBE_FUNCTION_NAME = render_template('new.html',form=form) -File: nyanblog/blogpy/views.py - > reaches line 119, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('post',id=post.id)) - -Vulnerability 8: -File: nyanblog/blogpy/views.py - > User input at line 132, trigger word "files[": - file = File(request.files['file']) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 136: ret_MAYBE_FUNCTION_NAME = jsonify(success=False) -File: nyanblog/blogpy/views.py - > reaches line 135, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(success=True, url=file.file_url) - -Vulnerability 9: -File: nyanblog/blogpy/views.py - > User input at line 149, trigger word "get(": - post = Post.query.get(int(id)) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 150: form = PostForm(obj=post) - File: nyanblog/blogpy/views.py - > Line 158: form.tags.data = ' '.join((unicode(tag) for tag in post.tags)) - File: nyanblog/blogpy/views.py - > Line 152: form.tags.data = get_tags(form.tags.data.strip()) -File: nyanblog/blogpy/views.py - > reaches line 157, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('post',id=post.id)) - -Vulnerability 10: -File: nyanblog/blogpy/views.py - > User input at line 149, trigger word "get(": - post = Post.query.get(int(id)) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 150: form = PostForm(obj=post) - File: nyanblog/blogpy/views.py - > Line 158: form.tags.data = ' '.join((unicode(tag) for tag in post.tags)) - File: nyanblog/blogpy/views.py - > Line 152: form.tags.data = get_tags(form.tags.data.strip()) -File: nyanblog/blogpy/views.py - > reaches line 157, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('post',id=post.id)) - -Vulnerability 11: -File: nyanblog/blogpy/views.py - > User input at line 149, trigger word "get(": - post = Post.query.get(int(id)) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 150: form = PostForm(obj=post) - File: nyanblog/blogpy/views.py - > Line 158: form.tags.data = ' '.join((unicode(tag) for tag in post.tags)) - File: nyanblog/blogpy/views.py - > Line 152: form.tags.data = get_tags(form.tags.data.strip()) -File: nyanblog/blogpy/views.py - > reaches line 159, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('new.html',form=form) - -Vulnerability 12: -File: nyanblog/blogpy/views.py - > User input at line 174, trigger word "get(": - url = request.args.get('next', url_for('home')) -File: nyanblog/blogpy/views.py - > reaches line 174, trigger word "url_for(": - url = request.args.get('next', url_for('home')) - -Vulnerability 13: -File: nyanblog/blogpy/views.py - > User input at line 174, trigger word "get(": - url = request.args.get('next', url_for('home')) -File: nyanblog/blogpy/views.py - > reaches line 175, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - -Vulnerability 14: -File: nyanblog/blogpy/views.py - > User input at line 180, trigger word "get(": - rss = cache.get('rss') -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 186: ret_MAYBE_FUNCTION_NAME = rss -File: nyanblog/blogpy/views.py - > reaches line 184, trigger word "render_template(": - rss = render_template('rss.xml',posts=posts, now=now) - - - -regisf/Strawberry -https://github.com/regisf/Strawberry -Entry file: Strawberry/main.py -Scanned: 2016-10-19 13:14:25.012621 -No vulnerabilities found. - - -davidhax0r/Rocket -https://github.com/davidhax0r/Rocket -Entry file: None -Scanned: 2016-10-19 13:14:28.090811 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kylepotts/droptak-web -https://github.com/kylepotts/droptak-web -Entry file: None -Scanned: 2016-10-19 13:14:42.514882 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -saurabh95/sampleflaskapp -https://github.com/saurabh95/sampleflaskapp -Entry file: sampleflaskapp/flaskr.py -Scanned: 2016-10-19 13:14:45.267713 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arilotter/sparky -https://github.com/arilotter/sparky -Entry file: sparky/sparky.py -Scanned: 2016-10-19 13:14:49.742409 -No vulnerabilities found. - - -miguelgrinberg/flask-webcast -https://github.com/miguelgrinberg/flask-webcast -Entry file: flask-webcast/03-forms/hello.py -Scanned: 2016-10-19 13:14:52.193746 -Vulnerability 1: -File: flask-webcast/03-forms/hello.py - > User input at line 8, trigger word "form[": - name = request.form['name'] -Reassigned in: - File: flask-webcast/03-forms/hello.py - > Line 6: name = None -File: flask-webcast/03-forms/hello.py - > reaches line 9, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',name=name) - - - -rayrapetyan/flask-spyne -https://github.com/rayrapetyan/flask-spyne -Entry file: flask-spyne/example/server.py -Scanned: 2016-10-19 13:14:53.498914 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iiSeymour/Flasked-Notebooks -https://github.com/iiSeymour/Flasked-Notebooks -Entry file: Flasked-Notebooks/app.py -Scanned: 2016-10-19 13:14:53.992064 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -basilfx/flask-daapserver -https://github.com/basilfx/flask-daapserver -Entry file: None -Scanned: 2016-10-19 13:14:55.584044 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/basilfx/flask-daapserver. - -waitingkuo/flask-sample -https://github.com/waitingkuo/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-19 13:14:56.068628 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -infothrill/flask-socketio-dbus-demo -https://github.com/infothrill/flask-socketio-dbus-demo -Entry file: flask-socketio-dbus-demo/myapp/__init__.py -Scanned: 2016-10-19 13:14:57.377160 -No vulnerabilities found. - - -OpenSystemsLab/flask-widgets -https://github.com/OpenSystemsLab/flask-widgets -Entry file: flask-widgets/example/app.py -Scanned: 2016-10-19 13:14:58.691272 -No vulnerabilities found. - - -fengsp/flask-application-wizard -https://github.com/fengsp/flask-application-wizard -Entry file: flask-application-wizard/make-flaskapp.py -Scanned: 2016-10-19 13:14:59.991416 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chiedo/flask-starter -https://github.com/chiedo/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-19 13:15:00.474306 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -devxoul/flask-errorhandler -https://github.com/devxoul/flask-errorhandler -Entry file: flask-errorhandler/flask_errorhandler.py -Scanned: 2016-10-19 13:15:01.693137 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iamtonyarmstrong/flasky -https://github.com/iamtonyarmstrong/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 13:15:02.196839 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hannah-grape/flaskr -https://github.com/hannah-grape/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:15:02.692079 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dastagg/flasktaskr -https://github.com/dastagg/flasktaskr -Entry file: None -Scanned: 2016-10-19 13:15:03.176178 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -StorjOld/promotweet -https://github.com/StorjOld/promotweet -Entry file: None -Scanned: 2016-10-19 13:15:04.376118 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/StorjOld/promotweet. - -florije1988/FlaskJson -https://github.com/florije1988/FlaskJson -Entry file: FlaskJson/FlaskJson/FlaskJson.py -Scanned: 2016-10-19 13:15:05.678594 -Vulnerability 1: -File: FlaskJson/FlaskJson/FlaskJson.py - > User input at line 13, trigger word "get(": - n = [request.form.get(x, 0,type=float) for x in 'n1''n2''n3'] -Reassigned in: - File: FlaskJson/FlaskJson/FlaskJson.py - > Line 16: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: FlaskJson/FlaskJson/FlaskJson.py - > reaches line 14, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(max=max(n), min=min(n)) - - - -tsh/flaskBlog -https://github.com/tsh/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-19 13:15:06.252701 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py - -tornadotbh/flask2 -https://github.com/tornadotbh/flask2 -Entry file: flask2/app.py -Scanned: 2016-10-19 13:15:11.749746 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -florije1988/flask_todo -https://github.com/florije1988/flask_todo -Entry file: None -Scanned: 2016-10-19 13:15:16.210060 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jstacoder/flask-basehead -https://github.com/jstacoder/flask-basehead -Entry file: flask-basehead/flask_basehead/app.py -Scanned: 2016-10-19 13:15:17.730047 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kawasakitoshiya/flask_sample -https://github.com/kawasakitoshiya/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-19 13:15:19.505167 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SandeR2012/flask_blog -https://github.com/SandeR2012/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-19 13:15:23.039600 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -LaunchKey/launchkey-flask -https://github.com/LaunchKey/launchkey-flask -Entry file: launchkey-flask/example/app.py -Scanned: 2016-10-19 13:15:24.627960 -Vulnerability 1: -File: launchkey-flask/example/app.py - > User input at line 43, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: launchkey-flask/example/app.py - > Line 46: auth_request = launchkey.authorize(username) -File: launchkey-flask/example/app.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('response'auth_request) - - - -crakins/microblog -https://github.com/crakins/microblog -Entry file: None -Scanned: 2016-10-19 13:15:26.124250 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -olidin/FlaskCoolProp -https://github.com/olidin/FlaskCoolProp -Entry file: FlaskCoolProp/app/__init__.py -Scanned: 2016-10-19 13:15:27.388344 -No vulnerabilities found. - - -xi/flekky -https://github.com/xi/flekky -Entry file: None -Scanned: 2016-10-19 13:15:45.346116 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xi/flekky. - -paulegan/flask-assets-dist-example -https://github.com/paulegan/flask-assets-dist-example -Entry file: flask-assets-dist-example/myapp/__init__.py -Scanned: 2016-10-19 13:15:52.044181 -No vulnerabilities found. - - -tildedave/cassandra-flask-sessions -https://github.com/tildedave/cassandra-flask-sessions -Entry file: cassandra-flask-sessions/server.py -Scanned: 2016-10-19 13:15:53.248870 -Vulnerability 1: -File: cassandra-flask-sessions/session.py - > User input at line 48, trigger word "get(": - sid = request.cookies.get(app.session_cookie_name) -Reassigned in: - File: cassandra-flask-sessions/session.py - > Line 50: sid = self.generate_sid() - File: cassandra-flask-sessions/session.py - > Line 51: ret_MAYBE_FUNCTION_NAME = self.session_class(sid=sid, new=True) - File: cassandra-flask-sessions/session.py - > Line 57: data = self.serializer.loads(rows[0].session_data) - File: cassandra-flask-sessions/session.py - > Line 58: ret_MAYBE_FUNCTION_NAME = self.session_class(data,sid=sid) - File: cassandra-flask-sessions/session.py - > Line 60: ret_MAYBE_FUNCTION_NAME = self.session_class(sid=sid, new=True) -File: cassandra-flask-sessions/session.py - > reaches line 53, trigger word "execute(": - rows = self.session.execute(self.select_query, (self.prefix + sid)) - - - -tonytan748/python_flask_blog -https://github.com/tonytan748/python_flask_blog -Entry file: None -Scanned: 2016-10-19 13:15:54.813970 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tonytan748/python_flask_blog. - -omab/psa-flask-mongoengine -https://github.com/omab/psa-flask-mongoengine -Entry file: psa-flask-mongoengine/example/__init__.py -Scanned: 2016-10-19 13:15:56.019974 -No vulnerabilities found. - - -Airead/angular-flask-seed -https://github.com/Airead/angular-flask-seed -Entry file: angular-flask-seed/flaskApp/main.py -Scanned: 2016-10-19 13:15:57.328496 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mphuie/nginx_uwsgi_flask_base -https://github.com/mphuie/nginx_uwsgi_flask_base -Entry file: nginx_uwsgi_flask_base/myapp/__init__.py -Scanned: 2016-10-19 13:15:58.519529 -No vulnerabilities found. - - -josuebrunel/getting_started_with_flask -https://github.com/josuebrunel/getting_started_with_flask -Entry file: None -Scanned: 2016-10-19 13:15:59.716145 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/josuebrunel/getting_started_with_flask. - -gloebit/python-flask-gloebit -https://github.com/gloebit/python-flask-gloebit -Entry file: None -Scanned: 2016-10-19 13:16:01.032775 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/gloebit/python-flask-gloebit. - -jawsthegame/jawsapps -https://github.com/jawsthegame/jawsapps -Entry file: jawsapps/jawsapps/__init__.py -Scanned: 2016-10-19 13:16:02.225073 -No vulnerabilities found. - - -TransactCharlie/fake-airline-api -https://github.com/TransactCharlie/fake-airline-api -Entry file: fake-airline-api/fake_airline_api.py -Scanned: 2016-10-19 13:16:03.490585 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elvinyung/florum -https://github.com/elvinyung/florum -Entry file: florum/app/__init__.py -Scanned: 2016-10-19 13:16:04.825037 -Vulnerability 1: -File: florum/app/views.py - > User input at line 53, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: florum/app/views.py - > Line 63: session['username'] = username - File: florum/app/views.py - > Line 62: session['logged_in'] = True -File: florum/app/views.py - > reaches line 54, trigger word "execute(": - username_row = db.execute('select * from accounts where username=?', (username)).fetchone() - -Vulnerability 2: -File: florum/app/views.py - > User input at line 91, trigger word "form[": - post_title = request.form['title'] -File: florum/app/views.py - > reaches line 100, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - -Vulnerability 3: -File: florum/app/views.py - > User input at line 95, trigger word "form[": - post_link = request.form['link'] -File: florum/app/views.py - > reaches line 100, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - -Vulnerability 4: -File: florum/app/views.py - > User input at line 96, trigger word "form[": - post_content = request.form['content'] -File: florum/app/views.py - > reaches line 100, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - - - -graup/servocam -https://github.com/graup/servocam -Entry file: servocam/api/app.py -Scanned: 2016-10-19 13:16:06.175679 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dariusdunlap/flasky-darius -https://github.com/dariusdunlap/flasky-darius -Entry file: None -Scanned: 2016-10-19 13:16:06.658135 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dariusdunlap/flasky-darius. - -OpenShift-Cookbook/chapter8-recipe2 -https://github.com/OpenShift-Cookbook/chapter8-recipe2 -Entry file: chapter8-recipe2/hello.py -Scanned: 2016-10-19 13:16:08.025835 -No vulnerabilities found. - - -zztalker/flskZakupki.gov.ru -https://github.com/zztalker/flskZakupki.gov.ru -Entry file: None -Scanned: 2016-10-19 13:16:09.394439 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zztalker/flskZakupki.gov.ru. - -funningboy/remoteChat -https://github.com/funningboy/remoteChat -Entry file: remoteChat/main.py -Scanned: 2016-10-19 13:16:11.181806 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -lbull/bullmicroblog -https://github.com/lbull/bullmicroblog -Entry file: bullmicroblog/app/__init__.py -Scanned: 2016-10-19 13:16:12.511381 -No vulnerabilities found. - - -liks79/flachat -https://github.com/liks79/flachat -Entry file: flachat/flachat.py -Scanned: 2016-10-19 13:16:13.771014 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ATRAN2/batimer -https://github.com/ATRAN2/batimer -Entry file: batimer/batimer.py -Scanned: 2016-10-19 13:16:15.146531 -Vulnerability 1: -File: batimer/batimer.py - > User input at line 13, trigger word "form[": - time_start = convert_to_datetime(request.form['date1'], request.form['time1']) -Reassigned in: - File: batimer/batimer.py - > Line 18: output_data += 'Opto 22 data between the times starting from ' + read_time(time_start) + ' to ' + read_time(time_end) + ' -' - File: batimer/batimer.py - > Line 25: output_data += read_time(status_row.recorded_time) + ',' + str(status_row.torr) + ' -' - File: batimer/batimer.py - > Line 28: output_data += ' | No data found in this range' - File: batimer/batimer.py - > Line 29: response = make_response(output_data) - File: batimer/batimer.py - > Line 30: ret_MAYBE_FUNCTION_NAME = response - File: batimer/batimer.py - > Line 31: response = make_response(output_data) - File: batimer/batimer.py - > Line 32: data_filename = 'Opto22 Data ' + read_time(time_start) + ' to ' + read_time(time_end) - File: batimer/batimer.py - > Line 37: response.headers['Content-Disposition'] = 'attachment; filename=' + data_filename + '.csv' - File: batimer/batimer.py - > Line 39: ret_MAYBE_FUNCTION_NAME = response - File: batimer/batimer.py - > Line 41: ret_MAYBE_FUNCTION_NAME = 'Inputted times were incorrect!' - File: batimer/batimer.py - > Line 43: ret_MAYBE_FUNCTION_NAME = render_template('main_page.html') - File: batimer/batimer.py - > Line 12: output_data = '' -File: batimer/batimer.py - > reaches line 20, trigger word "filter(": - db_query = Status.query.filter(Status.recorded_time > time_start).filter(Status.recorded_time < time_end).all() - -Vulnerability 2: -File: batimer/batimer.py - > User input at line 14, trigger word "form[": - time_end = convert_to_datetime(request.form['date2'], request.form['time2']) -Reassigned in: - File: batimer/batimer.py - > Line 18: output_data += 'Opto 22 data between the times starting from ' + read_time(time_start) + ' to ' + read_time(time_end) + ' -' - File: batimer/batimer.py - > Line 25: output_data += read_time(status_row.recorded_time) + ',' + str(status_row.torr) + ' -' - File: batimer/batimer.py - > Line 28: output_data += ' | No data found in this range' - File: batimer/batimer.py - > Line 29: response = make_response(output_data) - File: batimer/batimer.py - > Line 30: ret_MAYBE_FUNCTION_NAME = response - File: batimer/batimer.py - > Line 31: response = make_response(output_data) - File: batimer/batimer.py - > Line 32: data_filename = 'Opto22 Data ' + read_time(time_start) + ' to ' + read_time(time_end) - File: batimer/batimer.py - > Line 37: response.headers['Content-Disposition'] = 'attachment; filename=' + data_filename + '.csv' - File: batimer/batimer.py - > Line 39: ret_MAYBE_FUNCTION_NAME = response - File: batimer/batimer.py - > Line 41: ret_MAYBE_FUNCTION_NAME = 'Inputted times were incorrect!' - File: batimer/batimer.py - > Line 43: ret_MAYBE_FUNCTION_NAME = render_template('main_page.html') - File: batimer/batimer.py - > Line 12: output_data = '' -File: batimer/batimer.py - > reaches line 20, trigger word "filter(": - db_query = Status.query.filter(Status.recorded_time > time_start).filter(Status.recorded_time < time_end).all() - -Vulnerability 3: -File: batimer/batimer.py - > User input at line 13, trigger word "form[": - time_start = convert_to_datetime(request.form['date1'], request.form['time1']) -Reassigned in: - File: batimer/batimer.py - > Line 18: output_data += 'Opto 22 data between the times starting from ' + read_time(time_start) + ' to ' + read_time(time_end) + ' -' - File: batimer/batimer.py - > Line 25: output_data += read_time(status_row.recorded_time) + ',' + str(status_row.torr) + ' -' - File: batimer/batimer.py - > Line 28: output_data += ' | No data found in this range' - File: batimer/batimer.py - > Line 29: response = make_response(output_data) - File: batimer/batimer.py - > Line 30: ret_MAYBE_FUNCTION_NAME = response - File: batimer/batimer.py - > Line 31: response = make_response(output_data) - File: batimer/batimer.py - > Line 32: data_filename = 'Opto22 Data ' + read_time(time_start) + ' to ' + read_time(time_end) - File: batimer/batimer.py - > Line 37: response.headers['Content-Disposition'] = 'attachment; filename=' + data_filename + '.csv' - File: batimer/batimer.py - > Line 39: ret_MAYBE_FUNCTION_NAME = response - File: batimer/batimer.py - > Line 41: ret_MAYBE_FUNCTION_NAME = 'Inputted times were incorrect!' - File: batimer/batimer.py - > Line 43: ret_MAYBE_FUNCTION_NAME = render_template('main_page.html') - File: batimer/batimer.py - > Line 12: output_data = '' -File: batimer/batimer.py - > reaches line 35, trigger word "replace(": - data_filename = data_filename.replace(' ', '-') - -Vulnerability 4: -File: batimer/batimer.py - > User input at line 14, trigger word "form[": - time_end = convert_to_datetime(request.form['date2'], request.form['time2']) -Reassigned in: - File: batimer/batimer.py - > Line 18: output_data += 'Opto 22 data between the times starting from ' + read_time(time_start) + ' to ' + read_time(time_end) + ' -' - File: batimer/batimer.py - > Line 25: output_data += read_time(status_row.recorded_time) + ',' + str(status_row.torr) + ' -' - File: batimer/batimer.py - > Line 28: output_data += ' | No data found in this range' - File: batimer/batimer.py - > Line 29: response = make_response(output_data) - File: batimer/batimer.py - > Line 30: ret_MAYBE_FUNCTION_NAME = response - File: batimer/batimer.py - > Line 31: response = make_response(output_data) - File: batimer/batimer.py - > Line 32: data_filename = 'Opto22 Data ' + read_time(time_start) + ' to ' + read_time(time_end) - File: batimer/batimer.py - > Line 37: response.headers['Content-Disposition'] = 'attachment; filename=' + data_filename + '.csv' - File: batimer/batimer.py - > Line 39: ret_MAYBE_FUNCTION_NAME = response - File: batimer/batimer.py - > Line 41: ret_MAYBE_FUNCTION_NAME = 'Inputted times were incorrect!' - File: batimer/batimer.py - > Line 43: ret_MAYBE_FUNCTION_NAME = render_template('main_page.html') - File: batimer/batimer.py - > Line 12: output_data = '' -File: batimer/batimer.py - > reaches line 35, trigger word "replace(": - data_filename = data_filename.replace(' ', '-') - - - -OpenShift-Cookbook/chapter8-tornado-server -https://github.com/OpenShift-Cookbook/chapter8-tornado-server -Entry file: chapter8-tornado-server/hello.py -Scanned: 2016-10-19 13:16:17.489235 -No vulnerabilities found. - - -jackschultz/fantasy-golf -https://github.com/jackschultz/fantasy-golf -Entry file: fantasy-golf/app.py -Scanned: 2016-10-19 13:16:19.646196 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ryanhoskin/satisfaction -https://github.com/ryanhoskin/satisfaction -Entry file: satisfaction/satisfaction.py -Scanned: 2016-10-19 13:16:23.407278 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: satisfaction/venv/lib/python2.7/genericpath.py - -iancaltest/basicflask -https://github.com/iancaltest/basicflask -Entry file: basicflask/server.py -Scanned: 2016-10-19 13:16:23.917598 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gbrennon/RestPi -https://github.com/gbrennon/RestPi -Entry file: RestPi/RestPi.py -Scanned: 2016-10-19 13:16:25.247675 -No vulnerabilities found. - - -mbcrocci/agenda -https://github.com/mbcrocci/agenda -Entry file: agenda/run.py -Scanned: 2016-10-19 13:16:26.496552 -No vulnerabilities found. - - -aifa/python -https://github.com/aifa/python -Entry file: python/flask/microblog/app/__init__.py -Scanned: 2016-10-19 13:16:27.996766 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nyakiss/nyanblog -https://github.com/nyakiss/nyanblog -Entry file: nyanblog/blogpy/__init__.py -Scanned: 2016-10-19 13:16:30.119949 -Vulnerability 1: -File: nyanblog/blogpy/views.py - > User input at line 37, trigger word "get(": - url = request.args.get('next', '') or url_for('home') -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('login.html',ulogin_url=ulogin_url) -File: nyanblog/blogpy/views.py - > reaches line 37, trigger word "url_for(": - url = request.args.get('next', '') or url_for('home') - -Vulnerability 2: -File: nyanblog/blogpy/views.py - > User input at line 37, trigger word "get(": - url = request.args.get('next', '') or url_for('home') -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('login.html',ulogin_url=ulogin_url) -File: nyanblog/blogpy/views.py - > reaches line 39, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - -Vulnerability 3: -File: nyanblog/blogpy/views.py - > User input at line 37, trigger word "get(": - url = request.args.get('next', '') or url_for('home') -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('login.html',ulogin_url=ulogin_url) -File: nyanblog/blogpy/views.py - > reaches line 63, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - -Vulnerability 4: -File: nyanblog/blogpy/views.py - > User input at line 71, trigger word "get(": - url = request.args.get('next', url_for('home')) -File: nyanblog/blogpy/views.py - > reaches line 71, trigger word "url_for(": - url = request.args.get('next', url_for('home')) - -Vulnerability 5: -File: nyanblog/blogpy/views.py - > User input at line 71, trigger word "get(": - url = request.args.get('next', url_for('home')) -File: nyanblog/blogpy/views.py - > reaches line 72, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - -Vulnerability 6: -File: nyanblog/blogpy/views.py - > User input at line 115, trigger word ".data": - post = Post(g.user, form.text.data, get_tags(form.tags.data.strip())) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 123: ret_MAYBE_FUNCTION_NAME = render_template('new.html',form=form) -File: nyanblog/blogpy/views.py - > reaches line 119, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('post',id=post.id)) - -Vulnerability 7: -File: nyanblog/blogpy/views.py - > User input at line 115, trigger word ".data": - post = Post(g.user, form.text.data, get_tags(form.tags.data.strip())) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 123: ret_MAYBE_FUNCTION_NAME = render_template('new.html',form=form) -File: nyanblog/blogpy/views.py - > reaches line 119, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('post',id=post.id)) - -Vulnerability 8: -File: nyanblog/blogpy/views.py - > User input at line 132, trigger word "files[": - file = File(request.files['file']) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 136: ret_MAYBE_FUNCTION_NAME = jsonify(success=False) -File: nyanblog/blogpy/views.py - > reaches line 135, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(success=True, url=file.file_url) - -Vulnerability 9: -File: nyanblog/blogpy/views.py - > User input at line 149, trigger word "get(": - post = Post.query.get(int(id)) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 150: form = PostForm(obj=post) - File: nyanblog/blogpy/views.py - > Line 158: form.tags.data = ' '.join((unicode(tag) for tag in post.tags)) - File: nyanblog/blogpy/views.py - > Line 152: form.tags.data = get_tags(form.tags.data.strip()) -File: nyanblog/blogpy/views.py - > reaches line 157, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('post',id=post.id)) - -Vulnerability 10: -File: nyanblog/blogpy/views.py - > User input at line 149, trigger word "get(": - post = Post.query.get(int(id)) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 150: form = PostForm(obj=post) - File: nyanblog/blogpy/views.py - > Line 158: form.tags.data = ' '.join((unicode(tag) for tag in post.tags)) - File: nyanblog/blogpy/views.py - > Line 152: form.tags.data = get_tags(form.tags.data.strip()) -File: nyanblog/blogpy/views.py - > reaches line 157, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('post',id=post.id)) - -Vulnerability 11: -File: nyanblog/blogpy/views.py - > User input at line 149, trigger word "get(": - post = Post.query.get(int(id)) -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 150: form = PostForm(obj=post) - File: nyanblog/blogpy/views.py - > Line 158: form.tags.data = ' '.join((unicode(tag) for tag in post.tags)) - File: nyanblog/blogpy/views.py - > Line 152: form.tags.data = get_tags(form.tags.data.strip()) -File: nyanblog/blogpy/views.py - > reaches line 159, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('new.html',form=form) - -Vulnerability 12: -File: nyanblog/blogpy/views.py - > User input at line 174, trigger word "get(": - url = request.args.get('next', url_for('home')) -File: nyanblog/blogpy/views.py - > reaches line 174, trigger word "url_for(": - url = request.args.get('next', url_for('home')) - -Vulnerability 13: -File: nyanblog/blogpy/views.py - > User input at line 174, trigger word "get(": - url = request.args.get('next', url_for('home')) -File: nyanblog/blogpy/views.py - > reaches line 175, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - -Vulnerability 14: -File: nyanblog/blogpy/views.py - > User input at line 180, trigger word "get(": - rss = cache.get('rss') -Reassigned in: - File: nyanblog/blogpy/views.py - > Line 186: ret_MAYBE_FUNCTION_NAME = rss -File: nyanblog/blogpy/views.py - > reaches line 184, trigger word "render_template(": - rss = render_template('rss.xml',posts=posts, now=now) - - - -sbackus/microblog -https://github.com/sbackus/microblog -Entry file: None -Scanned: 2016-10-19 13:16:31.632170 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CrystalMoogle/rankedstats -https://github.com/CrystalMoogle/rankedstats -Entry file: None -Scanned: 2016-10-19 13:16:49.450350 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/CrystalMoogle/rankedstats. - -karen-mikaela/terra_tv -https://github.com/karen-mikaela/terra_tv -Entry file: terra_tv/terra_tv_car/__init__.py -Scanned: 2016-10-19 13:16:53.970639 -Vulnerability 1: -File: terra_tv/terra_tv_car/views.py - > User input at line 108, trigger word "form[": - model = request.form['model'] -Reassigned in: - File: terra_tv/terra_tv_car/views.py - > Line 133: context = 'car''create''tab_active''alert''status'Car(model=model, year=year, photo=photo, manufacturer=manufacturer)id is None'admin'alert-1 - File: terra_tv/terra_tv_car/views.py - > Line 146: car.model = model - File: terra_tv/terra_tv_car/views.py - > Line 158: car = Car(model=model, year=year, photo=photo_name, manufacturer=manufacturer) - File: terra_tv/terra_tv_car/views.py - > Line 160: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin.list')) - File: terra_tv/terra_tv_car/views.py - > Line 107: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin.login')) - File: terra_tv/terra_tv_car/views.py - > Line 145: car = Car.objects.get_or_404(id=id) -File: terra_tv/terra_tv_car/views.py - > reaches line 140, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/detail.html',context) - -Vulnerability 2: -File: terra_tv/terra_tv_car/views.py - > User input at line 109, trigger word "form[": - year = request.form['year'] -Reassigned in: - File: terra_tv/terra_tv_car/views.py - > Line 133: context = 'car''create''tab_active''alert''status'Car(model=model, year=year, photo=photo, manufacturer=manufacturer)id is None'admin'alert-1 - File: terra_tv/terra_tv_car/views.py - > Line 147: car.year = year - File: terra_tv/terra_tv_car/views.py - > Line 158: car = Car(model=model, year=year, photo=photo_name, manufacturer=manufacturer) - File: terra_tv/terra_tv_car/views.py - > Line 160: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin.list')) - File: terra_tv/terra_tv_car/views.py - > Line 107: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin.login')) - File: terra_tv/terra_tv_car/views.py - > Line 145: car = Car.objects.get_or_404(id=id) -File: terra_tv/terra_tv_car/views.py - > reaches line 140, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/detail.html',context) - -Vulnerability 3: -File: terra_tv/terra_tv_car/views.py - > User input at line 110, trigger word "form[": - manufacturer = request.form['manufacturer'] -Reassigned in: - File: terra_tv/terra_tv_car/views.py - > Line 133: context = 'car''create''tab_active''alert''status'Car(model=model, year=year, photo=photo, manufacturer=manufacturer)id is None'admin'alert-1 - File: terra_tv/terra_tv_car/views.py - > Line 148: car.manufacturer = manufacturer - File: terra_tv/terra_tv_car/views.py - > Line 158: car = Car(model=model, year=year, photo=photo_name, manufacturer=manufacturer) - File: terra_tv/terra_tv_car/views.py - > Line 160: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin.list')) - File: terra_tv/terra_tv_car/views.py - > Line 107: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin.login')) - File: terra_tv/terra_tv_car/views.py - > Line 145: car = Car.objects.get_or_404(id=id) -File: terra_tv/terra_tv_car/views.py - > reaches line 140, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/detail.html',context) - -Vulnerability 4: -File: terra_tv/terra_tv_car/views.py - > User input at line 111, trigger word "files[": - photo = request.files['photo'] -Reassigned in: - File: terra_tv/terra_tv_car/views.py - > Line 133: context = 'car''create''tab_active''alert''status'Car(model=model, year=year, photo=photo, manufacturer=manufacturer)id is None'admin'alert-1 - File: terra_tv/terra_tv_car/views.py - > Line 143: photo_name = self.upload_file(photo) - File: terra_tv/terra_tv_car/views.py - > Line 156: car.photo = photo_name - File: terra_tv/terra_tv_car/views.py - > Line 158: car = Car(model=model, year=year, photo=photo_name, manufacturer=manufacturer) - File: terra_tv/terra_tv_car/views.py - > Line 160: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin.list')) - File: terra_tv/terra_tv_car/views.py - > Line 107: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin.login')) - File: terra_tv/terra_tv_car/views.py - > Line 145: car = Car.objects.get_or_404(id=id) -File: terra_tv/terra_tv_car/views.py - > reaches line 140, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/detail.html',context) - - - -OpenShift-Cookbook/chapter8-recipe2-setup.py -https://github.com/OpenShift-Cookbook/chapter8-recipe2-setup.py -Entry file: None -Scanned: 2016-10-19 13:16:55.317319 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/OpenShift-Cookbook/chapter8-recipe2-setup.py. - -jalp/httplogger -https://github.com/jalp/httplogger -Entry file: httplogger/log.py -Scanned: 2016-10-19 13:16:56.524085 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gelioz/prom-test -https://github.com/gelioz/prom-test -Entry file: prom-test/library/__init__.py -Scanned: 2016-10-19 13:16:57.864584 -Vulnerability 1: -File: prom-test/library/__init__.py - > User input at line 32, trigger word "get(": - search = request.args.get('search') -File: prom-test/library/__init__.py - > reaches line 33, trigger word "filter(": - res = Author.query.filter(Author.name.like('%' + search + '%')).all() - -Vulnerability 2: -File: prom-test/library/__init__.py - > User input at line 39, trigger word "get(": - search = request.args.get('search') -File: prom-test/library/__init__.py - > reaches line 40, trigger word "filter(": - res = Book.query.filter(Book.title.like('%' + search + '%')).all() - -Vulnerability 3: -File: prom-test/library/__init__.py - > User input at line 48, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 48, trigger word "filter(": - book = Book.query.filter(Book.id == request.form['book_id']).first() - -Vulnerability 4: -File: prom-test/library/__init__.py - > User input at line 49, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 49, trigger word "filter(": - author = Author.query.filter(Author.id == request.form['author_id']).first() - -Vulnerability 5: -File: prom-test/library/__init__.py - > User input at line 48, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 6: -File: prom-test/library/__init__.py - > User input at line 48, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 7: -File: prom-test/library/__init__.py - > User input at line 67, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 67, trigger word "filter(": - author = Author.query.filter(Author.id == request.form['author_id']).first() - -Vulnerability 8: -File: prom-test/library/__init__.py - > User input at line 68, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 68, trigger word "filter(": - book = Book.query.filter(Book.id == request.form['book_id']).first() - -Vulnerability 9: -File: prom-test/library/__init__.py - > User input at line 67, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 79, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 10: -File: prom-test/library/__init__.py - > User input at line 67, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 79, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 11: -File: prom-test/library/__init__.py - > User input at line 86, trigger word "get(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() -File: prom-test/library/__init__.py - > reaches line 86, trigger word "filter(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() - -Vulnerability 12: -File: prom-test/library/__init__.py - > User input at line 87, trigger word "get(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() -File: prom-test/library/__init__.py - > reaches line 87, trigger word "filter(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() - -Vulnerability 13: -File: prom-test/library/__init__.py - > User input at line 86, trigger word "get(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() -File: prom-test/library/__init__.py - > reaches line 98, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 14: -File: prom-test/library/__init__.py - > User input at line 86, trigger word "get(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() -File: prom-test/library/__init__.py - > reaches line 98, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 15: -File: prom-test/library/__init__.py - > User input at line 105, trigger word "get(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() -File: prom-test/library/__init__.py - > reaches line 105, trigger word "filter(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() - -Vulnerability 16: -File: prom-test/library/__init__.py - > User input at line 106, trigger word "get(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() -File: prom-test/library/__init__.py - > reaches line 106, trigger word "filter(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() - -Vulnerability 17: -File: prom-test/library/__init__.py - > User input at line 106, trigger word "get(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() -File: prom-test/library/__init__.py - > reaches line 117, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 18: -File: prom-test/library/__init__.py - > User input at line 106, trigger word "get(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() -File: prom-test/library/__init__.py - > reaches line 117, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 19: -File: prom-test/library/__init__.py - > User input at line 124, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 124, trigger word "filter(": - author = Author.query.filter(Author.id == request.form['author_id']).first() - -Vulnerability 20: -File: prom-test/library/__init__.py - > User input at line 124, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 133, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 21: -File: prom-test/library/__init__.py - > User input at line 124, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 133, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 22: -File: prom-test/library/__init__.py - > User input at line 140, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 140, trigger word "filter(": - book = Book.query.filter(Book.id == request.form['book_id']).first() - -Vulnerability 23: -File: prom-test/library/__init__.py - > User input at line 140, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 149, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 24: -File: prom-test/library/__init__.py - > User input at line 140, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 149, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 25: -File: prom-test/library/__init__.py - > User input at line 156, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -Reassigned in: - File: prom-test/library/__init__.py - > Line 160: d = authors_books.delete(authors_books.c.author_id == author.id) -File: prom-test/library/__init__.py - > reaches line 156, trigger word "filter(": - author = Author.query.filter(Author.id == request.form['author_id']).first() - -Vulnerability 26: -File: prom-test/library/__init__.py - > User input at line 156, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -Reassigned in: - File: prom-test/library/__init__.py - > Line 160: d = authors_books.delete(authors_books.c.author_id == author.id) -File: prom-test/library/__init__.py - > reaches line 161, trigger word "execute(": - db_session.execute(d) - -Vulnerability 27: -File: prom-test/library/__init__.py - > User input at line 172, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -Reassigned in: - File: prom-test/library/__init__.py - > Line 176: d = authors_books.delete(authors_books.c.book_id == book.id) -File: prom-test/library/__init__.py - > reaches line 172, trigger word "filter(": - book = Book.query.filter(Book.id == request.form['book_id']).first() - -Vulnerability 28: -File: prom-test/library/__init__.py - > User input at line 172, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -Reassigned in: - File: prom-test/library/__init__.py - > Line 176: d = authors_books.delete(authors_books.c.book_id == book.id) -File: prom-test/library/__init__.py - > reaches line 177, trigger word "execute(": - db_session.execute(d) - -Vulnerability 29: -File: prom-test/library/__init__.py - > User input at line 238, trigger word ".data": - res = Book.query.filter(Book.title.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 238, trigger word "filter(": - res = Book.query.filter(Book.title.like('%' + form.query.data + '%')).all() - -Vulnerability 30: -File: prom-test/library/__init__.py - > User input at line 241, trigger word ".data": - res = Author.query.filter(Author.name.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 238, trigger word "filter(": - res = Book.query.filter(Book.title.like('%' + form.query.data + '%')).all() - -Vulnerability 31: -File: prom-test/library/__init__.py - > User input at line 238, trigger word ".data": - res = Book.query.filter(Book.title.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 241, trigger word "filter(": - res = Author.query.filter(Author.name.like('%' + form.query.data + '%')).all() - -Vulnerability 32: -File: prom-test/library/__init__.py - > User input at line 241, trigger word ".data": - res = Author.query.filter(Author.name.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 241, trigger word "filter(": - res = Author.query.filter(Author.name.like('%' + form.query.data + '%')).all() - -Vulnerability 33: -File: prom-test/library/__init__.py - > User input at line 238, trigger word ".data": - res = Book.query.filter(Book.title.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 242, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',results=res, source=source, form=form) - -Vulnerability 34: -File: prom-test/library/__init__.py - > User input at line 241, trigger word ".data": - res = Author.query.filter(Author.name.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 242, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',results=res, source=source, form=form) - -Vulnerability 35: -File: prom-test/library/__init__.py - > User input at line 265, trigger word ".data": - user = User.query.filter(User.username == form.username.data).first() -Reassigned in: - File: prom-test/library/__init__.py - > Line 273: session['username'] = user.username - File: prom-test/library/__init__.py - > Line 271: session['logged_in'] = True -File: prom-test/library/__init__.py - > reaches line 265, trigger word "filter(": - user = User.query.filter(User.username == form.username.data).first() - - - -regisf/Strawberry -https://github.com/regisf/Strawberry -Entry file: Strawberry/main.py -Scanned: 2016-10-19 13:16:59.174451 -No vulnerabilities found. - - -Smirl/teaflask -https://github.com/Smirl/teaflask -Entry file: teaflask/app/__init__.py -Scanned: 2016-10-19 13:17:01.150631 -Vulnerability 1: -File: teaflask/app/main/views.py - > User input at line 28, trigger word "get(": - tea = Tea.query.get(form.tea_id.data) -Reassigned in: - File: teaflask/app/main/views.py - > Line 32: pot = Pot(brewer=current_user._get_current_object(), tea=tea) -File: teaflask/app/main/views.py - > reaches line 37, trigger word "flash(": - flash('A pot of {} has been brewed.'.format(tea.name), 'info') - -Vulnerability 2: -File: teaflask/app/main/views.py - > User input at line 28, trigger word ".data": - tea = Tea.query.get(form.tea_id.data) -Reassigned in: - File: teaflask/app/main/views.py - > Line 32: pot = Pot(brewer=current_user._get_current_object(), tea=tea) -File: teaflask/app/main/views.py - > reaches line 37, trigger word "flash(": - flash('A pot of {} has been brewed.'.format(tea.name), 'info') - -Vulnerability 3: -File: teaflask/app/api_1_0/__init__.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: teaflask/app/api_1_0/__init__.py - > Line 10: pagination = query.paginate(page,per_page=request.args.get('limit', current_app.config['TEAFLASK_PER_PAGE'],type=int), error_out=False) - File: teaflask/app/api_1_0/__init__.py - > Line 19: _prev = None - File: teaflask/app/api_1_0/__init__.py - > Line 22: _next = None -File: teaflask/app/api_1_0/__init__.py - > reaches line 21, trigger word "url_for(": - _prev = url_for(endpoint,page=page - 1, _external=True, kwargs) - -Vulnerability 4: -File: teaflask/app/api_1_0/__init__.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: teaflask/app/api_1_0/__init__.py - > Line 10: pagination = query.paginate(page,per_page=request.args.get('limit', current_app.config['TEAFLASK_PER_PAGE'],type=int), error_out=False) - File: teaflask/app/api_1_0/__init__.py - > Line 19: _prev = None - File: teaflask/app/api_1_0/__init__.py - > Line 22: _next = None -File: teaflask/app/api_1_0/__init__.py - > reaches line 24, trigger word "url_for(": - _next = url_for(endpoint,page=page + 1, _external=True, kwargs) - -Vulnerability 5: -File: teaflask/app/api_1_0/__init__.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: teaflask/app/api_1_0/__init__.py - > Line 10: pagination = query.paginate(page,per_page=request.args.get('limit', current_app.config['TEAFLASK_PER_PAGE'],type=int), error_out=False) - File: teaflask/app/api_1_0/__init__.py - > Line 19: _prev = None - File: teaflask/app/api_1_0/__init__.py - > Line 22: _next = None -File: teaflask/app/api_1_0/__init__.py - > reaches line 25, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(tag_name'prev''next''count'[item.to_json() for item in pagination.items]_prev_nextpagination.total) - -Vulnerability 6: -File: teaflask/app/api_1_0/__init__.py - > User input at line 10, trigger word "get(": - pagination = query.paginate(page,per_page=request.args.get('limit', current_app.config['TEAFLASK_PER_PAGE'],type=int), error_out=False) -File: teaflask/app/api_1_0/__init__.py - > reaches line 25, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(tag_name'prev''next''count'[item.to_json() for item in pagination.items]_prev_nextpagination.total) - - - -jimr/chopper -https://github.com/jimr/chopper -Entry file: chopper/app.py -Scanned: 2016-10-19 13:17:02.452992 -No vulnerabilities found. - - -pawl/pdfreverse -https://github.com/pawl/pdfreverse -Entry file: pdfreverse/lib/flask/sessions.py -Scanned: 2016-10-19 13:17:04.688233 -No vulnerabilities found. - - -vrk7bp/GautamWebsite -https://github.com/vrk7bp/GautamWebsite -Entry file: GautamWebsite/FlaskServer.py -Scanned: 2016-10-19 13:17:09.165381 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -csojinb/flask_demo -https://github.com/csojinb/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-19 13:17:10.886481 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -waitingkuo/flask-sample -https://github.com/waitingkuo/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-19 13:17:11.384856 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nezaj/flask-skeleton -https://github.com/nezaj/flask-skeleton -Entry file: None -Scanned: 2016-10-19 13:17:11.868142 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nezaj/flask-skeleton. - -fengsp/flask-application-wizard -https://github.com/fengsp/flask-application-wizard -Entry file: flask-application-wizard/make-flaskapp.py -Scanned: 2016-10-19 13:17:12.360298 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chiedo/flask-starter -https://github.com/chiedo/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-19 13:17:12.842562 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dadadel/codelauncher -https://github.com/dadadel/codelauncher -Entry file: codelauncher/webdev.py -Scanned: 2016-10-19 13:17:14.528520 -Vulnerability 1: -File: codelauncher/webdev.py - > User input at line 39, trigger word "form[": - code = request.form['code'] -Reassigned in: - File: codelauncher/webdev.py - > Line 40: run = runcode.RunCCode(code) - File: codelauncher/webdev.py - > Line 45: code = default_c_code -File: codelauncher/webdev.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('main.html',code=code, target='runc', resrun=resrun, rescomp=rescompil, rows=default_rows, cols=default_cols) - -Vulnerability 2: -File: codelauncher/webdev.py - > User input at line 59, trigger word "form[": - code = request.form['code'] -Reassigned in: - File: codelauncher/webdev.py - > Line 60: run = runcode.RunCppCode(code) - File: codelauncher/webdev.py - > Line 65: code = default_cpp_code -File: codelauncher/webdev.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('main.html',code=code, target='runcpp', resrun=resrun, rescomp=rescompil, rows=default_rows, cols=default_cols) - -Vulnerability 3: -File: codelauncher/webdev.py - > User input at line 79, trigger word "form[": - code = request.form['code'] -Reassigned in: - File: codelauncher/webdev.py - > Line 80: run = runcode.RunPyCode(code) - File: codelauncher/webdev.py - > Line 85: code = default_py_code -File: codelauncher/webdev.py - > reaches line 89, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('main.html',code=code, target='runpy', resrun=resrun, rescomp=rescompil, rows=default_rows, cols=default_cols) - - - -devxoul/flask-errorhandler -https://github.com/devxoul/flask-errorhandler -Entry file: flask-errorhandler/flask_errorhandler.py -Scanned: 2016-10-19 13:17:15.022045 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cwmat/flasky -https://github.com/cwmat/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 13:17:15.511193 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rongmic/flaskr -https://github.com/rongmic/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:17:16.000898 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hannah-grape/flaskr -https://github.com/hannah-grape/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:17:18.494119 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Rosuav/Flask1 -https://github.com/Rosuav/Flask1 -Entry file: Flask1/1.py -Scanned: 2016-10-19 13:17:20.854789 -Vulnerability 1: -File: Flask1/1.py - > User input at line 34, trigger word "Markup(": - s = s.replace(' - ', Markup(' - ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 34, trigger word "replace(": - s = s.replace(' - ', Markup(' - ')) - -Vulnerability 2: -File: Flask1/1.py - > User input at line 35, trigger word "Markup(": - s = s.replace(' ', Markup('  ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 34, trigger word "replace(": - s = s.replace(' - ', Markup(' - ')) - -Vulnerability 3: -File: Flask1/1.py - > User input at line 36, trigger word "Markup(": - s = s.replace(' - -', Markup('

- -

')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 34, trigger word "replace(": - s = s.replace(' - ', Markup(' - ')) - -Vulnerability 4: -File: Flask1/1.py - > User input at line 37, trigger word "Markup(": - s = s.replace(' -', Markup('
-')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 34, trigger word "replace(": - s = s.replace(' - ', Markup(' - ')) - -Vulnerability 5: -File: Flask1/1.py - > User input at line 34, trigger word "Markup(": - s = s.replace(' - ', Markup(' - ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 35, trigger word "replace(": - s = s.replace(' ', Markup('  ')) - -Vulnerability 6: -File: Flask1/1.py - > User input at line 35, trigger word "Markup(": - s = s.replace(' ', Markup('  ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 35, trigger word "replace(": - s = s.replace(' ', Markup('  ')) - -Vulnerability 7: -File: Flask1/1.py - > User input at line 36, trigger word "Markup(": - s = s.replace(' - -', Markup('

- -

')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 35, trigger word "replace(": - s = s.replace(' ', Markup('  ')) - -Vulnerability 8: -File: Flask1/1.py - > User input at line 37, trigger word "Markup(": - s = s.replace(' -', Markup('
-')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 35, trigger word "replace(": - s = s.replace(' ', Markup('  ')) - -Vulnerability 9: -File: Flask1/1.py - > User input at line 34, trigger word "Markup(": - s = s.replace(' - ', Markup(' - ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 36, trigger word "replace(": - s = s.replace(' - -', Markup('

- -

')) - -Vulnerability 10: -File: Flask1/1.py - > User input at line 35, trigger word "Markup(": - s = s.replace(' ', Markup('  ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 36, trigger word "replace(": - s = s.replace(' - -', Markup('

- -

')) - -Vulnerability 11: -File: Flask1/1.py - > User input at line 36, trigger word "Markup(": - s = s.replace(' - -', Markup('

- -

')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 36, trigger word "replace(": - s = s.replace(' - -', Markup('

- -

')) - -Vulnerability 12: -File: Flask1/1.py - > User input at line 37, trigger word "Markup(": - s = s.replace(' -', Markup('
-')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 36, trigger word "replace(": - s = s.replace(' - -', Markup('

- -

')) - -Vulnerability 13: -File: Flask1/1.py - > User input at line 34, trigger word "Markup(": - s = s.replace(' - ', Markup(' - ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 37, trigger word "replace(": - s = s.replace(' -', Markup('
-')) - -Vulnerability 14: -File: Flask1/1.py - > User input at line 35, trigger word "Markup(": - s = s.replace(' ', Markup('  ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 37, trigger word "replace(": - s = s.replace(' -', Markup('
-')) - -Vulnerability 15: -File: Flask1/1.py - > User input at line 36, trigger word "Markup(": - s = s.replace(' - -', Markup('

- -

')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 37, trigger word "replace(": - s = s.replace(' -', Markup('
-')) - -Vulnerability 16: -File: Flask1/1.py - > User input at line 37, trigger word "Markup(": - s = s.replace(' -', Markup('
-')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 37, trigger word "replace(": - s = s.replace(' -', Markup('
-')) - -Vulnerability 17: -File: Flask1/1.py - > User input at line 63, trigger word "get(": - search = request.args.get('search', '') -Reassigned in: - File: Flask1/1.py - > Line 77: search = '' - File: Flask1/1.py - > Line 78: morelink = '

More...

' - File: Flask1/1.py - > Line 49: ret_MAYBE_FUNCTION_NAME = redirect(url_for('view')) - File: Flask1/1.py - > Line 51: ret_MAYBE_FUNCTION_NAME = Response('Invalid query, click here to retry', 401, 'WWW-Authenticate''Basic realm="1"') - File: Flask1/1.py - > Line 74: morelink = '' -File: Flask1/1.py - > reaches line 80, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('view.html',rows=rows, more=more, morelink=morelink, auth=auth) - -Vulnerability 18: -File: Flask1/1.py - > User input at line 106, trigger word "Markup(": - publish = Markup(publish'Currently published.''Private entry.' + '') -Reassigned in: - File: Flask1/1.py - > Line 100: publish = '' - File: Flask1/1.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('view')) -File: Flask1/1.py - > reaches line 120, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('addent.html',date=date, title=title, content=content, publish=publish, savenote=Markup(savenote)) - - - -florije1988/FlaskJson -https://github.com/florije1988/FlaskJson -Entry file: FlaskJson/FlaskJson/FlaskJson.py -Scanned: 2016-10-19 13:17:22.084951 -Vulnerability 1: -File: FlaskJson/FlaskJson/FlaskJson.py - > User input at line 13, trigger word "get(": - n = [request.form.get(x, 0,type=float) for x in 'n1''n2''n3'] -Reassigned in: - File: FlaskJson/FlaskJson/FlaskJson.py - > Line 16: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: FlaskJson/FlaskJson/FlaskJson.py - > reaches line 14, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(max=max(n), min=min(n)) - - - -Zhang/pythonFlask -https://github.com/Zhang/pythonFlask -Entry file: pythonFlask/server.py -Scanned: 2016-10-19 13:17:28.168694 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -casschin/flask-example -https://github.com/casschin/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-19 13:17:28.679440 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jasonfong/base-flask -https://github.com/jasonfong/base-flask -Entry file: base-flask/app.py -Scanned: 2016-10-19 13:17:29.971854 -No vulnerabilities found. - - -arushs/Flask-Experiments -https://github.com/arushs/Flask-Experiments -Entry file: Flask-Experiments/app/__init__.py -Scanned: 2016-10-19 13:17:34.146737 -No vulnerabilities found. - - -raulgtk/flask-base -https://github.com/raulgtk/flask-base -Entry file: None -Scanned: 2016-10-19 13:17:47.655109 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/raulgtk/flask-base. - -mgaldieri/flask-crosswords -https://github.com/mgaldieri/flask-crosswords -Entry file: flask-crosswords/flask-crosswords.py -Scanned: 2016-10-19 13:17:51.029864 -No vulnerabilities found. - - -Wojtek-89/Flask-stronka -https://github.com/Wojtek-89/Flask-stronka -Entry file: Flask-stronka/routes.py -Scanned: 2016-10-19 13:17:55.419506 -No vulnerabilities found. - - -Parkayun/Parkayun-Flask-Plate -https://github.com/Parkayun/Parkayun-Flask-Plate -Entry file: Parkayun-Flask-Plate/app/__init__.py -Scanned: 2016-10-19 13:17:56.639823 -No vulnerabilities found. - - -morpheme/FlaskWebDev -https://github.com/morpheme/FlaskWebDev -Entry file: FlaskWebDev/app/__init__.py -Scanned: 2016-10-19 13:17:57.950696 -No vulnerabilities found. - - -lucasmcastro/pymdb -https://github.com/lucasmcastro/pymdb -Entry file: pymdb/manage.py -Scanned: 2016-10-19 13:17:59.238842 -Vulnerability 1: -File: pymdb/manage.py - > User input at line 40, trigger word "get(": - movie = db.session.query(Movie).get(id) -File: pymdb/manage.py - > reaches line 41, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('movies/edit.html',movie=movie) - - - -masakichi/pocket -https://github.com/masakichi/pocket -Entry file: pocket/app/__init__.py -Scanned: 2016-10-19 13:18:00.659702 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jwatson/simple-flask-stacktrace -https://github.com/jwatson/simple-flask-stacktrace -Entry file: simple-flask-stacktrace/server.py -Scanned: 2016-10-19 13:18:04.816872 -No vulnerabilities found. - - -NickWoodhams/Flask-Admin-Mongo-Example -https://github.com/NickWoodhams/Flask-Admin-Mongo-Example -Entry file: Flask-Admin-Mongo-Example/app.py -Scanned: 2016-10-19 13:18:07.050208 -No vulnerabilities found. - - -stanleygu/flask-ipython-redirect -https://github.com/stanleygu/flask-ipython-redirect -Entry file: flask-ipython-redirect/app.py -Scanned: 2016-10-19 13:18:12.590578 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -StephanieKim/flask-todo-api -https://github.com/StephanieKim/flask-todo-api -Entry file: flask-todo-api/app/mongo_todo_app.py -Scanned: 2016-10-19 13:18:13.781959 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -steelywing/flask-blueprint-test -https://github.com/steelywing/flask-blueprint-test -Entry file: flask-blueprint-test/index.py -Scanned: 2016-10-19 13:18:14.974413 -No vulnerabilities found. - - -jstacoder/mrbob-flask-templates -https://github.com/jstacoder/mrbob-flask-templates -Entry file: mrbob-flask-templates/app.py -Scanned: 2016-10-19 13:18:16.196186 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rpsoko/tic_tac_flask -https://github.com/rpsoko/tic_tac_flask -Entry file: tic_tac_flask/server.py -Scanned: 2016-10-19 13:18:17.731249 -No vulnerabilities found. - - -rpsoko/my_dictionary_flask -https://github.com/rpsoko/my_dictionary_flask -Entry file: my_dictionary_flask/server.py -Scanned: 2016-10-19 13:18:18.974089 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -theTechnoWeenie/sample-flask-app -https://github.com/theTechnoWeenie/sample-flask-app -Entry file: sample-flask-app/src/sampleApp.py -Scanned: 2016-10-19 13:18:20.172461 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kartyboyz/n64-storage-flask -https://github.com/kartyboyz/n64-storage-flask -Entry file: n64-storage-flask/n64_storage/__init__.py -Scanned: 2016-10-19 13:18:21.618886 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sandys/flask-sms-ses -https://github.com/sandys/flask-sms-ses -Entry file: flask-sms-ses/routes.py -Scanned: 2016-10-19 13:18:22.823386 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elvinyung/wiski -https://github.com/elvinyung/wiski -Entry file: wiski/app.py -Scanned: 2016-10-19 13:18:24.263589 -Vulnerability 1: -File: wiski/app/views.py - > User input at line 39, trigger word "form[": - search_query = request.form['search_query'] -File: wiski/app/views.py - > reaches line 40, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(search,search_query=search_query)) - -Vulnerability 2: -File: wiski/app/views.py - > User input at line 39, trigger word "form[": - search_query = request.form['search_query'] -File: wiski/app/views.py - > reaches line 40, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for(search,search_query=search_query)) - -Vulnerability 3: -File: wiski/app/views.py - > User input at line 39, trigger word "form[": - search_query = request.form['search_query'] -File: wiski/app/views.py - > reaches line 42, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('searchresults.html',search_query=search_query, results=results) - - - -elvinyung/florum -https://github.com/elvinyung/florum -Entry file: florum/app/__init__.py -Scanned: 2016-10-19 13:18:25.578247 -Vulnerability 1: -File: florum/app/views.py - > User input at line 53, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: florum/app/views.py - > Line 63: session['username'] = username - File: florum/app/views.py - > Line 62: session['logged_in'] = True -File: florum/app/views.py - > reaches line 54, trigger word "execute(": - username_row = db.execute('select * from accounts where username=?', (username)).fetchone() - -Vulnerability 2: -File: florum/app/views.py - > User input at line 91, trigger word "form[": - post_title = request.form['title'] -File: florum/app/views.py - > reaches line 100, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - -Vulnerability 3: -File: florum/app/views.py - > User input at line 95, trigger word "form[": - post_link = request.form['link'] -File: florum/app/views.py - > reaches line 100, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - -Vulnerability 4: -File: florum/app/views.py - > User input at line 96, trigger word "form[": - post_content = request.form['content'] -File: florum/app/views.py - > reaches line 100, trigger word "execute(": - db.execute('insert into posts (postTime, title, content, linkURL, author, points) values (?, ?, ?, ?, ?, ?)', (current_time, post_title, post_content, post_link, post_author, starting_points)) - - - -leebox/bbs -https://github.com/leebox/bbs -Entry file: bbs/app/__init__.py -Scanned: 2016-10-19 13:18:26.895910 -No vulnerabilities found. - - -NilsNoreyson/FlaskServerToDocxLetter -https://github.com/NilsNoreyson/FlaskServerToDocxLetter -Entry file: None -Scanned: 2016-10-19 13:18:28.629293 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/NilsNoreyson/FlaskServerToDocxLetter. - -bhsaurabh/microblog -https://github.com/bhsaurabh/microblog -Entry file: None -Scanned: 2016-10-19 13:18:29.121262 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -frederick-masterton/python27-flask-RESTful-api-how-to -https://github.com/frederick-masterton/python27-flask-RESTful-api-how-to -Entry file: python27-flask-RESTful-api-how-to/restfulapi.py -Scanned: 2016-10-19 13:18:32.392321 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shekhargulati/redis-in-action-chapter1-flask-app -https://github.com/shekhargulati/redis-in-action-chapter1-flask-app -Entry file: redis-in-action-chapter1-flask-app/hackerpins.py -Scanned: 2016-10-19 13:18:33.837254 -No vulnerabilities found. - - -nmathias/tumbleblog -https://github.com/nmathias/tumbleblog -Entry file: tumbleblog/__init__.py -Scanned: 2016-10-19 13:18:35.245808 -No vulnerabilities found. - - -Konbonix/DisasterSupplyTracker -https://github.com/Konbonix/DisasterSupplyTracker -Entry file: DisasterSupplyTracker/lib/flask/sessions.py -Scanned: 2016-10-19 13:18:37.737296 -No vulnerabilities found. - - -jgrip/ddns -https://github.com/jgrip/ddns -Entry file: ddns/ddns.py -Scanned: 2016-10-19 13:18:39.013377 -No vulnerabilities found. - - -MrTrustworthy/SL21 -https://github.com/MrTrustworthy/SL21 -Entry file: SL21/ProjectSL/__init__.py -Scanned: 2016-10-19 13:18:50.775797 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shashisp/express -https://github.com/shashisp/express -Entry file: express/app/__init__.py -Scanned: 2016-10-19 13:18:52.025852 -No vulnerabilities found. - - -mhielscher/htpc-control -https://github.com/mhielscher/htpc-control -Entry file: htpc-control/htpc.py -Scanned: 2016-10-19 13:18:57.483175 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gbrennon/RestPi -https://github.com/gbrennon/RestPi -Entry file: RestPi/RestPi.py -Scanned: 2016-10-19 13:18:58.801511 -No vulnerabilities found. - - -caryoscelus/comment-anything -https://github.com/caryoscelus/comment-anything -Entry file: comment-anything/main.py -Scanned: 2016-10-19 13:19:00.149206 -No vulnerabilities found. - - -ryepdx/printer_proxy_server -https://github.com/ryepdx/printer_proxy_server -Entry file: printer_proxy_server/app.py -Scanned: 2016-10-19 13:19:01.478291 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -patxu/messageboard -https://github.com/patxu/messageboard -Entry file: None -Scanned: 2016-10-19 13:19:05.336120 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -romgain/PythonRestAPI -https://github.com/romgain/PythonRestAPI -Entry file: PythonRestAPI/app.py -Scanned: 2016-10-19 13:19:06.655791 -No vulnerabilities found. - - -niijv/webvita -https://github.com/niijv/webvita -Entry file: webvita/wsgi/webvita/__init__.py -Scanned: 2016-10-19 13:19:09.215554 -Vulnerability 1: -File: webvita/wsgi/webvita/views.py - > User input at line 34, trigger word "form[": - terms = unicode(request.form['searchterms']) -Reassigned in: - File: webvita/wsgi/webvita/views.py - > Line 36: blogposts = Blogpost.query.whoosh_search(terms,or_=True) -File: webvita/wsgi/webvita/views.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',terms=terms, blogposts=blogposts) - -Vulnerability 2: -File: webvita/wsgi/webvita/blogposts.py - > User input at line 45, trigger word "form[": - short_title = unicode(request.form['short_title']).replace(' ', '-') -Reassigned in: - File: webvita/wsgi/webvita/blogposts.py - > Line 64: blogpost = Blogpost(user, title, subtitle, short_title, text_markdown, text_html, blogpost_tags,hidden=False) -File: webvita/wsgi/webvita/blogposts.py - > reaches line 45, trigger word "replace(": - short_title = unicode(request.form['short_title']).replace(' ', '-') - -Vulnerability 3: -File: webvita/wsgi/webvita/blogposts.py - > User input at line 106, trigger word "form[": - short_title = unicode(request.form['short_title']).replace(' ', '-') -Reassigned in: - File: webvita/wsgi/webvita/blogposts.py - > Line 129: old_bp.short_title = short_title - File: webvita/wsgi/webvita/blogposts.py - > Line 104: ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit_blogpost',blogpost_title=blogpost_title)) - File: webvita/wsgi/webvita/blogposts.py - > Line 112: ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit_blogpost',blogpost_title=blogpost_title)) -File: webvita/wsgi/webvita/blogposts.py - > reaches line 106, trigger word "replace(": - short_title = unicode(request.form['short_title']).replace(' ', '-') - -Vulnerability 4: -File: webvita/wsgi/webvita/blogposts.py - > User input at line 106, trigger word "form[": - short_title = unicode(request.form['short_title']).replace(' ', '-') -Reassigned in: - File: webvita/wsgi/webvita/blogposts.py - > Line 129: old_bp.short_title = short_title - File: webvita/wsgi/webvita/blogposts.py - > Line 104: ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit_blogpost',blogpost_title=blogpost_title)) - File: webvita/wsgi/webvita/blogposts.py - > Line 112: ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit_blogpost',blogpost_title=blogpost_title)) -File: webvita/wsgi/webvita/blogposts.py - > reaches line 138, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_blogpost',blogpost_short_title=short_title)) - -Vulnerability 5: -File: webvita/wsgi/webvita/blogposts.py - > User input at line 106, trigger word "form[": - short_title = unicode(request.form['short_title']).replace(' ', '-') -Reassigned in: - File: webvita/wsgi/webvita/blogposts.py - > Line 129: old_bp.short_title = short_title - File: webvita/wsgi/webvita/blogposts.py - > Line 104: ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit_blogpost',blogpost_title=blogpost_title)) - File: webvita/wsgi/webvita/blogposts.py - > Line 112: ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit_blogpost',blogpost_title=blogpost_title)) -File: webvita/wsgi/webvita/blogposts.py - > reaches line 138, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_blogpost',blogpost_short_title=short_title)) - - - -fhebert-perkins/FileShare -https://github.com/fhebert-perkins/FileShare -Entry file: FileShare/server.py -Scanned: 2016-10-19 13:19:10.596529 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dastagg/sightings -https://github.com/dastagg/sightings -Entry file: sightings/routes.py -Scanned: 2016-10-19 13:19:22.178056 -No vulnerabilities found. - - -gregeinfrank/microblog -https://github.com/gregeinfrank/microblog -Entry file: None -Scanned: 2016-10-19 13:19:23.181940 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gelioz/prom-test -https://github.com/gelioz/prom-test -Entry file: prom-test/library/__init__.py -Scanned: 2016-10-19 13:19:24.579431 -Vulnerability 1: -File: prom-test/library/__init__.py - > User input at line 32, trigger word "get(": - search = request.args.get('search') -File: prom-test/library/__init__.py - > reaches line 33, trigger word "filter(": - res = Author.query.filter(Author.name.like('%' + search + '%')).all() - -Vulnerability 2: -File: prom-test/library/__init__.py - > User input at line 39, trigger word "get(": - search = request.args.get('search') -File: prom-test/library/__init__.py - > reaches line 40, trigger word "filter(": - res = Book.query.filter(Book.title.like('%' + search + '%')).all() - -Vulnerability 3: -File: prom-test/library/__init__.py - > User input at line 48, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 48, trigger word "filter(": - book = Book.query.filter(Book.id == request.form['book_id']).first() - -Vulnerability 4: -File: prom-test/library/__init__.py - > User input at line 49, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 49, trigger word "filter(": - author = Author.query.filter(Author.id == request.form['author_id']).first() - -Vulnerability 5: -File: prom-test/library/__init__.py - > User input at line 48, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 6: -File: prom-test/library/__init__.py - > User input at line 48, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 7: -File: prom-test/library/__init__.py - > User input at line 67, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 67, trigger word "filter(": - author = Author.query.filter(Author.id == request.form['author_id']).first() - -Vulnerability 8: -File: prom-test/library/__init__.py - > User input at line 68, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 68, trigger word "filter(": - book = Book.query.filter(Book.id == request.form['book_id']).first() - -Vulnerability 9: -File: prom-test/library/__init__.py - > User input at line 67, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 79, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 10: -File: prom-test/library/__init__.py - > User input at line 67, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 79, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 11: -File: prom-test/library/__init__.py - > User input at line 86, trigger word "get(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() -File: prom-test/library/__init__.py - > reaches line 86, trigger word "filter(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() - -Vulnerability 12: -File: prom-test/library/__init__.py - > User input at line 87, trigger word "get(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() -File: prom-test/library/__init__.py - > reaches line 87, trigger word "filter(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() - -Vulnerability 13: -File: prom-test/library/__init__.py - > User input at line 86, trigger word "get(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() -File: prom-test/library/__init__.py - > reaches line 98, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 14: -File: prom-test/library/__init__.py - > User input at line 86, trigger word "get(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() -File: prom-test/library/__init__.py - > reaches line 98, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 15: -File: prom-test/library/__init__.py - > User input at line 105, trigger word "get(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() -File: prom-test/library/__init__.py - > reaches line 105, trigger word "filter(": - book = Book.query.filter(Book.id == request.args.get('book', '')).first() - -Vulnerability 16: -File: prom-test/library/__init__.py - > User input at line 106, trigger word "get(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() -File: prom-test/library/__init__.py - > reaches line 106, trigger word "filter(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() - -Vulnerability 17: -File: prom-test/library/__init__.py - > User input at line 106, trigger word "get(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() -File: prom-test/library/__init__.py - > reaches line 117, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 18: -File: prom-test/library/__init__.py - > User input at line 106, trigger word "get(": - author = Author.query.filter(Author.id == request.args.get('author', '')).first() -File: prom-test/library/__init__.py - > reaches line 117, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 19: -File: prom-test/library/__init__.py - > User input at line 124, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 124, trigger word "filter(": - author = Author.query.filter(Author.id == request.form['author_id']).first() - -Vulnerability 20: -File: prom-test/library/__init__.py - > User input at line 124, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 133, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 21: -File: prom-test/library/__init__.py - > User input at line 124, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -File: prom-test/library/__init__.py - > reaches line 133, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('author_page',author_id=author.id)) - -Vulnerability 22: -File: prom-test/library/__init__.py - > User input at line 140, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 140, trigger word "filter(": - book = Book.query.filter(Book.id == request.form['book_id']).first() - -Vulnerability 23: -File: prom-test/library/__init__.py - > User input at line 140, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 149, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 24: -File: prom-test/library/__init__.py - > User input at line 140, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -File: prom-test/library/__init__.py - > reaches line 149, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book_page',book_id=book.id)) - -Vulnerability 25: -File: prom-test/library/__init__.py - > User input at line 156, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -Reassigned in: - File: prom-test/library/__init__.py - > Line 160: d = authors_books.delete(authors_books.c.author_id == author.id) -File: prom-test/library/__init__.py - > reaches line 156, trigger word "filter(": - author = Author.query.filter(Author.id == request.form['author_id']).first() - -Vulnerability 26: -File: prom-test/library/__init__.py - > User input at line 156, trigger word "form[": - author = Author.query.filter(Author.id == request.form['author_id']).first() -Reassigned in: - File: prom-test/library/__init__.py - > Line 160: d = authors_books.delete(authors_books.c.author_id == author.id) -File: prom-test/library/__init__.py - > reaches line 161, trigger word "execute(": - db_session.execute(d) - -Vulnerability 27: -File: prom-test/library/__init__.py - > User input at line 172, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -Reassigned in: - File: prom-test/library/__init__.py - > Line 176: d = authors_books.delete(authors_books.c.book_id == book.id) -File: prom-test/library/__init__.py - > reaches line 172, trigger word "filter(": - book = Book.query.filter(Book.id == request.form['book_id']).first() - -Vulnerability 28: -File: prom-test/library/__init__.py - > User input at line 172, trigger word "form[": - book = Book.query.filter(Book.id == request.form['book_id']).first() -Reassigned in: - File: prom-test/library/__init__.py - > Line 176: d = authors_books.delete(authors_books.c.book_id == book.id) -File: prom-test/library/__init__.py - > reaches line 177, trigger word "execute(": - db_session.execute(d) - -Vulnerability 29: -File: prom-test/library/__init__.py - > User input at line 238, trigger word ".data": - res = Book.query.filter(Book.title.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 238, trigger word "filter(": - res = Book.query.filter(Book.title.like('%' + form.query.data + '%')).all() - -Vulnerability 30: -File: prom-test/library/__init__.py - > User input at line 241, trigger word ".data": - res = Author.query.filter(Author.name.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 238, trigger word "filter(": - res = Book.query.filter(Book.title.like('%' + form.query.data + '%')).all() - -Vulnerability 31: -File: prom-test/library/__init__.py - > User input at line 238, trigger word ".data": - res = Book.query.filter(Book.title.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 241, trigger word "filter(": - res = Author.query.filter(Author.name.like('%' + form.query.data + '%')).all() - -Vulnerability 32: -File: prom-test/library/__init__.py - > User input at line 241, trigger word ".data": - res = Author.query.filter(Author.name.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 241, trigger word "filter(": - res = Author.query.filter(Author.name.like('%' + form.query.data + '%')).all() - -Vulnerability 33: -File: prom-test/library/__init__.py - > User input at line 238, trigger word ".data": - res = Book.query.filter(Book.title.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 242, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',results=res, source=source, form=form) - -Vulnerability 34: -File: prom-test/library/__init__.py - > User input at line 241, trigger word ".data": - res = Author.query.filter(Author.name.like('%' + form.query.data + '%')).all() -Reassigned in: - File: prom-test/library/__init__.py - > Line 233: res = None -File: prom-test/library/__init__.py - > reaches line 242, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',results=res, source=source, form=form) - -Vulnerability 35: -File: prom-test/library/__init__.py - > User input at line 265, trigger word ".data": - user = User.query.filter(User.username == form.username.data).first() -Reassigned in: - File: prom-test/library/__init__.py - > Line 273: session['username'] = user.username - File: prom-test/library/__init__.py - > Line 271: session['logged_in'] = True -File: prom-test/library/__init__.py - > reaches line 265, trigger word "filter(": - user = User.query.filter(User.username == form.username.data).first() - - - -cspears2002/tumblelog -https://github.com/cspears2002/tumblelog -Entry file: tumblelog/tumblelog/__init__.py -Scanned: 2016-10-19 13:19:25.864291 -No vulnerabilities found. - - -vrk7bp/GautamWebsite -https://github.com/vrk7bp/GautamWebsite -Entry file: GautamWebsite/FlaskServer.py -Scanned: 2016-10-19 13:19:27.850661 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -StevenMaude/pdf_to_html_preview -https://github.com/StevenMaude/pdf_to_html_preview -Entry file: pdf_to_html_preview/app/__init__.py -Scanned: 2016-10-19 13:19:29.194848 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -voidabhi/flask -https://github.com/voidabhi/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:19:30.782783 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -daniel-cheng/flask_webapp -https://github.com/daniel-cheng/flask_webapp -Entry file: flask_webapp/routes.py -Scanned: 2016-10-19 13:19:34.799591 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fmarella/dalie-flask -https://github.com/fmarella/dalie-flask -Entry file: dalie-flask/flask_application/__init__.py -Scanned: 2016-10-19 13:19:36.524458 -No vulnerabilities found. - - -rongmic/flaskr -https://github.com/rongmic/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:19:37.023812 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Rosuav/Flask1 -https://github.com/Rosuav/Flask1 -Entry file: Flask1/1.py -Scanned: 2016-10-19 13:19:38.357344 -Vulnerability 1: -File: Flask1/1.py - > User input at line 34, trigger word "Markup(": - s = s.replace(' - ', Markup(' - ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 34, trigger word "replace(": - s = s.replace(' - ', Markup(' - ')) - -Vulnerability 2: -File: Flask1/1.py - > User input at line 35, trigger word "Markup(": - s = s.replace(' ', Markup('  ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 34, trigger word "replace(": - s = s.replace(' - ', Markup(' - ')) - -Vulnerability 3: -File: Flask1/1.py - > User input at line 36, trigger word "Markup(": - s = s.replace(' - -', Markup('

- -

')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 34, trigger word "replace(": - s = s.replace(' - ', Markup(' - ')) - -Vulnerability 4: -File: Flask1/1.py - > User input at line 37, trigger word "Markup(": - s = s.replace(' -', Markup('
-')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 34, trigger word "replace(": - s = s.replace(' - ', Markup(' - ')) - -Vulnerability 5: -File: Flask1/1.py - > User input at line 34, trigger word "Markup(": - s = s.replace(' - ', Markup(' - ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 35, trigger word "replace(": - s = s.replace(' ', Markup('  ')) - -Vulnerability 6: -File: Flask1/1.py - > User input at line 35, trigger word "Markup(": - s = s.replace(' ', Markup('  ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 35, trigger word "replace(": - s = s.replace(' ', Markup('  ')) - -Vulnerability 7: -File: Flask1/1.py - > User input at line 36, trigger word "Markup(": - s = s.replace(' - -', Markup('

- -

')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 35, trigger word "replace(": - s = s.replace(' ', Markup('  ')) - -Vulnerability 8: -File: Flask1/1.py - > User input at line 37, trigger word "Markup(": - s = s.replace(' -', Markup('
-')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 35, trigger word "replace(": - s = s.replace(' ', Markup('  ')) - -Vulnerability 9: -File: Flask1/1.py - > User input at line 34, trigger word "Markup(": - s = s.replace(' - ', Markup(' - ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 36, trigger word "replace(": - s = s.replace(' - -', Markup('

- -

')) - -Vulnerability 10: -File: Flask1/1.py - > User input at line 35, trigger word "Markup(": - s = s.replace(' ', Markup('  ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 36, trigger word "replace(": - s = s.replace(' - -', Markup('

- -

')) - -Vulnerability 11: -File: Flask1/1.py - > User input at line 36, trigger word "Markup(": - s = s.replace(' - -', Markup('

- -

')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 36, trigger word "replace(": - s = s.replace(' - -', Markup('

- -

')) - -Vulnerability 12: -File: Flask1/1.py - > User input at line 37, trigger word "Markup(": - s = s.replace(' -', Markup('
-')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 36, trigger word "replace(": - s = s.replace(' - -', Markup('

- -

')) - -Vulnerability 13: -File: Flask1/1.py - > User input at line 34, trigger word "Markup(": - s = s.replace(' - ', Markup(' - ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 37, trigger word "replace(": - s = s.replace(' -', Markup('
-')) - -Vulnerability 14: -File: Flask1/1.py - > User input at line 35, trigger word "Markup(": - s = s.replace(' ', Markup('  ')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 37, trigger word "replace(": - s = s.replace(' -', Markup('
-')) - -Vulnerability 15: -File: Flask1/1.py - > User input at line 36, trigger word "Markup(": - s = s.replace(' - -', Markup('

- -

')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 37, trigger word "replace(": - s = s.replace(' -', Markup('
-')) - -Vulnerability 16: -File: Flask1/1.py - > User input at line 37, trigger word "Markup(": - s = s.replace(' -', Markup('
-')) -Reassigned in: - File: Flask1/1.py - > Line 32: s = s.decode('utf-8') - File: Flask1/1.py - > Line 33: s = Markup.escape(s) - File: Flask1/1.py - > Line 38: ret_MAYBE_FUNCTION_NAME = s -File: Flask1/1.py - > reaches line 37, trigger word "replace(": - s = s.replace(' -', Markup('
-')) - -Vulnerability 17: -File: Flask1/1.py - > User input at line 63, trigger word "get(": - search = request.args.get('search', '') -Reassigned in: - File: Flask1/1.py - > Line 77: search = '' - File: Flask1/1.py - > Line 78: morelink = '

More...

' - File: Flask1/1.py - > Line 49: ret_MAYBE_FUNCTION_NAME = redirect(url_for('view')) - File: Flask1/1.py - > Line 51: ret_MAYBE_FUNCTION_NAME = Response('Invalid query, click here to retry', 401, 'WWW-Authenticate''Basic realm="1"') - File: Flask1/1.py - > Line 74: morelink = '' -File: Flask1/1.py - > reaches line 80, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('view.html',rows=rows, more=more, morelink=morelink, auth=auth) - -Vulnerability 18: -File: Flask1/1.py - > User input at line 106, trigger word "Markup(": - publish = Markup(publish'Currently published.''Private entry.' + '') -Reassigned in: - File: Flask1/1.py - > Line 100: publish = '' - File: Flask1/1.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('view')) -File: Flask1/1.py - > reaches line 120, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('addent.html',date=date, title=title, content=content, publish=publish, savenote=Markup(savenote)) - - - -scgodbold/flaskFramework -https://github.com/scgodbold/flaskFramework -Entry file: flaskFramework/app/__init__.py -Scanned: 2016-10-19 13:19:39.918047 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ramsys/FlaskDo -https://github.com/ramsys/FlaskDo -Entry file: FlaskDo/wsgi/myflaskapp.py -Scanned: 2016-10-19 13:19:41.262830 -No vulnerabilities found. - - -farconada/FlaskWSSE -https://github.com/farconada/FlaskWSSE -Entry file: FlaskWSSE/application/__init__.py -Scanned: 2016-10-19 13:19:42.503202 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yi719/flask_demo -https://github.com/yi719/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-19 13:19:43.001395 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elvinyung/flask-scaffold -https://github.com/elvinyung/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-19 13:19:43.510281 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rkk09c/Flask_Boilerplate -https://github.com/rkk09c/Flask_Boilerplate -Entry file: Flask_Boilerplate/app/__init__.py -Scanned: 2016-10-19 13:19:45.164127 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -avwie/Flask-Flat -https://github.com/avwie/Flask-Flat -Entry file: Flask-Flat/example/app.py -Scanned: 2016-10-19 13:19:51.517971 -No vulnerabilities found. - - -bertonha/base_flask -https://github.com/bertonha/base_flask -Entry file: base_flask/app/__init__.py -Scanned: 2016-10-19 13:19:53.846754 -No vulnerabilities found. - - -wangwangwar/flask-docker -https://github.com/wangwangwar/flask-docker -Entry file: flask-docker/app/__init__.py -Scanned: 2016-10-19 13:19:59.122592 -No vulnerabilities found. - - -jbradach/flask-markov -https://github.com/jbradach/flask-markov -Entry file: flask-markov/app.py -Scanned: 2016-10-19 13:20:00.502838 -No vulnerabilities found. - - -antoniotari/flask_api -https://github.com/antoniotari/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-19 13:20:00.997265 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -trudikampfschaf/flask-microblog -https://github.com/trudikampfschaf/flask-microblog -Entry file: None -Scanned: 2016-10-19 13:20:02.506118 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Wojtek-89/Flask-stronka -https://github.com/Wojtek-89/Flask-stronka -Entry file: Flask-stronka/routes.py -Scanned: 2016-10-19 13:20:03.893630 -No vulnerabilities found. - - -BobbyJoeSmith3/FlaskAppLaunch -https://github.com/BobbyJoeSmith3/FlaskAppLaunch -Entry file: FlaskAppLaunch/app/__init__.py -Scanned: 2016-10-19 13:20:10.852650 -No vulnerabilities found. - - -masakichi/pocket -https://github.com/masakichi/pocket -Entry file: pocket/app/__init__.py -Scanned: 2016-10-19 13:20:11.386184 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jwatson/simple-flask-stacktrace -https://github.com/jwatson/simple-flask-stacktrace -Entry file: simple-flask-stacktrace/server.py -Scanned: 2016-10-19 13:20:12.609255 -No vulnerabilities found. - - -NickWoodhams/Flask-Admin-Mongo-Example -https://github.com/NickWoodhams/Flask-Admin-Mongo-Example -Entry file: Flask-Admin-Mongo-Example/app.py -Scanned: 2016-10-19 13:20:13.838275 -No vulnerabilities found. - - -stanleygu/flask-ipython-redirect -https://github.com/stanleygu/flask-ipython-redirect -Entry file: flask-ipython-redirect/app.py -Scanned: 2016-10-19 13:20:24.334763 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jef5ez/nlToSparqlFlask -https://github.com/jef5ez/nlToSparqlFlask -Entry file: nlToSparqlFlask/quepy_flask.py -Scanned: 2016-10-19 13:20:25.683871 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andrewkreid/swagger-flask-test -https://github.com/andrewkreid/swagger-flask-test -Entry file: swagger-flask-test/app_api.py -Scanned: 2016-10-19 13:20:27.017513 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Sysnove/flask-hello-world -https://github.com/Sysnove/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 13:20:27.545349 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -sakserv/hadoop-flask-apps -https://github.com/sakserv/hadoop-flask-apps -Entry file: hadoop-flask-apps/main.py -Scanned: 2016-10-19 13:20:28.885956 -No vulnerabilities found. - - -gene9/Flask-LaunchSoon -https://github.com/gene9/Flask-LaunchSoon -Entry file: Flask-LaunchSoon/launchsoon.py -Scanned: 2016-10-19 13:20:30.874509 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sandys/flask-sms-ses -https://github.com/sandys/flask-sms-ses -Entry file: flask-sms-ses/routes.py -Scanned: 2016-10-19 13:20:31.368779 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PatrickEGorman/Website -https://github.com/PatrickEGorman/Website -Entry file: Website/__init__.py -Scanned: 2016-10-19 13:20:32.812804 -No vulnerabilities found. - - -zlkca/fezlin -https://github.com/zlkca/fezlin -Entry file: fezlin/__init__.py -Scanned: 2016-10-19 13:20:36.248440 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -daboross/qxlc -https://github.com/daboross/qxlc -Entry file: qxlc/qxlc/__init__.py -Scanned: 2016-10-19 13:20:37.859886 -Vulnerability 1: -File: qxlc/qxlc/database.py - > User input at line 91, trigger word ".data": - select_result = db.execute(select([data_table.c.id]).where(data_table.c.type == data_type).where(data_table.c.data == data)) -Reassigned in: - File: qxlc/qxlc/database.py - > Line 89: select_result = None -File: qxlc/qxlc/database.py - > reaches line 91, trigger word "execute(": - select_result = db.execute(select([data_table.c.id]).where(data_table.c.type == data_type).where(data_table.c.data == data)) - -Vulnerability 2: -File: qxlc/qxlc/database.py - > User input at line 120, trigger word ".data": - select_result = db.execute(select([data_table.c.type, data_table.c.data]).where(data_table.c.id == data_id)) -Reassigned in: - File: qxlc/qxlc/database.py - > Line 118: select_result = None -File: qxlc/qxlc/database.py - > reaches line 120, trigger word "execute(": - select_result = db.execute(select([data_table.c.type, data_table.c.data]).where(data_table.c.id == data_id)) - - - -frederick-masterton/python27-flask-RESTful-api-how-to -https://github.com/frederick-masterton/python27-flask-RESTful-api-how-to -Entry file: python27-flask-RESTful-api-how-to/restfulapi.py -Scanned: 2016-10-19 13:20:38.351350 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xsteadfastx/praeger -https://github.com/xsteadfastx/praeger -Entry file: praeger/app/app.py -Scanned: 2016-10-19 13:20:39.916299 -Vulnerability 1: -File: praeger/app/app.py - > User input at line 401, trigger word ".data": - bet = Bet(username=current_user.get_id(), score1=form.score1.data, score2=form.score2.data) -Reassigned in: - File: praeger/app/app.py - > Line 379: form = MatchForm(score1=bet.score1, score2=bet.score2) - File: praeger/app/app.py - > Line 385: form = MatchForm() - File: praeger/app/app.py - > Line 398: bet.score1 = form.score1.data - File: praeger/app/app.py - > Line 399: bet.score2 = form.score2.data - File: praeger/app/app.py - > Line 368: ret_MAYBE_FUNCTION_NAME = redirect('/round/' + str(round)) - File: praeger/app/app.py - > Line 406: ret_MAYBE_FUNCTION_NAME = redirect('/round/' + str(round_number)) -File: praeger/app/app.py - > reaches line 407, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('bet.html',form=form, rounds=rounds, round=round, team1=team_key_to_title(team1), team2=team_key_to_title(team2)) - - - -shashisp/express -https://github.com/shashisp/express -Entry file: express/app/__init__.py -Scanned: 2016-10-19 13:20:41.121106 -No vulnerabilities found. - - -Smashman/mods.tf -https://github.com/Smashman/mods.tf -Entry file: None -Scanned: 2016-10-19 13:20:43.938402 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Smashman/mods.tf. - -belda/metaextractor -https://github.com/belda/metaextractor -Entry file: None -Scanned: 2016-10-19 13:20:45.276379 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/belda/metaextractor. - -hrkfdn/pyle -https://github.com/hrkfdn/pyle -Entry file: pyle/pyle.py -Scanned: 2016-10-19 13:20:47.547734 -No vulnerabilities found. - - -Ragora/CNS-Web -https://github.com/Ragora/CNS-Web -Entry file: None -Scanned: 2016-10-19 13:20:49.086850 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Ragora/CNS-Web. - -sambodanis/Receipt-Tracker -https://github.com/sambodanis/Receipt-Tracker -Entry file: Receipt-Tracker/server/__init__.py -Scanned: 2016-10-19 13:20:53.356213 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zeckalpha/wx -https://github.com/zeckalpha/wx -Entry file: wx/wx/app.py -Scanned: 2016-10-19 13:20:55.960077 -No vulnerabilities found. - - -Kentoseth/SimpleBlog -https://github.com/Kentoseth/SimpleBlog -Entry file: SimpleBlog/__init__.py -Scanned: 2016-10-19 13:21:00.335054 -No vulnerabilities found. - - -dastagg/fsblog -https://github.com/dastagg/fsblog -Entry file: fsblog/app/__init__.py -Scanned: 2016-10-19 13:21:01.681595 -No vulnerabilities found. - - -nrpeterson/homepage -https://github.com/nrpeterson/homepage -Entry file: None -Scanned: 2016-10-19 13:21:02.275438 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sourya/codoo -https://github.com/sourya/codoo -Entry file: codoo/codoo/codoo.py -Scanned: 2016-10-19 13:21:04.615968 -No vulnerabilities found. - - -realpython/discover-flask -https://github.com/realpython/discover-flask -Entry file: discover-flask/project/__init__.py -Scanned: 2016-10-19 13:21:09.890364 -No vulnerabilities found. - - -Depado/flask-skeleton -https://github.com/Depado/flask-skeleton -Entry file: None -Scanned: 2016-10-19 13:21:13.393793 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Depado/flask-skeleton. - -Robpol86/Flask-Celery-Helper -https://github.com/Robpol86/Flask-Celery-Helper -Entry file: Flask-Celery-Helper/tests/instances.py -Scanned: 2016-10-19 13:21:14.857418 -Vulnerability 1: -File: Flask-Celery-Helper/tests/instances.py - > User input at line 67, trigger word "SQLAlchemy": - db = SQLAlchemy(flask_app) -File: Flask-Celery-Helper/tests/instances.py - > reaches line 68, trigger word "execute(": - db.engine.execute('DROP TABLE IF EXISTS celery_tasksetmeta;') - - - -mmautner/simple_api -https://github.com/mmautner/simple_api -Entry file: simple_api/app.py -Scanned: 2016-10-19 13:21:16.181532 -No vulnerabilities found. - - -itsnauman/shrt -https://github.com/itsnauman/shrt -Entry file: shrt/app/__init__.py -Scanned: 2016-10-19 13:21:26.693693 -Vulnerability 1: -File: shrt/app/views.py - > User input at line 51, trigger word "form[": - url = request.form['url'] -Reassigned in: - File: shrt/app/views.py - > Line 52: short_url = shorten_link(url) - File: shrt/app/views.py - > Line 55: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: shrt/app/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('shortened.html',url=short_url) - - - -miguelgrinberg/flask-examples -https://github.com/miguelgrinberg/flask-examples -Entry file: flask-examples/Guestbook/app.py -Scanned: 2016-10-19 13:21:27.215930 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aliyarahman/flask_evolution -https://github.com/aliyarahman/flask_evolution -Entry file: flask_evolution/app/__init__.py -Scanned: 2016-10-19 13:21:34.078000 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Robpol86/Flask-Redis-Helper -https://github.com/Robpol86/Flask-Redis-Helper -Entry file: Flask-Redis-Helper/tests/conftest.py -Scanned: 2016-10-19 13:21:35.978536 -No vulnerabilities found. - - -desertpy/flask-demo -https://github.com/desertpy/flask-demo -Entry file: None -Scanned: 2016-10-19 13:21:36.481291 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/desertpy/flask-demo. - -jamonation/flask-hmac -https://github.com/jamonation/flask-hmac -Entry file: flask-hmac/flask_hmac.py -Scanned: 2016-10-19 13:21:37.741965 -No vulnerabilities found. - - -Drexden/flaskapp -https://github.com/Drexden/flaskapp -Entry file: None -Scanned: 2016-10-19 13:21:38.267322 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Drexden/flaskapp. - -shreyasrk/flaskr -https://github.com/shreyasrk/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:21:39.755863 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jvalentini/flaskr -https://github.com/jvalentini/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:21:40.251586 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cdorman1/flaskapp -https://github.com/cdorman1/flaskapp -Entry file: None -Scanned: 2016-10-19 13:21:43.234935 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cdorman1/flaskapp. - -mattiashem/python-oauth2 -https://github.com/mattiashem/python-oauth2 -Entry file: python-oauth2/client2.py -Scanned: 2016-10-19 13:21:46.479426 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -code-haven/FlaskBlog -https://github.com/code-haven/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 13:21:47.081494 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -HellerCommaA/flask-angular -https://github.com/HellerCommaA/flask-angular -Entry file: None -Scanned: 2016-10-19 13:21:49.790576 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -elainekamlley/flask_skeleton -https://github.com/elainekamlley/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-19 13:21:50.304432 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -SelinaMusuta/flask_skeleton -https://github.com/SelinaMusuta/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-19 13:21:50.809520 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -jhona22baz/blog-flask -https://github.com/jhona22baz/blog-flask -Entry file: blog-flask/project/views.py -Scanned: 2016-10-19 13:21:54.578891 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -the-adrian/demoFlask -https://github.com/the-adrian/demoFlask -Entry file: demoFlask/venv/lib/python2.7/site-packages/flask/sessions.py -Scanned: 2016-10-19 13:21:58.847950 -No vulnerabilities found. - - -portyaninoleh/flask_admin -https://github.com/portyaninoleh/flask_admin -Entry file: flask_admin/flask_test.py -Scanned: 2016-10-19 13:22:02.143783 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pmaddi/flask-graph -https://github.com/pmaddi/flask-graph -Entry file: None -Scanned: 2016-10-19 13:22:11.611330 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -BobbyJoeSmith3/flask_skeleton -https://github.com/BobbyJoeSmith3/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-19 13:22:12.146925 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -mitkaua/flask-page -https://github.com/mitkaua/flask-page -Entry file: flask-page/app/__init__.py -Scanned: 2016-10-19 13:22:13.789585 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -abekim/flask-seed -https://github.com/abekim/flask-seed -Entry file: None -Scanned: 2016-10-19 13:22:14.300002 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/abekim/flask-seed. - -dagobailon/flask_skeleton -https://github.com/dagobailon/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-19 13:22:15.280816 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -jbradach/flask-markov -https://github.com/jbradach/flask-markov -Entry file: flask-markov/app.py -Scanned: 2016-10-19 13:22:17.680129 -No vulnerabilities found. - - -jefftriplett/flask-whois -https://github.com/jefftriplett/flask-whois -Entry file: flask-whois/app.py -Scanned: 2016-10-19 13:22:27.944552 -Vulnerability 1: -File: flask-whois/app.py - > User input at line 11, trigger word "get(": - domain = request.args.get('domain', None) -Reassigned in: - File: flask-whois/app.py - > Line 14: data = pythonwhois.net.get_whois_raw(domain) - File: flask-whois/app.py - > Line 16: parsed = pythonwhois.parse.parse_raw_whois(data,normalized=True) - File: flask-whois/app.py - > Line 19: ret_MAYBE_FUNCTION_NAME = '
{0}
'.format(data[0]) - File: flask-whois/app.py - > Line 21: ret_MAYBE_FUNCTION_NAME = data[0] - File: flask-whois/app.py - > Line 23: ret_MAYBE_FUNCTION_NAME = 'No ?domain= specified!' -File: flask-whois/app.py - > reaches line 17, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(parsed) - - - -Sylnai/flask_zmq -https://github.com/Sylnai/flask_zmq -Entry file: flask_zmq/test.py -Scanned: 2016-10-19 13:22:29.168977 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cristian69/Pagina_Flask -https://github.com/cristian69/Pagina_Flask -Entry file: Pagina_Flask/__init__.py -Scanned: 2016-10-19 13:22:32.932858 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Pagina_Flask/venv/lib/python2.7/genericpath.py - -KittyLee/flask_skeleton -https://github.com/KittyLee/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-19 13:22:33.445540 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -areis23/Flask-SQLAlchemy -https://github.com/areis23/Flask-SQLAlchemy -Entry file: Flask-SQLAlchemy/app.py -Scanned: 2016-10-19 13:22:35.040722 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alon21034/flask-server -https://github.com/alon21034/flask-server -Entry file: None -Scanned: 2016-10-19 13:22:36.550780 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/alon21034/flask-server. - -msoltysik/FlaskMegaTutorial -https://github.com/msoltysik/FlaskMegaTutorial -Entry file: FlaskMegaTutorial/flask/Lib/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-19 13:22:37.190716 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flect/ht-python-flask -https://github.com/flect/ht-python-flask -Entry file: ht-python-flask/hello.py -Scanned: 2016-10-19 13:22:38.882834 -No vulnerabilities found. - - -pebreo/flask-heroku-helloworld -https://github.com/pebreo/flask-heroku-helloworld -Entry file: flask-heroku-helloworld/app.py -Scanned: 2016-10-19 13:22:40.139636 -No vulnerabilities found. - - -nfazzio/flask-mega-tutorial -https://github.com/nfazzio/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 13:22:41.628885 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wbeyda/flask-rest-api -https://github.com/wbeyda/flask-rest-api -Entry file: flask-rest-api/app/__init__.py -Scanned: 2016-10-19 13:22:42.120363 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danwiesenthal/simple_flask_api -https://github.com/danwiesenthal/simple_flask_api -Entry file: simple_flask_api/projectname/__init__.py -Scanned: 2016-10-19 13:22:44.469972 -No vulnerabilities found. - - -maethu/flask-pdf2img -https://github.com/maethu/flask-pdf2img -Entry file: flask-pdf2img/webapp/__init__.py -Scanned: 2016-10-19 13:22:47.648228 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -timzdevz/fm-flask-app -https://github.com/timzdevz/fm-flask-app -Entry file: fm-flask-app/app/__init__.py -Scanned: 2016-10-19 13:22:48.993676 -No vulnerabilities found. - - -twstddev/flask-admin-panel -https://github.com/twstddev/flask-admin-panel -Entry file: None -Scanned: 2016-10-19 13:22:50.563566 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/twstddev/flask-admin-panel. - -RockyRoad29/Flask-know_users -https://github.com/RockyRoad29/Flask-know_users -Entry file: Flask-know_users/know_users/__init__.py -Scanned: 2016-10-19 13:22:51.883369 -No vulnerabilities found. - - -SelinaMusuta/three_views -https://github.com/SelinaMusuta/three_views -Entry file: three_views/app/__init__.py -Scanned: 2016-10-19 13:22:55.483042 -No vulnerabilities found. - - -hortonew/Pyruse -https://github.com/hortonew/Pyruse -Entry file: Pyruse/server.py -Scanned: 2016-10-19 13:22:56.856454 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GandalfTheGandalf/twitter -https://github.com/GandalfTheGandalf/twitter -Entry file: twitter/hello.py -Scanned: 2016-10-19 13:22:58.086129 -Vulnerability 1: -File: twitter/hello.py - > User input at line 94, trigger word "get(": - resp = twitter.get('statuses/user_timeline.json?screen_name=twitter') -Reassigned in: - File: twitter/hello.py - > Line 96: tweets = resp.data - File: twitter/hello.py - > Line 92: tweets = None -File: twitter/hello.py - > reaches line 100, trigger word "flash(": - flash(resp.status) - -Vulnerability 2: -File: twitter/hello.py - > User input at line 94, trigger word "get(": - resp = twitter.get('statuses/user_timeline.json?screen_name=twitter') -Reassigned in: - File: twitter/hello.py - > Line 96: tweets = resp.data - File: twitter/hello.py - > Line 92: tweets = None -File: twitter/hello.py - > reaches line 101, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',tweets=tweets) - -Vulnerability 3: -File: twitter/hello.py - > User input at line 96, trigger word ".data": - tweets = resp.data -Reassigned in: - File: twitter/hello.py - > Line 92: tweets = None -File: twitter/hello.py - > reaches line 101, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',tweets=tweets) - -Vulnerability 4: -File: twitter/hello.py - > User input at line 109, trigger word "form[": - status = request.form['tweet'] -Reassigned in: - File: twitter/hello.py - > Line 112: resp = twitter.post('statuses/update.json',data='status'status) -File: twitter/hello.py - > reaches line 120, trigger word "flash(": - flash('Successfully tweeted your tweet (ID: #%s)' % resp.data['id']) - -Vulnerability 5: -File: twitter/hello.py - > User input at line 157, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -File: twitter/hello.py - > reaches line 157, trigger word "url_for(": - next_url = request.args.get('next') or url_for('index') - -Vulnerability 6: -File: twitter/hello.py - > User input at line 157, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -File: twitter/hello.py - > reaches line 160, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 7: -File: twitter/hello.py - > User input at line 157, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -File: twitter/hello.py - > reaches line 178, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - - - -lnhubbell/learning_journal -https://github.com/lnhubbell/learning_journal -Entry file: learning_journal/journal.py -Scanned: 2016-10-19 13:23:00.702582 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fernandojunior/rest_flaskr -https://github.com/fernandojunior/rest_flaskr -Entry file: rest_flaskr/app/__init__.py -Scanned: 2016-10-19 13:23:04.459082 -Vulnerability 1: -File: rest_flaskr/app/views/entry.py - > User input at line 32, trigger word "get(": - entry = Entry.query.get(id) -File: rest_flaskr/app/views/entry.py - > reaches line 37, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(entry=entry.serialize) - - - -somyamohanty/tweet_stream -https://github.com/somyamohanty/tweet_stream -Entry file: tweet_stream/twt_server.py -Scanned: 2016-10-19 13:23:05.672771 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jacktian86/learning_journal -https://github.com/jacktian86/learning_journal -Entry file: learning_journal/journal.py -Scanned: 2016-10-19 13:23:06.175474 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rivese/learning_journal -https://github.com/rivese/learning_journal -Entry file: learning_journal/journal.py -Scanned: 2016-10-19 13:23:13.663575 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EyuelAbebe/learning_journal -https://github.com/EyuelAbebe/learning_journal -Entry file: learning_journal/journal.py -Scanned: 2016-10-19 13:23:14.182366 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -corinnelhh/learning_journal -https://github.com/corinnelhh/learning_journal -Entry file: learning_journal/journal.py -Scanned: 2016-10-19 13:23:15.696790 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jonathansiebert/learning_journal -https://github.com/jonathansiebert/learning_journal -Entry file: learning_journal/journal.py -Scanned: 2016-10-19 13:23:16.192166 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sazlin/learning_journal -https://github.com/sazlin/learning_journal -Entry file: learning_journal/journal.py -Scanned: 2016-10-19 13:23:16.683746 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lfritts/learning_journal -https://github.com/lfritts/learning_journal -Entry file: learning_journal/journal.py -Scanned: 2016-10-19 13:23:18.182586 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -caderache2014/learning_journal -https://github.com/caderache2014/learning_journal -Entry file: learning_journal/journal.py -Scanned: 2016-10-19 13:23:28.679792 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AngieBrilliance/Swampr -https://github.com/AngieBrilliance/Swampr -Entry file: Swampr/app/__init__.py -Scanned: 2016-10-19 13:23:35.122122 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshsvoss/minitwit -https://github.com/joshsvoss/minitwit -Entry file: minitwit/minitwit.py -Scanned: 2016-10-19 13:23:36.508824 -No vulnerabilities found. - - -CasidyHenderson24/swamper -https://github.com/CasidyHenderson24/swamper -Entry file: swamper/app/__init__.py -Scanned: 2016-10-19 13:23:40.191358 -No vulnerabilities found. - - -burdell/GoWithMe -https://github.com/burdell/GoWithMe -Entry file: GoWithMe/app/__init__.py -Scanned: 2016-10-19 13:23:41.469028 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -belda/metaextractor -https://github.com/belda/metaextractor -Entry file: None -Scanned: 2016-10-19 13:23:41.957577 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/belda/metaextractor. - -danimajo/pineapple -https://github.com/danimajo/pineapple -Entry file: pineapple/pineapple.py -Scanned: 2016-10-19 13:23:45.251476 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -finnurtorfa/aflafrettir.is -https://github.com/finnurtorfa/aflafrettir.is -Entry file: None -Scanned: 2016-10-19 13:23:46.988896 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/finnurtorfa/aflafrettir.is. - -BobbyJoeSmith3/swampr -https://github.com/BobbyJoeSmith3/swampr -Entry file: swampr/app/__init__.py -Scanned: 2016-10-19 13:23:53.977544 -No vulnerabilities found. - - -jhtdc/swampr -https://github.com/jhtdc/swampr -Entry file: swampr/app/__init__.py -Scanned: 2016-10-19 13:23:59.090595 -No vulnerabilities found. - - -etse/HackMe -https://github.com/etse/HackMe -Entry file: HackMe/HackMe.py -Scanned: 2016-10-19 13:24:02.119640 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elainekamlley/swamper -https://github.com/elainekamlley/swamper -Entry file: swamper/app/__init__.py -Scanned: 2016-10-19 13:24:07.264167 -No vulnerabilities found. - - -birhanuh/MonkeyFace -https://github.com/birhanuh/MonkeyFace -Entry file: MonkeyFace/app/__init__.py -Scanned: 2016-10-19 13:24:13.582003 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AureaMartinez/swamp -https://github.com/AureaMartinez/swamp -Entry file: swamp/app/__init__.py -Scanned: 2016-10-19 13:24:18.364521 -No vulnerabilities found. - - -MariellaPaulino/swampr -https://github.com/MariellaPaulino/swampr -Entry file: swampr/app/__init__.py -Scanned: 2016-10-19 13:24:23.353796 -No vulnerabilities found. - - -michaelgugino/web_keyer -https://github.com/michaelgugino/web_keyer -Entry file: web_keyer/main.py -Scanned: 2016-10-19 13:24:28.361792 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -elainekamlley/three_views -https://github.com/elainekamlley/three_views -Entry file: three_views/app/__init__.py -Scanned: 2016-10-19 13:24:31.672595 -No vulnerabilities found. - - -sourya/codoo -https://github.com/sourya/codoo -Entry file: codoo/codoo/codoo.py -Scanned: 2016-10-19 13:24:33.586601 -No vulnerabilities found. - - -betoesquivel/CIE -https://github.com/betoesquivel/CIE -Entry file: None -Scanned: 2016-10-19 13:24:39.413521 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -grrrrreg/ASNator -https://github.com/grrrrreg/ASNator -Entry file: ASNator/asntool.py -Scanned: 2016-10-19 13:24:40.771528 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ks111777/BookScanner -https://github.com/ks111777/BookScanner -Entry file: BookScanner/run.py -Scanned: 2016-10-19 13:24:46.515116 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hufman/flask_rdf -https://github.com/hufman/flask_rdf -Entry file: flask_rdf/examples/simple.py -Scanned: 2016-10-19 13:24:50.011905 -No vulnerabilities found. - - -aliyarahman/flask_evolution -https://github.com/aliyarahman/flask_evolution -Entry file: flask_evolution/app/__init__.py -Scanned: 2016-10-19 13:24:50.514907 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JeffOwOSun/flaskr -https://github.com/JeffOwOSun/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:24:50.998162 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shreyasrk/flaskr -https://github.com/shreyasrk/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:24:51.486262 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -craig3050/flasktest -https://github.com/craig3050/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 13:24:51.995605 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cdorman1/flaskapp -https://github.com/cdorman1/flaskapp -Entry file: None -Scanned: 2016-10-19 13:24:52.492180 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cdorman1/flaskapp. - -naoiwata/simple-flask-api -https://github.com/naoiwata/simple-flask-api -Entry file: simple-flask-api/api.py -Scanned: 2016-10-19 13:24:53.828843 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -devunt/g -https://github.com/devunt/g -Entry file: g/g.py -Scanned: 2016-10-19 13:24:55.143291 -No vulnerabilities found. - - -nrkefauver/FlaskMegatutorial -https://github.com/nrkefauver/FlaskMegatutorial -Entry file: None -Scanned: 2016-10-19 13:25:03.221547 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jhtdc/flask-skeleton -https://github.com/jhtdc/flask-skeleton -Entry file: None -Scanned: 2016-10-19 13:25:04.234197 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jhtdc/flask-skeleton. - -the-adrian/demoFlask -https://github.com/the-adrian/demoFlask -Entry file: demoFlask/venv/lib/python2.7/site-packages/flask/sessions.py -Scanned: 2016-10-19 13:25:08.446673 -No vulnerabilities found. - - -LemunkoCORP/flask_lions -https://github.com/LemunkoCORP/flask_lions -Entry file: flask_lions/lemunko_app.py -Scanned: 2016-10-19 13:25:09.715015 -No vulnerabilities found. - - -davidabelman/wordcount_flask -https://github.com/davidabelman/wordcount_flask -Entry file: wordcount_flask/app.py -Scanned: 2016-10-19 13:25:10.930335 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tawastory/JuboFlask -https://github.com/tawastory/JuboFlask -Entry file: JuboFlask/minijubo.py -Scanned: 2016-10-19 13:25:16.861842 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -cristian69/Pagina_Flask -https://github.com/cristian69/Pagina_Flask -Entry file: Pagina_Flask/__init__.py -Scanned: 2016-10-19 13:25:17.401357 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Pagina_Flask/venv/lib/python2.7/genericpath.py - -Syntaf/flask-liblogger -https://github.com/Syntaf/flask-liblogger -Entry file: flask-liblogger/app/__init__.py -Scanned: 2016-10-19 13:25:21.127558 -No vulnerabilities found. - - -Benknis/LXC_Flask -https://github.com/Benknis/LXC_Flask -Entry file: LXC_Flask/flask/main.py -Scanned: 2016-10-19 13:25:22.350798 -No vulnerabilities found. - - -miabbott/reserve-flask -https://github.com/miabbott/reserve-flask -Entry file: reserve-flask/app/__init__.py -Scanned: 2016-10-19 13:25:23.717945 -Vulnerability 1: -File: reserve-flask/app/views.py - > User input at line 44, trigger word "get(": - res_id = request.args.get('res_id') -Reassigned in: - File: reserve-flask/app/views.py - > Line 45: reservation = Reservation.query.get(res_id) - File: reserve-flask/app/views.py - > Line 46: user_id = reservation.reserved_by - File: reserve-flask/app/views.py - > Line 47: sys = reservation.device - File: reserve-flask/app/views.py - > Line 48: res_date = reservation.res_datetime - File: reserve-flask/app/views.py - > Line 56: res_date = res_date + timedelta(hours=1) -File: reserve-flask/app/views.py - > reaches line 57, trigger word "filter(": - next_res = Reservation.query.filter(Reservation.res_datetime == res_date, Reservation.reserved_by == user_id, Reservation.device == sys).all() - -Vulnerability 2: -File: reserve-flask/app/views.py - > User input at line 45, trigger word "get(": - reservation = Reservation.query.get(res_id) -Reassigned in: - File: reserve-flask/app/views.py - > Line 46: user_id = reservation.reserved_by - File: reserve-flask/app/views.py - > Line 47: sys = reservation.device - File: reserve-flask/app/views.py - > Line 48: res_date = reservation.res_datetime - File: reserve-flask/app/views.py - > Line 56: res_date = res_date + timedelta(hours=1) -File: reserve-flask/app/views.py - > reaches line 57, trigger word "filter(": - next_res = Reservation.query.filter(Reservation.res_datetime == res_date, Reservation.reserved_by == user_id, Reservation.device == sys).all() - -Vulnerability 3: -File: reserve-flask/app/views.py - > User input at line 79, trigger word "get(": - date_list = request.args.get('res_date').split('-') -Reassigned in: - File: reserve-flask/app/views.py - > Line 80: year = int(date_list[0]) - File: reserve-flask/app/views.py - > Line 81: month = int(date_list[1]) - File: reserve-flask/app/views.py - > Line 82: day = int(date_list[2]) - File: reserve-flask/app/views.py - > Line 83: new_date = date(year, month, day) - File: reserve-flask/app/views.py - > Line 88: new_datetime = datetime.combine(new_date, new_time) - File: reserve-flask/app/views.py - > Line 95: r = Reservation(res_datetime=new_datetime + timedelta(hours=hr), reserved_by=reserved_by, device=system) -File: reserve-flask/app/views.py - > reaches line 104, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('hours',date_str=new_date.isoformat())) - -Vulnerability 4: -File: reserve-flask/app/views.py - > User input at line 79, trigger word "get(": - date_list = request.args.get('res_date').split('-') -Reassigned in: - File: reserve-flask/app/views.py - > Line 80: year = int(date_list[0]) - File: reserve-flask/app/views.py - > Line 81: month = int(date_list[1]) - File: reserve-flask/app/views.py - > Line 82: day = int(date_list[2]) - File: reserve-flask/app/views.py - > Line 83: new_date = date(year, month, day) - File: reserve-flask/app/views.py - > Line 88: new_datetime = datetime.combine(new_date, new_time) - File: reserve-flask/app/views.py - > Line 95: r = Reservation(res_datetime=new_datetime + timedelta(hours=hr), reserved_by=reserved_by, device=system) -File: reserve-flask/app/views.py - > reaches line 104, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('hours',date_str=new_date.isoformat())) - - - -practo/gource-flask -https://github.com/practo/gource-flask -Entry file: gource-flask/gource.py -Scanned: 2016-10-19 13:25:26.055550 -No vulnerabilities found. - - -Robpol86/Flask-JIRA-Helper -https://github.com/Robpol86/Flask-JIRA-Helper -Entry file: Flask-JIRA-Helper/tests/conftest.py -Scanned: 2016-10-19 13:25:32.105939 -No vulnerabilities found. - - -dmonopoly/flask-simple-setup -https://github.com/dmonopoly/flask-simple-setup -Entry file: flask-simple-setup/hello.py -Scanned: 2016-10-19 13:25:34.883715 -No vulnerabilities found. - - -nimate/flask-ink-test -https://github.com/nimate/flask-ink-test -Entry file: flask-ink-test/web.py -Scanned: 2016-10-19 13:25:42.699480 -No vulnerabilities found. - - -tototoshi/flask-app-template -https://github.com/tototoshi/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-19 13:25:43.205395 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zappala/listomatic-flask-server -https://github.com/zappala/listomatic-flask-server -Entry file: listomatic-flask-server/doc/config.py -Scanned: 2016-10-19 13:25:49.501969 -No vulnerabilities found. - - -frimmy/flask-uploads-demo -https://github.com/frimmy/flask-uploads-demo -Entry file: flask-uploads-demo/app.py -Scanned: 2016-10-19 13:25:51.333173 -Vulnerability 1: -File: flask-uploads-demo/app.py - > User input at line 24, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flask-uploads-demo/app.py - > Line 26: filename = secure_filename(file.filename) - File: flask-uploads-demo/app.py - > Line 31: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' -File: flask-uploads-demo/app.py - > reaches line 28, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: flask-uploads-demo/app.py - > User input at line 24, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flask-uploads-demo/app.py - > Line 26: filename = secure_filename(file.filename) - File: flask-uploads-demo/app.py - > Line 31: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' -File: flask-uploads-demo/app.py - > reaches line 28, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -natereed/flask-sample-app -https://github.com/natereed/flask-sample-app -Entry file: flask-sample-app/app/__init__.py -Scanned: 2016-10-19 13:25:52.668772 -No vulnerabilities found. - - -ishanagr/ttml -https://github.com/ishanagr/ttml -Entry file: ttml/ttml.py -Scanned: 2016-10-19 13:25:56.770896 -No vulnerabilities found. - - -binishbaig/Binish-s-Shoe-Boutique -https://github.com/binishbaig/Binish-s-Shoe-Boutique -Entry file: Binish-s-Shoe-Boutique/app.py -Scanned: 2016-10-19 13:25:58.470801 -No vulnerabilities found. - - -EyuelAbebe/learning_journal -https://github.com/EyuelAbebe/learning_journal -Entry file: learning_journal/journal.py -Scanned: 2016-10-19 13:25:58.971757 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DhashS/Greyhole_Frontend -https://github.com/DhashS/Greyhole_Frontend -Entry file: Greyhole_Frontend/Greyhole Webapp.py -Scanned: 2016-10-19 13:26:00.315776 -No vulnerabilities found. - - -saskyong/CoTwitter -https://github.com/saskyong/CoTwitter -Entry file: None -Scanned: 2016-10-19 13:26:04.930213 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AngieBrilliance/Swampr -https://github.com/AngieBrilliance/Swampr -Entry file: Swampr/app/__init__.py -Scanned: 2016-10-19 13:26:05.468227 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eamonjohnson/fierce-rambo-78 -https://github.com/eamonjohnson/fierce-rambo-78 -Entry file: fierce-rambo-78/main.py -Scanned: 2016-10-19 13:26:08.479329 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -d1ff/malinka-web-ui -https://github.com/d1ff/malinka-web-ui -Entry file: malinka-web-ui/webapp.py -Scanned: 2016-10-19 13:26:09.903374 -No vulnerabilities found. - - -OpenLinkedSocialData/aa01 -https://github.com/OpenLinkedSocialData/aa01 -Entry file: aa01/aaServer.py -Scanned: 2016-10-19 13:26:23.936126 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Nebelhom/WordPuzzleCreator -https://github.com/Nebelhom/WordPuzzleCreator -Entry file: WordPuzzleCreator/main.py -Scanned: 2016-10-19 13:26:26.260117 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -calpe20/websimple -https://github.com/calpe20/websimple -Entry file: websimple/app.py -Scanned: 2016-10-19 13:26:27.493721 -No vulnerabilities found. - - -ZCT/social_login -https://github.com/ZCT/social_login -Entry file: social_login/github.py -Scanned: 2016-10-19 13:26:28.743634 -Vulnerability 1: -File: social_login/github.py - > User input at line 97, trigger word "get(": - me = auth.get('user').json() -Reassigned in: - File: social_login/github.py - > Line 99: user = User.get_or_create(me['login'], me['name']) - File: social_login/github.py - > Line 102: session['user_id'] = user.id - File: social_login/github.py - > Line 101: session['token'] = auth.access_token -File: social_login/github.py - > reaches line 104, trigger word "flash(": - flash('Logged in as ' + me['name']) - - - -bembu/tidy -https://github.com/bembu/tidy -Entry file: tidy/app/__init__.py -Scanned: 2016-10-19 13:26:30.931226 -Vulnerability 1: -File: tidy/app/views.py - > User input at line 155, trigger word ".data": - user = models.User.query.filter_by(username=form.username.data).first() -Reassigned in: - File: tidy/app/views.py - > Line 157: rv = login_user(user) -File: tidy/app/views.py - > reaches line 158, trigger word "flash(": - flash('Logged in as ' + user.username + '.', 'alert-success') - - - -brcontainer/html2canvas-python-proxy -https://github.com/brcontainer/html2canvas-python-proxy -Entry file: None -Scanned: 2016-10-19 13:26:32.644455 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/brcontainer/html2canvas-python-proxy. - -psychopenguin/wikiwarrior -https://github.com/psychopenguin/wikiwarrior -Entry file: wikiwarrior/wikiwarrior.py -Scanned: 2016-10-19 13:26:34.718838 -Vulnerability 1: -File: wikiwarrior/wikiwarrior.py - > User input at line 73, trigger word "get(": - wikipage = requests.get(wikipedia + '/wiki/' + article).text -Reassigned in: - File: wikiwarrior/wikiwarrior.py - > Line 74: content = wikicontent(wikipage) - File: wikiwarrior/wikiwarrior.py - > Line 88: ret_MAYBE_FUNCTION_NAME = response -File: wikiwarrior/wikiwarrior.py - > reaches line 79, trigger word "replace(": - response = make_response(render_template('wiki.html',app_name=app_name, current_game=gamename(), content=content['text'], infobox=content['infobox'], title=unquote(article).decode('utf-8').replace('_', ' '), gameover=gameover)) - -Vulnerability 2: -File: wikiwarrior/wikiwarrior.py - > User input at line 73, trigger word "get(": - wikipage = requests.get(wikipedia + '/wiki/' + article).text -Reassigned in: - File: wikiwarrior/wikiwarrior.py - > Line 74: content = wikicontent(wikipage) - File: wikiwarrior/wikiwarrior.py - > Line 88: ret_MAYBE_FUNCTION_NAME = response -File: wikiwarrior/wikiwarrior.py - > reaches line 79, trigger word "render_template(": - response = make_response(render_template('wiki.html',app_name=app_name, current_game=gamename(), content=content['text'], infobox=content['infobox'], title=unquote(article).decode('utf-8').replace('_', ' '), gameover=gameover)) - - - -MwzkQmuUZkFLbXm/tumblelog -https://github.com/MwzkQmuUZkFLbXm/tumblelog -Entry file: tumblelog/__init__.py -Scanned: 2016-10-19 13:26:36.129420 -No vulnerabilities found. - - -birhanuh/MonkeyFace -https://github.com/birhanuh/MonkeyFace -Entry file: MonkeyFace/app/__init__.py -Scanned: 2016-10-19 13:26:36.620609 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yoniLavi/guess_me -https://github.com/yoniLavi/guess_me -Entry file: guess_me/guess_me.py -Scanned: 2016-10-19 13:26:38.423365 -Vulnerability 1: -File: guess_me/guess_me.py - > User input at line 22, trigger word "form[": - new_username = request.form['username'] -Reassigned in: - File: guess_me/guess_me.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: guess_me/guess_me.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('login.html') -File: guess_me/guess_me.py - > reaches line 24, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = (render_template('invalid_username.html',username=new_username), 401) - -Vulnerability 2: -File: guess_me/guess_me.py - > User input at line 46, trigger word "get(": - guess_input = request.args.get('guessed_number') -Reassigned in: - File: guess_me/guess_me.py - > Line 52: guess = int(guess_input) - File: guess_me/guess_me.py - > Line 62: ret_MAYBE_FUNCTION_NAME = render_template('victory.html',username=username, guesses=current_guesses) - File: guess_me/guess_me.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: guess_me/guess_me.py - > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('guess.html',MAX_NUMBER=MAX_NUMBER) -File: guess_me/guess_me.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('guess.html',MAX_NUMBER=MAX_NUMBER, current_guesses=current_guesses, last_guess=guess) - - - -andrewkreid/oauth2-test-client -https://github.com/andrewkreid/oauth2-test-client -Entry file: oauth2-test-client/openam_client.py -Scanned: 2016-10-19 13:26:39.643068 -No vulnerabilities found. - - -mcgoddard/chatta -https://github.com/mcgoddard/chatta -Entry file: chatta/chatta.py -Scanned: 2016-10-19 13:26:49.646305 -Vulnerability 1: -File: chatta/chatta.py - > User input at line 30, trigger word "get(": - last_update = request.args.get('last_update', '') -Reassigned in: - File: chatta/chatta.py - > Line 33: last_datetime = datetime.datetime.strptime(last_update, '%Y-%m-%d %H:%M:%S') -File: chatta/chatta.py - > reaches line 38, trigger word "filter(": - new_messages = Message.query.filter(Message.created_at > last_datetime) - - - -hrkfdn/mcpanel -https://github.com/hrkfdn/mcpanel -Entry file: mcpanel/mcpanel.py -Scanned: 2016-10-19 13:26:50.918902 -No vulnerabilities found. - - -danimajo/pineapple_pdf -https://github.com/danimajo/pineapple_pdf -Entry file: pineapple_pdf/pineapple.py -Scanned: 2016-10-19 13:26:55.200883 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mcgoddard/HALON -https://github.com/mcgoddard/HALON -Entry file: HALON/halon.py -Scanned: 2016-10-19 13:26:59.083119 -Vulnerability 1: -File: HALON/halon.py - > User input at line 118, trigger word "form[": - character_id = request.form['character_id'] -File: HALON/halon.py - > reaches line 119, trigger word "filter(": - character = Character.query.filter(Character.id == character_id).first() - - - -andrewparrish/SkypeConferenceAutomator -https://github.com/andrewparrish/SkypeConferenceAutomator -Entry file: SkypeConferenceAutomator/gui.py -Scanned: 2016-10-19 13:27:00.434131 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ks111777/BookScannerScraper -https://github.com/ks111777/BookScannerScraper -Entry file: BookScannerScraper/run.py -Scanned: 2016-10-19 13:27:03.844531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hussaintamboli/doMonit -https://github.com/hussaintamboli/doMonit -Entry file: doMonit/monit.py -Scanned: 2016-10-19 13:27:05.288343 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -betoesquivel/CIE -https://github.com/betoesquivel/CIE -Entry file: None -Scanned: 2016-10-19 13:27:05.828653 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -miguelgrinberg/Flask-SocketIO-Chat -https://github.com/miguelgrinberg/Flask-SocketIO-Chat -Entry file: Flask-SocketIO-Chat/app/__init__.py -Scanned: 2016-10-19 13:27:08.090900 -Vulnerability 1: -File: Flask-SocketIO-Chat/app/main/routes.py - > User input at line 24, trigger word "get(": - name = session.get('name', '') -Reassigned in: - File: Flask-SocketIO-Chat/app/main/routes.py - > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-SocketIO-Chat/app/main/routes.py - > reaches line 28, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room) - -Vulnerability 2: -File: Flask-SocketIO-Chat/app/main/routes.py - > User input at line 25, trigger word "get(": - room = session.get('room', '') -Reassigned in: - File: Flask-SocketIO-Chat/app/main/routes.py - > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-SocketIO-Chat/app/main/routes.py - > reaches line 28, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room) - - - -lpolepeddi/intro-to-flask -https://github.com/lpolepeddi/intro-to-flask -Entry file: intro-to-flask/intro_to_flask/__init__.py -Scanned: 2016-10-19 13:38:04.524200 -No vulnerabilities found. - - -saltycrane/flask-jquery-ajax-example -https://github.com/saltycrane/flask-jquery-ajax-example -Entry file: None -Scanned: 2016-10-19 13:38:05.028961 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example. - -jdiez17/flask-paypal -https://github.com/jdiez17/flask-paypal -Entry file: flask-paypal/app.py -Scanned: 2016-10-19 13:38:05.555177 -Vulnerability 1: -File: flask-paypal/app.py - > User input at line 30, trigger word "get(": - getexp_response = interface.get_express_checkout_details(token=request.args.get('token', '')) -File: flask-paypal/app.py - > reaches line 33, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = ' - Everything looks good!
- Click here to complete the payment. - ' % url_for('paypal_do',token=getexp_response['TOKEN']) - -Vulnerability 2: -File: flask-paypal/app.py - > User input at line 30, trigger word "get(": - getexp_response = interface.get_express_checkout_details(token=request.args.get('token', '')) -File: flask-paypal/app.py - > reaches line 38, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = ' - Oh noes! PayPal returned an error code.
-
-                %s
-            
- Click here to try again. - ' % (getexp_response['ACK'], url_for('index')) - - - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-19 13:38:06.990137 -No vulnerabilities found. - - -tarbell-project/tarbell -https://github.com/tarbell-project/tarbell -Entry file: tarbell/tarbell/app.py -Scanned: 2016-10-19 13:38:08.158039 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-19 13:38:08.686030 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -becdot/adventures-in-text -https://github.com/becdot/adventures-in-text -Entry file: adventures-in-text/db_methods.py -Scanned: 2016-10-19 13:38:09.206098 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dirn/Flask-Simon -https://github.com/dirn/Flask-Simon -Entry file: Flask-Simon/examples/flaskr/flaskr.py -Scanned: 2016-10-19 13:38:10.725933 -No vulnerabilities found. - - -caub/flask-geo -https://github.com/caub/flask-geo -Entry file: flask-geo/myMap.py -Scanned: 2016-10-19 13:38:11.283257 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -masayang/flask_dev -https://github.com/masayang/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-19 13:38:11.812743 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoh/perfume -https://github.com/hoh/perfume -Entry file: perfume/perfume/__init__.py -Scanned: 2016-10-19 13:38:13.188797 -No vulnerabilities found. - - -ffiiccuuss/torouterui -https://github.com/ffiiccuuss/torouterui -Entry file: torouterui/torouterui/__init__.py -Scanned: 2016-10-19 13:38:13.712126 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marsella/andrea -https://github.com/marsella/andrea -Entry file: andrea/init.py -Scanned: 2016-10-19 13:38:14.785477 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py - -embr/multithon -https://github.com/embr/multithon -Entry file: multithon/multithon.py -Scanned: 2016-10-19 13:38:16.454462 -No vulnerabilities found. - - -mattoufoutu/TrendnetStalker -https://github.com/mattoufoutu/TrendnetStalker -Entry file: TrendnetStalker/TrendnetStalker/__init__.py -Scanned: 2016-10-19 13:38:16.978530 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cyrilaub/myMap_python -https://github.com/cyrilaub/myMap_python -Entry file: myMap_python/myMap.py -Scanned: 2016-10-19 13:38:17.509184 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sysr-q/phi -https://github.com/sysr-q/phi -Entry file: phi/phi/phi.py -Scanned: 2016-10-19 13:38:19.401289 -No vulnerabilities found. - - -MaxPresman/tempymail -https://github.com/MaxPresman/tempymail -Entry file: tempymail/flask_frontend.py -Scanned: 2016-10-19 13:38:19.932333 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-19 13:38:22.041902 -No vulnerabilities found. - - -allanlei/flask-email -https://github.com/allanlei/flask-email -Entry file: flask-email/tests/__init__.py -Scanned: 2016-10-19 13:38:23.640743 -No vulnerabilities found. - - -Blender3D/Flask-LESS -https://github.com/Blender3D/Flask-LESS -Entry file: Flask-LESS/flask_less.py -Scanned: 2016-10-19 13:38:26.047454 -No vulnerabilities found. - - -hex/flaskr -https://github.com/hex/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:38:26.573529 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -faruken/flask-web.py-jvm -https://github.com/faruken/flask-web.py-jvm -Entry file: flask-web/local_debug.py -Scanned: 2016-10-19 13:38:27.568851 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-19 13:38:28.071295 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -parryjacob/flask-boilerplate -https://github.com/parryjacob/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 13:39:04.622406 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/parryjacob/flask-boilerplate. - -jpercent/flask-control -https://github.com/jpercent/flask-control -Entry file: flask-control/example.py -Scanned: 2016-10-19 13:39:05.144688 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Ceasar/pocket_flask -https://github.com/Ceasar/pocket_flask -Entry file: pocket_flask/app/__init__.py -Scanned: 2016-10-19 13:39:07.788825 -No vulnerabilities found. - - -CMGS/poll -https://github.com/CMGS/poll -Entry file: poll/app.py -Scanned: 2016-10-19 13:39:11.292419 -Vulnerability 1: -File: poll/app.py - > User input at line 31, trigger word "get(": - q = request.args.get('q', '') -File: poll/app.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',user=g.user, subjects=get_subjects(q), groups=get_groups(), group=get_group(q)) - -Vulnerability 2: -File: poll/app.py - > User input at line 59, trigger word "get(": - group = request.form.get('group') -Reassigned in: - File: poll/app.py - > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups()) -File: poll/app.py - > reaches line 64, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group)) - -Vulnerability 3: -File: poll/app.py - > User input at line 59, trigger word "get(": - group = request.form.get('group') -Reassigned in: - File: poll/app.py - > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups()) -File: poll/app.py - > reaches line 64, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group)) - - - -hoh/perfume -https://github.com/hoh/perfume -Entry file: perfume/perfume/__init__.py -Scanned: 2016-10-19 13:39:12.545071 -No vulnerabilities found. - - -dogrdon/txtr -https://github.com/dogrdon/txtr -Entry file: txtr/txtr.py -Scanned: 2016-10-19 13:39:13.065166 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattoufoutu/TrendnetStalker -https://github.com/mattoufoutu/TrendnetStalker -Entry file: TrendnetStalker/TrendnetStalker/__init__.py -Scanned: 2016-10-19 13:39:13.574920 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -perjo927/Portfolio -https://github.com/perjo927/Portfolio -Entry file: Portfolio/server.py -Scanned: 2016-10-19 13:39:15.679975 -Vulnerability 1: -File: Portfolio/server.py - > User input at line 96, trigger word "form[": - search_string = request.form['key'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 2: -File: Portfolio/server.py - > User input at line 99, trigger word "form[": - sort_order = request.form['sort_order'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 3: -File: Portfolio/server.py - > User input at line 100, trigger word "form[": - sort_by = request.form['sort_by'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - - - -cyrilaub/myMap_python -https://github.com/cyrilaub/myMap_python -Entry file: myMap_python/myMap.py -Scanned: 2016-10-19 13:39:16.208993 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sburns/switchboard -https://github.com/sburns/switchboard -Entry file: switchboard/sample_app.py -Scanned: 2016-10-19 13:39:16.742229 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahawker/jpool -https://github.com/ahawker/jpool -Entry file: None -Scanned: 2016-10-19 13:39:17.268513 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool. - -sysr-q/phi -https://github.com/sysr-q/phi -Entry file: phi/phi/phi.py -Scanned: 2016-10-19 13:39:19.172400 -No vulnerabilities found. - - -bogdan-kulynych/cloudlectures -https://github.com/bogdan-kulynych/cloudlectures -Entry file: cloudlectures/flask/sessions.py -Scanned: 2016-10-19 13:39:19.754213 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DanielleSucher/BookQueue -https://github.com/DanielleSucher/BookQueue -Entry file: BookQueue/app.py -Scanned: 2016-10-19 13:39:21.156614 -Vulnerability 1: -File: BookQueue/app.py - > User input at line 145, trigger word "form[": - from_email = request.form['sender'].lower() -File: BookQueue/app.py - > reaches line 146, trigger word "filter(": - query = User.query.filter(User.email == from_email) - - - -allanlei/flask-email -https://github.com/allanlei/flask-email -Entry file: flask-email/tests/__init__.py -Scanned: 2016-10-19 13:39:24.118873 -No vulnerabilities found. - - -maxcnunes/flaskgaedemo -https://github.com/maxcnunes/flaskgaedemo -Entry file: flaskgaedemo/main.py -Scanned: 2016-10-19 13:39:25.190868 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -domenicosolazzo/flask_examples -https://github.com/domenicosolazzo/flask_examples -Entry file: flask_examples/logger_example.py -Scanned: 2016-10-19 13:39:26.525738 -No vulnerabilities found. - - -akostyuk/flask-dbmigrate -https://github.com/akostyuk/flask-dbmigrate -Entry file: flask-dbmigrate/tests.py -Scanned: 2016-10-19 13:39:27.063264 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -50onRed/phillypug-flask -https://github.com/50onRed/phillypug-flask -Entry file: phillypug-flask/phillypug/app.py -Scanned: 2016-10-19 13:39:28.359703 -Vulnerability 1: -File: phillypug-flask/phillypug/views.py - > User input at line 19, trigger word "get(": - repos = redis_client.get(repos_key) -Reassigned in: - File: phillypug-flask/phillypug/views.py - > Line 21: repos = json.loads(repos) -File: phillypug-flask/phillypug/views.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',repos=repos) - - - -booo/flask-gtfs -https://github.com/booo/flask-gtfs -Entry file: None -Scanned: 2016-10-19 13:39:28.882710 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/booo/flask-gtfs. - -faruken/flask-web.py-jvm -https://github.com/faruken/flask-web.py-jvm -Entry file: flask-web/local_debug.py -Scanned: 2016-10-19 13:39:29.396594 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nerevu/prometheus -https://github.com/nerevu/prometheus -Entry file: prometheus/app/__init__.py -Scanned: 2016-10-19 13:39:29.970101 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottdnz/flask_skeleton -https://github.com/scottdnz/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-19 13:39:30.491136 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -pavlenko-volodymyr/flask-study -https://github.com/pavlenko-volodymyr/flask-study -Entry file: flask-study/hello.py -Scanned: 2016-10-19 13:39:31.054239 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -slizadel/flask-gitrcv -https://github.com/slizadel/flask-gitrcv -Entry file: flask-gitrcv/flask-gitrcv/gitrcv.py -Scanned: 2016-10-19 13:39:32.740265 -No vulnerabilities found. - - -apjd/flask-heroku -https://github.com/apjd/flask-heroku -Entry file: flask-heroku/flasky.py -Scanned: 2016-10-19 13:39:34.034443 -No vulnerabilities found. - - -scardine/flask-locale -https://github.com/scardine/flask-locale -Entry file: flask-locale/tests/__init__.py -Scanned: 2016-10-19 13:39:35.506709 -No vulnerabilities found. - - -JunilJacob/Paint-app-using-Flask -https://github.com/JunilJacob/Paint-app-using-Flask -Entry file: Paint-app-using-Flask/hello.py -Scanned: 2016-10-19 13:40:07.330554 -Vulnerability 1: -File: Paint-app-using-Flask/hello.py - > User input at line 12, trigger word "form[": - name = request.form['pname'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 16: iname = (name) -File: Paint-app-using-Flask/hello.py - > reaches line 18, trigger word "execute(": - c.execute('DELETE FROM Image WHERE file=?', iname) - -Vulnerability 2: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 19, trigger word "execute(": - c.execute('INSERT INTO Image VALUES (?,?)', image) - -Vulnerability 3: -File: Paint-app-using-Flask/hello.py - > User input at line 12, trigger word "form[": - name = request.form['pname'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 16: iname = (name) -File: Paint-app-using-Flask/hello.py - > reaches line 19, trigger word "execute(": - c.execute('INSERT INTO Image VALUES (?,?)', image) - -Vulnerability 4: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 34, trigger word "execute(": - for row in c.execute('SELECT * FROM Image WHERE file=?', filename): - -Vulnerability 5: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 36, trigger word "render_template(": - resp = Response('' + render_template('paint.html'),status=200, mimetype='html') - - - -dimfox/flask-mega-tutorial -https://github.com/dimfox/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 13:40:07.839555 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -callahad/temp-flask-persona-demo -https://github.com/callahad/temp-flask-persona-demo -Entry file: temp-flask-persona-demo/example.py -Scanned: 2016-10-19 13:40:12.842540 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshsee/GAE-flask-cms -https://github.com/joshsee/GAE-flask-cms -Entry file: GAE-flask-cms/flask/sessions.py -Scanned: 2016-10-19 13:40:14.388613 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshkurz/exi -https://github.com/joshkurz/exi -Entry file: exi/exi/tests/security/test_app/__init__.py -Scanned: 2016-10-19 13:40:16.148298 -No vulnerabilities found. - - -booo/baedproject -https://github.com/booo/baedproject -Entry file: baedproject/app.py -Scanned: 2016-10-19 13:40:17.441498 -No vulnerabilities found. - - -kalimatas/herokuflask -https://github.com/kalimatas/herokuflask -Entry file: herokuflask/app.py -Scanned: 2016-10-19 13:40:18.744554 -No vulnerabilities found. - - -norbert/helloflask -https://github.com/norbert/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 13:40:19.288672 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -perjo927/Portfolio -https://github.com/perjo927/Portfolio -Entry file: Portfolio/server.py -Scanned: 2016-10-19 13:40:21.402448 -Vulnerability 1: -File: Portfolio/server.py - > User input at line 96, trigger word "form[": - search_string = request.form['key'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 2: -File: Portfolio/server.py - > User input at line 99, trigger word "form[": - sort_order = request.form['sort_order'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 3: -File: Portfolio/server.py - > User input at line 100, trigger word "form[": - sort_by = request.form['sort_by'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - - - -Pusungwi/lobotomizer -https://github.com/Pusungwi/lobotomizer -Entry file: None -Scanned: 2016-10-19 13:40:21.929599 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pusungwi/lobotomizer. - -ahawker/jpool -https://github.com/ahawker/jpool -Entry file: None -Scanned: 2016-10-19 13:40:22.432823 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool. - -takosuke/pizzasuicideclub -https://github.com/takosuke/pizzasuicideclub -Entry file: pizzasuicideclub/psc_app/__init__.py -Scanned: 2016-10-19 13:40:23.032365 -Vulnerability 1: -File: pizzasuicideclub/psc_app/filters.py - > User input at line 15, trigger word "Markup(": - result = Markup(result) -Reassigned in: - File: pizzasuicideclub/psc_app/filters.py - > Line 16: ret_MAYBE_FUNCTION_NAME = result -File: pizzasuicideclub/psc_app/filters.py - > reaches line 12, trigger word "replace(": - result = ' - -'.join(('

%s

' % p.replace(' -', '
-') for p in _paragraph_re.split(escape(value)))) -This vulnerability is potentially sanitised by: ['escape'] - -Vulnerability 2: -File: pizzasuicideclub/psc_app/pages/views.py - > User input at line 35, trigger word "get(": - post = Post.query.get(postId) -Reassigned in: - File: pizzasuicideclub/psc_app/pages/views.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('404.html',user=user) -File: pizzasuicideclub/psc_app/pages/views.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('pages/permalink.html',title=post.title, post=post, user=user) - -Vulnerability 3: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 31, trigger word "get(": - profile = User.query.get(userId) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('pages.userlist')) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users/profile.html',profile=profile, user=user, form=form) - -Vulnerability 4: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(username=form.username.data).first() -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 52: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 53: session['username'] = user.username - File: pizzasuicideclub/psc_app/users/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 49: session['remember_me'] = form.remember_me.data -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 54, trigger word "flash(": - flash('You are logged in %s' % user.username) - -Vulnerability 5: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(username=form.username.data).first() -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 52: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 53: session['username'] = user.username - File: pizzasuicideclub/psc_app/users/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 49: session['remember_me'] = form.remember_me.data -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 55, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 6: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(username=form.username.data).first() -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 52: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 53: session['username'] = user.username - File: pizzasuicideclub/psc_app/users/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 49: session['remember_me'] = form.remember_me.data -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 55, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 7: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 79, trigger word ".data": - file = form.image.data -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 80: profile_pic = utilities.file_save(file, 'profilepics') - File: pizzasuicideclub/psc_app/users/views.py - > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 8: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 81, trigger word ".data": - user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 9: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 79, trigger word ".data": - file = form.image.data -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 80: profile_pic = utilities.file_save(file, 'profilepics') - File: pizzasuicideclub/psc_app/users/views.py - > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 10: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 81, trigger word ".data": - user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 11: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 140, trigger word "get(": - user = User.query.get(userId) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 134: user = g.user - File: pizzasuicideclub/psc_app/users/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=userId)) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 145, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users/modify_password.html',form=form, user=user) - - - -neilduncan/FlickrPlaceholders -https://github.com/neilduncan/FlickrPlaceholders -Entry file: FlickrPlaceholders/main.py -Scanned: 2016-10-19 13:40:24.331840 -No vulnerabilities found. - - -amaterasu-/placeholder -https://github.com/amaterasu-/placeholder -Entry file: placeholder/image.py -Scanned: 2016-10-19 13:40:25.622493 -No vulnerabilities found. - - -koon-kai/kiblog -https://github.com/koon-kai/kiblog -Entry file: kiblog/app.py -Scanned: 2016-10-19 13:40:26.810039 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joelrojo/flask -https://github.com/joelrojo/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:40:27.409321 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -asgoel/Merge-flask -https://github.com/asgoel/Merge-flask -Entry file: Merge-flask/app.py -Scanned: 2016-10-19 13:40:28.413767 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregimba/Vodka -https://github.com/gregimba/Vodka -Entry file: Vodka/app.py -Scanned: 2016-10-19 13:40:30.180609 -No vulnerabilities found. - - -corydolphin/flask-olinauth -https://github.com/corydolphin/flask-olinauth -Entry file: flask-olinauth/example.py -Scanned: 2016-10-19 13:40:32.375131 -No vulnerabilities found. - - -danielestevez/flasktutorial -https://github.com/danielestevez/flasktutorial -Entry file: None -Scanned: 2016-10-19 13:40:33.887393 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pityonline/flaskr -https://github.com/pityonline/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:40:34.402792 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabeesh/Studentapp-Flask -https://github.com/prabeesh/Studentapp-Flask -Entry file: Studentapp-Flask/test.py -Scanned: 2016-10-19 13:40:35.417199 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dproni/flask_test -https://github.com/dproni/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-19 13:41:07.583563 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scardine/flask-locale -https://github.com/scardine/flask-locale -Entry file: flask-locale/tests/__init__.py -Scanned: 2016-10-19 13:41:09.009935 -No vulnerabilities found. - - -callahad/temp-flask-persona-demo -https://github.com/callahad/temp-flask-persona-demo -Entry file: temp-flask-persona-demo/example.py -Scanned: 2016-10-19 13:41:09.571792 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kishorekdty/paint_using_flask -https://github.com/kishorekdty/paint_using_flask -Entry file: None -Scanned: 2016-10-19 13:41:11.083863 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kishorekdty/paint_using_flask. - -joshsee/GAE-flask-cms -https://github.com/joshsee/GAE-flask-cms -Entry file: GAE-flask-cms/flask/sessions.py -Scanned: 2016-10-19 13:41:14.619994 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rasheedh/Heroku-Paint-Using-Flask -https://github.com/rasheedh/Heroku-Paint-Using-Flask -Entry file: None -Scanned: 2016-10-19 13:41:16.136504 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Heroku-Paint-Using-Flask. - -sreekanthkaralmanna/heroku-paint-app-using-flask -https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask -Entry file: None -Scanned: 2016-10-19 13:41:16.662161 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask. - -mikewallace1979/milk -https://github.com/mikewallace1979/milk -Entry file: milk/milk.py -Scanned: 2016-10-19 13:41:18.994033 -No vulnerabilities found. - - -goonpug/goonpug-stats -https://github.com/goonpug/goonpug-stats -Entry file: goonpug-stats/goonpug/__init__.py -Scanned: 2016-10-19 13:41:20.796108 -No vulnerabilities found. - - -clly/blog.md -https://github.com/clly/blog.md -Entry file: blog/flaskr.py -Scanned: 2016-10-19 13:41:21.312854 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simplyluke/dothis -https://github.com/simplyluke/dothis -Entry file: dothis/dothis.py -Scanned: 2016-10-19 13:41:22.606795 -No vulnerabilities found. - - -oberkowitz/improv -https://github.com/oberkowitz/improv -Entry file: improv/mytest/app.py -Scanned: 2016-10-19 13:41:25.954182 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: improv/mytest/venv/lib/python2.7/genericpath.py - -mikeboers/Flask-Images -https://github.com/mikeboers/Flask-Images -Entry file: Flask-Images/tests/__init__.py -Scanned: 2016-10-19 13:41:28.474603 -No vulnerabilities found. - - -berlotto/flask-app-template -https://github.com/berlotto/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-19 13:41:29.458863 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -corydolphin/flask-jsonpify -https://github.com/corydolphin/flask-jsonpify -Entry file: flask-jsonpify/test.py -Scanned: 2016-10-19 13:41:31.628687 -No vulnerabilities found. - - -eadmundo/flask-static-blog -https://github.com/eadmundo/flask-static-blog -Entry file: flask-static-blog/app/__init__.py -Scanned: 2016-10-19 13:41:33.563474 -Vulnerability 1: -File: flask-static-blog/app/blueprints/blog/views.py - > User input at line 17, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: flask-static-blog/app/blueprints/blog/views.py - > Line 30: pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10)) - File: flask-static-blog/app/blueprints/blog/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0]) -File: flask-static-blog/app/blueprints/blog/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args) - -Vulnerability 2: -File: flask-static-blog/app/blueprints/blog/views.py - > User input at line 30, trigger word "get(": - pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10)) -Reassigned in: - File: flask-static-blog/app/blueprints/blog/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0]) -File: flask-static-blog/app/blueprints/blog/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args) - - - -0atman/flask-basic -https://github.com/0atman/flask-basic -Entry file: flask-basic/flask-basic.py -Scanned: 2016-10-19 13:41:35.356511 -No vulnerabilities found. - - -clmns/flasktest -https://github.com/clmns/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-19 13:41:36.398358 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zfdang/memcached-in-openshift -https://github.com/zfdang/memcached-in-openshift -Entry file: memcached-in-openshift/wsgi/main.py -Scanned: 2016-10-19 13:41:36.923431 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garethpaul/flask-sample -https://github.com/garethpaul/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-19 13:41:37.934024 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -naveenpremchand02/flask_url -https://github.com/naveenpremchand02/flask_url -Entry file: flask_url/url.py -Scanned: 2016-10-19 13:41:38.453126 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xiechao06/Flask-NavBar -https://github.com/xiechao06/Flask-NavBar -Entry file: Flask-NavBar/flask_nav_bar.py -Scanned: 2016-10-19 13:41:39.482550 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cpdean/flask-oauth-tutorial -https://github.com/cpdean/flask-oauth-tutorial -Entry file: flask-oauth-tutorial/flaskr.py -Scanned: 2016-10-19 13:41:40.783765 -No vulnerabilities found. - - -nsfyn55/flask-mega-tutorial -https://github.com/nsfyn55/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-19 13:42:09.431953 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kshitizrimal/flaskr-modified -https://github.com/kshitizrimal/flaskr-modified -Entry file: flaskr-modified/flaskr.py -Scanned: 2016-10-19 13:42:10.047560 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prasanthkumara/Heroku-Paint-App-Using--Flask -https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask -Entry file: None -Scanned: 2016-10-19 13:42:13.069764 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask. - -pyxze/PyxzeCorpus -https://github.com/pyxze/PyxzeCorpus -Entry file: PyxzeCorpus/corpus.py -Scanned: 2016-10-19 13:42:17.356769 -No vulnerabilities found. - - -crcsmnky/thehotspot -https://github.com/crcsmnky/thehotspot -Entry file: thehotspot/v2/app.py -Scanned: 2016-10-19 13:42:19.006316 -Vulnerability 1: -File: thehotspot/v2/app.py - > User input at line 54, trigger word "get(": - checkins_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('places.html',places=places, count=count, skip=checkins_skip) - -Vulnerability 2: -File: thehotspot/v2/app.py - > User input at line 64, trigger word "get(": - checkins_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users.html',users=users, count=count, skip=checkins_skip) - -Vulnerability 3: -File: thehotspot/v2/app.py - > User input at line 73, trigger word "get(": - checkins_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 82, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('checkins.html',checkins=checkins, users=users, places=places, skip=checkins_skip, count=count) - -Vulnerability 4: -File: thehotspot/v2/app.py - > User input at line 103, trigger word "get(": - cats_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('categories.html',categories=categories, count=count, skip=cats_skip) - -Vulnerability 5: -File: thehotspot/v2/app.py - > User input at line 114, trigger word "get(": - places_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 118, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.html',category=cat, places=places, mapped=places.clone(), count=cat['count'], skip=places_skip) - - - -etscrivner/sovereign-states -https://github.com/etscrivner/sovereign-states -Entry file: sovereign-states/sovereign_states/api.py -Scanned: 2016-10-19 13:42:20.485120 -No vulnerabilities found. - - -croach/cheap-and-scalable-webistes-with-flask-code -https://github.com/croach/cheap-and-scalable-webistes-with-flask-code -Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py -Scanned: 2016-10-19 13:42:21.898919 -No vulnerabilities found. - - -sreedathns/paint-app-using-heroku-and-flask -https://github.com/sreedathns/paint-app-using-heroku-and-flask -Entry file: None -Scanned: 2016-10-19 13:42:22.418314 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreedathns/paint-app-using-heroku-and-flask. - -nesv/cask -https://github.com/nesv/cask -Entry file: None -Scanned: 2016-10-19 13:42:22.938693 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask. - -chadgh/chessy -https://github.com/chadgh/chessy -Entry file: None -Scanned: 2016-10-19 13:42:23.459624 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wowo/pithermo -https://github.com/wowo/pithermo -Entry file: pithermo/pithermo.py -Scanned: 2016-10-19 13:42:29.484233 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aranasaurus/android-demo-server -https://github.com/aranasaurus/android-demo-server -Entry file: android-demo-server/app.py -Scanned: 2016-10-19 13:42:31.495709 -Vulnerability 1: -File: android-demo-server/app.py - > User input at line 21, trigger word "get(": - r = requests.get(url.format(query)) -Reassigned in: - File: android-demo-server/app.py - > Line 22: images = [(i, json.dumps(i)) for i in json.loads(r.text)['responseData']['results']] -File: android-demo-server/app.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',images=images) - - - -mjhea0/flask-intro -https://github.com/mjhea0/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 13:42:32.933805 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -deepgully/me -https://github.com/deepgully/me -Entry file: me/settings.py -Scanned: 2016-10-19 13:42:33.575633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mickey06/Flask-principal-example -https://github.com/mickey06/Flask-principal-example -Entry file: Flask-principal-example/FPrincipals.py -Scanned: 2016-10-19 13:42:35.046839 -No vulnerabilities found. - - -crazygit/flask -https://github.com/crazygit/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:42:35.658145 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -wingu/flask_filters -https://github.com/wingu/flask_filters -Entry file: flask_filters/test_flask_filters.py -Scanned: 2016-10-19 13:42:37.051365 -No vulnerabilities found. - - -BuongiornoMIP/Reding -https://github.com/BuongiornoMIP/Reding -Entry file: Reding/reding/app.py -Scanned: 2016-10-19 13:42:39.441537 -No vulnerabilities found. - - -mphuie/flask_base -https://github.com/mphuie/flask_base -Entry file: flask_base/myapp/__init__.py -Scanned: 2016-10-19 13:42:41.358343 -No vulnerabilities found. - - -colwilson/flask-lazyapi -https://github.com/colwilson/flask-lazyapi -Entry file: flask-lazyapi/demo_server.py -Scanned: 2016-10-19 13:42:41.905909 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xiechao06/Flask-DataBrowser -https://github.com/xiechao06/Flask-DataBrowser -Entry file: Flask-DataBrowser/flask_databrowser/test/basetest.py -Scanned: 2016-10-19 13:42:42.449200 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -knowshan/flaskey -https://github.com/knowshan/flaskey -Entry file: flaskey/app/__init__.py -Scanned: 2016-10-19 13:42:43.929122 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Masagin/FlaskCelery -https://github.com/Masagin/FlaskCelery -Entry file: FlaskCelery/flask.py -Scanned: 2016-10-19 13:42:44.445143 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -denz/flask_introspect -https://github.com/denz/flask_introspect -Entry file: flask_introspect/test/test_blueprint.py -Scanned: 2016-10-19 13:43:11.438578 -No vulnerabilities found. - - -EvilDmitri/flask-mikroblog -https://github.com/EvilDmitri/flask-mikroblog -Entry file: flask-mikroblog/app/__init__.py -Scanned: 2016-10-19 13:43:12.872673 -No vulnerabilities found. - - -maxcnunes/flask_bravi -https://github.com/maxcnunes/flask_bravi -Entry file: flask_bravi/braviapp/__init__.py -Scanned: 2016-10-19 13:43:14.385471 -No vulnerabilities found. - - -zhemao/flask_demo -https://github.com/zhemao/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-19 13:43:18.412051 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SalemHarrache-Archive/flask_chat_eventsource -https://github.com/SalemHarrache-Archive/flask_chat_eventsource -Entry file: flask_chat_eventsource/server.py -Scanned: 2016-10-19 13:43:18.945526 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ryanolson/flask-couchdb-schematics -https://github.com/ryanolson/flask-couchdb-schematics -Entry file: flask-couchdb-schematics/example/guestbook.py -Scanned: 2016-10-19 13:43:22.513938 -Vulnerability 1: -File: flask-couchdb-schematics/example/guestbook.py - > User input at line 53, trigger word "get(": - page = paginate(Signature.all(), 5, request.args.get('start')) -File: flask-couchdb-schematics/example/guestbook.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page) - - - -pouyan-ghasemi/flask-sql-cms -https://github.com/pouyan-ghasemi/flask-sql-cms -Entry file: flask-sql-cms/app.py -Scanned: 2016-10-19 13:43:23.056501 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -texuf/myflaskproject -https://github.com/texuf/myflaskproject -Entry file: myflaskproject/hello.py -Scanned: 2016-10-19 13:43:24.341238 -No vulnerabilities found. - - -csesoc/bark-core -https://github.com/csesoc/bark-core -Entry file: bark-core/bark/__init__.py -Scanned: 2016-10-19 13:43:25.354615 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -croach/cheap-and-scalable-webistes-with-flask-code -https://github.com/croach/cheap-and-scalable-webistes-with-flask-code -Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py -Scanned: 2016-10-19 13:43:27.768890 -No vulnerabilities found. - - -nesv/cask -https://github.com/nesv/cask -Entry file: None -Scanned: 2016-10-19 13:43:30.290565 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask. - -lee212/fg-ws -https://github.com/lee212/fg-ws -Entry file: fg-ws/fgws/ws/FGWSApps.py -Scanned: 2016-10-19 13:43:31.840161 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brunsgaard/qwablog -https://github.com/brunsgaard/qwablog -Entry file: qwablog/qwablog.py -Scanned: 2016-10-19 13:43:34.273183 -No vulnerabilities found. - - -nutrislice/mandrill-webhook-redirector -https://github.com/nutrislice/mandrill-webhook-redirector -Entry file: mandrill-webhook-redirector/webhook-router.py -Scanned: 2016-10-19 13:43:35.598481 -Vulnerability 1: -File: mandrill-webhook-redirector/webhook-router.py - > User input at line 13, trigger word "form[": - mandrill_event = json.loads(request.form['mandrill_events']) -Reassigned in: - File: mandrill-webhook-redirector/webhook-router.py - > Line 14: metadata = mandrill_event[0]['msg']['metadata'] - File: mandrill-webhook-redirector/webhook-router.py - > Line 15: domain = metadata['domain'] -File: mandrill-webhook-redirector/webhook-router.py - > reaches line 16, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/') - - - -rubinovitz/fourequality -https://github.com/rubinovitz/fourequality -Entry file: fourequality/app.py -Scanned: 2016-10-19 13:43:38.336062 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -darylchang/Hacker-Viz -https://github.com/darylchang/Hacker-Viz -Entry file: Hacker-Viz/flaskDir.py -Scanned: 2016-10-19 13:43:39.714517 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alexlod/movielist -https://github.com/alexlod/movielist -Entry file: movielist/movielist.py -Scanned: 2016-10-19 13:43:41.239092 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dhumbert/literable -https://github.com/dhumbert/literable -Entry file: None -Scanned: 2016-10-19 13:43:46.817740 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dhumbert/literable. - -ArcTanSusan/Task_List -https://github.com/ArcTanSusan/Task_List -Entry file: Task_List/tipsy/tipsy.py -Scanned: 2016-10-19 13:43:48.467266 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rbuysse/url_shortener -https://github.com/rbuysse/url_shortener -Entry file: url_shortener/url.py -Scanned: 2016-10-19 13:43:49.751466 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mjhea0/flask-intro -https://github.com/mjhea0/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-19 13:43:50.979633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seanrose/box-arcade -https://github.com/seanrose/box-arcade -Entry file: box-arcade/app/__init__.py -Scanned: 2016-10-19 13:43:51.974163 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -techniq/flask-wdb -https://github.com/techniq/flask-wdb -Entry file: flask-wdb/example.py -Scanned: 2016-10-19 13:43:53.266988 -No vulnerabilities found. - - -mphuie/flask_base -https://github.com/mphuie/flask_base -Entry file: flask_base/myapp/__init__.py -Scanned: 2016-10-19 13:43:55.728412 -No vulnerabilities found. - - -theho/flask-wsgi -https://github.com/theho/flask-wsgi -Entry file: flask-wsgi/wsgi.py -Scanned: 2016-10-19 13:44:14.824987 -No vulnerabilities found. - - -adityaathalye/flaskr -https://github.com/adityaathalye/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:44:15.330914 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -knowshan/flaskey -https://github.com/knowshan/flaskey -Entry file: flaskey/app/__init__.py -Scanned: 2016-10-19 13:44:16.835554 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyr/flaskapp -https://github.com/andyr/flaskapp -Entry file: None -Scanned: 2016-10-19 13:44:20.355829 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp. - -denz/flask_introspect -https://github.com/denz/flask_introspect -Entry file: flask_introspect/test/test_blueprint.py -Scanned: 2016-10-19 13:44:21.780496 -No vulnerabilities found. - - -ekfriis/flask-mbtiles -https://github.com/ekfriis/flask-mbtiles -Entry file: flask-mbtiles/mbtileserver.py -Scanned: 2016-10-19 13:44:24.082855 -No vulnerabilities found. - - -hyaticua/flask-blog -https://github.com/hyaticua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 13:44:24.677194 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -thearchduke/flask-boiler -https://github.com/thearchduke/flask-boiler -Entry file: None -Scanned: 2016-10-19 13:44:25.202160 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -StefanKjartansson/bower-flask -https://github.com/StefanKjartansson/bower-flask -Entry file: bower-flask/server.py -Scanned: 2016-10-19 13:44:27.525798 -No vulnerabilities found. - - -tanayseven/Voix -https://github.com/tanayseven/Voix -Entry file: None -Scanned: 2016-10-19 13:44:28.111487 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gatesphere/flaskr-flask-tutorial -https://github.com/gatesphere/flaskr-flask-tutorial -Entry file: flaskr-flask-tutorial/flaskr/flaskr.py -Scanned: 2016-10-19 13:44:29.431785 -No vulnerabilities found. - - -bazerk/baz-flask-base -https://github.com/bazerk/baz-flask-base -Entry file: baz-flask-base/app/app.py -Scanned: 2016-10-19 13:44:33.342125 -Vulnerability 1: -File: baz-flask-base/app/frontend/views.py - > User input at line 26, trigger word "get(": - form = RegisterForm(username=request.args.get('username', twitter_name), password=request.args.get('password', None)) -Reassigned in: - File: baz-flask-base/app/frontend/views.py - > Line 30: err = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets) - File: baz-flask-base/app/frontend/views.py - > Line 30: user = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets) - File: baz-flask-base/app/frontend/views.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('frontend.login')) -File: baz-flask-base/app/frontend/views.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('frontend/register.html',form=form, twitter_name=twitter_name) - -Vulnerability 2: -File: baz-flask-base/app/frontend/views.py - > User input at line 48, trigger word "get(": - form = LoginForm(login=request.args.get('login', None), next=request.args.get('next', None)) -Reassigned in: - File: baz-flask-base/app/frontend/views.py - > Line 52: user = User.authenticate(form.login.data, form.password.data, bcrypt.check_password_hash) - File: baz-flask-base/app/frontend/views.py - > Line 57: session['user_id'] = user.id - File: baz-flask-base/app/frontend/views.py - > Line 61: ret_MAYBE_FUNCTION_NAME = redirect('') -File: baz-flask-base/app/frontend/views.py - > reaches line 65, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('frontend/login.html',form=form) - - - -ryanolson/flask-couchdb-schematics -https://github.com/ryanolson/flask-couchdb-schematics -Entry file: flask-couchdb-schematics/example/guestbook.py -Scanned: 2016-10-19 13:44:34.884042 -Vulnerability 1: -File: flask-couchdb-schematics/example/guestbook.py - > User input at line 53, trigger word "get(": - page = paginate(Signature.all(), 5, request.args.get('start')) -File: flask-couchdb-schematics/example/guestbook.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page) - - - -pouyan-ghasemi/flask-sql-cms -https://github.com/pouyan-ghasemi/flask-sql-cms -Entry file: flask-sql-cms/app.py -Scanned: 2016-10-19 13:44:35.421788 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Andrey-Khobnya/flask-sessions-mongo -https://github.com/Andrey-Khobnya/flask-sessions-mongo -Entry file: flask-sessions-mongo/flask-sessions-mongo/examples/loginsession.py -Scanned: 2016-10-19 13:44:36.749102 -No vulnerabilities found. - - -igrishaev/youtube-python-api-sample -https://github.com/igrishaev/youtube-python-api-sample -Entry file: youtube-python-api-sample/app.py -Scanned: 2016-10-19 13:44:37.878135 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nutrislice/mandrill-webhook-redirector -https://github.com/nutrislice/mandrill-webhook-redirector -Entry file: mandrill-webhook-redirector/webhook-router.py -Scanned: 2016-10-19 13:44:39.302194 -Vulnerability 1: -File: mandrill-webhook-redirector/webhook-router.py - > User input at line 13, trigger word "form[": - mandrill_event = json.loads(request.form['mandrill_events']) -Reassigned in: - File: mandrill-webhook-redirector/webhook-router.py - > Line 14: metadata = mandrill_event[0]['msg']['metadata'] - File: mandrill-webhook-redirector/webhook-router.py - > Line 15: domain = metadata['domain'] -File: mandrill-webhook-redirector/webhook-router.py - > reaches line 16, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/') - - - -kfr2/pynances -https://github.com/kfr2/pynances -Entry file: pynances/pynances/pynances.py -Scanned: 2016-10-19 13:44:41.662646 -No vulnerabilities found. - - -WilliamMayor/geoffrey -https://github.com/WilliamMayor/geoffrey -Entry file: geoffrey/geoffrey.py -Scanned: 2016-10-19 13:44:42.965642 -No vulnerabilities found. - - -Timothee/Passerelle -https://github.com/Timothee/Passerelle -Entry file: Passerelle/passerelle.py -Scanned: 2016-10-19 13:44:44.256621 -No vulnerabilities found. - - -fusic-com/flask-todo -https://github.com/fusic-com/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-19 13:44:50.628244 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bkabrda/flask-whooshee -https://github.com/bkabrda/flask-whooshee -Entry file: flask-whooshee/test.py -Scanned: 2016-10-19 13:44:53.249500 -No vulnerabilities found. - - -DavidWittman/csrgenerator.com -https://github.com/DavidWittman/csrgenerator.com -Entry file: None -Scanned: 2016-10-19 13:44:54.260385 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -techniq/flask-wdb -https://github.com/techniq/flask-wdb -Entry file: flask-wdb/example.py -Scanned: 2016-10-19 13:44:55.556738 -No vulnerabilities found. - - -1000ch/flask-handson -https://github.com/1000ch/flask-handson -Entry file: flask-handson/flaskr/__init__.py -Scanned: 2016-10-19 13:44:56.109146 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajuna/car-registration -https://github.com/ajuna/car-registration -Entry file: None -Scanned: 2016-10-19 13:44:56.619963 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ajuna/car-registration. - -jishnujagajeeve/Flaskr -https://github.com/jishnujagajeeve/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 13:45:14.183509 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Basher51/Flaskr -https://github.com/Basher51/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 13:45:15.686184 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyr/flaskapp -https://github.com/andyr/flaskapp -Entry file: None -Scanned: 2016-10-19 13:45:17.191472 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp. - -sagnew/Prank-Roulette -https://github.com/sagnew/Prank-Roulette -Entry file: Prank-Roulette/app.py -Scanned: 2016-10-19 13:45:18.706616 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kaste/FlaskDeferredHandler -https://github.com/kaste/FlaskDeferredHandler -Entry file: FlaskDeferredHandler/flask_handler_test.py -Scanned: 2016-10-19 13:45:23.035199 -No vulnerabilities found. - - -adityaathalye/flaskr2 -https://github.com/adityaathalye/flaskr2 -Entry file: flaskr2/app.py -Scanned: 2016-10-19 13:45:24.324687 -No vulnerabilities found. - - -ConceptPending/flaskTemplate -https://github.com/ConceptPending/flaskTemplate -Entry file: flaskTemplate/server.py -Scanned: 2016-10-19 13:45:26.531627 -No vulnerabilities found. - - -AlexMost/Flask-starter -https://github.com/AlexMost/Flask-starter -Entry file: Flask-starter/app.py -Scanned: 2016-10-19 13:45:27.920716 -No vulnerabilities found. - - -samgclarke/flask-microblog -https://github.com/samgclarke/flask-microblog -Entry file: None -Scanned: 2016-10-19 13:45:28.441725 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jonomillin/learning-flask -https://github.com/jonomillin/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-19 13:45:29.048258 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nthfloor/Flask_learn -https://github.com/nthfloor/Flask_learn -Entry file: Flask_learn/login_system/flskr.py -Scanned: 2016-10-19 13:45:33.524906 -Vulnerability 1: -File: Flask_learn/login_system/flskr.py - > User input at line 116, trigger word "get(": - username = request.form.get('username') -File: Flask_learn/login_system/flskr.py - > reaches line 119, trigger word "filter(": - user = User.query.filter(User.name == username and User.password == password).first() - -Vulnerability 2: -File: Flask_learn/login_system/flskr.py - > User input at line 117, trigger word "get(": - password = request.form.get('password') -File: Flask_learn/login_system/flskr.py - > reaches line 119, trigger word "filter(": - user = User.query.filter(User.name == username and User.password == password).first() - - - -berlotto/hero-flask -https://github.com/berlotto/hero-flask -Entry file: hero-flask/hero/__init__.py -Scanned: 2016-10-19 13:45:34.973683 -No vulnerabilities found. - - -mmcgahan/flask-labs-bb -https://github.com/mmcgahan/flask-labs-bb -Entry file: flask-labs-bb/flask_labs/__init__.py -Scanned: 2016-10-19 13:45:35.572201 -Vulnerability 1: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 29, trigger word "filter(": - user = db.session.query(User).filter(User.username == login_form.username.data).first() - -Vulnerability 2: -File: flask-labs-bb/flask_labs/views.py - > User input at line 29, trigger word ".data": - user = db.session.query(User).filter(User.username == login_form.username.data).first() -File: flask-labs-bb/flask_labs/views.py - > reaches line 29, trigger word "filter(": - user = db.session.query(User).filter(User.username == login_form.username.data).first() - -Vulnerability 3: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 36, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index')) - -Vulnerability 4: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 36, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index')) - -Vulnerability 5: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',login_form=login_form) - - - -daisuzu/flask-app-sample -https://github.com/daisuzu/flask-app-sample -Entry file: flask-app-sample/db.py -Scanned: 2016-10-19 13:45:36.882015 -No vulnerabilities found. - - -penpyt/flask-couchdb-auth -https://github.com/penpyt/flask-couchdb-auth -Entry file: flask-couchdb-auth/example/guestbook.py -Scanned: 2016-10-19 13:45:38.385531 -Vulnerability 1: -File: flask-couchdb-auth/example/guestbook.py - > User input at line 53, trigger word "get(": - page = paginate(Signature.all(), 5, request.args.get('start')) -File: flask-couchdb-auth/example/guestbook.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page) - - - -rodreegez/flask-twitter-auth -https://github.com/rodreegez/flask-twitter-auth -Entry file: None -Scanned: 2016-10-19 13:45:38.913765 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rodreegez/flask-twitter-auth. - -DamnedFacts/flask-hello-world -https://github.com/DamnedFacts/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 13:45:39.483685 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ariamoraine/kitten-generator -https://github.com/ariamoraine/kitten-generator -Entry file: kitten-generator/flaskhello.py -Scanned: 2016-10-19 13:45:41.298961 -No vulnerabilities found. - - -honestappalachia/honest_site -https://github.com/honestappalachia/honest_site -Entry file: honest_site/run.py -Scanned: 2016-10-19 13:45:43.609346 -Vulnerability 1: -File: honest_site/run.py - > User input at line 36, trigger word "get(": - template = page.meta.get('template', 'default.html') -File: honest_site/run.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,page=page) - - - -daikeshi/one-dollar-metasearch-engine -https://github.com/daikeshi/one-dollar-metasearch-engine -Entry file: one-dollar-metasearch-engine/app/__init__.py -Scanned: 2016-10-19 13:45:44.154934 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -honestappalachia/honest_hiddenservice -https://github.com/honestappalachia/honest_hiddenservice -Entry file: honest_hiddenservice/run.py -Scanned: 2016-10-19 13:45:50.167407 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -msalahi/art-party -https://github.com/msalahi/art-party -Entry file: art-party/app.py -Scanned: 2016-10-19 13:45:54.331658 -No vulnerabilities found. - - -saltire/artpubpy -https://github.com/saltire/artpubpy -Entry file: artpubpy/artpubpy.py -Scanned: 2016-10-19 13:45:55.842265 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mcniac/simple-blog -https://github.com/mcniac/simple-blog -Entry file: simple-blog/tumblelog/__init__.py -Scanned: 2016-10-19 13:45:58.851477 -No vulnerabilities found. - - -ryanrdetzel/blimp-commit -https://github.com/ryanrdetzel/blimp-commit -Entry file: blimp-commit/blimp_commit.py -Scanned: 2016-10-19 13:46:00.122458 -No vulnerabilities found. - - -fusic-com/flask-webcache -https://github.com/fusic-com/flask-webcache -Entry file: flask-webcache/contrib/sleepycalc/app.py -Scanned: 2016-10-19 13:46:02.313205 -No vulnerabilities found. - - -rehandalal/flask-mobility -https://github.com/rehandalal/flask-mobility -Entry file: flask-mobility/flask_mobility/tests/test_decorators.py -Scanned: 2016-10-19 13:46:16.874195 -Vulnerability 1: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 46, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 48, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 2: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 46, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 51, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'off') - -Vulnerability 3: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 67, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 69, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 4: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 67, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 72, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'off') - -Vulnerability 5: -File: flask-mobility/flask_mobility/tests/test_mobility.py - > User input at line 33, trigger word "get(": - MOBILE_COOKIE = self.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_mobility.py - > reaches line 36, trigger word "set_cookie(": - self.app.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 6: -File: flask-mobility/flask_mobility/tests/test_mobility.py - > User input at line 33, trigger word "get(": - MOBILE_COOKIE = self.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_mobility.py - > reaches line 40, trigger word "set_cookie(": - self.app.set_cookie('localhost', MOBILE_COOKIE, 'off') - - - -kelp404/Flask-GAE -https://github.com/kelp404/Flask-GAE -Entry file: None -Scanned: 2016-10-19 13:46:17.384044 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jaysonsantos/jinja-assets-compressor -https://github.com/jaysonsantos/jinja-assets-compressor -Entry file: jinja-assets-compressor/jac/contrib/flask.py -Scanned: 2016-10-19 13:46:20.002140 -No vulnerabilities found. - - -nabetama/flaskr -https://github.com/nabetama/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:46:24.013097 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sagnew/Prank-Roulette -https://github.com/sagnew/Prank-Roulette -Entry file: Prank-Roulette/app.py -Scanned: 2016-10-19 13:46:25.523032 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jpscaletti/authcode -https://github.com/jpscaletti/authcode -Entry file: authcode/examples/default/app.py -Scanned: 2016-10-19 13:46:28.113012 -No vulnerabilities found. - - -samgclarke/flask-microblog -https://github.com/samgclarke/flask-microblog -Entry file: None -Scanned: 2016-10-19 13:46:30.097385 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -shunyata/flask-helloworld -https://github.com/shunyata/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-19 13:46:31.919394 -No vulnerabilities found. - - -stephen-allison/basic-flask -https://github.com/stephen-allison/basic-flask -Entry file: None -Scanned: 2016-10-19 13:46:32.454791 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/stephen-allison/basic-flask. - -bollwyvl/flask-reloaded -https://github.com/bollwyvl/flask-reloaded -Entry file: None -Scanned: 2016-10-19 13:46:35.983333 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bollwyvl/flask-reloaded. - -kitanata/flask-demo -https://github.com/kitanata/flask-demo -Entry file: None -Scanned: 2016-10-19 13:46:37.515280 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kitanata/flask-demo. - -berlotto/hero-flask -https://github.com/berlotto/hero-flask -Entry file: hero-flask/hero/__init__.py -Scanned: 2016-10-19 13:46:38.918590 -No vulnerabilities found. - - -flyingsparx/MongoFlask -https://github.com/flyingsparx/MongoFlask -Entry file: MongoFlask/application.py -Scanned: 2016-10-19 13:46:40.227721 -Vulnerability 1: -File: MongoFlask/application.py - > User input at line 39, trigger word "form[": - person = User.query.filter(User.name == request.form['username']).first() -File: MongoFlask/application.py - > reaches line 39, trigger word "filter(": - person = User.query.filter(User.name == request.form['username']).first() - -Vulnerability 2: -File: MongoFlask/application.py - > User input at line 64, trigger word "form[": - person = User.query.filter(User.name == request.form['username']).first() -Reassigned in: - File: MongoFlask/application.py - > Line 67: session['id'] = person.id -File: MongoFlask/application.py - > reaches line 64, trigger word "filter(": - person = User.query.filter(User.name == request.form['username']).first() - - - -DanAlbert/flask-guestbook -https://github.com/DanAlbert/flask-guestbook -Entry file: flask-guestbook/guestbook.py -Scanned: 2016-10-19 13:46:41.533754 -No vulnerabilities found. - - -kirkeby/empty-flask -https://github.com/kirkeby/empty-flask -Entry file: empty-flask/app/app.py -Scanned: 2016-10-19 13:46:42.544778 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rehandalal/buchner -https://github.com/rehandalal/buchner -Entry file: buchner/buchner/project-template/PROJECTMODULE/main.py -Scanned: 2016-10-19 13:46:44.548815 -No vulnerabilities found. - - -vitalk/flask-staticutils -https://github.com/vitalk/flask-staticutils -Entry file: flask-staticutils/tests/test_app/__init__.py -Scanned: 2016-10-19 13:46:45.982647 -No vulnerabilities found. - - -chiwong/flask_quickstart -https://github.com/chiwong/flask_quickstart -Entry file: flask_quickstart/hello.py -Scanned: 2016-10-19 13:46:46.649732 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_quickstart/venv_hello/lib/python2.6/genericpath.py - -archieyang/flask_app -https://github.com/archieyang/flask_app -Entry file: None -Scanned: 2016-10-19 13:46:47.165483 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/archieyang/flask_app. - -ipfans/openshift-flask-template -https://github.com/ipfans/openshift-flask-template -Entry file: openshift-flask-template/wsgi/mainapp.py -Scanned: 2016-10-19 13:46:52.470867 -No vulnerabilities found. - - -minhtuev/flask-google-map-example -https://github.com/minhtuev/flask-google-map-example -Entry file: flask-google-map-example/server.py -Scanned: 2016-10-19 13:46:53.760515 -No vulnerabilities found. - - -DamnedFacts/flask-hello-world -https://github.com/DamnedFacts/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 13:46:56.307424 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -philangist/url-shorten -https://github.com/philangist/url-shorten -Entry file: url-shorten/shorten.py -Scanned: 2016-10-19 13:46:57.844037 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fabionatali/DigiWebStats -https://github.com/fabionatali/DigiWebStats -Entry file: DigiWebStats/app.py -Scanned: 2016-10-19 13:46:59.389584 -Vulnerability 1: -File: DigiWebStats/app.py - > User input at line 31, trigger word "get(": - start_date = request.args.get('start_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 47, trigger word "execute(": - data = engine.execute(query).fetchall() - -Vulnerability 2: -File: DigiWebStats/app.py - > User input at line 32, trigger word "get(": - end_date = request.args.get('end_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 47, trigger word "execute(": - data = engine.execute(query).fetchall() - -Vulnerability 3: -File: DigiWebStats/app.py - > User input at line 31, trigger word "get(": - start_date = request.args.get('start_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 50, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data) - -Vulnerability 4: -File: DigiWebStats/app.py - > User input at line 32, trigger word "get(": - end_date = request.args.get('end_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 50, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data) - - - -confessin/addressbook -https://github.com/confessin/addressbook -Entry file: addressbook/addressbook.py -Scanned: 2016-10-19 13:47:02.026312 -No vulnerabilities found. - - -nafur/flmpc -https://github.com/nafur/flmpc -Entry file: flmpc/main.py -Scanned: 2016-10-19 13:47:03.447359 -No vulnerabilities found. - - -honestappalachia/honest_hiddenservice -https://github.com/honestappalachia/honest_hiddenservice -Entry file: honest_hiddenservice/run.py -Scanned: 2016-10-19 13:47:03.966636 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kvalle/greetr -https://github.com/kvalle/greetr -Entry file: greetr/greetr/__init__.py -Scanned: 2016-10-19 13:47:18.405753 -No vulnerabilities found. - - -mjhea0/brew -https://github.com/mjhea0/brew -Entry file: brew/app.py -Scanned: 2016-10-19 13:47:20.803085 -No vulnerabilities found. - - -dan-v/crossfitboxreview -https://github.com/dan-v/crossfitboxreview -Entry file: crossfitboxreview/seed_affiliates.py -Scanned: 2016-10-19 13:47:24.285512 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DoctorMalboro/leandropoblet.com -https://github.com/DoctorMalboro/leandropoblet.com -Entry file: None -Scanned: 2016-10-19 13:47:26.276503 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/DoctorMalboro/leandropoblet.com. - -ryanrdetzel/blimp-commit -https://github.com/ryanrdetzel/blimp-commit -Entry file: blimp-commit/blimp_commit.py -Scanned: 2016-10-19 13:47:27.573437 -No vulnerabilities found. - - -danielholmstrom/flask-alchemyview -https://github.com/danielholmstrom/flask-alchemyview -Entry file: flask-alchemyview/tests/test_with_flask_sqlalchemy.py -Scanned: 2016-10-19 13:47:32.041189 -Vulnerability 1: -File: flask-alchemyview/tests/test_view.py - > User input at line 150, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:get',id=model_id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 150, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:get',id=model_id)) - -Vulnerability 2: -File: flask-alchemyview/tests/test_view.py - > User input at line 154, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:get',id='a string')) -File: flask-alchemyview/tests/test_view.py - > reaches line 154, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:get',id='a string')) - -Vulnerability 3: -File: flask-alchemyview/tests/test_view.py - > User input at line 181, trigger word "get(": - m = self.session.query(SimpleModel).get(model_id) -Reassigned in: - File: flask-alchemyview/tests/test_view.py - > Line 174: m = SimpleModel('name') - File: flask-alchemyview/tests/test_view.py - > Line 177: model_id = m.id -File: flask-alchemyview/tests/test_view.py - > reaches line 178, trigger word "url_for(": - response = self.json_put(url_for('SimpleModelView:put',id=model_id), 'name''new name') - -Vulnerability 4: -File: flask-alchemyview/tests/test_view.py - > User input at line 197, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:delete',id=model_id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 197, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:delete',id=model_id)) - -Vulnerability 5: -File: flask-alchemyview/tests/test_view.py - > User input at line 209, trigger word "get(": - m = self.session.query(SimpleModel).get(model_id) -Reassigned in: - File: flask-alchemyview/tests/test_view.py - > Line 202: m = SimpleModel('name') - File: flask-alchemyview/tests/test_view.py - > Line 205: model_id = m.id -File: flask-alchemyview/tests/test_view.py - > reaches line 206, trigger word "url_for(": - response = self.json_delete(url_for('SimpleModelView:put',id=model_id)) - -Vulnerability 6: -File: flask-alchemyview/tests/test_view.py - > User input at line 236, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10)) -File: flask-alchemyview/tests/test_view.py - > reaches line 236, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10)) - -Vulnerability 7: -File: flask-alchemyview/tests/test_view.py - > User input at line 246, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 246, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) - -Vulnerability 8: -File: flask-alchemyview/tests/test_view.py - > User input at line 251, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id='a string')) -File: flask-alchemyview/tests/test_view.py - > reaches line 251, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id='a string')) - -Vulnerability 9: -File: flask-alchemyview/tests/test_view.py - > User input at line 258, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid')) -File: flask-alchemyview/tests/test_view.py - > reaches line 258, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid')) - -Vulnerability 10: -File: flask-alchemyview/tests/test_view.py - > User input at line 266, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:index')) -File: flask-alchemyview/tests/test_view.py - > reaches line 266, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:index')) - -Vulnerability 11: -File: flask-alchemyview/tests/test_view.py - > User input at line 279, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 279, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) - -Vulnerability 12: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > reaches line 56, trigger word "url_for(": - response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False) - -Vulnerability 13: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > reaches line 67, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') - -Vulnerability 14: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > reaches line 56, trigger word "url_for(": - response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False) - -Vulnerability 15: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > reaches line 67, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') - - - -vovantics/flask-bluebone -https://github.com/vovantics/flask-bluebone -Entry file: flask-bluebone/app/app.py -Scanned: 2016-10-19 13:47:32.618471 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -jpscaletti/authcode -https://github.com/jpscaletti/authcode -Entry file: authcode/examples/default/app.py -Scanned: 2016-10-19 13:47:35.698731 -No vulnerabilities found. - - -abulte/flask-arduino-websocket-sqlite -https://github.com/abulte/flask-arduino-websocket-sqlite -Entry file: flask-arduino-websocket-sqlite/app.py -Scanned: 2016-10-19 13:47:38.150209 -No vulnerabilities found. - - -futuregrid/flask_cm -https://github.com/futuregrid/flask_cm -Entry file: flask_cm/examples/forms/app.py -Scanned: 2016-10-19 13:47:40.746779 -Vulnerability 1: -File: flask_cm/examples/forms/app.py - > User input at line 24, trigger word "get(": - comments = session.get('comments', []) -File: flask_cm/examples/forms/app.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',comments=comments, form=form) - - - -mies/flask-heroku -https://github.com/mies/flask-heroku -Entry file: flask-heroku/main.py -Scanned: 2016-10-19 13:47:44.057062 -No vulnerabilities found. - - -mozillazg/flask-demo -https://github.com/mozillazg/flask-demo -Entry file: None -Scanned: 2016-10-19 13:47:44.583448 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mozillazg/flask-demo. - -toastercup/flask-social -https://github.com/toastercup/flask-social -Entry file: flask-social/app.py -Scanned: 2016-10-19 13:47:45.096448 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoest/flask-bardienst -https://github.com/hoest/flask-bardienst -Entry file: flask-bardienst/bardienst/__init__.py -Scanned: 2016-10-19 13:47:47.435441 -No vulnerabilities found. - - -danillosouza/flask-boilerplate -https://github.com/danillosouza/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 13:47:47.948661 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danillosouza/flask-boilerplate. - -dogrdon/flask-map -https://github.com/dogrdon/flask-map -Entry file: None -Scanned: 2016-10-19 13:47:48.480978 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sapid/Flask-Community -https://github.com/sapid/Flask-Community -Entry file: None -Scanned: 2016-10-19 13:47:53.010772 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sapid/Flask-Community. - -jaseemkp/flask-students-app -https://github.com/jaseemkp/flask-students-app -Entry file: flask-students-app/students.py -Scanned: 2016-10-19 13:47:58.037908 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -minhtuev/flask-google-map-example -https://github.com/minhtuev/flask-google-map-example -Entry file: flask-google-map-example/server.py -Scanned: 2016-10-19 13:48:00.333343 -No vulnerabilities found. - - -garbados/flask-the-gauntlet -https://github.com/garbados/flask-the-gauntlet -Entry file: flask-the-gauntlet/app.py -Scanned: 2016-10-19 13:48:03.116859 -No vulnerabilities found. - - -NoxDineen/microblog -https://github.com/NoxDineen/microblog -Entry file: None -Scanned: 2016-10-19 13:48:03.646481 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kaibin/Condom_Data_Server -https://github.com/Kaibin/Condom_Data_Server -Entry file: Condom_Data_Server/app.py -Scanned: 2016-10-19 13:48:05.184220 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nathanrosspowell/frozenboots -https://github.com/nathanrosspowell/frozenboots -Entry file: None -Scanned: 2016-10-19 13:48:21.466572 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nathanrosspowell/frozenboots. - -craneon/debutante -https://github.com/craneon/debutante -Entry file: debutante/app.py -Scanned: 2016-10-19 13:48:23.893786 -Vulnerability 1: -File: debutante/app.py - > User input at line 14, trigger word "form[": - name1 = request.form['name1'] -File: debutante/app.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age)) - -Vulnerability 2: -File: debutante/app.py - > User input at line 15, trigger word "form[": - name2 = request.form['name2'] -File: debutante/app.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age)) - -Vulnerability 3: -File: debutante/app.py - > User input at line 16, trigger word "form[": - age = request.form['age'] -File: debutante/app.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age)) - - - -kljensen/async-flask-sqlalchemy-example -https://github.com/kljensen/async-flask-sqlalchemy-example -Entry file: async-flask-sqlalchemy-example/server.py -Scanned: 2016-10-19 13:48:28.120683 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kommmy/Flask -https://github.com/kommmy/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 13:48:29.701972 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rbika/flaskm -https://github.com/rbika/flaskm -Entry file: flaskm/flaskm.py -Scanned: 2016-10-19 13:48:35.210493 -No vulnerabilities found. - - -catfive/flaskr -https://github.com/catfive/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:48:35.736939 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikedll/flasksqlitedemo -https://github.com/mikedll/flasksqlitedemo -Entry file: flasksqlitedemo/app.py -Scanned: 2016-10-19 13:48:36.288660 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GerardoGR/flask-boilerplate -https://github.com/GerardoGR/flask-boilerplate -Entry file: None -Scanned: 2016-10-19 13:48:38.808715 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/GerardoGR/flask-boilerplate. - -edouardswiac/linkstash-flask -https://github.com/edouardswiac/linkstash-flask -Entry file: linkstash-flask/app.py -Scanned: 2016-10-19 13:48:40.323815 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mies/flask-heroku -https://github.com/mies/flask-heroku -Entry file: flask-heroku/main.py -Scanned: 2016-10-19 13:48:41.616514 -No vulnerabilities found. - - -mattolsen1/flask_tumblelog -https://github.com/mattolsen1/flask_tumblelog -Entry file: flask_tumblelog/tumblelog/__init__.py -Scanned: 2016-10-19 13:48:44.049108 -No vulnerabilities found. - - -hoest/flask-bardienst -https://github.com/hoest/flask-bardienst -Entry file: flask-bardienst/bardienst/__init__.py -Scanned: 2016-10-19 13:48:45.847165 -No vulnerabilities found. - - -eudaimonious/HangmanWebsite -https://github.com/eudaimonious/HangmanWebsite -Entry file: HangmanWebsite/application_hangman.py -Scanned: 2016-10-19 13:48:46.514309 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bracken1983/flaskBlogDemo -https://github.com/bracken1983/flaskBlogDemo -Entry file: flaskBlogDemo/flask-sqlalchemy-test.py -Scanned: 2016-10-19 13:48:47.161870 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaseemkp/flask-students-app -https://github.com/jaseemkp/flask-students-app -Entry file: flask-students-app/students.py -Scanned: 2016-10-19 13:48:47.685775 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pinchsoft/flask-newrelic-dotcloud -https://github.com/pinchsoft/flask-newrelic-dotcloud -Entry file: flask-newrelic-dotcloud/app.py -Scanned: 2016-10-19 13:48:49.967110 -No vulnerabilities found. - - -PurplePilot/zanzeeba -https://github.com/PurplePilot/zanzeeba -Entry file: zanzeeba/appstd.py -Scanned: 2016-10-19 13:48:50.543991 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hit9/flask-sign-in-with-github.py -https://github.com/hit9/flask-sign-in-with-github.py -Entry file: None -Scanned: 2016-10-19 13:48:54.060972 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bscarlett/personal-site -https://github.com/bscarlett/personal-site -Entry file: personal-site/PersonalSite/__init__.py -Scanned: 2016-10-19 13:49:00.106111 -No vulnerabilities found. - - -cypx/trocr -https://github.com/cypx/trocr -Entry file: trocr/trocr.py -Scanned: 2016-10-19 13:49:03.430175 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ungarst/p4p_svr -https://github.com/ungarst/p4p_svr -Entry file: p4p_svr/server/__init__.py -Scanned: 2016-10-19 13:49:07.013357 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -koordinates/py-pubtkt -https://github.com/koordinates/py-pubtkt -Entry file: py-pubtkt/app.py -Scanned: 2016-10-19 13:49:08.418134 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jawr/flask-contact -https://github.com/jawr/flask-contact -Entry file: flask-contact/main.py -Scanned: 2016-10-19 13:49:22.104780 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wbolster/flask-uuid -https://github.com/wbolster/flask-uuid -Entry file: flask-uuid/test_flask_uuid.py -Scanned: 2016-10-19 13:49:25.430908 -No vulnerabilities found. - - -pyr/url-shortener -https://github.com/pyr/url-shortener -Entry file: url-shortener/url_shortener.py -Scanned: 2016-10-19 13:49:27.961872 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vmi356/filemanager -https://github.com/vmi356/filemanager -Entry file: filemanager/manager.py -Scanned: 2016-10-19 13:49:29.512499 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stef/tlsauth -https://github.com/stef/tlsauth -Entry file: tlsauth/flask-demo/webapp.py -Scanned: 2016-10-19 13:49:33.935726 -No vulnerabilities found. - - -cratejoy/flask-experiment -https://github.com/cratejoy/flask-experiment -Entry file: flask-experiment/test/test.py -Scanned: 2016-10-19 13:49:35.453173 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -openfree/flaskr -https://github.com/openfree/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:49:36.971425 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulthrissur/Flask_app -https://github.com/rahulthrissur/Flask_app -Entry file: Flask_app/test.py -Scanned: 2016-10-19 13:49:40.021697 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jcerise/flask-photos -https://github.com/jcerise/flask-photos -Entry file: flask-photos/app.py -Scanned: 2016-10-19 13:49:42.463132 -No vulnerabilities found. - - -grimkeke/miniblog -https://github.com/grimkeke/miniblog -Entry file: miniblog/app/__init__.py -Scanned: 2016-10-19 13:49:45.622057 -No vulnerabilities found. - - -rasheedh/Paint-Using-Flask---Mongodb- -https://github.com/rasheedh/Paint-Using-Flask---Mongodb- -Entry file: None -Scanned: 2016-10-19 13:49:46.629111 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Paint-Using-Flask---Mongodb-. - -Pitxon/sivir -https://github.com/Pitxon/sivir -Entry file: sivir/app.py -Scanned: 2016-10-19 13:49:48.920683 -No vulnerabilities found. - - -sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB -https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB -Entry file: None -Scanned: 2016-10-19 13:49:50.202344 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB. - -ssidorenko/twisker -https://github.com/ssidorenko/twisker -Entry file: twisker/flask/sessions.py -Scanned: 2016-10-19 13:49:52.267090 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Gabriele91/rss-soap-server -https://github.com/Gabriele91/rss-soap-server -Entry file: rss-soap-server/app.py -Scanned: 2016-10-19 13:49:55.507890 -No vulnerabilities found. - - -einashaddad/follow_app -https://github.com/einashaddad/follow_app -Entry file: follow_app/web_button.py -Scanned: 2016-10-19 13:49:58.020109 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cypx/trocr -https://github.com/cypx/trocr -Entry file: trocr/trocr.py -Scanned: 2016-10-19 13:49:58.538633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -haizaar/microtweet -https://github.com/haizaar/microtweet -Entry file: microtweet/server.py -Scanned: 2016-10-19 13:49:59.847667 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jawr/flask-contact -https://github.com/jawr/flask-contact -Entry file: flask-contact/main.py -Scanned: 2016-10-19 13:50:02.265688 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulkmr/flask-bigapp-template -https://github.com/rahulkmr/flask-bigapp-template -Entry file: flask-bigapp-template/main.py -Scanned: 2016-10-19 13:50:03.797547 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stef/flask-tlsauth -https://github.com/stef/flask-tlsauth -Entry file: flask-tlsauth/demo/webapp.py -Scanned: 2016-10-19 13:50:06.208210 -No vulnerabilities found. - - -kennethreitz/elephant -https://github.com/kennethreitz/elephant -Entry file: elephant/elephant.py -Scanned: 2016-10-19 13:50:08.741788 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stef/tlsauth -https://github.com/stef/tlsauth -Entry file: tlsauth/flask-demo/webapp.py -Scanned: 2016-10-19 13:50:22.785493 -No vulnerabilities found. - - -topherjaynes/flasktut -https://github.com/topherjaynes/flasktut -Entry file: flasktut/app/__init__.py -Scanned: 2016-10-19 13:50:24.440734 -No vulnerabilities found. - - -elboby/flask-config-override -https://github.com/elboby/flask-config-override -Entry file: flask-config-override/tests/basic_flask_test.py -Scanned: 2016-10-19 13:50:25.969286 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sherzberg/flask-native-package -https://github.com/sherzberg/flask-native-package -Entry file: flask-native-package/application.py -Scanned: 2016-10-19 13:50:30.661515 -No vulnerabilities found. - - -xrefor/flask_tut -https://github.com/xrefor/flask_tut -Entry file: flask_tut/flaskr.py -Scanned: 2016-10-19 13:50:32.443266 -No vulnerabilities found. - - -McrCoderDojo/Flask-Webapps -https://github.com/McrCoderDojo/Flask-Webapps -Entry file: Flask-Webapps/flask1.py -Scanned: 2016-10-19 13:50:33.029282 -No vulnerabilities found. - - -xrefor/flask_stuff -https://github.com/xrefor/flask_stuff -Entry file: flask_stuff/main.py -Scanned: 2016-10-19 13:50:34.323185 -No vulnerabilities found. - - -akbarovs/flask-sandbox -https://github.com/akbarovs/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-19 13:50:34.841464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adesst/flask-blog -https://github.com/adesst/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 13:50:37.399946 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -gourneau/anode -https://github.com/gourneau/anode -Entry file: anode/app.py -Scanned: 2016-10-19 13:50:41.911090 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mmahnken/Flask_to_do_list -https://github.com/mmahnken/Flask_to_do_list -Entry file: Flask_to_do_list/tipsy.py -Scanned: 2016-10-19 13:50:43.434432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabeesh/Paintapp-Javascript-Canvas-Flask -https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask -Entry file: Paintapp-Javascript-Canvas-Flask/test.py -Scanned: 2016-10-19 13:50:45.797445 -Vulnerability 1: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 34, trigger word "form[": - imgname = request.form['imagename'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 16: imgname = (imagename) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 23: imgname = row[0] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 19, trigger word "execute(": - cur.execute('SELECT * FROM Image WHERE imgname=?', imgname) - -Vulnerability 2: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 35, trigger word "form[": - imgdata = request.form['string'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 24: imgdata = row[1] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 28: ret_MAYBE_FUNCTION_NAME = resp - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 46: ret_MAYBE_FUNCTION_NAME = resp -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata) - -Vulnerability 3: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 34, trigger word "form[": - imgname = request.form['imagename'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 16: imgname = (imagename) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 23: imgname = row[0] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 42, trigger word "execute(": - cur.execute('INSERT INTO Image VALUES(?, ?)', data) - -Vulnerability 4: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 35, trigger word "form[": - imgdata = request.form['string'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 24: imgdata = row[1] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 28: ret_MAYBE_FUNCTION_NAME = resp - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 46: ret_MAYBE_FUNCTION_NAME = resp -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 42, trigger word "execute(": - cur.execute('INSERT INTO Image VALUES(?, ?)', data) - - - -godber/flask-mobile-switch -https://github.com/godber/flask-mobile-switch -Entry file: flask-mobile-switch/missionops/missionops/__init__.py -Scanned: 2016-10-19 13:50:47.313707 -Vulnerability 1: -File: flask-mobile-switch/missionops/missionops/views.py - > User input at line 29, trigger word "form[": - title = config_form['title'] -Reassigned in: - File: flask-mobile-switch/missionops/missionops/views.py - > Line 33: config_title.value = title - File: flask-mobile-switch/missionops/missionops/views.py - > Line 43: title = title.value - File: flask-mobile-switch/missionops/missionops/views.py - > Line 45: title = 'Mission Ops' -File: flask-mobile-switch/missionops/missionops/views.py - > reaches line 41, trigger word "filter(": - title = Config.query.filter(Config.key == 'title').first() - -Vulnerability 2: -File: flask-mobile-switch/missionops/missionops/views.py - > User input at line 30, trigger word "form[": - image_url = config_form['url'] -Reassigned in: - File: flask-mobile-switch/missionops/missionops/views.py - > Line 37: config_url.value = image_url - File: flask-mobile-switch/missionops/missionops/views.py - > Line 49: image_url = image_url.value - File: flask-mobile-switch/missionops/missionops/views.py - > Line 51: image_url = '../static/Mars.jpg' - File: flask-mobile-switch/missionops/missionops/views.py - > Line 52: ysize = image_size(image_url) - File: flask-mobile-switch/missionops/missionops/views.py - > Line 24: ysize = 0 -File: flask-mobile-switch/missionops/missionops/views.py - > reaches line 47, trigger word "filter(": - image_url = Config.query.filter(Config.key == 'url').first() - -Vulnerability 3: -File: flask-mobile-switch/missionops/missionops/views.py - > User input at line 29, trigger word "form[": - title = config_form['title'] -Reassigned in: - File: flask-mobile-switch/missionops/missionops/views.py - > Line 33: config_title.value = title - File: flask-mobile-switch/missionops/missionops/views.py - > Line 43: title = title.value - File: flask-mobile-switch/missionops/missionops/views.py - > Line 45: title = 'Mission Ops' -File: flask-mobile-switch/missionops/missionops/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('app.html',switch=switch, title=title, image_url=image_url, ysize=ysize) - -Vulnerability 4: -File: flask-mobile-switch/missionops/missionops/views.py - > User input at line 30, trigger word "form[": - image_url = config_form['url'] -Reassigned in: - File: flask-mobile-switch/missionops/missionops/views.py - > Line 37: config_url.value = image_url - File: flask-mobile-switch/missionops/missionops/views.py - > Line 49: image_url = image_url.value - File: flask-mobile-switch/missionops/missionops/views.py - > Line 51: image_url = '../static/Mars.jpg' - File: flask-mobile-switch/missionops/missionops/views.py - > Line 52: ysize = image_size(image_url) - File: flask-mobile-switch/missionops/missionops/views.py - > Line 24: ysize = 0 -File: flask-mobile-switch/missionops/missionops/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('app.html',switch=switch, title=title, image_url=image_url, ysize=ysize) - - - -naveenpremchand02/paintapp-using-Flask -https://github.com/naveenpremchand02/paintapp-using-Flask -Entry file: None -Scanned: 2016-10-19 13:50:47.840129 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/naveenpremchand02/paintapp-using-Flask. - -orkunozbek/deploy_test -https://github.com/orkunozbek/deploy_test -Entry file: deploy_test/app_pack/__init__.py -Scanned: 2016-10-19 13:50:49.164516 -No vulnerabilities found. - - -y2bishop2y/microengine -https://github.com/y2bishop2y/microengine -Entry file: microengine/lib/flask_sqlalchemy.py -Scanned: 2016-10-19 13:50:49.867283 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB -https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB -Entry file: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py -Scanned: 2016-10-19 13:50:52.675859 -Vulnerability 1: -File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > User input at line 34, trigger word "form[": - imgdata = request.form['string'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 22: imgdata = row['imgdata'] - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 27: ret_MAYBE_FUNCTION_NAME = resp - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 38: ret_MAYBE_FUNCTION_NAME = resp -File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > reaches line 24, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata) - - - -popeliao/FlavorPlusServer -https://github.com/popeliao/FlavorPlusServer -Entry file: FlavorPlusServer/app.py -Scanned: 2016-10-19 13:50:54.967548 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tatertot/tipsy -https://github.com/tatertot/tipsy -Entry file: tipsy/tipsy.py -Scanned: 2016-10-19 13:50:58.505655 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ssidorenko/twisker -https://github.com/ssidorenko/twisker -Entry file: twisker/flask/sessions.py -Scanned: 2016-10-19 13:51:00.025173 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -soniacs/mockup-boot -https://github.com/soniacs/mockup-boot -Entry file: mockup-boot/build.py -Scanned: 2016-10-19 13:51:01.424871 -Vulnerability 1: -File: mockup-boot/build.py - > User input at line 33, trigger word "get(": - template = page.meta.get('template', 'page.html') -File: mockup-boot/build.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,page=page) - - - -Liquix/microblog -https://github.com/Liquix/microblog -Entry file: None -Scanned: 2016-10-19 13:51:01.967758 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mvader/Quickflask -https://github.com/mvader/Quickflask -Entry file: Quickflask/quickflask/app.py -Scanned: 2016-10-19 13:51:04.480041 -No vulnerabilities found. - - -einashaddad/follow_app -https://github.com/einashaddad/follow_app -Entry file: follow_app/web_button.py -Scanned: 2016-10-19 13:51:05.018900 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joepetrini/dayuntil -https://github.com/joepetrini/dayuntil -Entry file: dayuntil/app/__init__.py -Scanned: 2016-10-19 13:51:08.011199 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dnet/wsfacade -https://github.com/dnet/wsfacade -Entry file: wsfacade/wsfacade.py -Scanned: 2016-10-19 13:51:11.476275 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -croach/cheap-and-scalable-websites-code -https://github.com/croach/cheap-and-scalable-websites-code -Entry file: cheap-and-scalable-websites-code/generator.py -Scanned: 2016-10-19 13:51:12.893190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kylemarsh/recipelister -https://github.com/kylemarsh/recipelister -Entry file: recipelister/recipelister/__init__.py -Scanned: 2016-10-19 13:51:24.447478 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jimpurbrick/hackinabox -https://github.com/jimpurbrick/hackinabox -Entry file: hackinabox/app.py -Scanned: 2016-10-19 13:51:25.852806 -No vulnerabilities found. - - -thegeekchick/converter -https://github.com/thegeekchick/converter -Entry file: None -Scanned: 2016-10-19 13:51:30.313947 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -angstwad/linky -https://github.com/angstwad/linky -Entry file: linky/linky/__init__.py -Scanned: 2016-10-19 13:51:32.757278 -No vulnerabilities found. - - -pysgf/GeoPhotoPy -https://github.com/pysgf/GeoPhotoPy -Entry file: GeoPhotoPy/GeoPhotoPy/__init__.py -Scanned: 2016-10-19 13:51:45.236604 -No vulnerabilities found. - - -GradySimon/RoommateDishes -https://github.com/GradySimon/RoommateDishes -Entry file: RoommateDishes/dishes.py -Scanned: 2016-10-19 13:51:46.600600 -No vulnerabilities found. - - -the-gigi/cloud_state -https://github.com/the-gigi/cloud_state -Entry file: cloud_state/CloudState.py -Scanned: 2016-10-19 13:51:48.010406 -No vulnerabilities found. - - -xiyoulaoyuanjia/flaskapp -https://github.com/xiyoulaoyuanjia/flaskapp -Entry file: None -Scanned: 2016-10-19 13:51:49.421844 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiyoulaoyuanjia/flaskapp. - -trustrachel/Flask-FeatureFlags -https://github.com/trustrachel/Flask-FeatureFlags -Entry file: Flask-FeatureFlags/tests/fixtures.py -Scanned: 2016-10-19 13:51:50.072425 -Vulnerability 1: -File: Flask-FeatureFlags/tests/test_core_function.py - > User input at line 55, trigger word "get(": - response = self.test_client.get(url) -File: Flask-FeatureFlags/tests/test_core_function.py - > reaches line 57, trigger word "url_for(": - response.location == url_for('redirect_destination',_external=True) - -Vulnerability 2: -File: Flask-FeatureFlags/tests/test_core_function.py - > User input at line 66, trigger word "get(": - response = self.test_client.get(url) -File: Flask-FeatureFlags/tests/test_core_function.py - > reaches line 68, trigger word "url_for(": - response.location == url_for('redirect_destination',_external=True) - - - -aahluwal/flask -https://github.com/aahluwal/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:51:50.678908 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -kennethreitz/elephant -https://github.com/kennethreitz/elephant -Entry file: elephant/elephant.py -Scanned: 2016-10-19 13:51:51.183552 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -clef/sample-flask -https://github.com/clef/sample-flask -Entry file: sample-flask/app.py -Scanned: 2016-10-19 13:51:52.590861 -No vulnerabilities found. - - -simonvc/rover-wasd-server -https://github.com/simonvc/rover-wasd-server -Entry file: rover-wasd-server/wasd_server.py -Scanned: 2016-10-19 13:51:55.038722 -No vulnerabilities found. - - -jonascj/flaskr -https://github.com/jonascj/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:51:55.557774 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thinboy92/flasktuts -https://github.com/thinboy92/flasktuts -Entry file: flasktuts/app/__init__.py -Scanned: 2016-10-19 13:51:57.048363 -No vulnerabilities found. - - -guilhermecomum/FlaskTutorial -https://github.com/guilhermecomum/FlaskTutorial -Entry file: None -Scanned: 2016-10-19 13:51:57.582960 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -landakram/squeak -https://github.com/landakram/squeak -Entry file: squeak/app.py -Scanned: 2016-10-19 13:51:59.605561 -Vulnerability 1: -File: squeak/app.py - > User input at line 73, trigger word "form[": - search_term = request.form['term'] -Reassigned in: - File: squeak/app.py - > Line 76: data = 'term''location'search_termlocation - File: squeak/app.py - > Line 80: query_string = urllib.urlencode(data) - File: squeak/app.py - > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string) - File: squeak/app.py - > Line 82: signed_url = sign_url(https://github.com/api_url) - File: squeak/app.py - > Line 83: response = requests.get(signed_url) - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - -Vulnerability 2: -File: squeak/app.py - > User input at line 74, trigger word "form[": - location = request.form['location'] -Reassigned in: - File: squeak/app.py - > Line 76: data = 'term''location'search_termlocation - File: squeak/app.py - > Line 80: query_string = urllib.urlencode(data) - File: squeak/app.py - > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string) - File: squeak/app.py - > Line 82: signed_url = sign_url(https://github.com/api_url) - File: squeak/app.py - > Line 83: response = requests.get(signed_url) - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - -Vulnerability 3: -File: squeak/app.py - > User input at line 83, trigger word "get(": - response = requests.get(signed_url) -Reassigned in: - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - - - -xjdrew/flask-demo -https://github.com/xjdrew/flask-demo -Entry file: None -Scanned: 2016-10-19 13:52:00.124579 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xjdrew/flask-demo. - -aerialdomo/flask_microblog -https://github.com/aerialdomo/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-19 13:52:00.661282 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akbarovs/flask-sandbox -https://github.com/akbarovs/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-19 13:52:01.161742 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jinzhangg/flask-helloworld -https://github.com/jinzhangg/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-19 13:52:04.076069 -No vulnerabilities found. - - -hardez/Flask-Skeleton -https://github.com/hardez/Flask-Skeleton -Entry file: None -Scanned: 2016-10-19 13:52:06.093759 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hardez/Flask-Skeleton. - -stfy86/pruebitasFlask -https://github.com/stfy86/pruebitasFlask -Entry file: pruebitasFlask/practica4/src/app/__init__.py -Scanned: 2016-10-19 13:52:08.743477 -No vulnerabilities found. - - -kracekumar/test-flask -https://github.com/kracekumar/test-flask -Entry file: test-flask/app.py -Scanned: 2016-10-19 13:52:13.365172 -No vulnerabilities found. - - -charliecrissman/microblog -https://github.com/charliecrissman/microblog -Entry file: None -Scanned: 2016-10-19 13:52:13.875991 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -abulte/Flask-Bootstrap-Fanstatic -https://github.com/abulte/Flask-Bootstrap-Fanstatic -Entry file: Flask-Bootstrap-Fanstatic/application/__init__.py -Scanned: 2016-10-19 13:52:26.331519 -No vulnerabilities found. - - -jennyferpinto/Flask_Part_1 -https://github.com/jennyferpinto/Flask_Part_1 -Entry file: Flask_Part_1/tipsy.py -Scanned: 2016-10-19 13:52:26.874293 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elboby/flask-test-template -https://github.com/elboby/flask-test-template -Entry file: None -Scanned: 2016-10-19 13:52:34.376547 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/elboby/flask-test-template. - -isms/flask-phonebank-dashboard -https://github.com/isms/flask-phonebank-dashboard -Entry file: flask-phonebank-dashboard/app.py -Scanned: 2016-10-19 13:52:46.922071 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -jpanganiban/flask-heroku-kickstart -https://github.com/jpanganiban/flask-heroku-kickstart -Entry file: None -Scanned: 2016-10-19 13:52:48.434988 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jpanganiban/flask-heroku-kickstart. - -justinxreese/ajax-calculator-flask -https://github.com/justinxreese/ajax-calculator-flask -Entry file: None -Scanned: 2016-10-19 13:52:49.978865 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chrismeono1022/movie-ratings -https://github.com/chrismeono1022/movie-ratings -Entry file: movie-ratings/judgement.py -Scanned: 2016-10-19 13:52:50.510242 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -soniacs/cabinet -https://github.com/soniacs/cabinet -Entry file: cabinet/app/__init__.py -Scanned: 2016-10-19 13:52:52.118600 -Vulnerability 1: -File: cabinet/app/views/clients.py - > User input at line 18, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: cabinet/app/views/clients.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('clients/view.html',title=client.name, client=client, projects=projects, invoices=invoices) - -Vulnerability 2: -File: cabinet/app/views/clients.py - > User input at line 33, trigger word "form[": - client = Client(name=request.form['name'], company=request.form['company'], website=request.form['website'], twitter=request.form['twitter'], email=request.form['email'], telephone=request.form['telephone'], skype=request.form['skype'], street=request.form['street'], street_2=request.form['street_2'], city=request.form['city'], state=request.form['state'], postcode=request.form['postcode'], country=request.form['country'], notes=request.form['notes']) -File: cabinet/app/views/clients.py - > reaches line 50, trigger word "flash(": - flash('Client '%s' was added.' % client.name) - -Vulnerability 3: -File: cabinet/app/views/clients.py - > User input at line 60, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 84: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 78, trigger word "flash(": - flash('Client '%s' has been updated.' % client.name) - -Vulnerability 4: -File: cabinet/app/views/clients.py - > User input at line 60, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 84: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 80, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('clients/edit.html',title='Edit %s' % client.name, client=client) - -Vulnerability 5: -File: cabinet/app/views/clients.py - > User input at line 89, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 93, trigger word "flash(": - flash('Client '%s' has been deleted.' % client.name) - -Vulnerability 6: -File: cabinet/app/views/clients.py - > User input at line 89, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 95, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('clients/delete.html',title='Delete %s' % client.name, client=client) - -Vulnerability 7: -File: cabinet/app/views/invoices.py - > User input at line 18, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: cabinet/app/views/invoices.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('invoices/view.html',title=invoice.name, invoice=invoice) - -Vulnerability 8: -File: cabinet/app/views/invoices.py - > User input at line 31, trigger word "get(": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 9: -File: cabinet/app/views/invoices.py - > User input at line 31, trigger word "form[": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 10: -File: cabinet/app/views/invoices.py - > User input at line 32, trigger word "get(": - project = Project.query.get(request.form['project']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 11: -File: cabinet/app/views/invoices.py - > User input at line 32, trigger word "form[": - project = Project.query.get(request.form['project']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 12: -File: cabinet/app/views/invoices.py - > User input at line 33, trigger word "form[": - invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 13: -File: cabinet/app/views/invoices.py - > User input at line 59, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 78, trigger word "flash(": - flash('Invoice '%s' has been updated.' % invoice.name) - -Vulnerability 14: -File: cabinet/app/views/invoices.py - > User input at line 59, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 80, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('invoices/edit.html',title='Edit Invoice %s' % invoice.name, invoice=invoice, clients=clients, projects=projects) - -Vulnerability 15: -File: cabinet/app/views/invoices.py - > User input at line 91, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 95, trigger word "flash(": - flash('Invoice '%s' has been deleted.' % invoice.name) - -Vulnerability 16: -File: cabinet/app/views/invoices.py - > User input at line 91, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 97, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('invoices/delete.html',title='Delete Invoice %s' % invoice.name, invoice=invoice) - -Vulnerability 17: -File: cabinet/app/views/projects.py - > User input at line 18, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: cabinet/app/views/projects.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('projects/view.html',title=project.name, project=project) - -Vulnerability 18: -File: cabinet/app/views/projects.py - > User input at line 30, trigger word "get(": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 19: -File: cabinet/app/views/projects.py - > User input at line 30, trigger word "form[": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 20: -File: cabinet/app/views/projects.py - > User input at line 31, trigger word "form[": - project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 21: -File: cabinet/app/views/projects.py - > User input at line 54, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 76: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 69, trigger word "flash(": - flash('Project '%s' has been updated.' % project.name) - -Vulnerability 22: -File: cabinet/app/views/projects.py - > User input at line 54, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 76: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 71, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('projects/edit.html',title='Edit %s' % project.name, project=project, clients=clients) - -Vulnerability 23: -File: cabinet/app/views/projects.py - > User input at line 81, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 91: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 85, trigger word "flash(": - flash('Project '%s' has been deleted.' % project.name) - -Vulnerability 24: -File: cabinet/app/views/projects.py - > User input at line 81, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 91: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 87, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('projects/delete.html',title='Delete %s' % project.name, project=project) - - - -MattStockton/manpage -https://github.com/MattStockton/manpage -Entry file: manpage/app.py -Scanned: 2016-10-19 13:52:52.659943 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qzio/tododis -https://github.com/qzio/tododis -Entry file: tododis/app.py -Scanned: 2016-10-19 13:52:53.184484 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ternup/caddisfly-heroku -https://github.com/ternup/caddisfly-heroku -Entry file: caddisfly-heroku/app.py -Scanned: 2016-10-19 13:52:53.699023 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB -https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB -Entry file: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py -Scanned: 2016-10-19 13:52:55.523342 -Vulnerability 1: -File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > User input at line 34, trigger word "form[": - imgdata = request.form['string'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 22: imgdata = row['imgdata'] - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 27: ret_MAYBE_FUNCTION_NAME = resp - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 38: ret_MAYBE_FUNCTION_NAME = resp -File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > reaches line 24, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata) - - - -mmahnken/Flask-To-Do-List-with-updates- -https://github.com/mmahnken/Flask-To-Do-List-with-updates- -Entry file: Flask-To-Do-List-with-updates-/tipsy.py -Scanned: 2016-10-19 13:52:57.940094 -No vulnerabilities found. - - -samgclarke/sms_sender -https://github.com/samgclarke/sms_sender -Entry file: sms_sender/application.py -Scanned: 2016-10-19 13:52:59.252961 -No vulnerabilities found. - - -Liquix/microblog -https://github.com/Liquix/microblog -Entry file: None -Scanned: 2016-10-19 13:52:59.763668 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -deegill/tipsytasklist -https://github.com/deegill/tipsytasklist -Entry file: tipsytasklist/tipsy.py -Scanned: 2016-10-19 13:53:01.280883 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dnet/wsfacade -https://github.com/dnet/wsfacade -Entry file: wsfacade/wsfacade.py -Scanned: 2016-10-19 13:53:01.785095 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mdjhny/OilPainter -https://github.com/mdjhny/OilPainter -Entry file: OilPainter/app/app.py -Scanned: 2016-10-19 13:53:03.513263 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yeradis/sizing -https://github.com/yeradis/sizing -Entry file: sizing/sizing.py -Scanned: 2016-10-19 13:53:04.781924 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattupstate/flask-social -https://github.com/mattupstate/flask-social -Entry file: flask-social/app.py -Scanned: 2016-10-19 13:53:06.137570 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattupstate/flask-jsonschema -https://github.com/mattupstate/flask-jsonschema -Entry file: flask-jsonschema/tests.py -Scanned: 2016-10-19 13:53:07.419243 -No vulnerabilities found. - - -whtsky/Flask-WeRoBot -https://github.com/whtsky/Flask-WeRoBot -Entry file: Flask-WeRoBot/flask_werobot.py -Scanned: 2016-10-19 13:53:08.841032 -No vulnerabilities found. - - -OpenTechSchool/python-flask-code -https://github.com/OpenTechSchool/python-flask-code -Entry file: python-flask-code/core/files-templates/catseverywhere.py -Scanned: 2016-10-19 13:53:10.145631 -No vulnerabilities found. - - -rollbar/rollbar-flask-example -https://github.com/rollbar/rollbar-flask-example -Entry file: rollbar-flask-example/hello.py -Scanned: 2016-10-19 13:53:10.674949 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lqez/flasky -https://github.com/lqez/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-19 13:53:14.183824 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Jd007/flask-rest -https://github.com/Jd007/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-19 13:53:15.687609 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simonvc/rover-wasd-server -https://github.com/simonvc/rover-wasd-server -Entry file: rover-wasd-server/wasd_server.py -Scanned: 2016-10-19 13:53:28.656567 -No vulnerabilities found. - - -aerialdomo/flaskblog -https://github.com/aerialdomo/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-19 13:53:29.692614 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -microamp/flaskel -https://github.com/microamp/flaskel -Entry file: flaskel/flaskel.py -Scanned: 2016-10-19 13:53:33.219465 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -pinoytech/flaskapp -https://github.com/pinoytech/flaskapp -Entry file: None -Scanned: 2016-10-19 13:53:35.727032 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pinoytech/flaskapp. - -aahluwal/flaskagain -https://github.com/aahluwal/flaskagain -Entry file: flaskagain/judgement.py -Scanned: 2016-10-19 13:53:48.365473 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskagain/renv/lib/python2.7/genericpath.py - -landakram/squeak -https://github.com/landakram/squeak -Entry file: squeak/app.py -Scanned: 2016-10-19 13:53:50.899579 -Vulnerability 1: -File: squeak/app.py - > User input at line 73, trigger word "form[": - search_term = request.form['term'] -Reassigned in: - File: squeak/app.py - > Line 76: data = 'term''location'search_termlocation - File: squeak/app.py - > Line 80: query_string = urllib.urlencode(data) - File: squeak/app.py - > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string) - File: squeak/app.py - > Line 82: signed_url = sign_url(https://github.com/api_url) - File: squeak/app.py - > Line 83: response = requests.get(signed_url) - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - -Vulnerability 2: -File: squeak/app.py - > User input at line 74, trigger word "form[": - location = request.form['location'] -Reassigned in: - File: squeak/app.py - > Line 76: data = 'term''location'search_termlocation - File: squeak/app.py - > Line 80: query_string = urllib.urlencode(data) - File: squeak/app.py - > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string) - File: squeak/app.py - > Line 82: signed_url = sign_url(https://github.com/api_url) - File: squeak/app.py - > Line 83: response = requests.get(signed_url) - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - -Vulnerability 3: -File: squeak/app.py - > User input at line 83, trigger word "get(": - response = requests.get(signed_url) -Reassigned in: - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - - - -y2bishop2y/vagrant.flask -https://github.com/y2bishop2y/vagrant.flask -Entry file: None -Scanned: 2016-10-19 13:53:51.905156 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -markchadwick/flask-empty -https://github.com/markchadwick/flask-empty -Entry file: flask-empty/main.py -Scanned: 2016-10-19 13:53:53.209731 -No vulnerabilities found. - - -Hardtack/Flask-Router -https://github.com/Hardtack/Flask-Router -Entry file: Flask-Router/flask_router/tests.py -Scanned: 2016-10-19 13:53:54.521979 -No vulnerabilities found. - - -mwmeyer/minimal-flask-socketserver -https://github.com/mwmeyer/minimal-flask-socketserver -Entry file: minimal-flask-socketserver/flash_socket.py -Scanned: 2016-10-19 13:53:56.016308 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elboby/flask-test-template -https://github.com/elboby/flask-test-template -Entry file: None -Scanned: 2016-10-19 13:53:56.545865 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/elboby/flask-test-template. - -ndrwdn/flat_flask_layout -https://github.com/ndrwdn/flat_flask_layout -Entry file: flat_flask_layout/sitebuilder.py -Scanned: 2016-10-19 13:53:58.959433 -No vulnerabilities found. - - -chrismeono1022/movie-ratings -https://github.com/chrismeono1022/movie-ratings -Entry file: movie-ratings/judgement.py -Scanned: 2016-10-19 13:53:59.475971 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -emi1337/movie_rater -https://github.com/emi1337/movie_rater -Entry file: movie_rater/judgement.py -Scanned: 2016-10-19 13:54:01.246871 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ternup/caddisfly-heroku -https://github.com/ternup/caddisfly-heroku -Entry file: caddisfly-heroku/app.py -Scanned: 2016-10-19 13:54:01.755274 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thrisp/flacro -https://github.com/thrisp/flacro -Entry file: flacro/tests/conftest.py -Scanned: 2016-10-19 13:54:04.282535 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -aksiksi/aflam -https://github.com/aksiksi/aflam -Entry file: aflam/views.py -Scanned: 2016-10-19 13:54:05.710046 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samgclarke/sms_sender -https://github.com/samgclarke/sms_sender -Entry file: sms_sender/application.py -Scanned: 2016-10-19 13:54:06.994657 -No vulnerabilities found. - - -kjudd/ratings_app -https://github.com/kjudd/ratings_app -Entry file: ratings_app/judgement.py -Scanned: 2016-10-19 13:54:10.701895 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: ratings_app/env/lib/python2.7/genericpath.py - -Max00355/FileUpload -https://github.com/Max00355/FileUpload -Entry file: FileUpload/main.py -Scanned: 2016-10-19 13:54:11.986723 -No vulnerabilities found. - - -joel-briggs/microblog -https://github.com/joel-briggs/microblog -Entry file: None -Scanned: 2016-10-19 13:54:12.497914 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gonewandering/TwitterLogin -https://github.com/gonewandering/TwitterLogin -Entry file: TwitterLogin/app.py -Scanned: 2016-10-19 13:54:13.793710 -No vulnerabilities found. - - -flebel/yt-redirector -https://github.com/flebel/yt-redirector -Entry file: yt-redirector/yt-redirector.py -Scanned: 2016-10-19 13:54:15.202837 -Vulnerability 1: -File: yt-redirector/yt-redirector.py - > User input at line 17, trigger word "get(": - video_id = requests.get(video_url).json()['items'][0]['id']['videoId'] -Reassigned in: - File: yt-redirector/yt-redirector.py - > Line 18: player_url = 'https://www.youtube.com/watch?v=%s' % (video_id) -File: yt-redirector/yt-redirector.py - > reaches line 19, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(player_url, 301) - - - -mattupstate/flask-jsonschema -https://github.com/mattupstate/flask-jsonschema -Entry file: flask-jsonschema/tests.py -Scanned: 2016-10-19 13:54:18.697226 -No vulnerabilities found. - - -mharrys/flask-blog -https://github.com/mharrys/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 13:54:28.317666 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -kienpham2000/airbrake-flask -https://github.com/kienpham2000/airbrake-flask -Entry file: airbrake-flask/setup.py -Scanned: 2016-10-19 13:54:30.839965 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -florapdx/My-Blog -https://github.com/florapdx/My-Blog -Entry file: My-Blog/sitebuilder.py -Scanned: 2016-10-19 13:54:38.153839 -No vulnerabilities found. - - -zeuxisoo/python-flask-social-oauth-facebook -https://github.com/zeuxisoo/python-flask-social-oauth-facebook -Entry file: None -Scanned: 2016-10-19 13:54:38.679559 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeuxisoo/python-flask-social-oauth-facebook. - -lpolepeddi/sightings -https://github.com/lpolepeddi/sightings -Entry file: sightings/routes.py -Scanned: 2016-10-19 13:55:00.557802 -No vulnerabilities found. - - -sholsapp/flask-skeleton -https://github.com/sholsapp/flask-skeleton -Entry file: None -Scanned: 2016-10-19 13:55:01.571864 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sholsapp/flask-skeleton. - -adatlabor/soa-demo -https://github.com/adatlabor/soa-demo -Entry file: soa-demo/service.py -Scanned: 2016-10-19 13:55:02.086386 -No vulnerabilities found. - - -speakingcode/pres-soa-flask-backbone -https://github.com/speakingcode/pres-soa-flask-backbone -Entry file: pres-soa-flask-backbone/notes.py -Scanned: 2016-10-19 13:55:04.327948 -No vulnerabilities found. - - -kirang89/flask-boiler -https://github.com/kirang89/flask-boiler -Entry file: None -Scanned: 2016-10-19 13:55:04.846721 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -microamp/flaskel -https://github.com/microamp/flaskel -Entry file: flaskel/flaskel.py -Scanned: 2016-10-19 13:55:05.845741 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -a2lin/flaskapp -https://github.com/a2lin/flaskapp -Entry file: None -Scanned: 2016-10-19 13:55:06.363503 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/a2lin/flaskapp. - -MrFichter/flask1 -https://github.com/MrFichter/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-19 13:55:07.055223 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -Bob-Thomas/webshopFlask -https://github.com/Bob-Thomas/webshopFlask -Entry file: webshopFlask/webshop.py -Scanned: 2016-10-19 13:55:07.691797 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smdmustaffa/PythonFlask -https://github.com/smdmustaffa/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-19 13:55:13.664632 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -bogavante/mitsuhiko-flask -https://github.com/bogavante/mitsuhiko-flask -Entry file: mitsuhiko-flask/setup.py -Scanned: 2016-10-19 13:55:14.223238 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stephanienkram/Flask-Log-Tracker -https://github.com/stephanienkram/Flask-Log-Tracker -Entry file: Flask-Log-Tracker/main.py -Scanned: 2016-10-19 13:55:15.944929 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dylanvee/flask-hello-world -https://github.com/dylanvee/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 13:55:16.499423 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ndrwdn/flat_flask_layout -https://github.com/ndrwdn/flat_flask_layout -Entry file: flat_flask_layout/sitebuilder.py -Scanned: 2016-10-19 13:55:17.832166 -No vulnerabilities found. - - -akshar-raaj/flaks -https://github.com/akshar-raaj/flaks -Entry file: flaks/hello.py -Scanned: 2016-10-19 13:55:19.145022 -No vulnerabilities found. - - -ajith-herga/searchflask -https://github.com/ajith-herga/searchflask -Entry file: searchflask/new_world.py -Scanned: 2016-10-19 13:55:19.692232 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -willmcmain/blag -https://github.com/willmcmain/blag -Entry file: blag/blag/__init__.py -Scanned: 2016-10-19 13:55:21.006778 -No vulnerabilities found. - - -mihneasim/iphy -https://github.com/mihneasim/iphy -Entry file: None -Scanned: 2016-10-19 13:55:22.437933 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mihneasim/iphy. - -dnajd/pyrest -https://github.com/dnajd/pyrest -Entry file: pyrest/src/main/rest_test.py -Scanned: 2016-10-19 13:55:23.856434 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MinnPost/jsonproxy -https://github.com/MinnPost/jsonproxy -Entry file: jsonproxy/app.py -Scanned: 2016-10-19 13:55:25.163581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BigBlueHat/recshackday -https://github.com/BigBlueHat/recshackday -Entry file: recshackday/app.py -Scanned: 2016-10-19 13:55:30.826151 -No vulnerabilities found. - - -capellayee/remake -https://github.com/capellayee/remake -Entry file: remake/Flasktest/__init__.py -Scanned: 2016-10-19 13:55:33.186059 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -corydolphin/ifighthunger -https://github.com/corydolphin/ifighthunger -Entry file: ifighthunger/ifighthunger/__init__.py -Scanned: 2016-10-19 13:55:40.937612 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lxchavez/CSULB-Confessions -https://github.com/lxchavez/CSULB-Confessions -Entry file: CSULB-Confessions/confessions_app/__init__.py -Scanned: 2016-10-19 13:55:43.469342 -No vulnerabilities found. - - -zoowii/VerySimpleBlog -https://github.com/zoowii/VerySimpleBlog -Entry file: VerySimpleBlog/main.py -Scanned: 2016-10-19 13:55:44.791756 -No vulnerabilities found. - - -ashcrow/flask-track-usage -https://github.com/ashcrow/flask-track-usage -Entry file: flask-track-usage/test/__init__.py -Scanned: 2016-10-19 13:56:02.720043 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lepture/flask-shorturl -https://github.com/lepture/flask-shorturl -Entry file: flask-shorturl/test_shorturl.py -Scanned: 2016-10-19 13:56:04.198924 -No vulnerabilities found. - - -mharrys/flask-blog -https://github.com/mharrys/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-19 13:56:04.773267 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -btomashvili/flasb -https://github.com/btomashvili/flasb -Entry file: None -Scanned: 2016-10-19 13:56:06.782776 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/btomashvili/flasb. - -krushton/flask-api-example -https://github.com/krushton/flask-api-example -Entry file: flask-api-example/app.py -Scanned: 2016-10-19 13:56:08.213839 -No vulnerabilities found. - - -roshow/flasktutorial -https://github.com/roshow/flasktutorial -Entry file: None -Scanned: 2016-10-19 13:56:08.750514 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jph98/flaskdmg -https://github.com/jph98/flaskdmg -Entry file: flaskdmg/flaskexample.py -Scanned: 2016-10-19 13:56:10.041368 -No vulnerabilities found. - - -akshar-raaj/flaskr -https://github.com/akshar-raaj/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:56:10.554526 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -codergirl/flaskbabar -https://github.com/codergirl/flaskbabar -Entry file: flaskbabar/hello.py -Scanned: 2016-10-19 13:56:11.889462 -Vulnerability 1: -File: flaskbabar/hello.py - > User input at line 44, trigger word "get(": - new_user = BabarUser(request.args.get('username'), request.args.get('email')) -Reassigned in: - File: flaskbabar/hello.py - > Line 47: json = new_user.id'username''email'new_user.namenew_user.email -File: flaskbabar/hello.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 2: -File: flaskbabar/hello.py - > User input at line 61, trigger word "get(": - the_user = db.session.query(BabarUser).filter_by(id=request.args.get('user_id')).first() -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 3: -File: flaskbabar/hello.py - > User input at line 62, trigger word "get(": - task_name = request.args.get('name') -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 4: -File: flaskbabar/hello.py - > User input at line 63, trigger word "get(": - task_description = request.args.get('description') -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 5: -File: flaskbabar/hello.py - > User input at line 64, trigger word "get(": - dismissable = request.args.get('dismissable') -Reassigned in: - File: flaskbabar/hello.py - > Line 66: dismissable = True - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 6: -File: flaskbabar/hello.py - > User input at line 67, trigger word "get(": - due_date = request.args.get('due_date') -Reassigned in: - File: flaskbabar/hello.py - > Line 69: due_date = datetime.datetime.fromtimestamp(float(due_date)) - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - - - -rajendrakrp/GAE-Flask-OpenID -https://github.com/rajendrakrp/GAE-Flask-OpenID -Entry file: GAE-Flask-OpenID/flask/sessions.py -Scanned: 2016-10-19 13:56:12.496563 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Bob-Thomas/webshopFlask -https://github.com/Bob-Thomas/webshopFlask -Entry file: webshopFlask/webshop.py -Scanned: 2016-10-19 13:56:16.122572 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -haburibe/flask-myapps -https://github.com/haburibe/flask-myapps -Entry file: flask-myapps/todos/todos.py -Scanned: 2016-10-19 13:56:17.448365 -No vulnerabilities found. - - -mykolasmith/flask-leaderboard -https://github.com/mykolasmith/flask-leaderboard -Entry file: flask-leaderboard/leaderboard/__init__.py -Scanned: 2016-10-19 13:56:18.914232 -Vulnerability 1: -File: flask-leaderboard/leaderboard/endpoints/login.py - > User input at line 13, trigger word "form[": - user = User.query.filter(User.name == request.form['username']).first() -Reassigned in: - File: flask-leaderboard/leaderboard/endpoints/login.py - > Line 19: session['user_id'] = user.id -File: flask-leaderboard/leaderboard/endpoints/login.py - > reaches line 13, trigger word "filter(": - user = User.query.filter(User.name == request.form['username']).first() - - - -betobaz/app_flask -https://github.com/betobaz/app_flask -Entry file: app_flask/app/routes.py -Scanned: 2016-10-19 13:56:20.318326 -No vulnerabilities found. - - -elimgoodman/Personnel-Flask -https://github.com/elimgoodman/Personnel-Flask -Entry file: Personnel-Flask/app/__init__.py -Scanned: 2016-10-19 13:56:22.488197 -Vulnerability 1: -File: Personnel-Flask/app/users/views.py - > User input at line 68, trigger word "get(": - salt = app.config.get('PW_SALT') -Reassigned in: - File: Personnel-Flask/app/users/views.py - > Line 69: password_hash = bcrypt.hashpw(form.password.data, salt) - File: Personnel-Flask/app/users/views.py - > Line 71: clause = and_(User.email == form.email.data, User.password_hash == password_hash) -File: Personnel-Flask/app/users/views.py - > reaches line 74, trigger word "filter(": - user = User.query.filter(clause).one() - -Vulnerability 2: -File: Personnel-Flask/app/users/views.py - > User input at line 69, trigger word ".data": - password_hash = bcrypt.hashpw(form.password.data, salt) -Reassigned in: - File: Personnel-Flask/app/users/views.py - > Line 71: clause = and_(User.email == form.email.data, User.password_hash == password_hash) -File: Personnel-Flask/app/users/views.py - > reaches line 74, trigger word "filter(": - user = User.query.filter(clause).one() - -Vulnerability 3: -File: Personnel-Flask/app/users/views.py - > User input at line 71, trigger word ".data": - clause = and_(User.email == form.email.data, User.password_hash == password_hash) -File: Personnel-Flask/app/users/views.py - > reaches line 74, trigger word "filter(": - user = User.query.filter(clause).one() - - - -erikgrueter/flask_app -https://github.com/erikgrueter/flask_app -Entry file: None -Scanned: 2016-10-19 13:56:23.489814 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/erikgrueter/flask_app. - -Duelist/ianb-flask -https://github.com/Duelist/ianb-flask -Entry file: ianb-flask/ianb/__init__.py -Scanned: 2016-10-19 13:56:24.934721 -No vulnerabilities found. - - -stephanienkram/Flask-Money-Tracker -https://github.com/stephanienkram/Flask-Money-Tracker -Entry file: Flask-Money-Tracker/main.py -Scanned: 2016-10-19 13:56:26.047789 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cismet/sqlparse-flask-webservice -https://github.com/cismet/sqlparse-flask-webservice -Entry file: sqlparse-flask-webservice/sqlparse_webservice.py -Scanned: 2016-10-19 13:56:26.577072 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jonascj/flask_logger_test -https://github.com/jonascj/flask_logger_test -Entry file: flask_logger_test/flask_logger_test.py -Scanned: 2016-10-19 13:56:32.214509 -No vulnerabilities found. - - -luckypool/flask-blueprints-template -https://github.com/luckypool/flask-blueprints-template -Entry file: flask-blueprints-template/hello/__init__.py -Scanned: 2016-10-19 13:56:34.654314 -No vulnerabilities found. - - -dylanvee/flask-hello-world -https://github.com/dylanvee/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-19 13:56:35.210140 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -adamjmarkham/flask-micro-blog -https://github.com/adamjmarkham/flask-micro-blog -Entry file: flask-micro-blog/micro_blog_flask.py -Scanned: 2016-10-19 13:56:43.649954 -No vulnerabilities found. - - -chrismeono1022/microblog_flask_tutorial -https://github.com/chrismeono1022/microblog_flask_tutorial -Entry file: microblog_flask_tutorial/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 13:56:47.279084 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jsutterfield/flaskr-buildout -https://github.com/jsutterfield/flaskr-buildout -Entry file: flaskr-buildout/src/flaskr/flaskr.py -Scanned: 2016-10-19 13:56:54.890901 -No vulnerabilities found. - - -corydolphin/boilerflask-facebook -https://github.com/corydolphin/boilerflask-facebook -Entry file: boilerflask-facebook/boilerflask/__init__.py -Scanned: 2016-10-19 13:57:03.438367 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -subdesign/temp_Flaskblog -https://github.com/subdesign/temp_Flaskblog -Entry file: temp_Flaskblog/app.py -Scanned: 2016-10-19 13:57:05.063205 -Vulnerability 1: -File: temp_Flaskblog/app.py - > User input at line 107, trigger word ".data": - cur = g.db.execute('INSERT INTO fblog (title, content, date, status) VALUES (?, ?, ?, 1)', [form.title.data, form.content.data, d]) -File: temp_Flaskblog/app.py - > reaches line 107, trigger word "execute(": - cur = g.db.execute('INSERT INTO fblog (title, content, date, status) VALUES (?, ?, ?, 1)', [form.title.data, form.content.data, d]) - -Vulnerability 2: -File: temp_Flaskblog/app.py - > User input at line 129, trigger word ".data": - cur = g.db.execute('UPDATE fblog SET title =' + form.title.data + ', content =' + form.content.data + ' WHERE blog_id=' + str(blog_id)) -File: temp_Flaskblog/app.py - > reaches line 129, trigger word "execute(": - cur = g.db.execute('UPDATE fblog SET title =' + form.title.data + ', content =' + form.content.data + ' WHERE blog_id=' + str(blog_id)) - - - -farresmoidu/weather -https://github.com/farresmoidu/weather -Entry file: weather/weather.py -Scanned: 2016-10-19 13:57:06.397311 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thensgens/vvs -https://github.com/thensgens/vvs -Entry file: vvs/src/flask/sessions.py -Scanned: 2016-10-19 13:57:08.481989 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mwieler/soccer -https://github.com/mwieler/soccer -Entry file: soccer/soccer/main.py -Scanned: 2016-10-19 13:57:09.878543 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shiroyuki/tori-sample-blog -https://github.com/shiroyuki/tori-sample-blog -Entry file: tori-sample-blog/main.py -Scanned: 2016-10-19 13:57:11.284027 -No vulnerabilities found. - - -jackvnimble/jackvnimble -https://github.com/jackvnimble/jackvnimble -Entry file: jackvnimble/flaskblog.py -Scanned: 2016-10-19 13:57:14.055245 -No vulnerabilities found. - - -micahwalter/hello-mysql -https://github.com/micahwalter/hello-mysql -Entry file: hello-mysql/hello-mysql.py -Scanned: 2016-10-19 13:57:15.354958 -No vulnerabilities found. - - -itsme300/assignment -https://github.com/itsme300/assignment -Entry file: assignment/iptables.py -Scanned: 2016-10-19 13:57:16.753853 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yhyap/lipsum -https://github.com/yhyap/lipsum -Entry file: lipsum/flask/app.py -Scanned: 2016-10-19 13:57:18.900535 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lxchavez/CSULB-Confessions -https://github.com/lxchavez/CSULB-Confessions -Entry file: CSULB-Confessions/confessions_app/__init__.py -Scanned: 2016-10-19 13:57:21.885565 -No vulnerabilities found. - - -tornado-utils/tornado-restless -https://github.com/tornado-utils/tornado-restless -Entry file: tornado-restless/tests/base.py -Scanned: 2016-10-19 13:57:25.399463 -No vulnerabilities found. - - -btomashvili/flasb -https://github.com/btomashvili/flasb -Entry file: None -Scanned: 2016-10-19 13:57:25.919894 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/btomashvili/flasb. - -maxcountryman/flask-simpleoauth -https://github.com/maxcountryman/flask-simpleoauth -Entry file: flask-simpleoauth/flask_simpleoauth/app.py -Scanned: 2016-10-19 13:57:27.355851 -Vulnerability 1: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 30, trigger word "get(": - next_url = request.args.get('next_url', url_for('.index')) -Reassigned in: - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 30, trigger word "url_for(": - next_url = request.args.get('next_url', url_for('.index')) - -Vulnerability 2: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 30, trigger word "get(": - next_url = request.args.get('next_url', url_for('.index')) -Reassigned in: - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 36, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 3: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 42, trigger word "get(": - next_url = request.args.get('next_url', url_for('.login')) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 42, trigger word "url_for(": - next_url = request.args.get('next_url', url_for('.login')) - -Vulnerability 4: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 42, trigger word "get(": - next_url = request.args.get('next_url', url_for('.login')) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 5: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 53, trigger word ".data": - consumer = Consumer(name=form.name.data, callback_uri=form.callback_uri.data) -Reassigned in: - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 58: args = 'key''secret'consumer.keyconsumer.secret - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 62: consumer = Consumer.objects.with_id(consumer_id) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 59, trigger word "flash(": - flash('Consumer created. Key {key} Secret {secret}'.format(args)) - - - -bayazee/flask-mosession -https://github.com/bayazee/flask-mosession -Entry file: flask-mosession/example/example.py -Scanned: 2016-10-19 13:57:28.899700 -No vulnerabilities found. - - -fabin/Flaskr -https://github.com/fabin/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 13:57:29.437895 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dorajistyle/proposal_center_python_flask_sqlalchemy_jade -https://github.com/dorajistyle/proposal_center_python_flask_sqlalchemy_jade -Entry file: proposal_center_python_flask_sqlalchemy_jade/application/__init__.py -Scanned: 2016-10-19 13:57:31.628223 -Vulnerability 1: -File: proposal_center_python_flask_sqlalchemy_jade/application/manager.py - > User input at line 58, trigger word "get(": - feedback = Feedback.query.get(feedback_id) -File: proposal_center_python_flask_sqlalchemy_jade/application/manager.py - > reaches line 59, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(feedback_id=feedback_id, vote_count=feedback.vote_count()) - - - -fabin/Flask-Upload -https://github.com/fabin/Flask-Upload -Entry file: Flask-Upload/upload/__init__.py -Scanned: 2016-10-19 13:57:32.997675 -Vulnerability 1: -File: Flask-Upload/upload/__init__.py - > User input at line 24, trigger word "files[": - uploadedFile = request.files['file'] -Reassigned in: - File: Flask-Upload/upload/__init__.py - > Line 26: filename = uploadedFile.filename - File: Flask-Upload/upload/__init__.py - > Line 36: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File (in package)

-
-

- -

- ' -File: Flask-Upload/upload/__init__.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(s.put(DOMAIN_NAME, filename, ob)) - - - -gabrielengel/learn-flask -https://github.com/gabrielengel/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-19 13:57:35.770419 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mutaku/alfred_flask -https://github.com/mutaku/alfred_flask -Entry file: alfred_flask/alfred.py -Scanned: 2016-10-19 13:57:36.287593 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -erikgrueter/flask_app -https://github.com/erikgrueter/flask_app -Entry file: None -Scanned: 2016-10-19 13:57:43.793528 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/erikgrueter/flask_app. - -marksteve/flask-nsq -https://github.com/marksteve/flask-nsq -Entry file: flask-nsq/test.py -Scanned: 2016-10-19 13:57:46.313939 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luxuia/gene_designer -https://github.com/luxuia/gene_designer -Entry file: gene_designer/geneDesigne.py -Scanned: 2016-10-19 13:58:05.359324 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rubinovitz/flask-gevent-boiler -https://github.com/rubinovitz/flask-gevent-boiler -Entry file: flask-gevent-boiler/app.py -Scanned: 2016-10-19 13:58:05.897788 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyhmltn/stripe-flask-test -https://github.com/andyhmltn/stripe-flask-test -Entry file: stripe-flask-test/main.py -Scanned: 2016-10-19 13:58:07.421973 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -manuclementz/shrt -https://github.com/manuclementz/shrt -Entry file: shrt/app.py -Scanned: 2016-10-19 13:58:11.243823 -Vulnerability 1: -File: shrt/app.py - > User input at line 46, trigger word "form[": - link = ShortLink(request.form['url']) -Reassigned in: - File: shrt/app.py - > Line 49: link.encoded_id = encode_id(link.id) - File: shrt/app.py - > Line 53: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: shrt/app.py - > reaches line 52, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('link_info',link_id=link.encoded_id)) - -Vulnerability 2: -File: shrt/app.py - > User input at line 46, trigger word "form[": - link = ShortLink(request.form['url']) -Reassigned in: - File: shrt/app.py - > Line 49: link.encoded_id = encode_id(link.id) - File: shrt/app.py - > Line 53: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: shrt/app.py - > reaches line 52, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('link_info',link_id=link.encoded_id)) - - - -liontree/lemonbook -https://github.com/liontree/lemonbook -Entry file: lemonbook/__init__.py -Scanned: 2016-10-19 13:58:13.626917 -Vulnerability 1: -File: lemonbook/common/flask_login.py - > User input at line 227, trigger word "get(": - cookie_name = config.get('REMEMBER_COOKIE_NAME', COOKIE_NAME) -File: lemonbook/common/flask_login.py - > reaches line 237, trigger word "set_cookie(": - response.set_cookie(cookie_name, data,expires=expires, domain=domain) - -Vulnerability 2: -File: lemonbook/common/flask_login.py - > User input at line 228, trigger word "get(": - duration = config.get('REMEMBER_COOKIE_DURATION', COOKIE_DURATION) -Reassigned in: - File: lemonbook/common/flask_login.py - > Line 235: expires = datetime.utcnow() + duration -File: lemonbook/common/flask_login.py - > reaches line 237, trigger word "set_cookie(": - response.set_cookie(cookie_name, data,expires=expires, domain=domain) - -Vulnerability 3: -File: lemonbook/common/flask_login.py - > User input at line 229, trigger word "get(": - domain = config.get('REMEMBER_COOKIE_DOMAIN', None) -File: lemonbook/common/flask_login.py - > reaches line 237, trigger word "set_cookie(": - response.set_cookie(cookie_name, data,expires=expires, domain=domain) - -Vulnerability 4: -File: lemonbook/views/notes.py - > User input at line 50, trigger word "form[": - date = request.form['date'].strip() -Reassigned in: - File: lemonbook/views/notes.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents) - File: lemonbook/views/notes.py - > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest')) -File: lemonbook/views/notes.py - > reaches line 55, trigger word "replace(": - date = date.replace('/', '') - -Vulnerability 5: -File: lemonbook/views/notes.py - > User input at line 50, trigger word "form[": - date = request.form['date'].strip() -Reassigned in: - File: lemonbook/views/notes.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents) - File: lemonbook/views/notes.py - > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest')) -File: lemonbook/views/notes.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('date',id=user_id, date=date)) - - - -willkg/fredrik -https://github.com/willkg/fredrik -Entry file: fredrik/fredrik/project-template/PROJECTMODULE/main.py -Scanned: 2016-10-19 13:58:15.273935 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scotfu/gae-twitter -https://github.com/scotfu/gae-twitter -Entry file: gae-twitter/lib/flask/sessions.py -Scanned: 2016-10-19 13:58:19.833151 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -richardmonette/webremote -https://github.com/richardmonette/webremote -Entry file: webremote/app.py -Scanned: 2016-10-19 13:58:21.610741 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -micahwalter/hello-mysql -https://github.com/micahwalter/hello-mysql -Entry file: hello-mysql/hello-mysql.py -Scanned: 2016-10-19 13:58:22.911087 -No vulnerabilities found. - - -joshsee/GAE-Online-Apparel-Survey-Form -https://github.com/joshsee/GAE-Online-Apparel-Survey-Form -Entry file: GAE-Online-Apparel-Survey-Form/flask/sessions.py -Scanned: 2016-10-19 13:58:25.134036 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samsolariusleo/Flask -https://github.com/samsolariusleo/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-19 13:58:26.793030 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adamgreenhall/flask-haml-sass-coffee-template -https://github.com/adamgreenhall/flask-haml-sass-coffee-template -Entry file: flask-haml-sass-coffee-template/app.py -Scanned: 2016-10-19 13:58:28.587018 -No vulnerabilities found. - - -prakhar1989/flask-tuts -https://github.com/prakhar1989/flask-tuts -Entry file: flask-tuts/lesson-2/blogs/__init__.py -Scanned: 2016-10-19 13:58:31.993430 -No vulnerabilities found. - - -damour/flaskr -https://github.com/damour/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:58:33.089989 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fabin/Flaskr -https://github.com/fabin/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-19 13:58:33.700202 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Aussiroth/FlaskPractical -https://github.com/Aussiroth/FlaskPractical -Entry file: FlaskPractical/flask/routes.py -Scanned: 2016-10-19 13:58:34.586440 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fabin/Flask-Upload -https://github.com/fabin/Flask-Upload -Entry file: Flask-Upload/upload/__init__.py -Scanned: 2016-10-19 13:58:36.356480 -Vulnerability 1: -File: Flask-Upload/upload/__init__.py - > User input at line 24, trigger word "files[": - uploadedFile = request.files['file'] -Reassigned in: - File: Flask-Upload/upload/__init__.py - > Line 26: filename = uploadedFile.filename - File: Flask-Upload/upload/__init__.py - > Line 36: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File (in package)

-
-

- -

- ' -File: Flask-Upload/upload/__init__.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(s.put(DOMAIN_NAME, filename, ob)) - - - -lachezar/tada_backend -https://github.com/lachezar/tada_backend -Entry file: tada_backend/todo.py -Scanned: 2016-10-19 13:58:38.465270 -No vulnerabilities found. - - -krushton/flask-location-example -https://github.com/krushton/flask-location-example -Entry file: flask-location-example/app.py -Scanned: 2016-10-19 13:58:48.344387 -No vulnerabilities found. - - -david-torres/flask-rest-quickstart -https://github.com/david-torres/flask-rest-quickstart -Entry file: flask-rest-quickstart/application/__init__.py -Scanned: 2016-10-19 13:58:55.704652 -No vulnerabilities found. - - -Syerram/maintenance-server -https://github.com/Syerram/maintenance-server -Entry file: maintenance-server/run.py -Scanned: 2016-10-19 13:59:07.257915 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bettertest-org/flask_app_skeleton_on_gae -https://github.com/bettertest-org/flask_app_skeleton_on_gae -Entry file: flask_app_skeleton_on_gae/lib/flask/sessions.py -Scanned: 2016-10-19 13:59:07.805380 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -abhiomkar/contacts-rest -https://github.com/abhiomkar/contacts-rest -Entry file: contacts-rest/contacts.py -Scanned: 2016-10-19 13:59:09.323572 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Giorgix/thor -https://github.com/Giorgix/thor -Entry file: thor/thor.py -Scanned: 2016-10-19 13:59:10.706626 -No vulnerabilities found. - - -dyim42/wiki -https://github.com/dyim42/wiki -Entry file: None -Scanned: 2016-10-19 13:59:13.747750 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aromanovich/flask-webtest -https://github.com/aromanovich/flask-webtest -Entry file: flask-webtest/tests/core.py -Scanned: 2016-10-19 13:59:19.843988 -No vulnerabilities found. - - -sintezcs/flask -https://github.com/sintezcs/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:59:21.929169 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -wangzexin/flask -https://github.com/wangzexin/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 13:59:23.514228 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Treeki/bitBoard -https://github.com/Treeki/bitBoard -Entry file: bitBoard/bitBoard/__init__.py -Scanned: 2016-10-19 13:59:26.362672 -Vulnerability 1: -File: bitBoard/bitBoard/views/board.py - > User input at line 173, trigger word "get(": - pagenum = int(request.args.get('page', 1)) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 175: pagination = query.paginate(pagenum, THREADS_PER_PAGE,error_out=False) - File: bitBoard/bitBoard/views/board.py - > Line 180: pagination.items = add_null_entities(pagination.items) -File: bitBoard/bitBoard/views/board.py - > reaches line 183, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('thread_list.html',mode='forum', forum=forum, stickies=stickies, threads=pagination.items, pagination=pagination) - -Vulnerability 2: -File: bitBoard/bitBoard/views/board.py - > User input at line 210, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 219: ret_MAYBE_FUNCTION_NAME = _base_view_thread(thread) -File: bitBoard/bitBoard/views/board.py - > reaches line 218, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=301) - -Vulnerability 3: -File: bitBoard/bitBoard/views/board.py - > User input at line 224, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 233: ret_MAYBE_FUNCTION_NAME = _base_view_thread(thread) -File: bitBoard/bitBoard/views/board.py - > reaches line 232, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=301) - -Vulnerability 4: -File: bitBoard/bitBoard/views/board.py - > User input at line 239, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303) - File: bitBoard/bitBoard/views/board.py - > Line 291: user = post.creator - File: bitBoard/bitBoard/views/board.py - > Line 296: ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply) -File: bitBoard/bitBoard/views/board.py - > reaches line 250, trigger word "filter(": - post = Post.query.filter(Post.thread == thread, Post.created_at > timestamp).order_by(db.asc(Post.created_at)).first() - -Vulnerability 5: -File: bitBoard/bitBoard/views/board.py - > User input at line 239, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303) - File: bitBoard/bitBoard/views/board.py - > Line 291: user = post.creator - File: bitBoard/bitBoard/views/board.py - > Line 296: ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply) -File: bitBoard/bitBoard/views/board.py - > reaches line 255, trigger word "filter(": - post = Post.query.filter(Post.thread == thread).order_by(db.asc(Post.created_at)).first() - -Vulnerability 6: -File: bitBoard/bitBoard/views/board.py - > User input at line 286, trigger word "get(": - pagenum = int(request.args.get('page', 1)) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 287: pagination = query.paginate(pagenum, POSTS_PER_PAGE,error_out=False) - File: bitBoard/bitBoard/views/board.py - > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303) -File: bitBoard/bitBoard/views/board.py - > reaches line 296, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply) - -Vulnerability 7: -File: bitBoard/bitBoard/views/board.py - > User input at line 366, trigger word ".data": - thread = Thread(title=form.title.data, subtitle=form.subtitle.data, forum=forum, creator=g.user, type=is_privateThread.PRIVATEThread.BASIC_THREAD, post_count=1) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 382: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 400: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 407: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 412: notify = Notification(thread=thread, recipient=user, type=Notification.NEW_PRIVATE_THREAD) - File: bitBoard/bitBoard/views/board.py - > Line 422: ret_MAYBE_FUNCTION_NAME = render_template('post.html',is_thread=True, is_private=is_private, recipient_errors=recipient_errors, form=form, forum=forum, pm_recipient_limit=PM_RECIPIENT_LIMIT, url=url) -File: bitBoard/bitBoard/views/board.py - > reaches line 420, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=303) - -Vulnerability 8: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 459, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(thread.reply_url,code=301) - -Vulnerability 9: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 504, trigger word "filter(": - notify_which = db.session.query(u_table.c.user_id, Notification.id).filter(u_table.c.thread_id == thread.id).filter(u_table.c.user_id != g.user.id).outerjoin(Notification, notify_join) - -Vulnerability 10: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 534, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303) - -Vulnerability 11: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 536, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=True, post_id=post.id, post_html=render_template('post_box.html',post=post, postNumber=thread.post_count), layout_extra=get_layout_extra(post)) - -Vulnerability 12: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 536, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=True, post_id=post.id, post_html=render_template('post_box.html',post=post, postNumber=thread.post_count), layout_extra=get_layout_extra(post)) - -Vulnerability 13: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 546, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, thread=thread, forum=thread.forum, url=thread.reply_url) - -Vulnerability 14: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 577, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(post.edit_url,code=301) - -Vulnerability 15: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 579, trigger word "filter(": - posts_before = Post.query.filter(Post.thread == thread, Post.id < post.id).count() - -Vulnerability 16: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 595, trigger word "render_template(": - html = render_template('inline_edit.html',post=post, is_thread=edits_thread, form=form, url=post.edit_url) - -Vulnerability 17: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 627, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303) - -Vulnerability 18: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 629, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=True, post_html=escape(parse_text(version.content))) - -Vulnerability 19: -File: bitBoard/bitBoard/views/board.py - > User input at line 604, trigger word ".data": - version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 635: ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, is_thread=edits_thread, is_edit=True, thread=thread, forum=thread.forum, url=post.edit_url) - File: bitBoard/bitBoard/views/board.py - > Line 643: ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=False, errors=jsonify_errors(form)) - File: bitBoard/bitBoard/views/board.py - > Line 577: ret_MAYBE_FUNCTION_NAME = redirect(post.edit_url,code=301) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 627: ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303) -File: bitBoard/bitBoard/views/board.py - > reaches line 629, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=True, post_html=escape(parse_text(version.content))) - -Vulnerability 20: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 635, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, is_thread=edits_thread, is_edit=True, thread=thread, forum=thread.forum, url=post.edit_url) - -Vulnerability 21: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 643, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=False, errors=jsonify_errors(form)) - -Vulnerability 22: -File: bitBoard/bitBoard/views/board.py - > User input at line 656, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 660: thread = post.thread -File: bitBoard/bitBoard/views/board.py - > reaches line 669, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(post.delete_url,code=301) - -Vulnerability 23: -File: bitBoard/bitBoard/views/board.py - > User input at line 656, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 660: thread = post.thread -File: bitBoard/bitBoard/views/board.py - > reaches line 679, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303) - -Vulnerability 24: -File: bitBoard/bitBoard/views/board.py - > User input at line 656, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 660: thread = post.thread -File: bitBoard/bitBoard/views/board.py - > reaches line 681, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_deleted=True, post_html=render_template('post_box.html',post=post)) - -Vulnerability 25: -File: bitBoard/bitBoard/views/board.py - > User input at line 656, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 660: thread = post.thread -File: bitBoard/bitBoard/views/board.py - > reaches line 681, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_deleted=True, post_html=render_template('post_box.html',post=post)) - -Vulnerability 26: -File: bitBoard/bitBoard/views/board.py - > User input at line 656, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 660: thread = post.thread -File: bitBoard/bitBoard/views/board.py - > reaches line 686, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('confirm_post_delete.html',post=post, thread=post.thread, forum=post.thread.forum, url=post.delete_url) - -Vulnerability 27: -File: bitBoard/bitBoard/views/board.py - > User input at line 696, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 703: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 704: url = thread.move_url - File: bitBoard/bitBoard/views/board.py - > Line 730: form = MoveThreadForm(destforum=thread.forum_id) - File: bitBoard/bitBoard/views/board.py - > Line 734: new_forum_id = form.destforum.data - File: bitBoard/bitBoard/views/board.py - > Line 741: old_forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 743: old_forum.post_count -= thread.post_count - File: bitBoard/bitBoard/views/board.py - > Line 745: thread.forum_id = new_forum_id - File: bitBoard/bitBoard/views/board.py - > Line 749: new_forum.post_count += thread.post_count -File: bitBoard/bitBoard/views/board.py - > reaches line 710, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url,code=301) - -Vulnerability 28: -File: bitBoard/bitBoard/views/board.py - > User input at line 696, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 703: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 704: url = thread.move_url - File: bitBoard/bitBoard/views/board.py - > Line 730: form = MoveThreadForm(destforum=thread.forum_id) - File: bitBoard/bitBoard/views/board.py - > Line 734: new_forum_id = form.destforum.data - File: bitBoard/bitBoard/views/board.py - > Line 741: old_forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 743: old_forum.post_count -= thread.post_count - File: bitBoard/bitBoard/views/board.py - > Line 745: thread.forum_id = new_forum_id - File: bitBoard/bitBoard/views/board.py - > Line 749: new_forum.post_count += thread.post_count -File: bitBoard/bitBoard/views/board.py - > reaches line 757, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=303) - -Vulnerability 29: -File: bitBoard/bitBoard/views/board.py - > User input at line 696, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 703: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 704: url = thread.move_url - File: bitBoard/bitBoard/views/board.py - > Line 730: form = MoveThreadForm(destforum=thread.forum_id) - File: bitBoard/bitBoard/views/board.py - > Line 734: new_forum_id = form.destforum.data - File: bitBoard/bitBoard/views/board.py - > Line 741: old_forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 743: old_forum.post_count -= thread.post_count - File: bitBoard/bitBoard/views/board.py - > Line 745: thread.forum_id = new_forum_id - File: bitBoard/bitBoard/views/board.py - > Line 749: new_forum.post_count += thread.post_count -File: bitBoard/bitBoard/views/board.py - > reaches line 760, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('move_thread.html',form=form, forum=forum, thread=thread, url=url) - -Vulnerability 30: -File: bitBoard/bitBoard/views/board.py - > User input at line 775, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 782: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 785: url = thread.sticky_url - File: bitBoard/bitBoard/views/board.py - > Line 787: url = thread.lock_url - File: bitBoard/bitBoard/views/board.py - > Line 791: url = thread.follow_url - File: bitBoard/bitBoard/views/board.py - > Line 808: old_value = thread.is_stickied - File: bitBoard/bitBoard/views/board.py - > Line 822: old_value = thread.is_locked - File: bitBoard/bitBoard/views/board.py - > Line 836: old_value = thread.is_followed_by(g.user) - File: bitBoard/bitBoard/views/board.py - > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title) -File: bitBoard/bitBoard/views/board.py - > reaches line 802, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url,code=301) - -Vulnerability 31: -File: bitBoard/bitBoard/views/board.py - > User input at line 775, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 782: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 785: url = thread.sticky_url - File: bitBoard/bitBoard/views/board.py - > Line 787: url = thread.lock_url - File: bitBoard/bitBoard/views/board.py - > Line 791: url = thread.follow_url - File: bitBoard/bitBoard/views/board.py - > Line 808: old_value = thread.is_stickied - File: bitBoard/bitBoard/views/board.py - > Line 822: old_value = thread.is_locked - File: bitBoard/bitBoard/views/board.py - > Line 836: old_value = thread.is_followed_by(g.user) - File: bitBoard/bitBoard/views/board.py - > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title) -File: bitBoard/bitBoard/views/board.py - > reaches line 869, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = form.redirect(url=thread.url) - -Vulnerability 32: -File: bitBoard/bitBoard/views/board.py - > User input at line 775, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 782: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 785: url = thread.sticky_url - File: bitBoard/bitBoard/views/board.py - > Line 787: url = thread.lock_url - File: bitBoard/bitBoard/views/board.py - > Line 791: url = thread.follow_url - File: bitBoard/bitBoard/views/board.py - > Line 808: old_value = thread.is_stickied - File: bitBoard/bitBoard/views/board.py - > Line 822: old_value = thread.is_locked - File: bitBoard/bitBoard/views/board.py - > Line 836: old_value = thread.is_followed_by(g.user) - File: bitBoard/bitBoard/views/board.py - > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title) -File: bitBoard/bitBoard/views/board.py - > reaches line 871, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('confirm.html',form=form, crumbs_type='thread', forum=forum, thread=thread, final_crumb='%s Thread' % cap_verb, message=message, url=url) - -Vulnerability 33: -File: bitBoard/bitBoard/views/base.py - > User input at line 49, trigger word "get(": - target = get_redirect_target() or url -Reassigned in: - File: bitBoard/bitBoard/views/base.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data) -File: bitBoard/bitBoard/views/base.py - > reaches line 50, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303) - -Vulnerability 34: -File: bitBoard/bitBoard/views/base.py - > User input at line 49, trigger word "get(": - target = get_redirect_target() or url -Reassigned in: - File: bitBoard/bitBoard/views/base.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data) -File: bitBoard/bitBoard/views/base.py - > reaches line 50, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303) - -Vulnerability 35: -File: bitBoard/bitBoard/views/wiki.py - > User input at line 31, trigger word "get(": - revision = WikiRevision.query.get(revision_id) -Reassigned in: - File: bitBoard/bitBoard/views/wiki.py - > Line 29: ret_MAYBE_FUNCTION_NAME = redirect(page.url,code=303) -File: bitBoard/bitBoard/views/wiki.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('wiki_page.html',is_old_revision=True, page=page, revision=revision) - -Vulnerability 36: -File: bitBoard/bitBoard/views/user.py - > User input at line 36, trigger word ".data": - user = User.query.filter(db.func.lower(User.name) == db.func.lower(self.name.data)).first() -Reassigned in: - File: bitBoard/bitBoard/views/user.py - > Line 44: self.user = user -File: bitBoard/bitBoard/views/user.py - > reaches line 36, trigger word "filter(": - user = User.query.filter(db.func.lower(User.name) == db.func.lower(self.name.data)).first() - -Vulnerability 37: -File: bitBoard/bitBoard/views/user.py - > User input at line 124, trigger word "get(": - user = User.query.get(id) -File: bitBoard/bitBoard/views/user.py - > reaches line 128, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(user.url,code=301) - -Vulnerability 38: -File: bitBoard/bitBoard/views/user.py - > User input at line 124, trigger word "get(": - user = User.query.get(id) -File: bitBoard/bitBoard/views/user.py - > reaches line 129, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('profile.html',user=user) - - - -byu-osl/familytree-sample-app -https://github.com/byu-osl/familytree-sample-app -Entry file: familytree-sample-app/app.py -Scanned: 2016-10-19 13:59:26.884698 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kmiasko/flask-barcode -https://github.com/kmiasko/flask-barcode -Entry file: flask-barcode/wsgi.py -Scanned: 2016-10-19 13:59:28.219837 -No vulnerabilities found. - - -jayzcode/helloflask -https://github.com/jayzcode/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-19 13:59:28.763071 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -bootandy/flask-sample -https://github.com/bootandy/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-19 13:59:29.301853 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lee814/flaskr -https://github.com/lee814/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 13:59:29.888598 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JLtheking/FlaskExample -https://github.com/JLtheking/FlaskExample -Entry file: FlaskExample/routes.py -Scanned: 2016-10-19 13:59:30.433939 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -redfive/python-flask -https://github.com/redfive/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-19 13:59:33.589211 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -atbaker/flask-tutorial -https://github.com/atbaker/flask-tutorial -Entry file: None -Scanned: 2016-10-19 13:59:35.608653 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -marcilioleite/flask-saude -https://github.com/marcilioleite/flask-saude -Entry file: flask-saude/app/__init__.py -Scanned: 2016-10-19 13:59:37.424193 -Vulnerability 1: -File: flask-saude/app/views.py - > User input at line 11, trigger word "get(": - m = Medico.query.get(1) -File: flask-saude/app/views.py - > reaches line 12, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('medico.html',medico=m) - - - -bradmerlin/porty_flask -https://github.com/bradmerlin/porty_flask -Entry file: porty_flask/app.py -Scanned: 2016-10-19 13:59:38.483098 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asap/watchman.flask -https://github.com/asap/watchman.flask -Entry file: None -Scanned: 2016-10-19 13:59:39.019032 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bradmerlin/mxit-spock_flask -https://github.com/bradmerlin/mxit-spock_flask -Entry file: mxit-spock_flask/app.py -Scanned: 2016-10-19 13:59:46.574787 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rartavia/flask-babel-example -https://github.com/rartavia/flask-babel-example -Entry file: flask-babel-example/flask-babel-example.py -Scanned: 2016-10-19 13:59:49.902580 -No vulnerabilities found. - - -elidickinson/flask-proxy-demo -https://github.com/elidickinson/flask-proxy-demo -Entry file: flask-proxy-demo/hello.py -Scanned: 2016-10-19 13:59:57.280896 -No vulnerabilities found. - - -bradmerlin/mxit-blackjack_flask -https://github.com/bradmerlin/mxit-blackjack_flask -Entry file: mxit-blackjack_flask/app.py -Scanned: 2016-10-19 14:00:09.347888 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -geunieve/ratemyfirefart -https://github.com/geunieve/ratemyfirefart -Entry file: ratemyfirefart/views.py -Scanned: 2016-10-19 14:00:11.706933 -No vulnerabilities found. - - -wangxiaoxiao88/python-bookmanager -https://github.com/wangxiaoxiao88/python-bookmanager -Entry file: python-bookmanager/app.py -Scanned: 2016-10-19 14:00:13.128584 -No vulnerabilities found. - - -bettertest-org/flask_app_skeleton_on_gae -https://github.com/bettertest-org/flask_app_skeleton_on_gae -Entry file: flask_app_skeleton_on_gae/lib/flask/sessions.py -Scanned: 2016-10-19 14:00:13.674022 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChannelIQ/redis-explorer -https://github.com/ChannelIQ/redis-explorer -Entry file: redis-explorer/redis_explorer/__init__.py -Scanned: 2016-10-19 14:00:16.226225 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -dougdragon/fuckyeanouns.com -https://github.com/dougdragon/fuckyeanouns.com -Entry file: None -Scanned: 2016-10-19 14:00:17.548163 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dougdragon/fuckyeanouns.com. - -brocksamson/minesweeper -https://github.com/brocksamson/minesweeper -Entry file: minesweeper/minesweeper/__init__.py -Scanned: 2016-10-19 14:00:20.504293 -No vulnerabilities found. - - -Sadhanandh/Chat-thumbnailer -https://github.com/Sadhanandh/Chat-thumbnailer -Entry file: Chat-thumbnailer/urllib2-enabled/flask_app.py -Scanned: 2016-10-19 14:00:22.960607 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -znewman01/creepy -https://github.com/znewman01/creepy -Entry file: creepy/creepy/app.py -Scanned: 2016-10-19 14:00:24.619752 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aliismayilov/microblog -https://github.com/aliismayilov/microblog -Entry file: None -Scanned: 2016-10-19 14:00:25.133486 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -konrad/annotation_helper_web_app -https://github.com/konrad/annotation_helper_web_app -Entry file: annotation_helper_web_app/annotate.py -Scanned: 2016-10-19 14:00:26.571709 -No vulnerabilities found. - - -smerritt/tempurl-signer -https://github.com/smerritt/tempurl-signer -Entry file: tempurl-signer/app.py -Scanned: 2016-10-19 14:00:27.885477 -No vulnerabilities found. - - -laiqing/crossFireWall-Search -https://github.com/laiqing/crossFireWall-Search -Entry file: crossFireWall-Search/google-enchance.py -Scanned: 2016-10-19 14:00:29.440559 -No vulnerabilities found. - - -lepture/flask-oauthlib -https://github.com/lepture/flask-oauthlib -Entry file: flask-oauthlib/flask_oauthlib/provider/oauth1.py -Scanned: 2016-10-19 14:00:33.811528 -Vulnerability 1: -File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > User input at line 87, trigger word "get(": - error_endpoint = self.app.config.get('OAUTH1_PROVIDER_ERROR_ENDPOINT') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > Line 90: ret_MAYBE_FUNCTION_NAME = '/oauth/errors' - File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > Line 86: ret_MAYBE_FUNCTION_NAME = error_uri -File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > reaches line 89, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint) - -Vulnerability 2: -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > User input at line 104, trigger word "get(": - error_endpoint = self.app.config.get('OAUTH2_PROVIDER_ERROR_ENDPOINT') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 107: ret_MAYBE_FUNCTION_NAME = '/oauth/errors' - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 103: ret_MAYBE_FUNCTION_NAME = error_uri -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > reaches line 106, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint) - -Vulnerability 3: -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > User input at line 447, trigger word "get(": - redirect_uri = credentials.get('redirect_uri') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 464: ret_MAYBE_FUNCTION_NAME = redirect(add_params_to_uri(self.error_uri, 'error'str(e))) - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 455: ret_MAYBE_FUNCTION_NAME = create_response(ret) - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 458: ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(self.error_uri)) -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > reaches line 461, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(redirect_uri or self.error_uri)) - - - -miguelgrinberg/Flask-HTTPAuth -https://github.com/miguelgrinberg/Flask-HTTPAuth -Entry file: Flask-HTTPAuth/examples/basic_auth.py -Scanned: 2016-10-19 14:00:37.566600 -No vulnerabilities found. - - -plastboks/Flaskmarks -https://github.com/plastboks/Flaskmarks -Entry file: Flaskmarks/flaskmarks/__init__.py -Scanned: 2016-10-19 14:00:39.790350 -Vulnerability 1: -File: Flaskmarks/flaskmarks/views/marks.py - > User input at line 92, trigger word "get(": - q = request.args.get('q') -Reassigned in: - File: Flaskmarks/flaskmarks/views/marks.py - > Line 98: m = g.user.q_marks_by_string(page, q, t) - File: Flaskmarks/flaskmarks/views/marks.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('marks.allmarks')) -File: Flaskmarks/flaskmarks/views/marks.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('mark/index.html',title='Search results for: %s' % q, header='Search results for: '%s'' % q, marks=m) - -Vulnerability 2: -File: Flaskmarks/flaskmarks/views/marks.py - > User input at line 93, trigger word "get(": - t = request.args.get('type') -Reassigned in: - File: Flaskmarks/flaskmarks/views/marks.py - > Line 98: m = g.user.q_marks_by_string(page, q, t) - File: Flaskmarks/flaskmarks/views/marks.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('marks.allmarks')) -File: Flaskmarks/flaskmarks/views/marks.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('mark/index.html',title='Search results for: %s' % q, header='Search results for: '%s'' % q, marks=m) - -Vulnerability 3: -File: Flaskmarks/flaskmarks/views/auth.py - > User input at line 33, trigger word ".data": - u = User.by_uname_or_email(form.username.data) -File: Flaskmarks/flaskmarks/views/auth.py - > reaches line 38, trigger word "flash(": - flash('Welcome %s.' % u.username,category='success') - - - -sintezcs/flask -https://github.com/sintezcs/flask -Entry file: flask/hello.py -Scanned: 2016-10-19 14:00:40.414316 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -klen/mixer -https://github.com/klen/mixer -Entry file: mixer/tests/test_flask.py -Scanned: 2016-10-19 14:00:42.571652 -No vulnerabilities found. - - -fedenusy/flaskr -https://github.com/fedenusy/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 14:00:43.579217 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lee814/flaskr -https://github.com/lee814/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-19 14:00:44.099342 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paraboul/FlaskPress -https://github.com/paraboul/FlaskPress -Entry file: None -Scanned: 2016-10-19 14:00:44.622415 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/paraboul/FlaskPress. - -AlexeyMK/gglto_flask -https://github.com/AlexeyMK/gglto_flask -Entry file: gglto_flask/gglto.py -Scanned: 2016-10-19 14:00:46.278159 -Vulnerability 1: -File: gglto_flask/gglto.py - > User input at line 27, trigger word "get(": - base_path = domain_to_redirect_url.get(request.headers['Host'], 'http://google.com/search?q={}') -File: gglto_flask/gglto.py - > reaches line 30, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(base_path.format(query_escaped)) - - - -DamnedFacts/flask-contact -https://github.com/DamnedFacts/flask-contact -Entry file: flask-contact/main.py -Scanned: 2016-10-19 14:00:46.807878 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxbucknell/vanilla_flask -https://github.com/maxbucknell/vanilla_flask -Entry file: vanilla_flask/vanilla/__init__.py -Scanned: 2016-10-19 14:00:48.465748 -No vulnerabilities found. - - -sammyrulez/flask-grolla -https://github.com/sammyrulez/flask-grolla -Entry file: flask-grolla/tests.py -Scanned: 2016-10-19 14:00:50.578136 -Vulnerability 1: -File: flask-grolla/flask_grolla.py - > User input at line 22, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -File: flask-grolla/flask_grolla.py - > reaches line 22, trigger word "url_for(": - next_url = request.args.get('next') or url_for('index') - -Vulnerability 2: -File: flask-grolla/flask_grolla.py - > User input at line 22, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -File: flask-grolla/flask_grolla.py - > reaches line 25, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 3: -File: flask-grolla/flask_grolla.py - > User input at line 22, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -File: flask-grolla/flask_grolla.py - > reaches line 32, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - - - -duffy25/sample_flask -https://github.com/duffy25/sample_flask -Entry file: sample_flask/sample_flask.py -Scanned: 2016-10-19 14:00:58.116350 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Joinhack/agent -https://github.com/Joinhack/agent -Entry file: agent/flask_sqlalchemy.py -Scanned: 2016-10-19 14:01:12.067463 -Vulnerability 1: -File: agent/agent/views/user.py - > User input at line 14, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/user.py - > Line 17: user = um.getByLoginId(loginid) - File: agent/agent/views/user.py - > Line 18: company = um.getUserCompany(user) - File: agent/agent/views/user.py - > Line 19: region = user.department.region - File: agent/agent/views/user.py - > Line 20: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/user.py - > reaches line 22, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',user=user, company=company, region=region, cities=cities) - -Vulnerability 2: -File: agent/agent/views/user.py - > User input at line 44, trigger word "form[": - area = request.form['area'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 3: -File: agent/agent/views/user.py - > User input at line 45, trigger word "form[": - name = request.form['section'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 4: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 5: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 6: -File: agent/agent/views/house.py - > User input at line 34, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 36: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 38: data = cmgmt.queryCommunitiesByUserId(user, q) - File: agent/agent/views/house.py - > Line 33: ret_MAYBE_FUNCTION_NAME = jsonify('code''msg'-1'unkown query') -File: agent/agent/views/house.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0toselect(data)) - -Vulnerability 7: -File: agent/agent/views/house.py - > User input at line 45, trigger word "form[": - community_name = request.form['community'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - -Vulnerability 8: -File: agent/agent/views/house.py - > User input at line 46, trigger word "form[": - location = request.form['location'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - - - -vasnake/mapfeatureserver -https://github.com/vasnake/mapfeatureserver -Entry file: None -Scanned: 2016-10-19 14:01:12.596272 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vasnake/mapfeatureserver. - -tonilxm/1stFlask -https://github.com/tonilxm/1stFlask -Entry file: 1stFlask/src/lib/flask/sessions.py -Scanned: 2016-10-19 14:01:13.149961 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cldershem/WebFlask-CleanTemplate -https://github.com/cldershem/WebFlask-CleanTemplate -Entry file: None -Scanned: 2016-10-19 14:01:13.661799 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -brooks/python-flask-sample -https://github.com/brooks/python-flask-sample -Entry file: python-flask-sample/hello.py -Scanned: 2016-10-19 14:01:15.254180 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py - -palei/Just-Another-Flask-App -https://github.com/palei/Just-Another-Flask-App -Entry file: Just-Another-Flask-App/app/__init__.py -Scanned: 2016-10-19 14:01:16.802908 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -FriendCode/python-flask-sample -https://github.com/FriendCode/python-flask-sample -Entry file: python-flask-sample/hello.py -Scanned: 2016-10-19 14:01:18.354455 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py - -thrisp/flarf -https://github.com/thrisp/flarf -Entry file: flarf/examples/example.py -Scanned: 2016-10-19 14:01:23.399347 -No vulnerabilities found. - - -geunieve/ratemyfirefart -https://github.com/geunieve/ratemyfirefart -Entry file: ratemyfirefart/views.py -Scanned: 2016-10-19 14:01:25.696816 -No vulnerabilities found. - - -lhr530124/nozomiServer -https://github.com/lhr530124/nozomiServer -Entry file: nozomiServer/app.py -Scanned: 2016-10-19 14:01:28.075186 -No vulnerabilities found. - - -ChannelIQ/redis-explorer -https://github.com/ChannelIQ/redis-explorer -Entry file: redis-explorer/redis_explorer/__init__.py -Scanned: 2016-10-19 14:01:28.588041 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sangallimarco/arduino_raspberry_garden_ui -https://github.com/sangallimarco/arduino_raspberry_garden_ui -Entry file: arduino_raspberry_garden_ui/main.py -Scanned: 2016-10-19 14:01:29.113224 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -carlosvin/cmsflask -https://github.com/carlosvin/cmsflask -Entry file: cmsflask/cmsflask/__init__.py -Scanned: 2016-10-19 14:01:30.985871 -No vulnerabilities found. - - -Sadhanandh/Fb-page-manager -https://github.com/Sadhanandh/Fb-page-manager -Entry file: Fb-page-manager/flask_app.py -Scanned: 2016-10-19 14:01:31.516951 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chromy/pithy -https://github.com/chromy/pithy -Entry file: None -Scanned: 2016-10-19 14:01:33.047956 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chromy/pithy. - -lpolepeddi/intro-to-flask -https://github.com/lpolepeddi/intro-to-flask -Entry file: intro-to-flask/intro_to_flask/__init__.py -Scanned: 2016-10-20 06:51:13.042094 -No vulnerabilities found. - - -saltycrane/flask-jquery-ajax-example -https://github.com/saltycrane/flask-jquery-ajax-example -Entry file: None -Scanned: 2016-10-20 06:51:13.559213 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example. - -jdiez17/flask-paypal -https://github.com/jdiez17/flask-paypal -Entry file: flask-paypal/app.py -Scanned: 2016-10-20 06:51:14.818617 -Vulnerability 1: -File: flask-paypal/app.py - > User input at line 30, trigger word "get(": - getexp_response = interface.get_express_checkout_details(token=request.args.get('token', '')) -File: flask-paypal/app.py - > reaches line 33, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = ' - Everything looks good!
- Click here to complete the payment. - ' % url_for('paypal_do',token=getexp_response['TOKEN']) - -Vulnerability 2: -File: flask-paypal/app.py - > User input at line 30, trigger word "get(": - getexp_response = interface.get_express_checkout_details(token=request.args.get('token', '')) -File: flask-paypal/app.py - > reaches line 38, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = ' - Oh noes! PayPal returned an error code.
-
-                %s
-            
- Click here to try again. - ' % (getexp_response['ACK'], url_for('index')) - - - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-20 06:51:16.184186 -No vulnerabilities found. - - -tarbell-project/tarbell -https://github.com/tarbell-project/tarbell -Entry file: tarbell/tarbell/app.py -Scanned: 2016-10-20 06:51:17.138369 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-20 06:51:17.655636 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -becdot/adventures-in-text -https://github.com/becdot/adventures-in-text -Entry file: adventures-in-text/db_methods.py -Scanned: 2016-10-20 06:51:18.179937 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dirn/Flask-Simon -https://github.com/dirn/Flask-Simon -Entry file: Flask-Simon/examples/flaskr/flaskr.py -Scanned: 2016-10-20 06:51:19.657719 -No vulnerabilities found. - - -caub/flask-geo -https://github.com/caub/flask-geo -Entry file: flask-geo/myMap.py -Scanned: 2016-10-20 06:51:20.180706 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -masayang/flask_dev -https://github.com/masayang/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-20 06:51:20.697868 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoh/perfume -https://github.com/hoh/perfume -Entry file: perfume/perfume/__init__.py -Scanned: 2016-10-20 06:51:21.952416 -No vulnerabilities found. - - -ffiiccuuss/torouterui -https://github.com/ffiiccuuss/torouterui -Entry file: torouterui/torouterui/__init__.py -Scanned: 2016-10-20 06:51:22.468860 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marsella/andrea -https://github.com/marsella/andrea -Entry file: andrea/init.py -Scanned: 2016-10-20 06:51:23.553479 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py - -embr/multithon -https://github.com/embr/multithon -Entry file: multithon/multithon.py -Scanned: 2016-10-20 06:51:25.132938 -No vulnerabilities found. - - -mattoufoutu/TrendnetStalker -https://github.com/mattoufoutu/TrendnetStalker -Entry file: TrendnetStalker/TrendnetStalker/__init__.py -Scanned: 2016-10-20 06:51:25.646343 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cyrilaub/myMap_python -https://github.com/cyrilaub/myMap_python -Entry file: myMap_python/myMap.py -Scanned: 2016-10-20 06:51:26.162908 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sysr-q/phi -https://github.com/sysr-q/phi -Entry file: phi/phi/phi.py -Scanned: 2016-10-20 06:51:28.003866 -No vulnerabilities found. - - -MaxPresman/tempymail -https://github.com/MaxPresman/tempymail -Entry file: tempymail/flask_frontend.py -Scanned: 2016-10-20 06:51:28.523630 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-20 06:51:30.896551 -No vulnerabilities found. - - -allanlei/flask-email -https://github.com/allanlei/flask-email -Entry file: flask-email/tests/__init__.py -Scanned: 2016-10-20 06:51:32.410798 -No vulnerabilities found. - - -Blender3D/Flask-LESS -https://github.com/Blender3D/Flask-LESS -Entry file: Flask-LESS/flask_less.py -Scanned: 2016-10-20 06:51:34.737347 -No vulnerabilities found. - - -hex/flaskr -https://github.com/hex/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 06:51:35.280176 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -faruken/flask-web.py-jvm -https://github.com/faruken/flask-web.py-jvm -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 06:51:36.270667 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-20 06:51:36.792104 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lpolepeddi/intro-to-flask -https://github.com/lpolepeddi/intro-to-flask -Entry file: intro-to-flask/intro_to_flask/__init__.py -Scanned: 2016-10-20 06:53:14.651536 -No vulnerabilities found. - - -saltycrane/flask-jquery-ajax-example -https://github.com/saltycrane/flask-jquery-ajax-example -Entry file: None -Scanned: 2016-10-20 06:53:15.147947 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example. - -jdiez17/flask-paypal -https://github.com/jdiez17/flask-paypal -Entry file: flask-paypal/app.py -Scanned: 2016-10-20 06:53:16.345532 -Vulnerability 1: -File: flask-paypal/app.py - > User input at line 30, trigger word "get(": - getexp_response = interface.get_express_checkout_details(token=request.args.get('token', '')) -File: flask-paypal/app.py - > reaches line 33, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = ' - Everything looks good!
- Click here to complete the payment. - ' % url_for('paypal_do',token=getexp_response['TOKEN']) - -Vulnerability 2: -File: flask-paypal/app.py - > User input at line 30, trigger word "get(": - getexp_response = interface.get_express_checkout_details(token=request.args.get('token', '')) -File: flask-paypal/app.py - > reaches line 38, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = ' - Oh noes! PayPal returned an error code.
-
-                %s
-            
- Click here to try again. - ' % (getexp_response['ACK'], url_for('index')) - - - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-20 06:53:17.680291 -No vulnerabilities found. - - -tarbell-project/tarbell -https://github.com/tarbell-project/tarbell -Entry file: tarbell/tarbell/app.py -Scanned: 2016-10-20 06:53:18.630604 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-20 06:53:19.112148 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -becdot/adventures-in-text -https://github.com/becdot/adventures-in-text -Entry file: adventures-in-text/db_methods.py -Scanned: 2016-10-20 06:53:19.597455 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dirn/Flask-Simon -https://github.com/dirn/Flask-Simon -Entry file: Flask-Simon/examples/flaskr/flaskr.py -Scanned: 2016-10-20 06:53:21.029904 -No vulnerabilities found. - - -caub/flask-geo -https://github.com/caub/flask-geo -Entry file: flask-geo/myMap.py -Scanned: 2016-10-20 06:53:21.530338 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -masayang/flask_dev -https://github.com/masayang/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-20 06:53:22.029691 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoh/perfume -https://github.com/hoh/perfume -Entry file: perfume/perfume/__init__.py -Scanned: 2016-10-20 06:53:23.266967 -No vulnerabilities found. - - -ffiiccuuss/torouterui -https://github.com/ffiiccuuss/torouterui -Entry file: torouterui/torouterui/__init__.py -Scanned: 2016-10-20 06:53:23.771455 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marsella/andrea -https://github.com/marsella/andrea -Entry file: andrea/init.py -Scanned: 2016-10-20 06:53:24.786259 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py - -embr/multithon -https://github.com/embr/multithon -Entry file: multithon/multithon.py -Scanned: 2016-10-20 06:53:26.343027 -No vulnerabilities found. - - -mattoufoutu/TrendnetStalker -https://github.com/mattoufoutu/TrendnetStalker -Entry file: TrendnetStalker/TrendnetStalker/__init__.py -Scanned: 2016-10-20 06:53:26.856531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cyrilaub/myMap_python -https://github.com/cyrilaub/myMap_python -Entry file: myMap_python/myMap.py -Scanned: 2016-10-20 06:53:27.367748 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sysr-q/phi -https://github.com/sysr-q/phi -Entry file: phi/phi/phi.py -Scanned: 2016-10-20 06:53:29.297310 -No vulnerabilities found. - - -MaxPresman/tempymail -https://github.com/MaxPresman/tempymail -Entry file: tempymail/flask_frontend.py -Scanned: 2016-10-20 06:53:29.802200 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-20 06:53:32.116384 -No vulnerabilities found. - - -allanlei/flask-email -https://github.com/allanlei/flask-email -Entry file: flask-email/tests/__init__.py -Scanned: 2016-10-20 06:53:33.651567 -No vulnerabilities found. - - -Blender3D/Flask-LESS -https://github.com/Blender3D/Flask-LESS -Entry file: Flask-LESS/flask_less.py -Scanned: 2016-10-20 06:53:35.987428 -No vulnerabilities found. - - -hex/flaskr -https://github.com/hex/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 06:53:36.507315 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -faruken/flask-web.py-jvm -https://github.com/faruken/flask-web.py-jvm -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 06:53:37.476644 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-20 06:53:37.973907 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lpolepeddi/intro-to-flask -https://github.com/lpolepeddi/intro-to-flask -Entry file: intro-to-flask/intro_to_flask/__init__.py -Scanned: 2016-10-20 08:27:12.053852 -No vulnerabilities found. - - -saltycrane/flask-jquery-ajax-example -https://github.com/saltycrane/flask-jquery-ajax-example -Entry file: None -Scanned: 2016-10-20 08:27:12.547228 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example. - -jdiez17/flask-paypal -https://github.com/jdiez17/flask-paypal -Entry file: flask-paypal/app.py -Scanned: 2016-10-20 08:27:13.749667 -Vulnerability 1: -File: flask-paypal/app.py - > User input at line 30, trigger word "get(": - getexp_response = interface.get_express_checkout_details(token=request.args.get('token', '')) -File: flask-paypal/app.py - > reaches line 33, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = ' - Everything looks good!
- Click here to complete the payment. - ' % url_for('paypal_do',token=getexp_response['TOKEN']) - -Vulnerability 2: -File: flask-paypal/app.py - > User input at line 30, trigger word "get(": - getexp_response = interface.get_express_checkout_details(token=request.args.get('token', '')) -File: flask-paypal/app.py - > reaches line 38, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = ' - Oh noes! PayPal returned an error code.
-
-                %s
-            
- Click here to try again. - ' % (getexp_response['ACK'], url_for('index')) - - - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-20 08:27:15.080607 -No vulnerabilities found. - - -tarbell-project/tarbell -https://github.com/tarbell-project/tarbell -Entry file: tarbell/tarbell/app.py -Scanned: 2016-10-20 08:27:16.449274 -Vulnerability 1: -File: tarbell/tarbell/app.py - > User input at line 558, trigger word "get(": - spreadsheet_file = self.client.files().get(fileId=key).execute() -File: tarbell/tarbell/app.py - > reaches line 558, trigger word "execute(": - spreadsheet_file = self.client.files().get(fileId=key).execute() - - - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-20 08:27:16.952327 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -becdot/adventures-in-text -https://github.com/becdot/adventures-in-text -Entry file: adventures-in-text/db_methods.py -Scanned: 2016-10-20 08:27:17.464339 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dirn/Flask-Simon -https://github.com/dirn/Flask-Simon -Entry file: Flask-Simon/examples/flaskr/flaskr.py -Scanned: 2016-10-20 08:27:18.903986 -No vulnerabilities found. - - -caub/flask-geo -https://github.com/caub/flask-geo -Entry file: flask-geo/myMap.py -Scanned: 2016-10-20 08:27:19.428052 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -masayang/flask_dev -https://github.com/masayang/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-20 08:27:19.965994 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoh/perfume -https://github.com/hoh/perfume -Entry file: perfume/perfume/__init__.py -Scanned: 2016-10-20 08:27:21.315854 -No vulnerabilities found. - - -ffiiccuuss/torouterui -https://github.com/ffiiccuuss/torouterui -Entry file: torouterui/torouterui/__init__.py -Scanned: 2016-10-20 08:27:21.825577 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marsella/andrea -https://github.com/marsella/andrea -Entry file: andrea/init.py -Scanned: 2016-10-20 08:27:22.879104 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py - -embr/multithon -https://github.com/embr/multithon -Entry file: multithon/multithon.py -Scanned: 2016-10-20 08:27:24.451190 -No vulnerabilities found. - - -mattoufoutu/TrendnetStalker -https://github.com/mattoufoutu/TrendnetStalker -Entry file: TrendnetStalker/TrendnetStalker/__init__.py -Scanned: 2016-10-20 08:27:24.964353 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cyrilaub/myMap_python -https://github.com/cyrilaub/myMap_python -Entry file: myMap_python/myMap.py -Scanned: 2016-10-20 08:27:25.463728 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sysr-q/phi -https://github.com/sysr-q/phi -Entry file: phi/phi/phi.py -Scanned: 2016-10-20 08:27:27.902289 -No vulnerabilities found. - - -MaxPresman/tempymail -https://github.com/MaxPresman/tempymail -Entry file: tempymail/flask_frontend.py -Scanned: 2016-10-20 08:27:28.409485 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-20 08:27:30.625953 -No vulnerabilities found. - - -allanlei/flask-email -https://github.com/allanlei/flask-email -Entry file: flask-email/tests/__init__.py -Scanned: 2016-10-20 08:27:32.136133 -No vulnerabilities found. - - -Blender3D/Flask-LESS -https://github.com/Blender3D/Flask-LESS -Entry file: Flask-LESS/flask_less.py -Scanned: 2016-10-20 08:27:34.387562 -No vulnerabilities found. - - -hex/flaskr -https://github.com/hex/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:27:34.911900 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -faruken/flask-web.py-jvm -https://github.com/faruken/flask-web.py-jvm -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 08:27:35.896431 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-20 08:27:36.391196 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -parryjacob/flask-boilerplate -https://github.com/parryjacob/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 08:28:10.938439 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/parryjacob/flask-boilerplate. - -jpercent/flask-control -https://github.com/jpercent/flask-control -Entry file: flask-control/example.py -Scanned: 2016-10-20 08:28:11.447146 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Ceasar/pocket_flask -https://github.com/Ceasar/pocket_flask -Entry file: pocket_flask/app/__init__.py -Scanned: 2016-10-20 08:28:13.960309 -No vulnerabilities found. - - -CMGS/poll -https://github.com/CMGS/poll -Entry file: poll/app.py -Scanned: 2016-10-20 08:28:17.074592 -Vulnerability 1: -File: poll/app.py - > User input at line 31, trigger word "get(": - q = request.args.get('q', '') -File: poll/app.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',user=g.user, subjects=get_subjects(q), groups=get_groups(), group=get_group(q)) - -Vulnerability 2: -File: poll/app.py - > User input at line 59, trigger word "get(": - group = request.form.get('group') -Reassigned in: - File: poll/app.py - > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups()) -File: poll/app.py - > reaches line 64, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group)) - -Vulnerability 3: -File: poll/app.py - > User input at line 59, trigger word "get(": - group = request.form.get('group') -Reassigned in: - File: poll/app.py - > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups()) -File: poll/app.py - > reaches line 64, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group)) - - - -hoh/perfume -https://github.com/hoh/perfume -Entry file: perfume/perfume/__init__.py -Scanned: 2016-10-20 08:28:18.387324 -No vulnerabilities found. - - -dogrdon/txtr -https://github.com/dogrdon/txtr -Entry file: txtr/txtr.py -Scanned: 2016-10-20 08:28:18.899209 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattoufoutu/TrendnetStalker -https://github.com/mattoufoutu/TrendnetStalker -Entry file: TrendnetStalker/TrendnetStalker/__init__.py -Scanned: 2016-10-20 08:28:19.397664 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -perjo927/Portfolio -https://github.com/perjo927/Portfolio -Entry file: Portfolio/server.py -Scanned: 2016-10-20 08:28:21.902112 -Vulnerability 1: -File: Portfolio/server.py - > User input at line 96, trigger word "form[": - search_string = request.form['key'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 2: -File: Portfolio/server.py - > User input at line 99, trigger word "form[": - sort_order = request.form['sort_order'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 3: -File: Portfolio/server.py - > User input at line 100, trigger word "form[": - sort_by = request.form['sort_by'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - - - -cyrilaub/myMap_python -https://github.com/cyrilaub/myMap_python -Entry file: myMap_python/myMap.py -Scanned: 2016-10-20 08:28:22.418123 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sburns/switchboard -https://github.com/sburns/switchboard -Entry file: switchboard/sample_app.py -Scanned: 2016-10-20 08:28:22.924289 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahawker/jpool -https://github.com/ahawker/jpool -Entry file: None -Scanned: 2016-10-20 08:28:23.423695 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool. - -sysr-q/phi -https://github.com/sysr-q/phi -Entry file: phi/phi/phi.py -Scanned: 2016-10-20 08:28:25.339036 -No vulnerabilities found. - - -bogdan-kulynych/cloudlectures -https://github.com/bogdan-kulynych/cloudlectures -Entry file: cloudlectures/flask/sessions.py -Scanned: 2016-10-20 08:28:25.894192 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DanielleSucher/BookQueue -https://github.com/DanielleSucher/BookQueue -Entry file: BookQueue/app.py -Scanned: 2016-10-20 08:28:27.239965 -Vulnerability 1: -File: BookQueue/app.py - > User input at line 145, trigger word "form[": - from_email = request.form['sender'].lower() -File: BookQueue/app.py - > reaches line 146, trigger word "filter(": - query = User.query.filter(User.email == from_email) - - - -allanlei/flask-email -https://github.com/allanlei/flask-email -Entry file: flask-email/tests/__init__.py -Scanned: 2016-10-20 08:28:30.381453 -No vulnerabilities found. - - -maxcnunes/flaskgaedemo -https://github.com/maxcnunes/flaskgaedemo -Entry file: flaskgaedemo/main.py -Scanned: 2016-10-20 08:28:31.442540 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -domenicosolazzo/flask_examples -https://github.com/domenicosolazzo/flask_examples -Entry file: flask_examples/logger_example.py -Scanned: 2016-10-20 08:28:33.078443 -No vulnerabilities found. - - -akostyuk/flask-dbmigrate -https://github.com/akostyuk/flask-dbmigrate -Entry file: flask-dbmigrate/tests.py -Scanned: 2016-10-20 08:28:33.591971 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -50onRed/phillypug-flask -https://github.com/50onRed/phillypug-flask -Entry file: phillypug-flask/phillypug/app.py -Scanned: 2016-10-20 08:28:34.950694 -Vulnerability 1: -File: phillypug-flask/phillypug/views.py - > User input at line 19, trigger word "get(": - repos = redis_client.get(repos_key) -Reassigned in: - File: phillypug-flask/phillypug/views.py - > Line 21: repos = json.loads(repos) -File: phillypug-flask/phillypug/views.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',repos=repos) - - - -booo/flask-gtfs -https://github.com/booo/flask-gtfs -Entry file: None -Scanned: 2016-10-20 08:28:35.468180 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/booo/flask-gtfs. - -faruken/flask-web.py-jvm -https://github.com/faruken/flask-web.py-jvm -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 08:28:35.963498 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nerevu/prometheus -https://github.com/nerevu/prometheus -Entry file: prometheus/app/__init__.py -Scanned: 2016-10-20 08:28:36.477247 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottdnz/flask_skeleton -https://github.com/scottdnz/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-20 08:28:36.981272 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -pavlenko-volodymyr/flask-study -https://github.com/pavlenko-volodymyr/flask-study -Entry file: flask-study/hello.py -Scanned: 2016-10-20 08:28:37.510487 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -slizadel/flask-gitrcv -https://github.com/slizadel/flask-gitrcv -Entry file: flask-gitrcv/flask-gitrcv/gitrcv.py -Scanned: 2016-10-20 08:28:38.760043 -No vulnerabilities found. - - -apjd/flask-heroku -https://github.com/apjd/flask-heroku -Entry file: flask-heroku/flasky.py -Scanned: 2016-10-20 08:28:40.030416 -No vulnerabilities found. - - -scardine/flask-locale -https://github.com/scardine/flask-locale -Entry file: flask-locale/tests/__init__.py -Scanned: 2016-10-20 08:28:41.353299 -No vulnerabilities found. - - -JunilJacob/Paint-app-using-Flask -https://github.com/JunilJacob/Paint-app-using-Flask -Entry file: Paint-app-using-Flask/hello.py -Scanned: 2016-10-20 08:29:13.177705 -Vulnerability 1: -File: Paint-app-using-Flask/hello.py - > User input at line 12, trigger word "form[": - name = request.form['pname'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 16: iname = (name) -File: Paint-app-using-Flask/hello.py - > reaches line 18, trigger word "execute(": - c.execute('DELETE FROM Image WHERE file=?', iname) - -Vulnerability 2: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 19, trigger word "execute(": - c.execute('INSERT INTO Image VALUES (?,?)', image) - -Vulnerability 3: -File: Paint-app-using-Flask/hello.py - > User input at line 12, trigger word "form[": - name = request.form['pname'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 16: iname = (name) -File: Paint-app-using-Flask/hello.py - > reaches line 19, trigger word "execute(": - c.execute('INSERT INTO Image VALUES (?,?)', image) - -Vulnerability 4: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 34, trigger word "execute(": - for row in c.execute('SELECT * FROM Image WHERE file=?', filename): - -Vulnerability 5: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 36, trigger word "render_template(": - resp = Response('' + render_template('paint.html'),status=200, mimetype='html') - - - -dimfox/flask-mega-tutorial -https://github.com/dimfox/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-20 08:29:13.693957 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -callahad/temp-flask-persona-demo -https://github.com/callahad/temp-flask-persona-demo -Entry file: temp-flask-persona-demo/example.py -Scanned: 2016-10-20 08:29:17.679223 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshsee/GAE-flask-cms -https://github.com/joshsee/GAE-flask-cms -Entry file: GAE-flask-cms/flask/sessions.py -Scanned: 2016-10-20 08:29:19.204669 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshkurz/exi -https://github.com/joshkurz/exi -Entry file: exi/exi/tests/security/test_app/__init__.py -Scanned: 2016-10-20 08:29:20.885836 -No vulnerabilities found. - - -booo/baedproject -https://github.com/booo/baedproject -Entry file: baedproject/app.py -Scanned: 2016-10-20 08:29:22.107180 -No vulnerabilities found. - - -kalimatas/herokuflask -https://github.com/kalimatas/herokuflask -Entry file: herokuflask/app.py -Scanned: 2016-10-20 08:29:23.315458 -No vulnerabilities found. - - -norbert/helloflask -https://github.com/norbert/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-20 08:29:23.851395 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -perjo927/Portfolio -https://github.com/perjo927/Portfolio -Entry file: Portfolio/server.py -Scanned: 2016-10-20 08:29:26.587197 -Vulnerability 1: -File: Portfolio/server.py - > User input at line 96, trigger word "form[": - search_string = request.form['key'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 2: -File: Portfolio/server.py - > User input at line 99, trigger word "form[": - sort_order = request.form['sort_order'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 3: -File: Portfolio/server.py - > User input at line 100, trigger word "form[": - sort_by = request.form['sort_by'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - - - -Pusungwi/lobotomizer -https://github.com/Pusungwi/lobotomizer -Entry file: None -Scanned: 2016-10-20 08:29:27.136162 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pusungwi/lobotomizer. - -ahawker/jpool -https://github.com/ahawker/jpool -Entry file: None -Scanned: 2016-10-20 08:29:27.627894 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool. - -takosuke/pizzasuicideclub -https://github.com/takosuke/pizzasuicideclub -Entry file: pizzasuicideclub/psc_app/__init__.py -Scanned: 2016-10-20 08:29:33.690341 -Vulnerability 1: -File: pizzasuicideclub/psc_app/filters.py - > User input at line 15, trigger word "Markup(": - result = Markup(result) -Reassigned in: - File: pizzasuicideclub/psc_app/filters.py - > Line 16: ret_MAYBE_FUNCTION_NAME = result -File: pizzasuicideclub/psc_app/filters.py - > reaches line 12, trigger word "replace(": - result = ' - -'.join(('

%s

' % p.replace(' -', '
-') for p in _paragraph_re.split(escape(value)))) -This vulnerability is potentially sanitised by: ['escape'] - -Vulnerability 2: -File: pizzasuicideclub/psc_app/pages/views.py - > User input at line 35, trigger word "get(": - post = Post.query.get(postId) -Reassigned in: - File: pizzasuicideclub/psc_app/pages/views.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('404.html',user=user) -File: pizzasuicideclub/psc_app/pages/views.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('pages/permalink.html',title=post.title, post=post, user=user) - -Vulnerability 3: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 31, trigger word "get(": - profile = User.query.get(userId) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('pages.userlist')) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users/profile.html',profile=profile, user=user, form=form) - -Vulnerability 4: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(username=form.username.data).first() -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 52: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 53: session['username'] = user.username - File: pizzasuicideclub/psc_app/users/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 49: session['remember_me'] = form.remember_me.data -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 54, trigger word "flash(": - flash('You are logged in %s' % user.username) - -Vulnerability 5: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(username=form.username.data).first() -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 52: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 53: session['username'] = user.username - File: pizzasuicideclub/psc_app/users/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 49: session['remember_me'] = form.remember_me.data -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 55, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 6: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(username=form.username.data).first() -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 52: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 53: session['username'] = user.username - File: pizzasuicideclub/psc_app/users/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 49: session['remember_me'] = form.remember_me.data -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 55, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 7: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 79, trigger word ".data": - file = form.image.data -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 80: profile_pic = utilities.file_save(file, 'profilepics') - File: pizzasuicideclub/psc_app/users/views.py - > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 8: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 81, trigger word ".data": - user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 9: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 79, trigger word ".data": - file = form.image.data -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 80: profile_pic = utilities.file_save(file, 'profilepics') - File: pizzasuicideclub/psc_app/users/views.py - > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 10: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 81, trigger word ".data": - user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 11: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 140, trigger word "get(": - user = User.query.get(userId) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 134: user = g.user - File: pizzasuicideclub/psc_app/users/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=userId)) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 145, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users/modify_password.html',form=form, user=user) - - - -neilduncan/FlickrPlaceholders -https://github.com/neilduncan/FlickrPlaceholders -Entry file: FlickrPlaceholders/main.py -Scanned: 2016-10-20 08:29:34.950411 -No vulnerabilities found. - - -amaterasu-/placeholder -https://github.com/amaterasu-/placeholder -Entry file: placeholder/image.py -Scanned: 2016-10-20 08:29:36.184828 -No vulnerabilities found. - - -koon-kai/kiblog -https://github.com/koon-kai/kiblog -Entry file: kiblog/app.py -Scanned: 2016-10-20 08:29:37.405804 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joelrojo/flask -https://github.com/joelrojo/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 08:29:37.981126 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -asgoel/Merge-flask -https://github.com/asgoel/Merge-flask -Entry file: Merge-flask/app.py -Scanned: 2016-10-20 08:29:38.959270 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregimba/Vodka -https://github.com/gregimba/Vodka -Entry file: Vodka/app.py -Scanned: 2016-10-20 08:29:40.635859 -No vulnerabilities found. - - -corydolphin/flask-olinauth -https://github.com/corydolphin/flask-olinauth -Entry file: flask-olinauth/example.py -Scanned: 2016-10-20 08:29:41.874731 -No vulnerabilities found. - - -danielestevez/flasktutorial -https://github.com/danielestevez/flasktutorial -Entry file: None -Scanned: 2016-10-20 08:29:43.343534 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pityonline/flaskr -https://github.com/pityonline/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:29:43.839798 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabeesh/Studentapp-Flask -https://github.com/prabeesh/Studentapp-Flask -Entry file: Studentapp-Flask/test.py -Scanned: 2016-10-20 08:29:44.818815 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dproni/flask_test -https://github.com/dproni/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 08:30:12.902664 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scardine/flask-locale -https://github.com/scardine/flask-locale -Entry file: flask-locale/tests/__init__.py -Scanned: 2016-10-20 08:30:14.331538 -No vulnerabilities found. - - -callahad/temp-flask-persona-demo -https://github.com/callahad/temp-flask-persona-demo -Entry file: temp-flask-persona-demo/example.py -Scanned: 2016-10-20 08:30:14.831763 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kishorekdty/paint_using_flask -https://github.com/kishorekdty/paint_using_flask -Entry file: None -Scanned: 2016-10-20 08:30:15.324795 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kishorekdty/paint_using_flask. - -joshsee/GAE-flask-cms -https://github.com/joshsee/GAE-flask-cms -Entry file: GAE-flask-cms/flask/sessions.py -Scanned: 2016-10-20 08:30:17.847002 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rasheedh/Heroku-Paint-Using-Flask -https://github.com/rasheedh/Heroku-Paint-Using-Flask -Entry file: None -Scanned: 2016-10-20 08:30:19.346813 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Heroku-Paint-Using-Flask. - -sreekanthkaralmanna/heroku-paint-app-using-flask -https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask -Entry file: None -Scanned: 2016-10-20 08:30:19.850489 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask. - -mikewallace1979/milk -https://github.com/mikewallace1979/milk -Entry file: milk/milk.py -Scanned: 2016-10-20 08:30:23.211434 -No vulnerabilities found. - - -goonpug/goonpug-stats -https://github.com/goonpug/goonpug-stats -Entry file: goonpug-stats/goonpug/__init__.py -Scanned: 2016-10-20 08:30:24.936581 -No vulnerabilities found. - - -clly/blog.md -https://github.com/clly/blog.md -Entry file: blog/flaskr.py -Scanned: 2016-10-20 08:30:25.432035 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simplyluke/dothis -https://github.com/simplyluke/dothis -Entry file: dothis/dothis.py -Scanned: 2016-10-20 08:30:26.681107 -No vulnerabilities found. - - -oberkowitz/improv -https://github.com/oberkowitz/improv -Entry file: improv/mytest/app.py -Scanned: 2016-10-20 08:30:27.272117 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: improv/mytest/venv/lib/python2.7/genericpath.py - -mikeboers/Flask-Images -https://github.com/mikeboers/Flask-Images -Entry file: Flask-Images/tests/__init__.py -Scanned: 2016-10-20 08:30:29.702913 -No vulnerabilities found. - - -berlotto/flask-app-template -https://github.com/berlotto/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-20 08:30:35.695807 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -corydolphin/flask-jsonpify -https://github.com/corydolphin/flask-jsonpify -Entry file: flask-jsonpify/test.py -Scanned: 2016-10-20 08:30:38.084229 -No vulnerabilities found. - - -eadmundo/flask-static-blog -https://github.com/eadmundo/flask-static-blog -Entry file: flask-static-blog/app/__init__.py -Scanned: 2016-10-20 08:30:39.907747 -Vulnerability 1: -File: flask-static-blog/app/blueprints/blog/views.py - > User input at line 17, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: flask-static-blog/app/blueprints/blog/views.py - > Line 30: pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10)) - File: flask-static-blog/app/blueprints/blog/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0]) -File: flask-static-blog/app/blueprints/blog/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args) - -Vulnerability 2: -File: flask-static-blog/app/blueprints/blog/views.py - > User input at line 30, trigger word "get(": - pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10)) -Reassigned in: - File: flask-static-blog/app/blueprints/blog/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0]) -File: flask-static-blog/app/blueprints/blog/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args) - - - -0atman/flask-basic -https://github.com/0atman/flask-basic -Entry file: flask-basic/flask-basic.py -Scanned: 2016-10-20 08:30:41.633652 -No vulnerabilities found. - - -clmns/flasktest -https://github.com/clmns/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 08:30:42.639265 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zfdang/memcached-in-openshift -https://github.com/zfdang/memcached-in-openshift -Entry file: memcached-in-openshift/wsgi/main.py -Scanned: 2016-10-20 08:30:43.147278 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garethpaul/flask-sample -https://github.com/garethpaul/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-20 08:30:43.654669 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -naveenpremchand02/flask_url -https://github.com/naveenpremchand02/flask_url -Entry file: flask_url/url.py -Scanned: 2016-10-20 08:30:45.129496 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cpdean/flask-oauth-tutorial -https://github.com/cpdean/flask-oauth-tutorial -Entry file: flask-oauth-tutorial/flaskr.py -Scanned: 2016-10-20 08:30:46.368707 -No vulnerabilities found. - - -xiechao06/Flask-NavBar -https://github.com/xiechao06/Flask-NavBar -Entry file: Flask-NavBar/flask_nav_bar.py -Scanned: 2016-10-20 08:30:46.917745 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nsfyn55/flask-mega-tutorial -https://github.com/nsfyn55/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-20 08:31:13.435892 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kshitizrimal/flaskr-modified -https://github.com/kshitizrimal/flaskr-modified -Entry file: flaskr-modified/flaskr.py -Scanned: 2016-10-20 08:31:14.002040 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prasanthkumara/Heroku-Paint-App-Using--Flask -https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask -Entry file: None -Scanned: 2016-10-20 08:31:15.971191 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask. - -pyxze/PyxzeCorpus -https://github.com/pyxze/PyxzeCorpus -Entry file: PyxzeCorpus/corpus.py -Scanned: 2016-10-20 08:31:19.216973 -No vulnerabilities found. - - -crcsmnky/thehotspot -https://github.com/crcsmnky/thehotspot -Entry file: thehotspot/v2/app.py -Scanned: 2016-10-20 08:31:20.770633 -Vulnerability 1: -File: thehotspot/v2/app.py - > User input at line 54, trigger word "get(": - checkins_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('places.html',places=places, count=count, skip=checkins_skip) - -Vulnerability 2: -File: thehotspot/v2/app.py - > User input at line 64, trigger word "get(": - checkins_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users.html',users=users, count=count, skip=checkins_skip) - -Vulnerability 3: -File: thehotspot/v2/app.py - > User input at line 73, trigger word "get(": - checkins_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 82, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('checkins.html',checkins=checkins, users=users, places=places, skip=checkins_skip, count=count) - -Vulnerability 4: -File: thehotspot/v2/app.py - > User input at line 103, trigger word "get(": - cats_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('categories.html',categories=categories, count=count, skip=cats_skip) - -Vulnerability 5: -File: thehotspot/v2/app.py - > User input at line 114, trigger word "get(": - places_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 118, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.html',category=cat, places=places, mapped=places.clone(), count=cat['count'], skip=places_skip) - - - -etscrivner/sovereign-states -https://github.com/etscrivner/sovereign-states -Entry file: sovereign-states/sovereign_states/api.py -Scanned: 2016-10-20 08:31:22.110989 -No vulnerabilities found. - - -croach/cheap-and-scalable-webistes-with-flask-code -https://github.com/croach/cheap-and-scalable-webistes-with-flask-code -Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py -Scanned: 2016-10-20 08:31:23.427324 -No vulnerabilities found. - - -sreedathns/paint-app-using-heroku-and-flask -https://github.com/sreedathns/paint-app-using-heroku-and-flask -Entry file: None -Scanned: 2016-10-20 08:31:23.931047 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreedathns/paint-app-using-heroku-and-flask. - -nesv/cask -https://github.com/nesv/cask -Entry file: None -Scanned: 2016-10-20 08:31:26.431988 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask. - -chadgh/chessy -https://github.com/chadgh/chessy -Entry file: None -Scanned: 2016-10-20 08:31:26.934297 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wowo/pithermo -https://github.com/wowo/pithermo -Entry file: pithermo/pithermo.py -Scanned: 2016-10-20 08:31:27.897604 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aranasaurus/android-demo-server -https://github.com/aranasaurus/android-demo-server -Entry file: android-demo-server/app.py -Scanned: 2016-10-20 08:31:30.325568 -Vulnerability 1: -File: android-demo-server/app.py - > User input at line 21, trigger word "get(": - r = requests.get(url.format(query)) -Reassigned in: - File: android-demo-server/app.py - > Line 22: images = [(i, json.dumps(i)) for i in json.loads(r.text)['responseData']['results']] -File: android-demo-server/app.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',images=images) - - - -mjhea0/flask-intro -https://github.com/mjhea0/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 08:31:36.742021 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -deepgully/me -https://github.com/deepgully/me -Entry file: me/settings.py -Scanned: 2016-10-20 08:31:37.325218 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mickey06/Flask-principal-example -https://github.com/mickey06/Flask-principal-example -Entry file: Flask-principal-example/FPrincipals.py -Scanned: 2016-10-20 08:31:39.836691 -No vulnerabilities found. - - -crazygit/flask -https://github.com/crazygit/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 08:31:40.450727 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -wingu/flask_filters -https://github.com/wingu/flask_filters -Entry file: flask_filters/test_flask_filters.py -Scanned: 2016-10-20 08:31:41.828215 -No vulnerabilities found. - - -BuongiornoMIP/Reding -https://github.com/BuongiornoMIP/Reding -Entry file: Reding/reding/app.py -Scanned: 2016-10-20 08:31:44.159601 -No vulnerabilities found. - - -mphuie/flask_base -https://github.com/mphuie/flask_base -Entry file: flask_base/myapp/__init__.py -Scanned: 2016-10-20 08:31:45.978108 -No vulnerabilities found. - - -colwilson/flask-lazyapi -https://github.com/colwilson/flask-lazyapi -Entry file: flask-lazyapi/demo_server.py -Scanned: 2016-10-20 08:31:46.496254 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xiechao06/Flask-DataBrowser -https://github.com/xiechao06/Flask-DataBrowser -Entry file: Flask-DataBrowser/flask_databrowser/test/basetest.py -Scanned: 2016-10-20 08:31:47.025495 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -knowshan/flaskey -https://github.com/knowshan/flaskey -Entry file: flaskey/app/__init__.py -Scanned: 2016-10-20 08:31:48.521348 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Masagin/FlaskCelery -https://github.com/Masagin/FlaskCelery -Entry file: FlaskCelery/flask.py -Scanned: 2016-10-20 08:31:49.025942 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -denz/flask_introspect -https://github.com/denz/flask_introspect -Entry file: flask_introspect/test/test_blueprint.py -Scanned: 2016-10-20 08:32:14.973962 -No vulnerabilities found. - - -EvilDmitri/flask-mikroblog -https://github.com/EvilDmitri/flask-mikroblog -Entry file: flask-mikroblog/app/__init__.py -Scanned: 2016-10-20 08:32:16.313061 -No vulnerabilities found. - - -maxcnunes/flask_bravi -https://github.com/maxcnunes/flask_bravi -Entry file: flask_bravi/braviapp/__init__.py -Scanned: 2016-10-20 08:32:17.762431 -No vulnerabilities found. - - -zhemao/flask_demo -https://github.com/zhemao/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 08:32:18.738841 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SalemHarrache-Archive/flask_chat_eventsource -https://github.com/SalemHarrache-Archive/flask_chat_eventsource -Entry file: flask_chat_eventsource/server.py -Scanned: 2016-10-20 08:32:20.232309 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ryanolson/flask-couchdb-schematics -https://github.com/ryanolson/flask-couchdb-schematics -Entry file: flask-couchdb-schematics/example/guestbook.py -Scanned: 2016-10-20 08:32:22.706877 -Vulnerability 1: -File: flask-couchdb-schematics/example/guestbook.py - > User input at line 53, trigger word "get(": - page = paginate(Signature.all(), 5, request.args.get('start')) -File: flask-couchdb-schematics/example/guestbook.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page) - - - -pouyan-ghasemi/flask-sql-cms -https://github.com/pouyan-ghasemi/flask-sql-cms -Entry file: flask-sql-cms/app.py -Scanned: 2016-10-20 08:32:23.238477 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -texuf/myflaskproject -https://github.com/texuf/myflaskproject -Entry file: myflaskproject/hello.py -Scanned: 2016-10-20 08:32:25.463433 -No vulnerabilities found. - - -csesoc/bark-core -https://github.com/csesoc/bark-core -Entry file: bark-core/bark/__init__.py -Scanned: 2016-10-20 08:32:27.478583 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -croach/cheap-and-scalable-webistes-with-flask-code -https://github.com/croach/cheap-and-scalable-webistes-with-flask-code -Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py -Scanned: 2016-10-20 08:32:28.835400 -No vulnerabilities found. - - -nesv/cask -https://github.com/nesv/cask -Entry file: None -Scanned: 2016-10-20 08:32:29.326263 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask. - -lee212/fg-ws -https://github.com/lee212/fg-ws -Entry file: fg-ws/fgws/ws/FGWSApps.py -Scanned: 2016-10-20 08:32:29.842297 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brunsgaard/qwablog -https://github.com/brunsgaard/qwablog -Entry file: qwablog/qwablog.py -Scanned: 2016-10-20 08:32:36.114588 -No vulnerabilities found. - - -nutrislice/mandrill-webhook-redirector -https://github.com/nutrislice/mandrill-webhook-redirector -Entry file: mandrill-webhook-redirector/webhook-router.py -Scanned: 2016-10-20 08:32:38.465847 -Vulnerability 1: -File: mandrill-webhook-redirector/webhook-router.py - > User input at line 13, trigger word "form[": - mandrill_event = json.loads(request.form['mandrill_events']) -Reassigned in: - File: mandrill-webhook-redirector/webhook-router.py - > Line 14: metadata = mandrill_event[0]['msg']['metadata'] - File: mandrill-webhook-redirector/webhook-router.py - > Line 15: domain = metadata['domain'] -File: mandrill-webhook-redirector/webhook-router.py - > reaches line 16, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/') - - - -rubinovitz/fourequality -https://github.com/rubinovitz/fourequality -Entry file: fourequality/app.py -Scanned: 2016-10-20 08:32:40.963293 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -darylchang/Hacker-Viz -https://github.com/darylchang/Hacker-Viz -Entry file: Hacker-Viz/flaskDir.py -Scanned: 2016-10-20 08:32:41.484879 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alexlod/movielist -https://github.com/alexlod/movielist -Entry file: movielist/movielist.py -Scanned: 2016-10-20 08:32:42.993093 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dhumbert/literable -https://github.com/dhumbert/literable -Entry file: None -Scanned: 2016-10-20 08:32:43.518401 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dhumbert/literable. - -ArcTanSusan/Task_List -https://github.com/ArcTanSusan/Task_List -Entry file: Task_List/tipsy/tipsy.py -Scanned: 2016-10-20 08:32:45.025600 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rbuysse/url_shortener -https://github.com/rbuysse/url_shortener -Entry file: url_shortener/url.py -Scanned: 2016-10-20 08:32:46.546443 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mjhea0/flask-intro -https://github.com/mjhea0/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 08:32:47.708920 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seanrose/box-arcade -https://github.com/seanrose/box-arcade -Entry file: box-arcade/app/__init__.py -Scanned: 2016-10-20 08:32:48.692860 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -techniq/flask-wdb -https://github.com/techniq/flask-wdb -Entry file: flask-wdb/example.py -Scanned: 2016-10-20 08:32:49.930092 -No vulnerabilities found. - - -mphuie/flask_base -https://github.com/mphuie/flask_base -Entry file: flask_base/myapp/__init__.py -Scanned: 2016-10-20 08:32:52.314153 -No vulnerabilities found. - - -theho/flask-wsgi -https://github.com/theho/flask-wsgi -Entry file: flask-wsgi/wsgi.py -Scanned: 2016-10-20 08:33:17.060308 -No vulnerabilities found. - - -adityaathalye/flaskr -https://github.com/adityaathalye/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:33:17.562104 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -knowshan/flaskey -https://github.com/knowshan/flaskey -Entry file: flaskey/app/__init__.py -Scanned: 2016-10-20 08:33:19.060440 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyr/flaskapp -https://github.com/andyr/flaskapp -Entry file: None -Scanned: 2016-10-20 08:33:19.572848 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp. - -denz/flask_introspect -https://github.com/denz/flask_introspect -Entry file: flask_introspect/test/test_blueprint.py -Scanned: 2016-10-20 08:33:21.948100 -No vulnerabilities found. - - -ekfriis/flask-mbtiles -https://github.com/ekfriis/flask-mbtiles -Entry file: flask-mbtiles/mbtileserver.py -Scanned: 2016-10-20 08:33:23.218498 -No vulnerabilities found. - - -hyaticua/flask-blog -https://github.com/hyaticua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 08:33:23.842718 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -thearchduke/flask-boiler -https://github.com/thearchduke/flask-boiler -Entry file: None -Scanned: 2016-10-20 08:33:25.367778 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -StefanKjartansson/bower-flask -https://github.com/StefanKjartansson/bower-flask -Entry file: bower-flask/server.py -Scanned: 2016-10-20 08:33:28.604043 -No vulnerabilities found. - - -tanayseven/Voix -https://github.com/tanayseven/Voix -Entry file: None -Scanned: 2016-10-20 08:33:29.124726 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gatesphere/flaskr-flask-tutorial -https://github.com/gatesphere/flaskr-flask-tutorial -Entry file: flaskr-flask-tutorial/flaskr/flaskr.py -Scanned: 2016-10-20 08:33:30.738879 -No vulnerabilities found. - - -bazerk/baz-flask-base -https://github.com/bazerk/baz-flask-base -Entry file: baz-flask-base/app/app.py -Scanned: 2016-10-20 08:33:32.673810 -Vulnerability 1: -File: baz-flask-base/app/frontend/views.py - > User input at line 26, trigger word "get(": - form = RegisterForm(username=request.args.get('username', twitter_name), password=request.args.get('password', None)) -Reassigned in: - File: baz-flask-base/app/frontend/views.py - > Line 30: err = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets) - File: baz-flask-base/app/frontend/views.py - > Line 30: user = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets) - File: baz-flask-base/app/frontend/views.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('frontend.login')) -File: baz-flask-base/app/frontend/views.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('frontend/register.html',form=form, twitter_name=twitter_name) - -Vulnerability 2: -File: baz-flask-base/app/frontend/views.py - > User input at line 48, trigger word "get(": - form = LoginForm(login=request.args.get('login', None), next=request.args.get('next', None)) -Reassigned in: - File: baz-flask-base/app/frontend/views.py - > Line 52: user = User.authenticate(form.login.data, form.password.data, bcrypt.check_password_hash) - File: baz-flask-base/app/frontend/views.py - > Line 57: session['user_id'] = user.id - File: baz-flask-base/app/frontend/views.py - > Line 61: ret_MAYBE_FUNCTION_NAME = redirect('') -File: baz-flask-base/app/frontend/views.py - > reaches line 65, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('frontend/login.html',form=form) - - - -ryanolson/flask-couchdb-schematics -https://github.com/ryanolson/flask-couchdb-schematics -Entry file: flask-couchdb-schematics/example/guestbook.py -Scanned: 2016-10-20 08:33:34.148424 -Vulnerability 1: -File: flask-couchdb-schematics/example/guestbook.py - > User input at line 53, trigger word "get(": - page = paginate(Signature.all(), 5, request.args.get('start')) -File: flask-couchdb-schematics/example/guestbook.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page) - - - -pouyan-ghasemi/flask-sql-cms -https://github.com/pouyan-ghasemi/flask-sql-cms -Entry file: flask-sql-cms/app.py -Scanned: 2016-10-20 08:33:35.662927 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Andrey-Khobnya/flask-sessions-mongo -https://github.com/Andrey-Khobnya/flask-sessions-mongo -Entry file: flask-sessions-mongo/flask-sessions-mongo/examples/loginsession.py -Scanned: 2016-10-20 08:33:38.930583 -No vulnerabilities found. - - -igrishaev/youtube-python-api-sample -https://github.com/igrishaev/youtube-python-api-sample -Entry file: youtube-python-api-sample/app.py -Scanned: 2016-10-20 08:33:39.994550 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nutrislice/mandrill-webhook-redirector -https://github.com/nutrislice/mandrill-webhook-redirector -Entry file: mandrill-webhook-redirector/webhook-router.py -Scanned: 2016-10-20 08:33:42.317885 -Vulnerability 1: -File: mandrill-webhook-redirector/webhook-router.py - > User input at line 13, trigger word "form[": - mandrill_event = json.loads(request.form['mandrill_events']) -Reassigned in: - File: mandrill-webhook-redirector/webhook-router.py - > Line 14: metadata = mandrill_event[0]['msg']['metadata'] - File: mandrill-webhook-redirector/webhook-router.py - > Line 15: domain = metadata['domain'] -File: mandrill-webhook-redirector/webhook-router.py - > reaches line 16, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/') - - - -kfr2/pynances -https://github.com/kfr2/pynances -Entry file: pynances/pynances/pynances.py -Scanned: 2016-10-20 08:33:43.659230 -No vulnerabilities found. - - -WilliamMayor/geoffrey -https://github.com/WilliamMayor/geoffrey -Entry file: geoffrey/geoffrey.py -Scanned: 2016-10-20 08:33:44.896867 -No vulnerabilities found. - - -Timothee/Passerelle -https://github.com/Timothee/Passerelle -Entry file: Passerelle/passerelle.py -Scanned: 2016-10-20 08:33:46.159828 -No vulnerabilities found. - - -fusic-com/flask-todo -https://github.com/fusic-com/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-20 08:33:47.555795 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bkabrda/flask-whooshee -https://github.com/bkabrda/flask-whooshee -Entry file: flask-whooshee/test.py -Scanned: 2016-10-20 08:33:49.156897 -No vulnerabilities found. - - -DavidWittman/csrgenerator.com -https://github.com/DavidWittman/csrgenerator.com -Entry file: None -Scanned: 2016-10-20 08:33:50.136787 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -techniq/flask-wdb -https://github.com/techniq/flask-wdb -Entry file: flask-wdb/example.py -Scanned: 2016-10-20 08:33:51.471794 -No vulnerabilities found. - - -1000ch/flask-handson -https://github.com/1000ch/flask-handson -Entry file: flask-handson/flaskr/__init__.py -Scanned: 2016-10-20 08:33:52.007182 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajuna/car-registration -https://github.com/ajuna/car-registration -Entry file: None -Scanned: 2016-10-20 08:33:52.508448 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ajuna/car-registration. - -jishnujagajeeve/Flaskr -https://github.com/jishnujagajeeve/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 08:34:15.045759 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Basher51/Flaskr -https://github.com/Basher51/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 08:34:16.542711 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyr/flaskapp -https://github.com/andyr/flaskapp -Entry file: None -Scanned: 2016-10-20 08:34:18.044340 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp. - -sagnew/Prank-Roulette -https://github.com/sagnew/Prank-Roulette -Entry file: Prank-Roulette/app.py -Scanned: 2016-10-20 08:34:19.560275 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kaste/FlaskDeferredHandler -https://github.com/kaste/FlaskDeferredHandler -Entry file: FlaskDeferredHandler/flask_handler_test.py -Scanned: 2016-10-20 08:34:20.827930 -No vulnerabilities found. - - -adityaathalye/flaskr2 -https://github.com/adityaathalye/flaskr2 -Entry file: flaskr2/app.py -Scanned: 2016-10-20 08:34:22.068069 -No vulnerabilities found. - - -ConceptPending/flaskTemplate -https://github.com/ConceptPending/flaskTemplate -Entry file: flaskTemplate/server.py -Scanned: 2016-10-20 08:34:24.070642 -No vulnerabilities found. - - -AlexMost/Flask-starter -https://github.com/AlexMost/Flask-starter -Entry file: Flask-starter/app.py -Scanned: 2016-10-20 08:34:25.340728 -No vulnerabilities found. - - -samgclarke/flask-microblog -https://github.com/samgclarke/flask-microblog -Entry file: None -Scanned: 2016-10-20 08:34:25.840825 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jonomillin/learning-flask -https://github.com/jonomillin/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 08:34:28.399735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -berlotto/hero-flask -https://github.com/berlotto/hero-flask -Entry file: hero-flask/hero/__init__.py -Scanned: 2016-10-20 08:34:31.024300 -No vulnerabilities found. - - -nthfloor/Flask_learn -https://github.com/nthfloor/Flask_learn -Entry file: Flask_learn/login_system/flskr.py -Scanned: 2016-10-20 08:34:35.044846 -Vulnerability 1: -File: Flask_learn/login_system/flskr.py - > User input at line 116, trigger word "get(": - username = request.form.get('username') -File: Flask_learn/login_system/flskr.py - > reaches line 119, trigger word "filter(": - user = User.query.filter(User.name == username and User.password == password).first() - -Vulnerability 2: -File: Flask_learn/login_system/flskr.py - > User input at line 117, trigger word "get(": - password = request.form.get('password') -File: Flask_learn/login_system/flskr.py - > reaches line 119, trigger word "filter(": - user = User.query.filter(User.name == username and User.password == password).first() - - - -mmcgahan/flask-labs-bb -https://github.com/mmcgahan/flask-labs-bb -Entry file: flask-labs-bb/flask_labs/__init__.py -Scanned: 2016-10-20 08:34:37.124124 -Vulnerability 1: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 29, trigger word "filter(": - user = db.session.query(User).filter(User.username == login_form.username.data).first() - -Vulnerability 2: -File: flask-labs-bb/flask_labs/views.py - > User input at line 29, trigger word ".data": - user = db.session.query(User).filter(User.username == login_form.username.data).first() -File: flask-labs-bb/flask_labs/views.py - > reaches line 29, trigger word "filter(": - user = db.session.query(User).filter(User.username == login_form.username.data).first() - -Vulnerability 3: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 36, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index')) - -Vulnerability 4: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 36, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index')) - -Vulnerability 5: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',login_form=login_form) - - - -daisuzu/flask-app-sample -https://github.com/daisuzu/flask-app-sample -Entry file: flask-app-sample/db.py -Scanned: 2016-10-20 08:34:38.388078 -No vulnerabilities found. - - -penpyt/flask-couchdb-auth -https://github.com/penpyt/flask-couchdb-auth -Entry file: flask-couchdb-auth/example/guestbook.py -Scanned: 2016-10-20 08:34:39.725213 -Vulnerability 1: -File: flask-couchdb-auth/example/guestbook.py - > User input at line 53, trigger word "get(": - page = paginate(Signature.all(), 5, request.args.get('start')) -File: flask-couchdb-auth/example/guestbook.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page) - - - -rodreegez/flask-twitter-auth -https://github.com/rodreegez/flask-twitter-auth -Entry file: None -Scanned: 2016-10-20 08:34:40.249067 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rodreegez/flask-twitter-auth. - -DamnedFacts/flask-hello-world -https://github.com/DamnedFacts/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 08:34:40.796581 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ariamoraine/kitten-generator -https://github.com/ariamoraine/kitten-generator -Entry file: kitten-generator/flaskhello.py -Scanned: 2016-10-20 08:34:42.473482 -No vulnerabilities found. - - -honestappalachia/honest_site -https://github.com/honestappalachia/honest_site -Entry file: honest_site/run.py -Scanned: 2016-10-20 08:34:43.812614 -Vulnerability 1: -File: honest_site/run.py - > User input at line 36, trigger word "get(": - template = page.meta.get('template', 'default.html') -File: honest_site/run.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,page=page) - - - -daikeshi/one-dollar-metasearch-engine -https://github.com/daikeshi/one-dollar-metasearch-engine -Entry file: one-dollar-metasearch-engine/app/__init__.py -Scanned: 2016-10-20 08:34:44.314769 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -msalahi/art-party -https://github.com/msalahi/art-party -Entry file: art-party/app.py -Scanned: 2016-10-20 08:34:54.027236 -No vulnerabilities found. - - -honestappalachia/honest_hiddenservice -https://github.com/honestappalachia/honest_hiddenservice -Entry file: honest_hiddenservice/run.py -Scanned: 2016-10-20 08:34:54.542168 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -saltire/artpubpy -https://github.com/saltire/artpubpy -Entry file: artpubpy/artpubpy.py -Scanned: 2016-10-20 08:34:55.069042 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mcniac/simple-blog -https://github.com/mcniac/simple-blog -Entry file: simple-blog/tumblelog/__init__.py -Scanned: 2016-10-20 08:35:00.983920 -No vulnerabilities found. - - -ryanrdetzel/blimp-commit -https://github.com/ryanrdetzel/blimp-commit -Entry file: blimp-commit/blimp_commit.py -Scanned: 2016-10-20 08:35:02.293795 -No vulnerabilities found. - - -fusic-com/flask-webcache -https://github.com/fusic-com/flask-webcache -Entry file: flask-webcache/contrib/sleepycalc/app.py -Scanned: 2016-10-20 08:35:08.594266 -No vulnerabilities found. - - -rehandalal/flask-mobility -https://github.com/rehandalal/flask-mobility -Entry file: flask-mobility/flask_mobility/tests/test_decorators.py -Scanned: 2016-10-20 08:35:16.971818 -Vulnerability 1: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 46, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 48, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 2: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 46, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 51, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'off') - -Vulnerability 3: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 67, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 69, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 4: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 67, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 72, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'off') - -Vulnerability 5: -File: flask-mobility/flask_mobility/tests/test_mobility.py - > User input at line 33, trigger word "get(": - MOBILE_COOKIE = self.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_mobility.py - > reaches line 36, trigger word "set_cookie(": - self.app.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 6: -File: flask-mobility/flask_mobility/tests/test_mobility.py - > User input at line 33, trigger word "get(": - MOBILE_COOKIE = self.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_mobility.py - > reaches line 40, trigger word "set_cookie(": - self.app.set_cookie('localhost', MOBILE_COOKIE, 'off') - - - -kelp404/Flask-GAE -https://github.com/kelp404/Flask-GAE -Entry file: None -Scanned: 2016-10-20 08:35:17.476297 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jaysonsantos/jinja-assets-compressor -https://github.com/jaysonsantos/jinja-assets-compressor -Entry file: jinja-assets-compressor/jac/contrib/flask.py -Scanned: 2016-10-20 08:35:20.286992 -No vulnerabilities found. - - -nabetama/flaskr -https://github.com/nabetama/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:35:21.275190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sagnew/Prank-Roulette -https://github.com/sagnew/Prank-Roulette -Entry file: Prank-Roulette/app.py -Scanned: 2016-10-20 08:35:21.776187 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jpscaletti/authcode -https://github.com/jpscaletti/authcode -Entry file: authcode/examples/default/app.py -Scanned: 2016-10-20 08:35:28.018545 -No vulnerabilities found. - - -samgclarke/flask-microblog -https://github.com/samgclarke/flask-microblog -Entry file: None -Scanned: 2016-10-20 08:35:28.517624 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -shunyata/flask-helloworld -https://github.com/shunyata/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-20 08:35:30.421189 -No vulnerabilities found. - - -stephen-allison/basic-flask -https://github.com/stephen-allison/basic-flask -Entry file: None -Scanned: 2016-10-20 08:35:30.938896 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/stephen-allison/basic-flask. - -bollwyvl/flask-reloaded -https://github.com/bollwyvl/flask-reloaded -Entry file: None -Scanned: 2016-10-20 08:35:32.451322 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bollwyvl/flask-reloaded. - -kitanata/flask-demo -https://github.com/kitanata/flask-demo -Entry file: None -Scanned: 2016-10-20 08:35:35.983512 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kitanata/flask-demo. - -berlotto/hero-flask -https://github.com/berlotto/hero-flask -Entry file: hero-flask/hero/__init__.py -Scanned: 2016-10-20 08:35:39.258200 -No vulnerabilities found. - - -flyingsparx/MongoFlask -https://github.com/flyingsparx/MongoFlask -Entry file: MongoFlask/application.py -Scanned: 2016-10-20 08:35:40.577096 -Vulnerability 1: -File: MongoFlask/application.py - > User input at line 39, trigger word "form[": - person = User.query.filter(User.name == request.form['username']).first() -File: MongoFlask/application.py - > reaches line 39, trigger word "filter(": - person = User.query.filter(User.name == request.form['username']).first() - -Vulnerability 2: -File: MongoFlask/application.py - > User input at line 64, trigger word "form[": - person = User.query.filter(User.name == request.form['username']).first() -Reassigned in: - File: MongoFlask/application.py - > Line 67: session['id'] = person.id -File: MongoFlask/application.py - > reaches line 64, trigger word "filter(": - person = User.query.filter(User.name == request.form['username']).first() - - - -DanAlbert/flask-guestbook -https://github.com/DanAlbert/flask-guestbook -Entry file: flask-guestbook/guestbook.py -Scanned: 2016-10-20 08:35:41.898141 -No vulnerabilities found. - - -kirkeby/empty-flask -https://github.com/kirkeby/empty-flask -Entry file: empty-flask/app/app.py -Scanned: 2016-10-20 08:35:42.884859 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rehandalal/buchner -https://github.com/rehandalal/buchner -Entry file: buchner/buchner/project-template/PROJECTMODULE/main.py -Scanned: 2016-10-20 08:35:46.558238 -No vulnerabilities found. - - -vitalk/flask-staticutils -https://github.com/vitalk/flask-staticutils -Entry file: flask-staticutils/tests/test_app/__init__.py -Scanned: 2016-10-20 08:35:47.939310 -No vulnerabilities found. - - -chiwong/flask_quickstart -https://github.com/chiwong/flask_quickstart -Entry file: flask_quickstart/hello.py -Scanned: 2016-10-20 08:35:48.578620 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_quickstart/venv_hello/lib/python2.6/genericpath.py - -archieyang/flask_app -https://github.com/archieyang/flask_app -Entry file: None -Scanned: 2016-10-20 08:35:49.097427 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/archieyang/flask_app. - -ipfans/openshift-flask-template -https://github.com/ipfans/openshift-flask-template -Entry file: openshift-flask-template/wsgi/mainapp.py -Scanned: 2016-10-20 08:35:50.422537 -No vulnerabilities found. - - -minhtuev/flask-google-map-example -https://github.com/minhtuev/flask-google-map-example -Entry file: flask-google-map-example/server.py -Scanned: 2016-10-20 08:35:55.656122 -No vulnerabilities found. - - -DamnedFacts/flask-hello-world -https://github.com/DamnedFacts/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 08:35:56.170394 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -philangist/url-shorten -https://github.com/philangist/url-shorten -Entry file: url-shorten/shorten.py -Scanned: 2016-10-20 08:35:56.674473 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fabionatali/DigiWebStats -https://github.com/fabionatali/DigiWebStats -Entry file: DigiWebStats/app.py -Scanned: 2016-10-20 08:35:58.239175 -Vulnerability 1: -File: DigiWebStats/app.py - > User input at line 31, trigger word "get(": - start_date = request.args.get('start_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 47, trigger word "execute(": - data = engine.execute(query).fetchall() - -Vulnerability 2: -File: DigiWebStats/app.py - > User input at line 32, trigger word "get(": - end_date = request.args.get('end_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 47, trigger word "execute(": - data = engine.execute(query).fetchall() - -Vulnerability 3: -File: DigiWebStats/app.py - > User input at line 31, trigger word "get(": - start_date = request.args.get('start_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 50, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data) - -Vulnerability 4: -File: DigiWebStats/app.py - > User input at line 32, trigger word "get(": - end_date = request.args.get('end_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 50, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data) - - - -confessin/addressbook -https://github.com/confessin/addressbook -Entry file: addressbook/addressbook.py -Scanned: 2016-10-20 08:36:02.465399 -No vulnerabilities found. - - -nafur/flmpc -https://github.com/nafur/flmpc -Entry file: flmpc/main.py -Scanned: 2016-10-20 08:36:03.836749 -No vulnerabilities found. - - -honestappalachia/honest_hiddenservice -https://github.com/honestappalachia/honest_hiddenservice -Entry file: honest_hiddenservice/run.py -Scanned: 2016-10-20 08:36:04.331522 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kvalle/greetr -https://github.com/kvalle/greetr -Entry file: greetr/greetr/__init__.py -Scanned: 2016-10-20 08:36:16.733368 -No vulnerabilities found. - - -dan-v/crossfitboxreview -https://github.com/dan-v/crossfitboxreview -Entry file: crossfitboxreview/seed_affiliates.py -Scanned: 2016-10-20 08:36:18.450346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mjhea0/brew -https://github.com/mjhea0/brew -Entry file: brew/app.py -Scanned: 2016-10-20 08:36:24.528189 -No vulnerabilities found. - - -DoctorMalboro/leandropoblet.com -https://github.com/DoctorMalboro/leandropoblet.com -Entry file: None -Scanned: 2016-10-20 08:36:25.027321 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ryanrdetzel/blimp-commit -https://github.com/ryanrdetzel/blimp-commit -Entry file: blimp-commit/blimp_commit.py -Scanned: 2016-10-20 08:36:26.277398 -No vulnerabilities found. - - -danielholmstrom/flask-alchemyview -https://github.com/danielholmstrom/flask-alchemyview -Entry file: flask-alchemyview/tests/test_with_flask_sqlalchemy.py -Scanned: 2016-10-20 08:36:30.249395 -Vulnerability 1: -File: flask-alchemyview/tests/test_view.py - > User input at line 150, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:get',id=model_id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 150, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:get',id=model_id)) - -Vulnerability 2: -File: flask-alchemyview/tests/test_view.py - > User input at line 154, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:get',id='a string')) -File: flask-alchemyview/tests/test_view.py - > reaches line 154, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:get',id='a string')) - -Vulnerability 3: -File: flask-alchemyview/tests/test_view.py - > User input at line 181, trigger word "get(": - m = self.session.query(SimpleModel).get(model_id) -Reassigned in: - File: flask-alchemyview/tests/test_view.py - > Line 174: m = SimpleModel('name') - File: flask-alchemyview/tests/test_view.py - > Line 177: model_id = m.id -File: flask-alchemyview/tests/test_view.py - > reaches line 178, trigger word "url_for(": - response = self.json_put(url_for('SimpleModelView:put',id=model_id), 'name''new name') - -Vulnerability 4: -File: flask-alchemyview/tests/test_view.py - > User input at line 197, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:delete',id=model_id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 197, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:delete',id=model_id)) - -Vulnerability 5: -File: flask-alchemyview/tests/test_view.py - > User input at line 209, trigger word "get(": - m = self.session.query(SimpleModel).get(model_id) -Reassigned in: - File: flask-alchemyview/tests/test_view.py - > Line 202: m = SimpleModel('name') - File: flask-alchemyview/tests/test_view.py - > Line 205: model_id = m.id -File: flask-alchemyview/tests/test_view.py - > reaches line 206, trigger word "url_for(": - response = self.json_delete(url_for('SimpleModelView:put',id=model_id)) - -Vulnerability 6: -File: flask-alchemyview/tests/test_view.py - > User input at line 236, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10)) -File: flask-alchemyview/tests/test_view.py - > reaches line 236, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10)) - -Vulnerability 7: -File: flask-alchemyview/tests/test_view.py - > User input at line 246, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 246, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) - -Vulnerability 8: -File: flask-alchemyview/tests/test_view.py - > User input at line 251, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id='a string')) -File: flask-alchemyview/tests/test_view.py - > reaches line 251, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id='a string')) - -Vulnerability 9: -File: flask-alchemyview/tests/test_view.py - > User input at line 258, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid')) -File: flask-alchemyview/tests/test_view.py - > reaches line 258, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid')) - -Vulnerability 10: -File: flask-alchemyview/tests/test_view.py - > User input at line 266, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:index')) -File: flask-alchemyview/tests/test_view.py - > reaches line 266, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:index')) - -Vulnerability 11: -File: flask-alchemyview/tests/test_view.py - > User input at line 279, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 279, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) - -Vulnerability 12: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > reaches line 56, trigger word "url_for(": - response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False) - -Vulnerability 13: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > reaches line 67, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') - -Vulnerability 14: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > reaches line 56, trigger word "url_for(": - response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False) - -Vulnerability 15: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > reaches line 67, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') - - - -vovantics/flask-bluebone -https://github.com/vovantics/flask-bluebone -Entry file: flask-bluebone/app/app.py -Scanned: 2016-10-20 08:36:30.854530 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -jpscaletti/authcode -https://github.com/jpscaletti/authcode -Entry file: authcode/examples/default/app.py -Scanned: 2016-10-20 08:36:40.284296 -No vulnerabilities found. - - -abulte/flask-arduino-websocket-sqlite -https://github.com/abulte/flask-arduino-websocket-sqlite -Entry file: flask-arduino-websocket-sqlite/app.py -Scanned: 2016-10-20 08:36:41.646582 -No vulnerabilities found. - - -futuregrid/flask_cm -https://github.com/futuregrid/flask_cm -Entry file: flask_cm/examples/forms/app.py -Scanned: 2016-10-20 08:36:47.301047 -Vulnerability 1: -File: flask_cm/examples/forms/app.py - > User input at line 24, trigger word "get(": - comments = session.get('comments', []) -File: flask_cm/examples/forms/app.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',comments=comments, form=form) - - - -mies/flask-heroku -https://github.com/mies/flask-heroku -Entry file: flask-heroku/main.py -Scanned: 2016-10-20 08:36:48.596224 -No vulnerabilities found. - - -mozillazg/flask-demo -https://github.com/mozillazg/flask-demo -Entry file: None -Scanned: 2016-10-20 08:36:49.122429 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mozillazg/flask-demo. - -toastercup/flask-social -https://github.com/toastercup/flask-social -Entry file: flask-social/app.py -Scanned: 2016-10-20 08:36:49.627585 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoest/flask-bardienst -https://github.com/hoest/flask-bardienst -Entry file: flask-bardienst/bardienst/__init__.py -Scanned: 2016-10-20 08:36:50.890242 -No vulnerabilities found. - - -danillosouza/flask-boilerplate -https://github.com/danillosouza/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 08:36:51.398960 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danillosouza/flask-boilerplate. - -dogrdon/flask-map -https://github.com/dogrdon/flask-map -Entry file: None -Scanned: 2016-10-20 08:36:51.919498 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sapid/Flask-Community -https://github.com/sapid/Flask-Community -Entry file: None -Scanned: 2016-10-20 08:36:52.431645 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sapid/Flask-Community. - -jaseemkp/flask-students-app -https://github.com/jaseemkp/flask-students-app -Entry file: flask-students-app/students.py -Scanned: 2016-10-20 08:36:56.413107 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -minhtuev/flask-google-map-example -https://github.com/minhtuev/flask-google-map-example -Entry file: flask-google-map-example/server.py -Scanned: 2016-10-20 08:36:57.651777 -No vulnerabilities found. - - -garbados/flask-the-gauntlet -https://github.com/garbados/flask-the-gauntlet -Entry file: flask-the-gauntlet/app.py -Scanned: 2016-10-20 08:37:03.320137 -No vulnerabilities found. - - -NoxDineen/microblog -https://github.com/NoxDineen/microblog -Entry file: None -Scanned: 2016-10-20 08:37:03.833773 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kaibin/Condom_Data_Server -https://github.com/Kaibin/Condom_Data_Server -Entry file: Condom_Data_Server/app.py -Scanned: 2016-10-20 08:37:05.358711 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lpolepeddi/intro-to-flask -https://github.com/lpolepeddi/intro-to-flask -Entry file: intro-to-flask/intro_to_flask/__init__.py -Scanned: 2016-10-20 08:39:27.898151 -No vulnerabilities found. - - -saltycrane/flask-jquery-ajax-example -https://github.com/saltycrane/flask-jquery-ajax-example -Entry file: None -Scanned: 2016-10-20 08:39:28.400384 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example. - -jdiez17/flask-paypal -https://github.com/jdiez17/flask-paypal -Entry file: flask-paypal/app.py -Scanned: 2016-10-20 08:39:29.673455 -Vulnerability 1: -File: flask-paypal/app.py - > User input at line 30, trigger word "get(": - getexp_response = interface.get_express_checkout_details(token=request.args.get('token', '')) -File: flask-paypal/app.py - > reaches line 33, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = ' - Everything looks good!
- Click here to complete the payment. - ' % url_for('paypal_do',token=getexp_response['TOKEN']) - -Vulnerability 2: -File: flask-paypal/app.py - > User input at line 30, trigger word "get(": - getexp_response = interface.get_express_checkout_details(token=request.args.get('token', '')) -File: flask-paypal/app.py - > reaches line 38, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = ' - Oh noes! PayPal returned an error code.
-
-                %s
-            
- Click here to try again. - ' % (getexp_response['ACK'], url_for('index')) - - - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-20 08:39:31.399898 -No vulnerabilities found. - - -tarbell-project/tarbell -https://github.com/tarbell-project/tarbell -Entry file: tarbell/tarbell/app.py -Scanned: 2016-10-20 08:39:40.009835 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-20 08:39:40.507083 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -becdot/adventures-in-text -https://github.com/becdot/adventures-in-text -Entry file: adventures-in-text/db_methods.py -Scanned: 2016-10-20 08:39:41.009209 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dirn/Flask-Simon -https://github.com/dirn/Flask-Simon -Entry file: Flask-Simon/examples/flaskr/flaskr.py -Scanned: 2016-10-20 08:39:42.503193 -No vulnerabilities found. - - -caub/flask-geo -https://github.com/caub/flask-geo -Entry file: flask-geo/myMap.py -Scanned: 2016-10-20 08:39:43.016259 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -masayang/flask_dev -https://github.com/masayang/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-20 08:39:43.515684 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoh/perfume -https://github.com/hoh/perfume -Entry file: perfume/perfume/__init__.py -Scanned: 2016-10-20 08:39:44.835817 -No vulnerabilities found. - - -ffiiccuuss/torouterui -https://github.com/ffiiccuuss/torouterui -Entry file: torouterui/torouterui/__init__.py -Scanned: 2016-10-20 08:39:45.337145 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marsella/andrea -https://github.com/marsella/andrea -Entry file: andrea/init.py -Scanned: 2016-10-20 08:39:46.367404 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: andrea/venv/lib/python2.7/genericpath.py - -embr/multithon -https://github.com/embr/multithon -Entry file: multithon/multithon.py -Scanned: 2016-10-20 08:39:48.125448 -No vulnerabilities found. - - -mattoufoutu/TrendnetStalker -https://github.com/mattoufoutu/TrendnetStalker -Entry file: TrendnetStalker/TrendnetStalker/__init__.py -Scanned: 2016-10-20 08:39:48.634254 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cyrilaub/myMap_python -https://github.com/cyrilaub/myMap_python -Entry file: myMap_python/myMap.py -Scanned: 2016-10-20 08:39:49.134194 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sysr-q/phi -https://github.com/sysr-q/phi -Entry file: phi/phi/phi.py -Scanned: 2016-10-20 08:39:52.390983 -No vulnerabilities found. - - -MaxPresman/tempymail -https://github.com/MaxPresman/tempymail -Entry file: tempymail/flask_frontend.py -Scanned: 2016-10-20 08:39:52.895976 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregorynicholas/flask-xsrf -https://github.com/gregorynicholas/flask-xsrf -Entry file: flask-xsrf/flask_xsrf.py -Scanned: 2016-10-20 08:39:54.886314 -No vulnerabilities found. - - -allanlei/flask-email -https://github.com/allanlei/flask-email -Entry file: flask-email/tests/__init__.py -Scanned: 2016-10-20 08:39:56.591554 -No vulnerabilities found. - - -Blender3D/Flask-LESS -https://github.com/Blender3D/Flask-LESS -Entry file: Flask-LESS/flask_less.py -Scanned: 2016-10-20 08:39:58.923912 -No vulnerabilities found. - - -hex/flaskr -https://github.com/hex/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:39:59.475347 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -faruken/flask-web.py-jvm -https://github.com/faruken/flask-web.py-jvm -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 08:40:00.456941 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cheesysam/flaskDemo -https://github.com/cheesysam/flaskDemo -Entry file: flaskDemo/flaskDemo.py -Scanned: 2016-10-20 08:40:00.940365 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -parryjacob/flask-boilerplate -https://github.com/parryjacob/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 08:41:26.975374 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/parryjacob/flask-boilerplate. - -jpercent/flask-control -https://github.com/jpercent/flask-control -Entry file: flask-control/example.py -Scanned: 2016-10-20 08:41:27.475999 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Ceasar/pocket_flask -https://github.com/Ceasar/pocket_flask -Entry file: pocket_flask/app/__init__.py -Scanned: 2016-10-20 08:41:29.251792 -No vulnerabilities found. - - -CMGS/poll -https://github.com/CMGS/poll -Entry file: poll/app.py -Scanned: 2016-10-20 08:41:35.933139 -Vulnerability 1: -File: poll/app.py - > User input at line 31, trigger word "get(": - q = request.args.get('q', '') -File: poll/app.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',user=g.user, subjects=get_subjects(q), groups=get_groups(), group=get_group(q)) - -Vulnerability 2: -File: poll/app.py - > User input at line 59, trigger word "get(": - group = request.form.get('group') -Reassigned in: - File: poll/app.py - > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups()) -File: poll/app.py - > reaches line 64, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group)) - -Vulnerability 3: -File: poll/app.py - > User input at line 59, trigger word "get(": - group = request.form.get('group') -Reassigned in: - File: poll/app.py - > Line 56: ret_MAYBE_FUNCTION_NAME = render_template('write.html',user=g.user, groups=get_groups()) -File: poll/app.py - > reaches line 64, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',q=group)) - - - -hoh/perfume -https://github.com/hoh/perfume -Entry file: perfume/perfume/__init__.py -Scanned: 2016-10-20 08:41:37.296284 -No vulnerabilities found. - - -dogrdon/txtr -https://github.com/dogrdon/txtr -Entry file: txtr/txtr.py -Scanned: 2016-10-20 08:41:37.810549 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattoufoutu/TrendnetStalker -https://github.com/mattoufoutu/TrendnetStalker -Entry file: TrendnetStalker/TrendnetStalker/__init__.py -Scanned: 2016-10-20 08:41:38.299944 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -perjo927/Portfolio -https://github.com/perjo927/Portfolio -Entry file: Portfolio/server.py -Scanned: 2016-10-20 08:41:42.486274 -Vulnerability 1: -File: Portfolio/server.py - > User input at line 96, trigger word "form[": - search_string = request.form['key'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 2: -File: Portfolio/server.py - > User input at line 99, trigger word "form[": - sort_order = request.form['sort_order'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 3: -File: Portfolio/server.py - > User input at line 100, trigger word "form[": - sort_by = request.form['sort_by'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - - - -cyrilaub/myMap_python -https://github.com/cyrilaub/myMap_python -Entry file: myMap_python/myMap.py -Scanned: 2016-10-20 08:41:42.995675 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sburns/switchboard -https://github.com/sburns/switchboard -Entry file: switchboard/sample_app.py -Scanned: 2016-10-20 08:41:43.498294 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahawker/jpool -https://github.com/ahawker/jpool -Entry file: None -Scanned: 2016-10-20 08:41:43.998601 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool. - -sysr-q/phi -https://github.com/sysr-q/phi -Entry file: phi/phi/phi.py -Scanned: 2016-10-20 08:41:47.425334 -No vulnerabilities found. - - -bogdan-kulynych/cloudlectures -https://github.com/bogdan-kulynych/cloudlectures -Entry file: cloudlectures/flask/sessions.py -Scanned: 2016-10-20 08:41:47.950235 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DanielleSucher/BookQueue -https://github.com/DanielleSucher/BookQueue -Entry file: BookQueue/app.py -Scanned: 2016-10-20 08:41:49.343095 -Vulnerability 1: -File: BookQueue/app.py - > User input at line 145, trigger word "form[": - from_email = request.form['sender'].lower() -File: BookQueue/app.py - > reaches line 146, trigger word "filter(": - query = User.query.filter(User.email == from_email) - - - -allanlei/flask-email -https://github.com/allanlei/flask-email -Entry file: flask-email/tests/__init__.py -Scanned: 2016-10-20 08:41:52.321427 -No vulnerabilities found. - - -maxcnunes/flaskgaedemo -https://github.com/maxcnunes/flaskgaedemo -Entry file: flaskgaedemo/main.py -Scanned: 2016-10-20 08:41:53.404232 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -domenicosolazzo/flask_examples -https://github.com/domenicosolazzo/flask_examples -Entry file: flask_examples/logger_example.py -Scanned: 2016-10-20 08:41:54.712064 -No vulnerabilities found. - - -akostyuk/flask-dbmigrate -https://github.com/akostyuk/flask-dbmigrate -Entry file: flask-dbmigrate/tests.py -Scanned: 2016-10-20 08:41:55.233508 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -50onRed/phillypug-flask -https://github.com/50onRed/phillypug-flask -Entry file: phillypug-flask/phillypug/app.py -Scanned: 2016-10-20 08:41:56.470275 -Vulnerability 1: -File: phillypug-flask/phillypug/views.py - > User input at line 19, trigger word "get(": - repos = redis_client.get(repos_key) -Reassigned in: - File: phillypug-flask/phillypug/views.py - > Line 21: repos = json.loads(repos) -File: phillypug-flask/phillypug/views.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',repos=repos) - - - -booo/flask-gtfs -https://github.com/booo/flask-gtfs -Entry file: None -Scanned: 2016-10-20 08:41:56.977347 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/booo/flask-gtfs. - -faruken/flask-web.py-jvm -https://github.com/faruken/flask-web.py-jvm -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 08:41:57.466034 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nerevu/prometheus -https://github.com/nerevu/prometheus -Entry file: prometheus/app/__init__.py -Scanned: 2016-10-20 08:41:57.968249 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottdnz/flask_skeleton -https://github.com/scottdnz/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-20 08:41:58.471957 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -pavlenko-volodymyr/flask-study -https://github.com/pavlenko-volodymyr/flask-study -Entry file: flask-study/hello.py -Scanned: 2016-10-20 08:41:59.000605 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -slizadel/flask-gitrcv -https://github.com/slizadel/flask-gitrcv -Entry file: flask-gitrcv/flask-gitrcv/gitrcv.py -Scanned: 2016-10-20 08:42:00.303873 -No vulnerabilities found. - - -apjd/flask-heroku -https://github.com/apjd/flask-heroku -Entry file: flask-heroku/flasky.py -Scanned: 2016-10-20 08:42:01.570546 -No vulnerabilities found. - - -scardine/flask-locale -https://github.com/scardine/flask-locale -Entry file: flask-locale/tests/__init__.py -Scanned: 2016-10-20 08:42:02.960656 -No vulnerabilities found. - - -JunilJacob/Paint-app-using-Flask -https://github.com/JunilJacob/Paint-app-using-Flask -Entry file: Paint-app-using-Flask/hello.py -Scanned: 2016-10-20 08:42:28.726667 -Vulnerability 1: -File: Paint-app-using-Flask/hello.py - > User input at line 12, trigger word "form[": - name = request.form['pname'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 16: iname = (name) -File: Paint-app-using-Flask/hello.py - > reaches line 18, trigger word "execute(": - c.execute('DELETE FROM Image WHERE file=?', iname) - -Vulnerability 2: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 19, trigger word "execute(": - c.execute('INSERT INTO Image VALUES (?,?)', image) - -Vulnerability 3: -File: Paint-app-using-Flask/hello.py - > User input at line 12, trigger word "form[": - name = request.form['pname'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 16: iname = (name) -File: Paint-app-using-Flask/hello.py - > reaches line 19, trigger word "execute(": - c.execute('INSERT INTO Image VALUES (?,?)', image) - -Vulnerability 4: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 34, trigger word "execute(": - for row in c.execute('SELECT * FROM Image WHERE file=?', filename): - -Vulnerability 5: -File: Paint-app-using-Flask/hello.py - > User input at line 11, trigger word "form[": - data = request.form['pdata'] -Reassigned in: - File: Paint-app-using-Flask/hello.py - > Line 15: image = (name, data) - File: Paint-app-using-Flask/hello.py - > Line 33: data = '' - File: Paint-app-using-Flask/hello.py - > Line 37: ret_MAYBE_FUNCTION_NAME = resp - File: Paint-app-using-Flask/hello.py - > Line 39: ret_MAYBE_FUNCTION_NAME = 'Image not Found' - File: Paint-app-using-Flask/hello.py - > Line 42: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') -File: Paint-app-using-Flask/hello.py - > reaches line 36, trigger word "render_template(": - resp = Response('' + render_template('paint.html'),status=200, mimetype='html') - - - -dimfox/flask-mega-tutorial -https://github.com/dimfox/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-20 08:42:29.227048 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -callahad/temp-flask-persona-demo -https://github.com/callahad/temp-flask-persona-demo -Entry file: temp-flask-persona-demo/example.py -Scanned: 2016-10-20 08:42:37.200092 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshsee/GAE-flask-cms -https://github.com/joshsee/GAE-flask-cms -Entry file: GAE-flask-cms/flask/sessions.py -Scanned: 2016-10-20 08:42:38.721279 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshkurz/exi -https://github.com/joshkurz/exi -Entry file: exi/exi/tests/security/test_app/__init__.py -Scanned: 2016-10-20 08:42:41.078902 -No vulnerabilities found. - - -booo/baedproject -https://github.com/booo/baedproject -Entry file: baedproject/app.py -Scanned: 2016-10-20 08:42:42.312265 -No vulnerabilities found. - - -kalimatas/herokuflask -https://github.com/kalimatas/herokuflask -Entry file: herokuflask/app.py -Scanned: 2016-10-20 08:42:44.560846 -No vulnerabilities found. - - -norbert/helloflask -https://github.com/norbert/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-20 08:42:45.087441 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -perjo927/Portfolio -https://github.com/perjo927/Portfolio -Entry file: Portfolio/server.py -Scanned: 2016-10-20 08:42:49.294374 -Vulnerability 1: -File: Portfolio/server.py - > User input at line 96, trigger word "form[": - search_string = request.form['key'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 2: -File: Portfolio/server.py - > User input at line 99, trigger word "form[": - sort_order = request.form['sort_order'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - -Vulnerability 3: -File: Portfolio/server.py - > User input at line 100, trigger word "form[": - sort_by = request.form['sort_by'] -Reassigned in: - File: Portfolio/server.py - > Line 103: search_res = data.search(db,search=search_string, sort_order=sort_order, sort_by=sort_by, techniques=techs, search_fields=search_fields) -File: Portfolio/server.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',search_res=search_res, db=db, search=search_string) - - - -Pusungwi/lobotomizer -https://github.com/Pusungwi/lobotomizer -Entry file: None -Scanned: 2016-10-20 08:42:49.790022 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pusungwi/lobotomizer. - -ahawker/jpool -https://github.com/ahawker/jpool -Entry file: None -Scanned: 2016-10-20 08:42:50.283080 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ahawker/jpool. - -takosuke/pizzasuicideclub -https://github.com/takosuke/pizzasuicideclub -Entry file: pizzasuicideclub/psc_app/__init__.py -Scanned: 2016-10-20 08:42:58.613059 -Vulnerability 1: -File: pizzasuicideclub/psc_app/filters.py - > User input at line 15, trigger word "Markup(": - result = Markup(result) -Reassigned in: - File: pizzasuicideclub/psc_app/filters.py - > Line 16: ret_MAYBE_FUNCTION_NAME = result -File: pizzasuicideclub/psc_app/filters.py - > reaches line 12, trigger word "replace(": - result = ' - -'.join(('

%s

' % p.replace(' -', '
-') for p in _paragraph_re.split(escape(value)))) -This vulnerability is potentially sanitised by: ['escape'] - -Vulnerability 2: -File: pizzasuicideclub/psc_app/pages/views.py - > User input at line 35, trigger word "get(": - post = Post.query.get(postId) -Reassigned in: - File: pizzasuicideclub/psc_app/pages/views.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('404.html',user=user) -File: pizzasuicideclub/psc_app/pages/views.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('pages/permalink.html',title=post.title, post=post, user=user) - -Vulnerability 3: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 31, trigger word "get(": - profile = User.query.get(userId) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('pages.userlist')) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users/profile.html',profile=profile, user=user, form=form) - -Vulnerability 4: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(username=form.username.data).first() -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 52: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 53: session['username'] = user.username - File: pizzasuicideclub/psc_app/users/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 49: session['remember_me'] = form.remember_me.data -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 54, trigger word "flash(": - flash('You are logged in %s' % user.username) - -Vulnerability 5: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(username=form.username.data).first() -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 52: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 53: session['username'] = user.username - File: pizzasuicideclub/psc_app/users/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 49: session['remember_me'] = form.remember_me.data -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 55, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 6: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(username=form.username.data).first() -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 52: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 53: session['username'] = user.username - File: pizzasuicideclub/psc_app/users/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('users/login.html',form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 49: session['remember_me'] = form.remember_me.data -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 55, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 7: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 79, trigger word ".data": - file = form.image.data -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 80: profile_pic = utilities.file_save(file, 'profilepics') - File: pizzasuicideclub/psc_app/users/views.py - > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 8: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 81, trigger word ".data": - user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 9: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 79, trigger word ".data": - file = form.image.data -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 80: profile_pic = utilities.file_save(file, 'profilepics') - File: pizzasuicideclub/psc_app/users/views.py - > Line 81: user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 10: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 81, trigger word ".data": - user = User(username=form.username.data, email=form.email.data, password=generate_password_hash(form.password.data), description=form.description.data, profile_pic=profile_pic, homepage=form.homepage.data, role=form.role.data, zodiac=form.zodiac.data) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 84: session['user_id'] = user.id - File: pizzasuicideclub/psc_app/users/views.py - > Line 87: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.home')) - File: pizzasuicideclub/psc_app/users/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) - File: pizzasuicideclub/psc_app/users/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('users/register.html',title='register', form=form) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 86, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=user.id)) - -Vulnerability 11: -File: pizzasuicideclub/psc_app/users/views.py - > User input at line 140, trigger word "get(": - user = User.query.get(userId) -Reassigned in: - File: pizzasuicideclub/psc_app/users/views.py - > Line 134: user = g.user - File: pizzasuicideclub/psc_app/users/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('users.profile',userId=userId)) -File: pizzasuicideclub/psc_app/users/views.py - > reaches line 145, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users/modify_password.html',form=form, user=user) - - - -neilduncan/FlickrPlaceholders -https://github.com/neilduncan/FlickrPlaceholders -Entry file: FlickrPlaceholders/main.py -Scanned: 2016-10-20 08:42:59.894866 -No vulnerabilities found. - - -amaterasu-/placeholder -https://github.com/amaterasu-/placeholder -Entry file: placeholder/image.py -Scanned: 2016-10-20 08:43:01.137334 -No vulnerabilities found. - - -koon-kai/kiblog -https://github.com/koon-kai/kiblog -Entry file: kiblog/app.py -Scanned: 2016-10-20 08:43:02.274226 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joelrojo/flask -https://github.com/joelrojo/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 08:43:02.834546 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -asgoel/Merge-flask -https://github.com/asgoel/Merge-flask -Entry file: Merge-flask/app.py -Scanned: 2016-10-20 08:43:03.817977 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gregimba/Vodka -https://github.com/gregimba/Vodka -Entry file: Vodka/app.py -Scanned: 2016-10-20 08:43:06.346362 -No vulnerabilities found. - - -corydolphin/flask-olinauth -https://github.com/corydolphin/flask-olinauth -Entry file: flask-olinauth/example.py -Scanned: 2016-10-20 08:43:07.746642 -No vulnerabilities found. - - -danielestevez/flasktutorial -https://github.com/danielestevez/flasktutorial -Entry file: None -Scanned: 2016-10-20 08:43:09.252066 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pityonline/flaskr -https://github.com/pityonline/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:43:09.755460 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabeesh/Studentapp-Flask -https://github.com/prabeesh/Studentapp-Flask -Entry file: Studentapp-Flask/test.py -Scanned: 2016-10-20 08:43:10.716458 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dproni/flask_test -https://github.com/dproni/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 08:43:27.811935 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scardine/flask-locale -https://github.com/scardine/flask-locale -Entry file: flask-locale/tests/__init__.py -Scanned: 2016-10-20 08:43:29.168445 -No vulnerabilities found. - - -callahad/temp-flask-persona-demo -https://github.com/callahad/temp-flask-persona-demo -Entry file: temp-flask-persona-demo/example.py -Scanned: 2016-10-20 08:43:29.749296 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kishorekdty/paint_using_flask -https://github.com/kishorekdty/paint_using_flask -Entry file: None -Scanned: 2016-10-20 08:43:31.239792 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kishorekdty/paint_using_flask. - -joshsee/GAE-flask-cms -https://github.com/joshsee/GAE-flask-cms -Entry file: GAE-flask-cms/flask/sessions.py -Scanned: 2016-10-20 08:43:37.765289 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rasheedh/Heroku-Paint-Using-Flask -https://github.com/rasheedh/Heroku-Paint-Using-Flask -Entry file: None -Scanned: 2016-10-20 08:43:39.274675 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Heroku-Paint-Using-Flask. - -sreekanthkaralmanna/heroku-paint-app-using-flask -https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask -Entry file: None -Scanned: 2016-10-20 08:43:39.774949 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask. - -mikewallace1979/milk -https://github.com/mikewallace1979/milk -Entry file: milk/milk.py -Scanned: 2016-10-20 08:43:43.038322 -No vulnerabilities found. - - -goonpug/goonpug-stats -https://github.com/goonpug/goonpug-stats -Entry file: goonpug-stats/goonpug/__init__.py -Scanned: 2016-10-20 08:43:46.394545 -No vulnerabilities found. - - -clly/blog.md -https://github.com/clly/blog.md -Entry file: blog/flaskr.py -Scanned: 2016-10-20 08:43:46.920117 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simplyluke/dothis -https://github.com/simplyluke/dothis -Entry file: dothis/dothis.py -Scanned: 2016-10-20 08:43:48.149067 -No vulnerabilities found. - - -oberkowitz/improv -https://github.com/oberkowitz/improv -Entry file: improv/mytest/app.py -Scanned: 2016-10-20 08:43:50.696310 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: improv/mytest/venv/lib/python2.7/genericpath.py - -mikeboers/Flask-Images -https://github.com/mikeboers/Flask-Images -Entry file: Flask-Images/tests/__init__.py -Scanned: 2016-10-20 08:43:53.644568 -No vulnerabilities found. - - -berlotto/flask-app-template -https://github.com/berlotto/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-20 08:44:00.635610 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -corydolphin/flask-jsonpify -https://github.com/corydolphin/flask-jsonpify -Entry file: flask-jsonpify/test.py -Scanned: 2016-10-20 08:44:03.053101 -No vulnerabilities found. - - -eadmundo/flask-static-blog -https://github.com/eadmundo/flask-static-blog -Entry file: flask-static-blog/app/__init__.py -Scanned: 2016-10-20 08:44:04.990840 -Vulnerability 1: -File: flask-static-blog/app/blueprints/blog/views.py - > User input at line 17, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: flask-static-blog/app/blueprints/blog/views.py - > Line 30: pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10)) - File: flask-static-blog/app/blueprints/blog/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0]) -File: flask-static-blog/app/blueprints/blog/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args) - -Vulnerability 2: -File: flask-static-blog/app/blueprints/blog/views.py - > User input at line 30, trigger word "get(": - pagination = query.paginate(page, current_app.config.get('BLOG_POSTS_PER_PAGE', 10)) -Reassigned in: - File: flask-static-blog/app/blueprints/blog/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('single_post.jinja',post=query.all()[0]) -File: flask-static-blog/app/blueprints/blog/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('posts.jinja',pagination=pagination, endpoint=request.endpoint, view_args=request.view_args) - - - -0atman/flask-basic -https://github.com/0atman/flask-basic -Entry file: flask-basic/flask-basic.py -Scanned: 2016-10-20 08:44:06.691395 -No vulnerabilities found. - - -clmns/flasktest -https://github.com/clmns/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 08:44:07.711630 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zfdang/memcached-in-openshift -https://github.com/zfdang/memcached-in-openshift -Entry file: memcached-in-openshift/wsgi/main.py -Scanned: 2016-10-20 08:44:09.202481 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garethpaul/flask-sample -https://github.com/garethpaul/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-20 08:44:10.199095 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -naveenpremchand02/flask_url -https://github.com/naveenpremchand02/flask_url -Entry file: flask_url/url.py -Scanned: 2016-10-20 08:44:10.696020 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xiechao06/Flask-NavBar -https://github.com/xiechao06/Flask-NavBar -Entry file: Flask-NavBar/flask_nav_bar.py -Scanned: 2016-10-20 08:44:11.669858 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cpdean/flask-oauth-tutorial -https://github.com/cpdean/flask-oauth-tutorial -Entry file: flask-oauth-tutorial/flaskr.py -Scanned: 2016-10-20 08:44:12.937681 -No vulnerabilities found. - - -nsfyn55/flask-mega-tutorial -https://github.com/nsfyn55/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-20 08:44:28.510435 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kshitizrimal/flaskr-modified -https://github.com/kshitizrimal/flaskr-modified -Entry file: flaskr-modified/flaskr.py -Scanned: 2016-10-20 08:44:29.087524 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prasanthkumara/Heroku-Paint-App-Using--Flask -https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask -Entry file: None -Scanned: 2016-10-20 08:44:32.063644 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/prasanthkumara/Heroku-Paint-App-Using--Flask. - -pyxze/PyxzeCorpus -https://github.com/pyxze/PyxzeCorpus -Entry file: PyxzeCorpus/corpus.py -Scanned: 2016-10-20 08:44:39.299261 -No vulnerabilities found. - - -crcsmnky/thehotspot -https://github.com/crcsmnky/thehotspot -Entry file: thehotspot/v2/app.py -Scanned: 2016-10-20 08:44:41.332880 -Vulnerability 1: -File: thehotspot/v2/app.py - > User input at line 54, trigger word "get(": - checkins_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('places.html',places=places, count=count, skip=checkins_skip) - -Vulnerability 2: -File: thehotspot/v2/app.py - > User input at line 64, trigger word "get(": - checkins_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users.html',users=users, count=count, skip=checkins_skip) - -Vulnerability 3: -File: thehotspot/v2/app.py - > User input at line 73, trigger word "get(": - checkins_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 82, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('checkins.html',checkins=checkins, users=users, places=places, skip=checkins_skip, count=count) - -Vulnerability 4: -File: thehotspot/v2/app.py - > User input at line 103, trigger word "get(": - cats_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('categories.html',categories=categories, count=count, skip=cats_skip) - -Vulnerability 5: -File: thehotspot/v2/app.py - > User input at line 114, trigger word "get(": - places_skip = int(request.args.get('skip', 0)) -File: thehotspot/v2/app.py - > reaches line 118, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.html',category=cat, places=places, mapped=places.clone(), count=cat['count'], skip=places_skip) - - - -etscrivner/sovereign-states -https://github.com/etscrivner/sovereign-states -Entry file: sovereign-states/sovereign_states/api.py -Scanned: 2016-10-20 08:44:42.717027 -No vulnerabilities found. - - -croach/cheap-and-scalable-webistes-with-flask-code -https://github.com/croach/cheap-and-scalable-webistes-with-flask-code -Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py -Scanned: 2016-10-20 08:44:44.089649 -No vulnerabilities found. - - -sreedathns/paint-app-using-heroku-and-flask -https://github.com/sreedathns/paint-app-using-heroku-and-flask -Entry file: None -Scanned: 2016-10-20 08:44:44.601452 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreedathns/paint-app-using-heroku-and-flask. - -nesv/cask -https://github.com/nesv/cask -Entry file: None -Scanned: 2016-10-20 08:44:47.099087 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask. - -chadgh/chessy -https://github.com/chadgh/chessy -Entry file: None -Scanned: 2016-10-20 08:44:47.616697 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wowo/pithermo -https://github.com/wowo/pithermo -Entry file: pithermo/pithermo.py -Scanned: 2016-10-20 08:44:51.581577 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aranasaurus/android-demo-server -https://github.com/aranasaurus/android-demo-server -Entry file: android-demo-server/app.py -Scanned: 2016-10-20 08:44:52.855867 -Vulnerability 1: -File: android-demo-server/app.py - > User input at line 21, trigger word "get(": - r = requests.get(url.format(query)) -Reassigned in: - File: android-demo-server/app.py - > Line 22: images = [(i, json.dumps(i)) for i in json.loads(r.text)['responseData']['results']] -File: android-demo-server/app.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',images=images) - - - -mjhea0/flask-intro -https://github.com/mjhea0/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 08:45:01.317195 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -deepgully/me -https://github.com/deepgully/me -Entry file: me/settings.py -Scanned: 2016-10-20 08:45:02.865850 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mickey06/Flask-principal-example -https://github.com/mickey06/Flask-principal-example -Entry file: Flask-principal-example/FPrincipals.py -Scanned: 2016-10-20 08:45:05.237206 -No vulnerabilities found. - - -crazygit/flask -https://github.com/crazygit/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 08:45:05.811223 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -wingu/flask_filters -https://github.com/wingu/flask_filters -Entry file: flask_filters/test_flask_filters.py -Scanned: 2016-10-20 08:45:07.141889 -No vulnerabilities found. - - -BuongiornoMIP/Reding -https://github.com/BuongiornoMIP/Reding -Entry file: Reding/reding/app.py -Scanned: 2016-10-20 08:45:10.712742 -No vulnerabilities found. - - -mphuie/flask_base -https://github.com/mphuie/flask_base -Entry file: flask_base/myapp/__init__.py -Scanned: 2016-10-20 08:45:13.545427 -No vulnerabilities found. - - -colwilson/flask-lazyapi -https://github.com/colwilson/flask-lazyapi -Entry file: flask-lazyapi/demo_server.py -Scanned: 2016-10-20 08:45:14.047065 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xiechao06/Flask-DataBrowser -https://github.com/xiechao06/Flask-DataBrowser -Entry file: Flask-DataBrowser/flask_databrowser/test/basetest.py -Scanned: 2016-10-20 08:45:14.563417 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -knowshan/flaskey -https://github.com/knowshan/flaskey -Entry file: flaskey/app/__init__.py -Scanned: 2016-10-20 08:45:16.032041 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Masagin/FlaskCelery -https://github.com/Masagin/FlaskCelery -Entry file: FlaskCelery/flask.py -Scanned: 2016-10-20 08:45:16.523810 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -denz/flask_introspect -https://github.com/denz/flask_introspect -Entry file: flask_introspect/test/test_blueprint.py -Scanned: 2016-10-20 08:45:29.452653 -No vulnerabilities found. - - -EvilDmitri/flask-mikroblog -https://github.com/EvilDmitri/flask-mikroblog -Entry file: flask-mikroblog/app/__init__.py -Scanned: 2016-10-20 08:45:31.158848 -No vulnerabilities found. - - -maxcnunes/flask_bravi -https://github.com/maxcnunes/flask_bravi -Entry file: flask_bravi/braviapp/__init__.py -Scanned: 2016-10-20 08:45:32.654585 -No vulnerabilities found. - - -zhemao/flask_demo -https://github.com/zhemao/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 08:45:38.667858 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SalemHarrache-Archive/flask_chat_eventsource -https://github.com/SalemHarrache-Archive/flask_chat_eventsource -Entry file: flask_chat_eventsource/server.py -Scanned: 2016-10-20 08:45:40.176919 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ryanolson/flask-couchdb-schematics -https://github.com/ryanolson/flask-couchdb-schematics -Entry file: flask-couchdb-schematics/example/guestbook.py -Scanned: 2016-10-20 08:45:43.792239 -Vulnerability 1: -File: flask-couchdb-schematics/example/guestbook.py - > User input at line 53, trigger word "get(": - page = paginate(Signature.all(), 5, request.args.get('start')) -File: flask-couchdb-schematics/example/guestbook.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page) - - - -pouyan-ghasemi/flask-sql-cms -https://github.com/pouyan-ghasemi/flask-sql-cms -Entry file: flask-sql-cms/app.py -Scanned: 2016-10-20 08:45:44.312857 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -texuf/myflaskproject -https://github.com/texuf/myflaskproject -Entry file: myflaskproject/hello.py -Scanned: 2016-10-20 08:45:45.557042 -No vulnerabilities found. - - -csesoc/bark-core -https://github.com/csesoc/bark-core -Entry file: bark-core/bark/__init__.py -Scanned: 2016-10-20 08:45:48.562772 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -croach/cheap-and-scalable-webistes-with-flask-code -https://github.com/croach/cheap-and-scalable-webistes-with-flask-code -Entry file: cheap-and-scalable-webistes-with-flask-code/generator.py -Scanned: 2016-10-20 08:45:52.987577 -No vulnerabilities found. - - -nesv/cask -https://github.com/nesv/cask -Entry file: None -Scanned: 2016-10-20 08:45:53.490281 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nesv/cask. - -lee212/fg-ws -https://github.com/lee212/fg-ws -Entry file: fg-ws/fgws/ws/FGWSApps.py -Scanned: 2016-10-20 08:45:53.991681 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brunsgaard/qwablog -https://github.com/brunsgaard/qwablog -Entry file: qwablog/qwablog.py -Scanned: 2016-10-20 08:46:00.382068 -No vulnerabilities found. - - -nutrislice/mandrill-webhook-redirector -https://github.com/nutrislice/mandrill-webhook-redirector -Entry file: mandrill-webhook-redirector/webhook-router.py -Scanned: 2016-10-20 08:46:02.775127 -Vulnerability 1: -File: mandrill-webhook-redirector/webhook-router.py - > User input at line 13, trigger word "form[": - mandrill_event = json.loads(request.form['mandrill_events']) -Reassigned in: - File: mandrill-webhook-redirector/webhook-router.py - > Line 14: metadata = mandrill_event[0]['msg']['metadata'] - File: mandrill-webhook-redirector/webhook-router.py - > Line 15: domain = metadata['domain'] -File: mandrill-webhook-redirector/webhook-router.py - > reaches line 16, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/') - - - -rubinovitz/fourequality -https://github.com/rubinovitz/fourequality -Entry file: fourequality/app.py -Scanned: 2016-10-20 08:46:06.275026 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -darylchang/Hacker-Viz -https://github.com/darylchang/Hacker-Viz -Entry file: Hacker-Viz/flaskDir.py -Scanned: 2016-10-20 08:46:06.776841 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alexlod/movielist -https://github.com/alexlod/movielist -Entry file: movielist/movielist.py -Scanned: 2016-10-20 08:46:08.288717 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dhumbert/literable -https://github.com/dhumbert/literable -Entry file: None -Scanned: 2016-10-20 08:46:08.792966 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dhumbert/literable. - -ArcTanSusan/Task_List -https://github.com/ArcTanSusan/Task_List -Entry file: Task_List/tipsy/tipsy.py -Scanned: 2016-10-20 08:46:11.311379 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rbuysse/url_shortener -https://github.com/rbuysse/url_shortener -Entry file: url_shortener/url.py -Scanned: 2016-10-20 08:46:14.818411 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mjhea0/flask-intro -https://github.com/mjhea0/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 08:46:16.025217 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seanrose/box-arcade -https://github.com/seanrose/box-arcade -Entry file: box-arcade/app/__init__.py -Scanned: 2016-10-20 08:46:17.019268 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -techniq/flask-wdb -https://github.com/techniq/flask-wdb -Entry file: flask-wdb/example.py -Scanned: 2016-10-20 08:46:18.340439 -No vulnerabilities found. - - -mphuie/flask_base -https://github.com/mphuie/flask_base -Entry file: flask_base/myapp/__init__.py -Scanned: 2016-10-20 08:46:21.291568 -No vulnerabilities found. - - -theho/flask-wsgi -https://github.com/theho/flask-wsgi -Entry file: flask-wsgi/wsgi.py -Scanned: 2016-10-20 08:46:31.319172 -No vulnerabilities found. - - -adityaathalye/flaskr -https://github.com/adityaathalye/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:46:31.856619 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -knowshan/flaskey -https://github.com/knowshan/flaskey -Entry file: flaskey/app/__init__.py -Scanned: 2016-10-20 08:46:33.391809 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyr/flaskapp -https://github.com/andyr/flaskapp -Entry file: None -Scanned: 2016-10-20 08:46:38.904887 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp. - -denz/flask_introspect -https://github.com/denz/flask_introspect -Entry file: flask_introspect/test/test_blueprint.py -Scanned: 2016-10-20 08:46:41.308778 -No vulnerabilities found. - - -ekfriis/flask-mbtiles -https://github.com/ekfriis/flask-mbtiles -Entry file: flask-mbtiles/mbtileserver.py -Scanned: 2016-10-20 08:46:43.571932 -No vulnerabilities found. - - -hyaticua/flask-blog -https://github.com/hyaticua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 08:46:45.131515 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -thearchduke/flask-boiler -https://github.com/thearchduke/flask-boiler -Entry file: None -Scanned: 2016-10-20 08:46:45.651951 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -StefanKjartansson/bower-flask -https://github.com/StefanKjartansson/bower-flask -Entry file: bower-flask/server.py -Scanned: 2016-10-20 08:46:48.952042 -No vulnerabilities found. - - -tanayseven/Voix -https://github.com/tanayseven/Voix -Entry file: None -Scanned: 2016-10-20 08:46:49.477207 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gatesphere/flaskr-flask-tutorial -https://github.com/gatesphere/flaskr-flask-tutorial -Entry file: flaskr-flask-tutorial/flaskr/flaskr.py -Scanned: 2016-10-20 08:46:53.748084 -No vulnerabilities found. - - -bazerk/baz-flask-base -https://github.com/bazerk/baz-flask-base -Entry file: baz-flask-base/app/app.py -Scanned: 2016-10-20 08:46:55.636538 -Vulnerability 1: -File: baz-flask-base/app/frontend/views.py - > User input at line 26, trigger word "get(": - form = RegisterForm(username=request.args.get('username', twitter_name), password=request.args.get('password', None)) -Reassigned in: - File: baz-flask-base/app/frontend/views.py - > Line 30: err = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets) - File: baz-flask-base/app/frontend/views.py - > Line 30: user = User.create(form.username.data, form.email.data, bcrypt.generate_password_hash(form.password.data),twitter_deets=twitter_deets) - File: baz-flask-base/app/frontend/views.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('frontend.login')) -File: baz-flask-base/app/frontend/views.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('frontend/register.html',form=form, twitter_name=twitter_name) - -Vulnerability 2: -File: baz-flask-base/app/frontend/views.py - > User input at line 48, trigger word "get(": - form = LoginForm(login=request.args.get('login', None), next=request.args.get('next', None)) -Reassigned in: - File: baz-flask-base/app/frontend/views.py - > Line 52: user = User.authenticate(form.login.data, form.password.data, bcrypt.check_password_hash) - File: baz-flask-base/app/frontend/views.py - > Line 57: session['user_id'] = user.id - File: baz-flask-base/app/frontend/views.py - > Line 61: ret_MAYBE_FUNCTION_NAME = redirect('') -File: baz-flask-base/app/frontend/views.py - > reaches line 65, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('frontend/login.html',form=form) - - - -ryanolson/flask-couchdb-schematics -https://github.com/ryanolson/flask-couchdb-schematics -Entry file: flask-couchdb-schematics/example/guestbook.py -Scanned: 2016-10-20 08:46:57.177170 -Vulnerability 1: -File: flask-couchdb-schematics/example/guestbook.py - > User input at line 53, trigger word "get(": - page = paginate(Signature.all(), 5, request.args.get('start')) -File: flask-couchdb-schematics/example/guestbook.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page) - - - -pouyan-ghasemi/flask-sql-cms -https://github.com/pouyan-ghasemi/flask-sql-cms -Entry file: flask-sql-cms/app.py -Scanned: 2016-10-20 08:46:59.693036 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Andrey-Khobnya/flask-sessions-mongo -https://github.com/Andrey-Khobnya/flask-sessions-mongo -Entry file: flask-sessions-mongo/flask-sessions-mongo/examples/loginsession.py -Scanned: 2016-10-20 08:47:03.056073 -No vulnerabilities found. - - -igrishaev/youtube-python-api-sample -https://github.com/igrishaev/youtube-python-api-sample -Entry file: youtube-python-api-sample/app.py -Scanned: 2016-10-20 08:47:05.096357 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nutrislice/mandrill-webhook-redirector -https://github.com/nutrislice/mandrill-webhook-redirector -Entry file: mandrill-webhook-redirector/webhook-router.py -Scanned: 2016-10-20 08:47:07.373261 -Vulnerability 1: -File: mandrill-webhook-redirector/webhook-router.py - > User input at line 13, trigger word "form[": - mandrill_event = json.loads(request.form['mandrill_events']) -Reassigned in: - File: mandrill-webhook-redirector/webhook-router.py - > Line 14: metadata = mandrill_event[0]['msg']['metadata'] - File: mandrill-webhook-redirector/webhook-router.py - > Line 15: domain = metadata['domain'] -File: mandrill-webhook-redirector/webhook-router.py - > reaches line 16, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(domain.rstrip('/') + '/menu/autounsub/') - - - -kfr2/pynances -https://github.com/kfr2/pynances -Entry file: pynances/pynances/pynances.py -Scanned: 2016-10-20 08:47:08.776599 -No vulnerabilities found. - - -WilliamMayor/geoffrey -https://github.com/WilliamMayor/geoffrey -Entry file: geoffrey/geoffrey.py -Scanned: 2016-10-20 08:47:10.046483 -No vulnerabilities found. - - -Timothee/Passerelle -https://github.com/Timothee/Passerelle -Entry file: Passerelle/passerelle.py -Scanned: 2016-10-20 08:47:11.419110 -No vulnerabilities found. - - -fusic-com/flask-todo -https://github.com/fusic-com/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-20 08:47:15.756147 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bkabrda/flask-whooshee -https://github.com/bkabrda/flask-whooshee -Entry file: flask-whooshee/test.py -Scanned: 2016-10-20 08:47:17.463765 -No vulnerabilities found. - - -DavidWittman/csrgenerator.com -https://github.com/DavidWittman/csrgenerator.com -Entry file: None -Scanned: 2016-10-20 08:47:18.455989 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -techniq/flask-wdb -https://github.com/techniq/flask-wdb -Entry file: flask-wdb/example.py -Scanned: 2016-10-20 08:47:19.722180 -No vulnerabilities found. - - -1000ch/flask-handson -https://github.com/1000ch/flask-handson -Entry file: flask-handson/flaskr/__init__.py -Scanned: 2016-10-20 08:47:20.239632 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajuna/car-registration -https://github.com/ajuna/car-registration -Entry file: None -Scanned: 2016-10-20 08:47:20.738370 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ajuna/car-registration. - -jishnujagajeeve/Flaskr -https://github.com/jishnujagajeeve/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 08:47:29.280696 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Basher51/Flaskr -https://github.com/Basher51/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 08:47:30.791935 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyr/flaskapp -https://github.com/andyr/flaskapp -Entry file: None -Scanned: 2016-10-20 08:47:32.298682 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/andyr/flaskapp. - -sagnew/Prank-Roulette -https://github.com/sagnew/Prank-Roulette -Entry file: Prank-Roulette/app.py -Scanned: 2016-10-20 08:47:33.828298 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kaste/FlaskDeferredHandler -https://github.com/kaste/FlaskDeferredHandler -Entry file: FlaskDeferredHandler/flask_handler_test.py -Scanned: 2016-10-20 08:47:40.122682 -No vulnerabilities found. - - -adityaathalye/flaskr2 -https://github.com/adityaathalye/flaskr2 -Entry file: flaskr2/app.py -Scanned: 2016-10-20 08:47:41.372411 -No vulnerabilities found. - - -ConceptPending/flaskTemplate -https://github.com/ConceptPending/flaskTemplate -Entry file: flaskTemplate/server.py -Scanned: 2016-10-20 08:47:46.636042 -No vulnerabilities found. - - -AlexMost/Flask-starter -https://github.com/AlexMost/Flask-starter -Entry file: Flask-starter/app.py -Scanned: 2016-10-20 08:47:47.930948 -No vulnerabilities found. - - -samgclarke/flask-microblog -https://github.com/samgclarke/flask-microblog -Entry file: None -Scanned: 2016-10-20 08:47:48.440913 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jonomillin/learning-flask -https://github.com/jonomillin/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 08:47:48.999270 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -berlotto/hero-flask -https://github.com/berlotto/hero-flask -Entry file: hero-flask/hero/__init__.py -Scanned: 2016-10-20 08:47:50.374245 -No vulnerabilities found. - - -nthfloor/Flask_learn -https://github.com/nthfloor/Flask_learn -Entry file: Flask_learn/login_system/flskr.py -Scanned: 2016-10-20 08:48:00.491753 -Vulnerability 1: -File: Flask_learn/login_system/flskr.py - > User input at line 116, trigger word "get(": - username = request.form.get('username') -File: Flask_learn/login_system/flskr.py - > reaches line 119, trigger word "filter(": - user = User.query.filter(User.name == username and User.password == password).first() - -Vulnerability 2: -File: Flask_learn/login_system/flskr.py - > User input at line 117, trigger word "get(": - password = request.form.get('password') -File: Flask_learn/login_system/flskr.py - > reaches line 119, trigger word "filter(": - user = User.query.filter(User.name == username and User.password == password).first() - - - -mmcgahan/flask-labs-bb -https://github.com/mmcgahan/flask-labs-bb -Entry file: flask-labs-bb/flask_labs/__init__.py -Scanned: 2016-10-20 08:48:04.971032 -Vulnerability 1: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 29, trigger word "filter(": - user = db.session.query(User).filter(User.username == login_form.username.data).first() - -Vulnerability 2: -File: flask-labs-bb/flask_labs/views.py - > User input at line 29, trigger word ".data": - user = db.session.query(User).filter(User.username == login_form.username.data).first() -File: flask-labs-bb/flask_labs/views.py - > reaches line 29, trigger word "filter(": - user = db.session.query(User).filter(User.username == login_form.username.data).first() - -Vulnerability 3: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 36, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index')) - -Vulnerability 4: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 36, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(login_form.next.data or url_for('index')) - -Vulnerability 5: -File: flask-labs-bb/flask_labs/views.py - > User input at line 27, trigger word "get(": - login_form = LoginForm(request.form,next=request.args.get('next')) -Reassigned in: - File: flask-labs-bb/flask_labs/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(request.referrer) -File: flask-labs-bb/flask_labs/views.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',login_form=login_form) - - - -daisuzu/flask-app-sample -https://github.com/daisuzu/flask-app-sample -Entry file: flask-app-sample/db.py -Scanned: 2016-10-20 08:48:06.301189 -No vulnerabilities found. - - -penpyt/flask-couchdb-auth -https://github.com/penpyt/flask-couchdb-auth -Entry file: flask-couchdb-auth/example/guestbook.py -Scanned: 2016-10-20 08:48:07.785898 -Vulnerability 1: -File: flask-couchdb-auth/example/guestbook.py - > User input at line 53, trigger word "get(": - page = paginate(Signature.all(), 5, request.args.get('start')) -File: flask-couchdb-auth/example/guestbook.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('display.html',page=page) - - - -rodreegez/flask-twitter-auth -https://github.com/rodreegez/flask-twitter-auth -Entry file: None -Scanned: 2016-10-20 08:48:08.305451 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rodreegez/flask-twitter-auth. - -DamnedFacts/flask-hello-world -https://github.com/DamnedFacts/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 08:48:08.843770 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ariamoraine/kitten-generator -https://github.com/ariamoraine/kitten-generator -Entry file: kitten-generator/flaskhello.py -Scanned: 2016-10-20 08:48:10.605778 -No vulnerabilities found. - - -honestappalachia/honest_site -https://github.com/honestappalachia/honest_site -Entry file: honest_site/run.py -Scanned: 2016-10-20 08:48:11.967503 -Vulnerability 1: -File: honest_site/run.py - > User input at line 36, trigger word "get(": - template = page.meta.get('template', 'default.html') -File: honest_site/run.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,page=page) - - - -daikeshi/one-dollar-metasearch-engine -https://github.com/daikeshi/one-dollar-metasearch-engine -Entry file: one-dollar-metasearch-engine/app/__init__.py -Scanned: 2016-10-20 08:48:12.468636 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -msalahi/art-party -https://github.com/msalahi/art-party -Entry file: art-party/app.py -Scanned: 2016-10-20 08:48:18.817291 -No vulnerabilities found. - - -honestappalachia/honest_hiddenservice -https://github.com/honestappalachia/honest_hiddenservice -Entry file: honest_hiddenservice/run.py -Scanned: 2016-10-20 08:48:19.332967 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -saltire/artpubpy -https://github.com/saltire/artpubpy -Entry file: artpubpy/artpubpy.py -Scanned: 2016-10-20 08:48:19.838529 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mcniac/simple-blog -https://github.com/mcniac/simple-blog -Entry file: simple-blog/tumblelog/__init__.py -Scanned: 2016-10-20 08:48:25.837053 -No vulnerabilities found. - - -ryanrdetzel/blimp-commit -https://github.com/ryanrdetzel/blimp-commit -Entry file: blimp-commit/blimp_commit.py -Scanned: 2016-10-20 08:48:27.135968 -No vulnerabilities found. - - -fusic-com/flask-webcache -https://github.com/fusic-com/flask-webcache -Entry file: flask-webcache/contrib/sleepycalc/app.py -Scanned: 2016-10-20 08:48:29.483504 -No vulnerabilities found. - - -rehandalal/flask-mobility -https://github.com/rehandalal/flask-mobility -Entry file: flask-mobility/flask_mobility/tests/test_decorators.py -Scanned: 2016-10-20 08:48:31.694444 -Vulnerability 1: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 46, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 48, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 2: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 46, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 51, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'off') - -Vulnerability 3: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 67, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 69, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 4: -File: flask-mobility/flask_mobility/tests/test_decorators.py - > User input at line 67, trigger word "get(": - MOBILE_COOKIE = self.app.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_decorators.py - > reaches line 72, trigger word "set_cookie(": - self.client.set_cookie('localhost', MOBILE_COOKIE, 'off') - -Vulnerability 5: -File: flask-mobility/flask_mobility/tests/test_mobility.py - > User input at line 33, trigger word "get(": - MOBILE_COOKIE = self.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_mobility.py - > reaches line 36, trigger word "set_cookie(": - self.app.set_cookie('localhost', MOBILE_COOKIE, 'on') - -Vulnerability 6: -File: flask-mobility/flask_mobility/tests/test_mobility.py - > User input at line 33, trigger word "get(": - MOBILE_COOKIE = self.config.get('MOBILE_COOKIE') -File: flask-mobility/flask_mobility/tests/test_mobility.py - > reaches line 40, trigger word "set_cookie(": - self.app.set_cookie('localhost', MOBILE_COOKIE, 'off') - - - -kelp404/Flask-GAE -https://github.com/kelp404/Flask-GAE -Entry file: None -Scanned: 2016-10-20 08:48:32.199729 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jaysonsantos/jinja-assets-compressor -https://github.com/jaysonsantos/jinja-assets-compressor -Entry file: jinja-assets-compressor/jac/contrib/flask.py -Scanned: 2016-10-20 08:48:34.037894 -No vulnerabilities found. - - -nabetama/flaskr -https://github.com/nabetama/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:48:40.043998 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sagnew/Prank-Roulette -https://github.com/sagnew/Prank-Roulette -Entry file: Prank-Roulette/app.py -Scanned: 2016-10-20 08:48:41.550959 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jpscaletti/authcode -https://github.com/jpscaletti/authcode -Entry file: authcode/examples/default/app.py -Scanned: 2016-10-20 08:48:47.745519 -No vulnerabilities found. - - -samgclarke/flask-microblog -https://github.com/samgclarke/flask-microblog -Entry file: None -Scanned: 2016-10-20 08:48:48.732799 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -shunyata/flask-helloworld -https://github.com/shunyata/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-20 08:48:50.006192 -No vulnerabilities found. - - -stephen-allison/basic-flask -https://github.com/stephen-allison/basic-flask -Entry file: None -Scanned: 2016-10-20 08:48:50.513513 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/stephen-allison/basic-flask. - -bollwyvl/flask-reloaded -https://github.com/bollwyvl/flask-reloaded -Entry file: None -Scanned: 2016-10-20 08:48:54.017752 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bollwyvl/flask-reloaded. - -kitanata/flask-demo -https://github.com/kitanata/flask-demo -Entry file: None -Scanned: 2016-10-20 08:49:01.544824 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kitanata/flask-demo. - -berlotto/hero-flask -https://github.com/berlotto/hero-flask -Entry file: hero-flask/hero/__init__.py -Scanned: 2016-10-20 08:49:06.912299 -No vulnerabilities found. - - -flyingsparx/MongoFlask -https://github.com/flyingsparx/MongoFlask -Entry file: MongoFlask/application.py -Scanned: 2016-10-20 08:49:08.209674 -Vulnerability 1: -File: MongoFlask/application.py - > User input at line 39, trigger word "form[": - person = User.query.filter(User.name == request.form['username']).first() -File: MongoFlask/application.py - > reaches line 39, trigger word "filter(": - person = User.query.filter(User.name == request.form['username']).first() - -Vulnerability 2: -File: MongoFlask/application.py - > User input at line 64, trigger word "form[": - person = User.query.filter(User.name == request.form['username']).first() -Reassigned in: - File: MongoFlask/application.py - > Line 67: session['id'] = person.id -File: MongoFlask/application.py - > reaches line 64, trigger word "filter(": - person = User.query.filter(User.name == request.form['username']).first() - - - -DanAlbert/flask-guestbook -https://github.com/DanAlbert/flask-guestbook -Entry file: flask-guestbook/guestbook.py -Scanned: 2016-10-20 08:49:09.492858 -No vulnerabilities found. - - -kirkeby/empty-flask -https://github.com/kirkeby/empty-flask -Entry file: empty-flask/app/app.py -Scanned: 2016-10-20 08:49:10.497664 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rehandalal/buchner -https://github.com/rehandalal/buchner -Entry file: buchner/buchner/project-template/PROJECTMODULE/main.py -Scanned: 2016-10-20 08:49:14.127244 -No vulnerabilities found. - - -vitalk/flask-staticutils -https://github.com/vitalk/flask-staticutils -Entry file: flask-staticutils/tests/test_app/__init__.py -Scanned: 2016-10-20 08:49:15.508610 -No vulnerabilities found. - - -chiwong/flask_quickstart -https://github.com/chiwong/flask_quickstart -Entry file: flask_quickstart/hello.py -Scanned: 2016-10-20 08:49:16.115118 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_quickstart/venv_hello/lib/python2.6/genericpath.py - -archieyang/flask_app -https://github.com/archieyang/flask_app -Entry file: None -Scanned: 2016-10-20 08:49:16.618051 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/archieyang/flask_app. - -ipfans/openshift-flask-template -https://github.com/ipfans/openshift-flask-template -Entry file: openshift-flask-template/wsgi/mainapp.py -Scanned: 2016-10-20 08:49:17.981618 -No vulnerabilities found. - - -minhtuev/flask-google-map-example -https://github.com/minhtuev/flask-google-map-example -Entry file: flask-google-map-example/server.py -Scanned: 2016-10-20 08:49:20.263237 -No vulnerabilities found. - - -DamnedFacts/flask-hello-world -https://github.com/DamnedFacts/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 08:49:20.810466 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -philangist/url-shorten -https://github.com/philangist/url-shorten -Entry file: url-shorten/shorten.py -Scanned: 2016-10-20 08:49:21.314895 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fabionatali/DigiWebStats -https://github.com/fabionatali/DigiWebStats -Entry file: DigiWebStats/app.py -Scanned: 2016-10-20 08:49:22.928634 -Vulnerability 1: -File: DigiWebStats/app.py - > User input at line 31, trigger word "get(": - start_date = request.args.get('start_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 47, trigger word "execute(": - data = engine.execute(query).fetchall() - -Vulnerability 2: -File: DigiWebStats/app.py - > User input at line 32, trigger word "get(": - end_date = request.args.get('end_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 47, trigger word "execute(": - data = engine.execute(query).fetchall() - -Vulnerability 3: -File: DigiWebStats/app.py - > User input at line 31, trigger word "get(": - start_date = request.args.get('start_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 41: start_date = datetime.strptime(start_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 50, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data) - -Vulnerability 4: -File: DigiWebStats/app.py - > User input at line 32, trigger word "get(": - end_date = request.args.get('end_date', None) -Reassigned in: - File: DigiWebStats/app.py - > Line 42: end_date = datetime.strptime(end_date, DATE_FORMAT).date() - File: DigiWebStats/app.py - > Line 46: query = settings.DB_QUERY % (start_date, end_date) - File: DigiWebStats/app.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: DigiWebStats/app.py - > Line 37: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index',start_date=today, end_date=today)) -File: DigiWebStats/app.py - > reaches line 50, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',start_date=start_date, end_date=end_date, data=data) - - - -confessin/addressbook -https://github.com/confessin/addressbook -Entry file: addressbook/addressbook.py -Scanned: 2016-10-20 08:49:27.301515 -No vulnerabilities found. - - -nafur/flmpc -https://github.com/nafur/flmpc -Entry file: flmpc/main.py -Scanned: 2016-10-20 08:49:28.716368 -No vulnerabilities found. - - -honestappalachia/honest_hiddenservice -https://github.com/honestappalachia/honest_hiddenservice -Entry file: honest_hiddenservice/run.py -Scanned: 2016-10-20 08:49:29.238538 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kvalle/greetr -https://github.com/kvalle/greetr -Entry file: greetr/greetr/__init__.py -Scanned: 2016-10-20 08:49:31.916979 -No vulnerabilities found. - - -mjhea0/brew -https://github.com/mjhea0/brew -Entry file: brew/app.py -Scanned: 2016-10-20 08:49:36.960780 -No vulnerabilities found. - - -dan-v/crossfitboxreview -https://github.com/dan-v/crossfitboxreview -Entry file: crossfitboxreview/seed_affiliates.py -Scanned: 2016-10-20 08:49:37.640637 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DoctorMalboro/leandropoblet.com -https://github.com/DoctorMalboro/leandropoblet.com -Entry file: None -Scanned: 2016-10-20 08:49:38.140652 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ryanrdetzel/blimp-commit -https://github.com/ryanrdetzel/blimp-commit -Entry file: blimp-commit/blimp_commit.py -Scanned: 2016-10-20 08:49:41.409666 -No vulnerabilities found. - - -danielholmstrom/flask-alchemyview -https://github.com/danielholmstrom/flask-alchemyview -Entry file: flask-alchemyview/tests/test_with_flask_sqlalchemy.py -Scanned: 2016-10-20 08:49:50.421483 -Vulnerability 1: -File: flask-alchemyview/tests/test_view.py - > User input at line 150, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:get',id=model_id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 150, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:get',id=model_id)) - -Vulnerability 2: -File: flask-alchemyview/tests/test_view.py - > User input at line 154, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:get',id='a string')) -File: flask-alchemyview/tests/test_view.py - > reaches line 154, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:get',id='a string')) - -Vulnerability 3: -File: flask-alchemyview/tests/test_view.py - > User input at line 181, trigger word "get(": - m = self.session.query(SimpleModel).get(model_id) -Reassigned in: - File: flask-alchemyview/tests/test_view.py - > Line 174: m = SimpleModel('name') - File: flask-alchemyview/tests/test_view.py - > Line 177: model_id = m.id -File: flask-alchemyview/tests/test_view.py - > reaches line 178, trigger word "url_for(": - response = self.json_put(url_for('SimpleModelView:put',id=model_id), 'name''new name') - -Vulnerability 4: -File: flask-alchemyview/tests/test_view.py - > User input at line 197, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:delete',id=model_id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 197, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:delete',id=model_id)) - -Vulnerability 5: -File: flask-alchemyview/tests/test_view.py - > User input at line 209, trigger word "get(": - m = self.session.query(SimpleModel).get(model_id) -Reassigned in: - File: flask-alchemyview/tests/test_view.py - > Line 202: m = SimpleModel('name') - File: flask-alchemyview/tests/test_view.py - > Line 205: model_id = m.id -File: flask-alchemyview/tests/test_view.py - > reaches line 206, trigger word "url_for(": - response = self.json_delete(url_for('SimpleModelView:put',id=model_id)) - -Vulnerability 6: -File: flask-alchemyview/tests/test_view.py - > User input at line 236, trigger word "get(": - response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10)) -File: flask-alchemyview/tests/test_view.py - > reaches line 236, trigger word "url_for(": - response = self.json_get(url_for('SimpleModelView:index',sortby='id', offset=10)) - -Vulnerability 7: -File: flask-alchemyview/tests/test_view.py - > User input at line 246, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 246, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) - -Vulnerability 8: -File: flask-alchemyview/tests/test_view.py - > User input at line 251, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id='a string')) -File: flask-alchemyview/tests/test_view.py - > reaches line 251, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id='a string')) - -Vulnerability 9: -File: flask-alchemyview/tests/test_view.py - > User input at line 258, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid')) -File: flask-alchemyview/tests/test_view.py - > reaches line 258, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:index',sortby='id', offset='invalid')) - -Vulnerability 10: -File: flask-alchemyview/tests/test_view.py - > User input at line 266, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:index')) -File: flask-alchemyview/tests/test_view.py - > reaches line 266, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:index')) - -Vulnerability 11: -File: flask-alchemyview/tests/test_view.py - > User input at line 279, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) -File: flask-alchemyview/tests/test_view.py - > reaches line 279, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=m.id)) - -Vulnerability 12: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > reaches line 56, trigger word "url_for(": - response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False) - -Vulnerability 13: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy.py - > reaches line 67, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') - -Vulnerability 14: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > reaches line 56, trigger word "url_for(": - response = self.client.post(url_for('SimpleModelView:post'),content_type='application/json', headers=[('Accept', 'application/json')], data=json.dumps('name''a name'), follow_redirects=False) - -Vulnerability 15: -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > User input at line 67, trigger word "get(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') -File: flask-alchemyview/tests/test_with_flask_sqlalchemy_session.py - > reaches line 67, trigger word "url_for(": - response = self.client.get(url_for('SimpleModelView:get',id=model_id),headers=[('Accept', 'application/json')], content_type='application/json') - - - -vovantics/flask-bluebone -https://github.com/vovantics/flask-bluebone -Entry file: flask-bluebone/app/app.py -Scanned: 2016-10-20 08:49:50.976247 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -jpscaletti/authcode -https://github.com/jpscaletti/authcode -Entry file: authcode/examples/default/app.py -Scanned: 2016-10-20 08:49:56.675841 -No vulnerabilities found. - - -abulte/flask-arduino-websocket-sqlite -https://github.com/abulte/flask-arduino-websocket-sqlite -Entry file: flask-arduino-websocket-sqlite/app.py -Scanned: 2016-10-20 08:49:58.069765 -No vulnerabilities found. - - -futuregrid/flask_cm -https://github.com/futuregrid/flask_cm -Entry file: flask_cm/examples/forms/app.py -Scanned: 2016-10-20 08:50:09.835073 -Vulnerability 1: -File: flask_cm/examples/forms/app.py - > User input at line 24, trigger word "get(": - comments = session.get('comments', []) -File: flask_cm/examples/forms/app.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',comments=comments, form=form) - - - -mies/flask-heroku -https://github.com/mies/flask-heroku -Entry file: flask-heroku/main.py -Scanned: 2016-10-20 08:50:12.128815 -No vulnerabilities found. - - -mozillazg/flask-demo -https://github.com/mozillazg/flask-demo -Entry file: None -Scanned: 2016-10-20 08:50:12.631626 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mozillazg/flask-demo. - -toastercup/flask-social -https://github.com/toastercup/flask-social -Entry file: flask-social/app.py -Scanned: 2016-10-20 08:50:13.127639 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoest/flask-bardienst -https://github.com/hoest/flask-bardienst -Entry file: flask-bardienst/bardienst/__init__.py -Scanned: 2016-10-20 08:50:16.387546 -No vulnerabilities found. - - -danillosouza/flask-boilerplate -https://github.com/danillosouza/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 08:50:16.885384 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danillosouza/flask-boilerplate. - -dogrdon/flask-map -https://github.com/dogrdon/flask-map -Entry file: None -Scanned: 2016-10-20 08:50:17.409474 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sapid/Flask-Community -https://github.com/sapid/Flask-Community -Entry file: None -Scanned: 2016-10-20 08:50:17.918542 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sapid/Flask-Community. - -jaseemkp/flask-students-app -https://github.com/jaseemkp/flask-students-app -Entry file: flask-students-app/students.py -Scanned: 2016-10-20 08:50:20.905155 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -minhtuev/flask-google-map-example -https://github.com/minhtuev/flask-google-map-example -Entry file: flask-google-map-example/server.py -Scanned: 2016-10-20 08:50:22.209332 -No vulnerabilities found. - - -garbados/flask-the-gauntlet -https://github.com/garbados/flask-the-gauntlet -Entry file: flask-the-gauntlet/app.py -Scanned: 2016-10-20 08:50:28.007021 -No vulnerabilities found. - - -NoxDineen/microblog -https://github.com/NoxDineen/microblog -Entry file: None -Scanned: 2016-10-20 08:50:28.506145 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kaibin/Condom_Data_Server -https://github.com/Kaibin/Condom_Data_Server -Entry file: Condom_Data_Server/app.py -Scanned: 2016-10-20 08:50:30.033560 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nathanrosspowell/frozenboots -https://github.com/nathanrosspowell/frozenboots -Entry file: None -Scanned: 2016-10-20 08:50:33.032355 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nathanrosspowell/frozenboots. - -craneon/debutante -https://github.com/craneon/debutante -Entry file: debutante/app.py -Scanned: 2016-10-20 08:50:38.563463 -Vulnerability 1: -File: debutante/app.py - > User input at line 14, trigger word "form[": - name1 = request.form['name1'] -File: debutante/app.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age)) - -Vulnerability 2: -File: debutante/app.py - > User input at line 15, trigger word "form[": - name2 = request.form['name2'] -File: debutante/app.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age)) - -Vulnerability 3: -File: debutante/app.py - > User input at line 16, trigger word "form[": - age = request.form['age'] -File: debutante/app.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('submit.html',name1=name1, name2=name2, bio=biogenerate(name1, name2, age)) - - - -kljensen/async-flask-sqlalchemy-example -https://github.com/kljensen/async-flask-sqlalchemy-example -Entry file: async-flask-sqlalchemy-example/server.py -Scanned: 2016-10-20 08:50:40.754991 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kommmy/Flask -https://github.com/kommmy/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 08:50:42.273357 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rbika/flaskm -https://github.com/rbika/flaskm -Entry file: flaskm/flaskm.py -Scanned: 2016-10-20 08:50:52.738317 -No vulnerabilities found. - - -catfive/flaskr -https://github.com/catfive/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:50:53.248788 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikedll/flasksqlitedemo -https://github.com/mikedll/flasksqlitedemo -Entry file: flasksqlitedemo/app.py -Scanned: 2016-10-20 08:50:53.762549 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GerardoGR/flask-boilerplate -https://github.com/GerardoGR/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 08:50:57.278466 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/GerardoGR/flask-boilerplate. - -edouardswiac/linkstash-flask -https://github.com/edouardswiac/linkstash-flask -Entry file: linkstash-flask/app.py -Scanned: 2016-10-20 08:51:01.789354 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mies/flask-heroku -https://github.com/mies/flask-heroku -Entry file: flask-heroku/main.py -Scanned: 2016-10-20 08:51:07.098615 -No vulnerabilities found. - - -mattolsen1/flask_tumblelog -https://github.com/mattolsen1/flask_tumblelog -Entry file: flask_tumblelog/tumblelog/__init__.py -Scanned: 2016-10-20 08:51:11.582373 -No vulnerabilities found. - - -hoest/flask-bardienst -https://github.com/hoest/flask-bardienst -Entry file: flask-bardienst/bardienst/__init__.py -Scanned: 2016-10-20 08:51:12.845235 -No vulnerabilities found. - - -eudaimonious/HangmanWebsite -https://github.com/eudaimonious/HangmanWebsite -Entry file: HangmanWebsite/application_hangman.py -Scanned: 2016-10-20 08:51:13.991638 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bracken1983/flaskBlogDemo -https://github.com/bracken1983/flaskBlogDemo -Entry file: flaskBlogDemo/flask-sqlalchemy-test.py -Scanned: 2016-10-20 08:51:14.602329 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaseemkp/flask-students-app -https://github.com/jaseemkp/flask-students-app -Entry file: flask-students-app/students.py -Scanned: 2016-10-20 08:51:16.101517 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pinchsoft/flask-newrelic-dotcloud -https://github.com/pinchsoft/flask-newrelic-dotcloud -Entry file: flask-newrelic-dotcloud/app.py -Scanned: 2016-10-20 08:51:18.365101 -No vulnerabilities found. - - -PurplePilot/zanzeeba -https://github.com/PurplePilot/zanzeeba -Entry file: zanzeeba/appstd.py -Scanned: 2016-10-20 08:51:18.959152 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hit9/flask-sign-in-with-github.py -https://github.com/hit9/flask-sign-in-with-github.py -Entry file: None -Scanned: 2016-10-20 08:51:19.460709 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bscarlett/personal-site -https://github.com/bscarlett/personal-site -Entry file: personal-site/PersonalSite/__init__.py -Scanned: 2016-10-20 08:51:22.721865 -No vulnerabilities found. - - -cypx/trocr -https://github.com/cypx/trocr -Entry file: trocr/trocr.py -Scanned: 2016-10-20 08:51:23.731086 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ungarst/p4p_svr -https://github.com/ungarst/p4p_svr -Entry file: p4p_svr/server/__init__.py -Scanned: 2016-10-20 08:51:27.258907 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -koordinates/py-pubtkt -https://github.com/koordinates/py-pubtkt -Entry file: py-pubtkt/app.py -Scanned: 2016-10-20 08:51:28.751464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jawr/flask-contact -https://github.com/jawr/flask-contact -Entry file: flask-contact/main.py -Scanned: 2016-10-20 08:51:33.392285 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wbolster/flask-uuid -https://github.com/wbolster/flask-uuid -Entry file: flask-uuid/test_flask_uuid.py -Scanned: 2016-10-20 08:51:38.816627 -No vulnerabilities found. - - -pyr/url-shortener -https://github.com/pyr/url-shortener -Entry file: url-shortener/url_shortener.py -Scanned: 2016-10-20 08:51:39.340815 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vmi356/filemanager -https://github.com/vmi356/filemanager -Entry file: filemanager/manager.py -Scanned: 2016-10-20 08:51:40.882414 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stef/tlsauth -https://github.com/stef/tlsauth -Entry file: tlsauth/flask-demo/webapp.py -Scanned: 2016-10-20 08:51:50.375362 -No vulnerabilities found. - - -cratejoy/flask-experiment -https://github.com/cratejoy/flask-experiment -Entry file: flask-experiment/test/test.py -Scanned: 2016-10-20 08:51:51.887404 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -openfree/flaskr -https://github.com/openfree/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:51:53.391917 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulthrissur/Flask_app -https://github.com/rahulthrissur/Flask_app -Entry file: Flask_app/test.py -Scanned: 2016-10-20 08:51:57.394468 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jcerise/flask-photos -https://github.com/jcerise/flask-photos -Entry file: flask-photos/app.py -Scanned: 2016-10-20 08:52:02.696926 -No vulnerabilities found. - - -grimkeke/miniblog -https://github.com/grimkeke/miniblog -Entry file: miniblog/app/__init__.py -Scanned: 2016-10-20 08:52:12.499359 -No vulnerabilities found. - - -rasheedh/Paint-Using-Flask---Mongodb- -https://github.com/rasheedh/Paint-Using-Flask---Mongodb- -Entry file: None -Scanned: 2016-10-20 08:52:13.515585 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rasheedh/Paint-Using-Flask---Mongodb-. - -Pitxon/sivir -https://github.com/Pitxon/sivir -Entry file: sivir/app.py -Scanned: 2016-10-20 08:52:14.760628 -No vulnerabilities found. - - -sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB -https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB -Entry file: None -Scanned: 2016-10-20 08:52:15.274761 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sreekanthkaralmanna/heroku-paint-app-using-flask-and-mongoDB. - -ssidorenko/twisker -https://github.com/ssidorenko/twisker -Entry file: twisker/flask/sessions.py -Scanned: 2016-10-20 08:52:16.822052 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Gabriele91/rss-soap-server -https://github.com/Gabriele91/rss-soap-server -Entry file: rss-soap-server/app.py -Scanned: 2016-10-20 08:52:24.669525 -No vulnerabilities found. - - -einashaddad/follow_app -https://github.com/einashaddad/follow_app -Entry file: follow_app/web_button.py -Scanned: 2016-10-20 08:52:25.185931 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cypx/trocr -https://github.com/cypx/trocr -Entry file: trocr/trocr.py -Scanned: 2016-10-20 08:52:25.679682 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -haizaar/microtweet -https://github.com/haizaar/microtweet -Entry file: microtweet/server.py -Scanned: 2016-10-20 08:52:26.198686 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jawr/flask-contact -https://github.com/jawr/flask-contact -Entry file: flask-contact/main.py -Scanned: 2016-10-20 08:52:27.524275 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulkmr/flask-bigapp-template -https://github.com/rahulkmr/flask-bigapp-template -Entry file: flask-bigapp-template/main.py -Scanned: 2016-10-20 08:52:28.053345 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stef/flask-tlsauth -https://github.com/stef/flask-tlsauth -Entry file: flask-tlsauth/demo/webapp.py -Scanned: 2016-10-20 08:52:29.385416 -No vulnerabilities found. - - -kennethreitz/elephant -https://github.com/kennethreitz/elephant -Entry file: elephant/elephant.py -Scanned: 2016-10-20 08:52:29.983517 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stef/tlsauth -https://github.com/stef/tlsauth -Entry file: tlsauth/flask-demo/webapp.py -Scanned: 2016-10-20 08:52:32.960884 -No vulnerabilities found. - - -topherjaynes/flasktut -https://github.com/topherjaynes/flasktut -Entry file: flasktut/app/__init__.py -Scanned: 2016-10-20 08:52:35.081531 -No vulnerabilities found. - - -elboby/flask-config-override -https://github.com/elboby/flask-config-override -Entry file: flask-config-override/tests/basic_flask_test.py -Scanned: 2016-10-20 08:52:38.595072 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sherzberg/flask-native-package -https://github.com/sherzberg/flask-native-package -Entry file: flask-native-package/application.py -Scanned: 2016-10-20 08:52:40.912949 -No vulnerabilities found. - - -McrCoderDojo/Flask-Webapps -https://github.com/McrCoderDojo/Flask-Webapps -Entry file: Flask-Webapps/flask1.py -Scanned: 2016-10-20 08:52:42.217861 -No vulnerabilities found. - - -xrefor/flask_tut -https://github.com/xrefor/flask_tut -Entry file: flask_tut/flaskr.py -Scanned: 2016-10-20 08:52:43.493034 -No vulnerabilities found. - - -xrefor/flask_stuff -https://github.com/xrefor/flask_stuff -Entry file: flask_stuff/main.py -Scanned: 2016-10-20 08:52:44.771262 -No vulnerabilities found. - - -akbarovs/flask-sandbox -https://github.com/akbarovs/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-20 08:52:50.294725 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adesst/flask-blog -https://github.com/adesst/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 08:52:52.840742 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -gourneau/anode -https://github.com/gourneau/anode -Entry file: anode/app.py -Scanned: 2016-10-20 08:52:58.335735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mmahnken/Flask_to_do_list -https://github.com/mmahnken/Flask_to_do_list -Entry file: Flask_to_do_list/tipsy.py -Scanned: 2016-10-20 08:53:02.860857 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabeesh/Paintapp-Javascript-Canvas-Flask -https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask -Entry file: Paintapp-Javascript-Canvas-Flask/test.py -Scanned: 2016-10-20 08:53:08.161732 -Vulnerability 1: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 34, trigger word "form[": - imgname = request.form['imagename'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 16: imgname = (imagename) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 23: imgname = row[0] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 19, trigger word "execute(": - cur.execute('SELECT * FROM Image WHERE imgname=?', imgname) - -Vulnerability 2: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 35, trigger word "form[": - imgdata = request.form['string'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 24: imgdata = row[1] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 28: ret_MAYBE_FUNCTION_NAME = resp - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 46: ret_MAYBE_FUNCTION_NAME = resp -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata) - -Vulnerability 3: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 34, trigger word "form[": - imgname = request.form['imagename'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 16: imgname = (imagename) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 23: imgname = row[0] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 42, trigger word "execute(": - cur.execute('INSERT INTO Image VALUES(?, ?)', data) - -Vulnerability 4: -File: Paintapp-Javascript-Canvas-Flask/test.py - > User input at line 35, trigger word "form[": - imgdata = request.form['string'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 24: imgdata = row[1] - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 28: ret_MAYBE_FUNCTION_NAME = resp - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 37: data = (imgname, imgdata) - File: Paintapp-Javascript-Canvas-Flask/test.py - > Line 46: ret_MAYBE_FUNCTION_NAME = resp -File: Paintapp-Javascript-Canvas-Flask/test.py - > reaches line 42, trigger word "execute(": - cur.execute('INSERT INTO Image VALUES(?, ?)', data) - - - -godber/flask-mobile-switch -https://github.com/godber/flask-mobile-switch -Entry file: flask-mobile-switch/missionops/missionops/__init__.py -Scanned: 2016-10-20 08:53:12.767148 -Vulnerability 1: -File: flask-mobile-switch/missionops/missionops/views.py - > User input at line 29, trigger word "form[": - title = config_form['title'] -Reassigned in: - File: flask-mobile-switch/missionops/missionops/views.py - > Line 33: config_title.value = title - File: flask-mobile-switch/missionops/missionops/views.py - > Line 43: title = title.value - File: flask-mobile-switch/missionops/missionops/views.py - > Line 45: title = 'Mission Ops' -File: flask-mobile-switch/missionops/missionops/views.py - > reaches line 41, trigger word "filter(": - title = Config.query.filter(Config.key == 'title').first() - -Vulnerability 2: -File: flask-mobile-switch/missionops/missionops/views.py - > User input at line 30, trigger word "form[": - image_url = config_form['url'] -Reassigned in: - File: flask-mobile-switch/missionops/missionops/views.py - > Line 37: config_url.value = image_url - File: flask-mobile-switch/missionops/missionops/views.py - > Line 49: image_url = image_url.value - File: flask-mobile-switch/missionops/missionops/views.py - > Line 51: image_url = '../static/Mars.jpg' - File: flask-mobile-switch/missionops/missionops/views.py - > Line 52: ysize = image_size(image_url) - File: flask-mobile-switch/missionops/missionops/views.py - > Line 24: ysize = 0 -File: flask-mobile-switch/missionops/missionops/views.py - > reaches line 47, trigger word "filter(": - image_url = Config.query.filter(Config.key == 'url').first() - -Vulnerability 3: -File: flask-mobile-switch/missionops/missionops/views.py - > User input at line 29, trigger word "form[": - title = config_form['title'] -Reassigned in: - File: flask-mobile-switch/missionops/missionops/views.py - > Line 33: config_title.value = title - File: flask-mobile-switch/missionops/missionops/views.py - > Line 43: title = title.value - File: flask-mobile-switch/missionops/missionops/views.py - > Line 45: title = 'Mission Ops' -File: flask-mobile-switch/missionops/missionops/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('app.html',switch=switch, title=title, image_url=image_url, ysize=ysize) - -Vulnerability 4: -File: flask-mobile-switch/missionops/missionops/views.py - > User input at line 30, trigger word "form[": - image_url = config_form['url'] -Reassigned in: - File: flask-mobile-switch/missionops/missionops/views.py - > Line 37: config_url.value = image_url - File: flask-mobile-switch/missionops/missionops/views.py - > Line 49: image_url = image_url.value - File: flask-mobile-switch/missionops/missionops/views.py - > Line 51: image_url = '../static/Mars.jpg' - File: flask-mobile-switch/missionops/missionops/views.py - > Line 52: ysize = image_size(image_url) - File: flask-mobile-switch/missionops/missionops/views.py - > Line 24: ysize = 0 -File: flask-mobile-switch/missionops/missionops/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('app.html',switch=switch, title=title, image_url=image_url, ysize=ysize) - - - -naveenpremchand02/paintapp-using-Flask -https://github.com/naveenpremchand02/paintapp-using-Flask -Entry file: None -Scanned: 2016-10-20 08:53:13.286974 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/naveenpremchand02/paintapp-using-Flask. - -orkunozbek/deploy_test -https://github.com/orkunozbek/deploy_test -Entry file: deploy_test/app_pack/__init__.py -Scanned: 2016-10-20 08:53:14.548741 -No vulnerabilities found. - - -y2bishop2y/microengine -https://github.com/y2bishop2y/microengine -Entry file: microengine/lib/flask_sqlalchemy.py -Scanned: 2016-10-20 08:53:15.199897 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB -https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB -Entry file: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py -Scanned: 2016-10-20 08:53:18.030744 -Vulnerability 1: -File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > User input at line 34, trigger word "form[": - imgdata = request.form['string'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 22: imgdata = row['imgdata'] - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 27: ret_MAYBE_FUNCTION_NAME = resp - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 38: ret_MAYBE_FUNCTION_NAME = resp -File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > reaches line 24, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata) - - - -popeliao/FlavorPlusServer -https://github.com/popeliao/FlavorPlusServer -Entry file: FlavorPlusServer/app.py -Scanned: 2016-10-20 08:53:18.578768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tatertot/tipsy -https://github.com/tatertot/tipsy -Entry file: tipsy/tipsy.py -Scanned: 2016-10-20 08:53:26.100284 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ssidorenko/twisker -https://github.com/ssidorenko/twisker -Entry file: twisker/flask/sessions.py -Scanned: 2016-10-20 08:53:26.621436 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -einashaddad/follow_app -https://github.com/einashaddad/follow_app -Entry file: follow_app/web_button.py -Scanned: 2016-10-20 08:53:27.122551 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joepetrini/dayuntil -https://github.com/joepetrini/dayuntil -Entry file: dayuntil/app/__init__.py -Scanned: 2016-10-20 08:53:27.638950 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -soniacs/mockup-boot -https://github.com/soniacs/mockup-boot -Entry file: mockup-boot/build.py -Scanned: 2016-10-20 08:53:29.065044 -Vulnerability 1: -File: mockup-boot/build.py - > User input at line 33, trigger word "get(": - template = page.meta.get('template', 'page.html') -File: mockup-boot/build.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,page=page) - - - -Liquix/microblog -https://github.com/Liquix/microblog -Entry file: None -Scanned: 2016-10-20 08:53:29.631479 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mvader/Quickflask -https://github.com/mvader/Quickflask -Entry file: Quickflask/quickflask/app.py -Scanned: 2016-10-20 08:53:31.751591 -No vulnerabilities found. - - -dnet/wsfacade -https://github.com/dnet/wsfacade -Entry file: wsfacade/wsfacade.py -Scanned: 2016-10-20 08:53:32.277375 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kylemarsh/recipelister -https://github.com/kylemarsh/recipelister -Entry file: recipelister/recipelister/__init__.py -Scanned: 2016-10-20 08:53:32.791224 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -croach/cheap-and-scalable-websites-code -https://github.com/croach/cheap-and-scalable-websites-code -Entry file: cheap-and-scalable-websites-code/generator.py -Scanned: 2016-10-20 08:53:33.299286 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jimpurbrick/hackinabox -https://github.com/jimpurbrick/hackinabox -Entry file: hackinabox/app.py -Scanned: 2016-10-20 08:53:34.611506 -No vulnerabilities found. - - -thegeekchick/converter -https://github.com/thegeekchick/converter -Entry file: None -Scanned: 2016-10-20 08:53:39.153301 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -angstwad/linky -https://github.com/angstwad/linky -Entry file: linky/linky/__init__.py -Scanned: 2016-10-20 08:53:43.555399 -No vulnerabilities found. - - -pysgf/GeoPhotoPy -https://github.com/pysgf/GeoPhotoPy -Entry file: GeoPhotoPy/GeoPhotoPy/__init__.py -Scanned: 2016-10-20 08:53:58.961338 -No vulnerabilities found. - - -GradySimon/RoommateDishes -https://github.com/GradySimon/RoommateDishes -Entry file: RoommateDishes/dishes.py -Scanned: 2016-10-20 08:54:00.273028 -No vulnerabilities found. - - -the-gigi/cloud_state -https://github.com/the-gigi/cloud_state -Entry file: cloud_state/CloudState.py -Scanned: 2016-10-20 08:54:01.766052 -No vulnerabilities found. - - -xiyoulaoyuanjia/flaskapp -https://github.com/xiyoulaoyuanjia/flaskapp -Entry file: None -Scanned: 2016-10-20 08:54:03.160234 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiyoulaoyuanjia/flaskapp. - -trustrachel/Flask-FeatureFlags -https://github.com/trustrachel/Flask-FeatureFlags -Entry file: Flask-FeatureFlags/tests/fixtures.py -Scanned: 2016-10-20 08:54:05.081983 -Vulnerability 1: -File: Flask-FeatureFlags/tests/test_core_function.py - > User input at line 55, trigger word "get(": - response = self.test_client.get(url) -File: Flask-FeatureFlags/tests/test_core_function.py - > reaches line 57, trigger word "url_for(": - response.location == url_for('redirect_destination',_external=True) - -Vulnerability 2: -File: Flask-FeatureFlags/tests/test_core_function.py - > User input at line 66, trigger word "get(": - response = self.test_client.get(url) -File: Flask-FeatureFlags/tests/test_core_function.py - > reaches line 68, trigger word "url_for(": - response.location == url_for('redirect_destination',_external=True) - - - -aahluwal/flask -https://github.com/aahluwal/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 08:54:05.662241 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -kennethreitz/elephant -https://github.com/kennethreitz/elephant -Entry file: elephant/elephant.py -Scanned: 2016-10-20 08:54:06.157572 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -clef/sample-flask -https://github.com/clef/sample-flask -Entry file: sample-flask/app.py -Scanned: 2016-10-20 08:54:07.539084 -No vulnerabilities found. - - -simonvc/rover-wasd-server -https://github.com/simonvc/rover-wasd-server -Entry file: rover-wasd-server/wasd_server.py -Scanned: 2016-10-20 08:54:15.590159 -No vulnerabilities found. - - -jonascj/flaskr -https://github.com/jonascj/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:54:16.088673 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thinboy92/flasktuts -https://github.com/thinboy92/flasktuts -Entry file: flasktuts/app/__init__.py -Scanned: 2016-10-20 08:54:17.653688 -No vulnerabilities found. - - -guilhermecomum/FlaskTutorial -https://github.com/guilhermecomum/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 08:54:18.171668 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -landakram/squeak -https://github.com/landakram/squeak -Entry file: squeak/app.py -Scanned: 2016-10-20 08:54:20.247472 -Vulnerability 1: -File: squeak/app.py - > User input at line 73, trigger word "form[": - search_term = request.form['term'] -Reassigned in: - File: squeak/app.py - > Line 76: data = 'term''location'search_termlocation - File: squeak/app.py - > Line 80: query_string = urllib.urlencode(data) - File: squeak/app.py - > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string) - File: squeak/app.py - > Line 82: signed_url = sign_url(https://github.com/api_url) - File: squeak/app.py - > Line 83: response = requests.get(signed_url) - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - -Vulnerability 2: -File: squeak/app.py - > User input at line 74, trigger word "form[": - location = request.form['location'] -Reassigned in: - File: squeak/app.py - > Line 76: data = 'term''location'search_termlocation - File: squeak/app.py - > Line 80: query_string = urllib.urlencode(data) - File: squeak/app.py - > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string) - File: squeak/app.py - > Line 82: signed_url = sign_url(https://github.com/api_url) - File: squeak/app.py - > Line 83: response = requests.get(signed_url) - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - -Vulnerability 3: -File: squeak/app.py - > User input at line 83, trigger word "get(": - response = requests.get(signed_url) -Reassigned in: - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - - - -xjdrew/flask-demo -https://github.com/xjdrew/flask-demo -Entry file: None -Scanned: 2016-10-20 08:54:20.783937 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xjdrew/flask-demo. - -aerialdomo/flask_microblog -https://github.com/aerialdomo/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-20 08:54:26.310795 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akbarovs/flask-sandbox -https://github.com/akbarovs/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-20 08:54:26.813660 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jinzhangg/flask-helloworld -https://github.com/jinzhangg/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-20 08:54:28.616634 -No vulnerabilities found. - - -hardez/Flask-Skeleton -https://github.com/hardez/Flask-Skeleton -Entry file: None -Scanned: 2016-10-20 08:54:29.640339 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hardez/Flask-Skeleton. - -stfy86/pruebitasFlask -https://github.com/stfy86/pruebitasFlask -Entry file: pruebitasFlask/practica4/src/app/__init__.py -Scanned: 2016-10-20 08:54:32.022348 -No vulnerabilities found. - - -kracekumar/test-flask -https://github.com/kracekumar/test-flask -Entry file: test-flask/app.py -Scanned: 2016-10-20 08:54:33.895678 -No vulnerabilities found. - - -charliecrissman/microblog -https://github.com/charliecrissman/microblog -Entry file: None -Scanned: 2016-10-20 08:54:34.401273 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -abulte/Flask-Bootstrap-Fanstatic -https://github.com/abulte/Flask-Bootstrap-Fanstatic -Entry file: Flask-Bootstrap-Fanstatic/application/__init__.py -Scanned: 2016-10-20 08:54:35.600917 -No vulnerabilities found. - - -jennyferpinto/Flask_Part_1 -https://github.com/jennyferpinto/Flask_Part_1 -Entry file: Flask_Part_1/tipsy.py -Scanned: 2016-10-20 08:54:36.129343 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elboby/flask-test-template -https://github.com/elboby/flask-test-template -Entry file: None -Scanned: 2016-10-20 08:54:44.613519 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/elboby/flask-test-template. - -isms/flask-phonebank-dashboard -https://github.com/isms/flask-phonebank-dashboard -Entry file: flask-phonebank-dashboard/app.py -Scanned: 2016-10-20 08:55:00.134754 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -jpanganiban/flask-heroku-kickstart -https://github.com/jpanganiban/flask-heroku-kickstart -Entry file: None -Scanned: 2016-10-20 08:55:01.638095 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jpanganiban/flask-heroku-kickstart. - -justinxreese/ajax-calculator-flask -https://github.com/justinxreese/ajax-calculator-flask -Entry file: None -Scanned: 2016-10-20 08:55:03.150078 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chrismeono1022/movie-ratings -https://github.com/chrismeono1022/movie-ratings -Entry file: movie-ratings/judgement.py -Scanned: 2016-10-20 08:55:03.681342 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -soniacs/cabinet -https://github.com/soniacs/cabinet -Entry file: cabinet/app/__init__.py -Scanned: 2016-10-20 08:55:05.361288 -Vulnerability 1: -File: cabinet/app/views/clients.py - > User input at line 18, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: cabinet/app/views/clients.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('clients/view.html',title=client.name, client=client, projects=projects, invoices=invoices) - -Vulnerability 2: -File: cabinet/app/views/clients.py - > User input at line 33, trigger word "form[": - client = Client(name=request.form['name'], company=request.form['company'], website=request.form['website'], twitter=request.form['twitter'], email=request.form['email'], telephone=request.form['telephone'], skype=request.form['skype'], street=request.form['street'], street_2=request.form['street_2'], city=request.form['city'], state=request.form['state'], postcode=request.form['postcode'], country=request.form['country'], notes=request.form['notes']) -File: cabinet/app/views/clients.py - > reaches line 50, trigger word "flash(": - flash('Client '%s' was added.' % client.name) - -Vulnerability 3: -File: cabinet/app/views/clients.py - > User input at line 60, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 84: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 78, trigger word "flash(": - flash('Client '%s' has been updated.' % client.name) - -Vulnerability 4: -File: cabinet/app/views/clients.py - > User input at line 60, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 84: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 80, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('clients/edit.html',title='Edit %s' % client.name, client=client) - -Vulnerability 5: -File: cabinet/app/views/clients.py - > User input at line 89, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 93, trigger word "flash(": - flash('Client '%s' has been deleted.' % client.name) - -Vulnerability 6: -File: cabinet/app/views/clients.py - > User input at line 89, trigger word "get(": - client = Client.query.get(client_id) -Reassigned in: - File: cabinet/app/views/clients.py - > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/clients.py - > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('clients')) -File: cabinet/app/views/clients.py - > reaches line 95, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('clients/delete.html',title='Delete %s' % client.name, client=client) - -Vulnerability 7: -File: cabinet/app/views/invoices.py - > User input at line 18, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: cabinet/app/views/invoices.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('invoices/view.html',title=invoice.name, invoice=invoice) - -Vulnerability 8: -File: cabinet/app/views/invoices.py - > User input at line 31, trigger word "get(": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 9: -File: cabinet/app/views/invoices.py - > User input at line 31, trigger word "form[": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 10: -File: cabinet/app/views/invoices.py - > User input at line 32, trigger word "get(": - project = Project.query.get(request.form['project']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 11: -File: cabinet/app/views/invoices.py - > User input at line 32, trigger word "form[": - project = Project.query.get(request.form['project']) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 33: invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 12: -File: cabinet/app/views/invoices.py - > User input at line 33, trigger word "form[": - invoice = Invoice(name=request.form['name'], currency=request.form['currency'], status=request.form['status'], notes=request.form['notes'], payment=request.form['payment'], internal_notes=request.form['internal_notes'], client=client, project=project) -File: cabinet/app/views/invoices.py - > reaches line 47, trigger word "flash(": - flash('Invoice '%s' was added.' % invoice.name) - -Vulnerability 13: -File: cabinet/app/views/invoices.py - > User input at line 59, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 78, trigger word "flash(": - flash('Invoice '%s' has been updated.' % invoice.name) - -Vulnerability 14: -File: cabinet/app/views/invoices.py - > User input at line 59, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 79: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 80, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('invoices/edit.html',title='Edit Invoice %s' % invoice.name, invoice=invoice, clients=clients, projects=projects) - -Vulnerability 15: -File: cabinet/app/views/invoices.py - > User input at line 91, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 95, trigger word "flash(": - flash('Invoice '%s' has been deleted.' % invoice.name) - -Vulnerability 16: -File: cabinet/app/views/invoices.py - > User input at line 91, trigger word "get(": - invoice = Invoice.query.get(invoice_id) -Reassigned in: - File: cabinet/app/views/invoices.py - > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/invoices.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('invoices')) -File: cabinet/app/views/invoices.py - > reaches line 97, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('invoices/delete.html',title='Delete Invoice %s' % invoice.name, invoice=invoice) - -Vulnerability 17: -File: cabinet/app/views/projects.py - > User input at line 18, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: cabinet/app/views/projects.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('projects/view.html',title=project.name, project=project) - -Vulnerability 18: -File: cabinet/app/views/projects.py - > User input at line 30, trigger word "get(": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 19: -File: cabinet/app/views/projects.py - > User input at line 30, trigger word "form[": - client = Client.query.get(request.form['client']) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 31: project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 20: -File: cabinet/app/views/projects.py - > User input at line 31, trigger word "form[": - project = Project(name=request.form['name'], description=request.form['description'], status=request.form['status'], hourly_rate=request.form['hourly_rate'], quote=request.form['quote'], notes=request.form['notes'], client=client) -File: cabinet/app/views/projects.py - > reaches line 43, trigger word "flash(": - flash('Project '%s' was added.' % project.name) - -Vulnerability 21: -File: cabinet/app/views/projects.py - > User input at line 54, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 76: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 69, trigger word "flash(": - flash('Project '%s' has been updated.' % project.name) - -Vulnerability 22: -File: cabinet/app/views/projects.py - > User input at line 54, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 76: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 70: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 71, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('projects/edit.html',title='Edit %s' % project.name, project=project, clients=clients) - -Vulnerability 23: -File: cabinet/app/views/projects.py - > User input at line 81, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 91: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 85, trigger word "flash(": - flash('Project '%s' has been deleted.' % project.name) - -Vulnerability 24: -File: cabinet/app/views/projects.py - > User input at line 81, trigger word "get(": - project = Project.query.get(project_id) -Reassigned in: - File: cabinet/app/views/projects.py - > Line 91: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: cabinet/app/views/projects.py - > Line 86: ret_MAYBE_FUNCTION_NAME = redirect(url_for('projects')) -File: cabinet/app/views/projects.py - > reaches line 87, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('projects/delete.html',title='Delete %s' % project.name, project=project) - - - -MattStockton/manpage -https://github.com/MattStockton/manpage -Entry file: manpage/app.py -Scanned: 2016-10-20 08:55:05.903907 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qzio/tododis -https://github.com/qzio/tododis -Entry file: tododis/app.py -Scanned: 2016-10-20 08:55:06.439779 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ternup/caddisfly-heroku -https://github.com/ternup/caddisfly-heroku -Entry file: caddisfly-heroku/app.py -Scanned: 2016-10-20 08:55:06.953730 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB -https://github.com/prabeesh/Paintapp-Javascript-Canvas-Flask-MongoDB -Entry file: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py -Scanned: 2016-10-20 08:55:13.663557 -Vulnerability 1: -File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > User input at line 34, trigger word "form[": - imgdata = request.form['string'] -Reassigned in: - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 22: imgdata = row['imgdata'] - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 27: ret_MAYBE_FUNCTION_NAME = resp - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('paint.html') - File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > Line 38: ret_MAYBE_FUNCTION_NAME = resp -File: Paintapp-Javascript-Canvas-Flask-MongoDB/test.py - > reaches line 24, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('paint.html',saved=imgdata) - - - -mmahnken/Flask-To-Do-List-with-updates- -https://github.com/mmahnken/Flask-To-Do-List-with-updates- -Entry file: Flask-To-Do-List-with-updates-/tipsy.py -Scanned: 2016-10-20 08:55:17.056541 -No vulnerabilities found. - - -samgclarke/sms_sender -https://github.com/samgclarke/sms_sender -Entry file: sms_sender/application.py -Scanned: 2016-10-20 08:55:18.285943 -No vulnerabilities found. - - -Liquix/microblog -https://github.com/Liquix/microblog -Entry file: None -Scanned: 2016-10-20 08:55:18.790556 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -deegill/tipsytasklist -https://github.com/deegill/tipsytasklist -Entry file: tipsytasklist/tipsy.py -Scanned: 2016-10-20 08:55:19.309993 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dnet/wsfacade -https://github.com/dnet/wsfacade -Entry file: wsfacade/wsfacade.py -Scanned: 2016-10-20 08:55:19.805852 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mdjhny/OilPainter -https://github.com/mdjhny/OilPainter -Entry file: OilPainter/app/app.py -Scanned: 2016-10-20 08:55:21.323042 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yeradis/sizing -https://github.com/yeradis/sizing -Entry file: sizing/sizing.py -Scanned: 2016-10-20 08:55:26.831268 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattupstate/flask-social -https://github.com/mattupstate/flask-social -Entry file: flask-social/app.py -Scanned: 2016-10-20 08:55:28.129491 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattupstate/flask-jsonschema -https://github.com/mattupstate/flask-jsonschema -Entry file: flask-jsonschema/tests.py -Scanned: 2016-10-20 08:55:29.417148 -No vulnerabilities found. - - -whtsky/Flask-WeRoBot -https://github.com/whtsky/Flask-WeRoBot -Entry file: Flask-WeRoBot/flask_werobot.py -Scanned: 2016-10-20 08:55:31.087200 -No vulnerabilities found. - - -OpenTechSchool/python-flask-code -https://github.com/OpenTechSchool/python-flask-code -Entry file: python-flask-code/core/files-templates/catseverywhere.py -Scanned: 2016-10-20 08:55:32.341612 -No vulnerabilities found. - - -rollbar/rollbar-flask-example -https://github.com/rollbar/rollbar-flask-example -Entry file: rollbar-flask-example/hello.py -Scanned: 2016-10-20 08:55:32.866198 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lqez/flasky -https://github.com/lqez/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 08:55:33.380101 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Jd007/flask-rest -https://github.com/Jd007/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-20 08:55:34.879226 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simonvc/rover-wasd-server -https://github.com/simonvc/rover-wasd-server -Entry file: rover-wasd-server/wasd_server.py -Scanned: 2016-10-20 08:55:38.494605 -No vulnerabilities found. - - -microamp/flaskel -https://github.com/microamp/flaskel -Entry file: flaskel/flaskel.py -Scanned: 2016-10-20 08:55:40.493488 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -aerialdomo/flaskblog -https://github.com/aerialdomo/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 08:55:42.037645 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -pinoytech/flaskapp -https://github.com/pinoytech/flaskapp -Entry file: None -Scanned: 2016-10-20 08:55:45.534265 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pinoytech/flaskapp. - -aahluwal/flaskagain -https://github.com/aahluwal/flaskagain -Entry file: flaskagain/judgement.py -Scanned: 2016-10-20 08:56:01.172275 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskagain/renv/lib/python2.7/genericpath.py - -landakram/squeak -https://github.com/landakram/squeak -Entry file: squeak/app.py -Scanned: 2016-10-20 08:56:02.732380 -Vulnerability 1: -File: squeak/app.py - > User input at line 73, trigger word "form[": - search_term = request.form['term'] -Reassigned in: - File: squeak/app.py - > Line 76: data = 'term''location'search_termlocation - File: squeak/app.py - > Line 80: query_string = urllib.urlencode(data) - File: squeak/app.py - > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string) - File: squeak/app.py - > Line 82: signed_url = sign_url(https://github.com/api_url) - File: squeak/app.py - > Line 83: response = requests.get(signed_url) - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - -Vulnerability 2: -File: squeak/app.py - > User input at line 74, trigger word "form[": - location = request.form['location'] -Reassigned in: - File: squeak/app.py - > Line 76: data = 'term''location'search_termlocation - File: squeak/app.py - > Line 80: query_string = urllib.urlencode(data) - File: squeak/app.py - > Line 81: api_url = '%s?%s' % (app.config['YELP_SEARCH_URL'], query_string) - File: squeak/app.py - > Line 82: signed_url = sign_url(https://github.com/api_url) - File: squeak/app.py - > Line 83: response = requests.get(signed_url) - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - -Vulnerability 3: -File: squeak/app.py - > User input at line 83, trigger word "get(": - response = requests.get(signed_url) -Reassigned in: - File: squeak/app.py - > Line 84: json_response = json.loads(response.text) -File: squeak/app.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',search_term=search_term, location=location, businesses=json_response['businesses']) - - - -y2bishop2y/vagrant.flask -https://github.com/y2bishop2y/vagrant.flask -Entry file: None -Scanned: 2016-10-20 08:56:03.251747 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -markchadwick/flask-empty -https://github.com/markchadwick/flask-empty -Entry file: flask-empty/main.py -Scanned: 2016-10-20 08:56:04.458412 -No vulnerabilities found. - - -Hardtack/Flask-Router -https://github.com/Hardtack/Flask-Router -Entry file: Flask-Router/flask_router/tests.py -Scanned: 2016-10-20 08:56:07.233293 -No vulnerabilities found. - - -mwmeyer/minimal-flask-socketserver -https://github.com/mwmeyer/minimal-flask-socketserver -Entry file: minimal-flask-socketserver/flash_socket.py -Scanned: 2016-10-20 08:56:08.704892 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elboby/flask-test-template -https://github.com/elboby/flask-test-template -Entry file: None -Scanned: 2016-10-20 08:56:13.197781 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/elboby/flask-test-template. - -ndrwdn/flat_flask_layout -https://github.com/ndrwdn/flat_flask_layout -Entry file: flat_flask_layout/sitebuilder.py -Scanned: 2016-10-20 08:56:17.429548 -No vulnerabilities found. - - -emi1337/movie_rater -https://github.com/emi1337/movie_rater -Entry file: movie_rater/judgement.py -Scanned: 2016-10-20 08:56:18.186954 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chrismeono1022/movie-ratings -https://github.com/chrismeono1022/movie-ratings -Entry file: movie-ratings/judgement.py -Scanned: 2016-10-20 08:56:19.682154 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ternup/caddisfly-heroku -https://github.com/ternup/caddisfly-heroku -Entry file: caddisfly-heroku/app.py -Scanned: 2016-10-20 08:56:20.174558 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thrisp/flacro -https://github.com/thrisp/flacro -Entry file: flacro/tests/conftest.py -Scanned: 2016-10-20 08:56:20.712271 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -aksiksi/aflam -https://github.com/aksiksi/aflam -Entry file: aflam/views.py -Scanned: 2016-10-20 08:56:22.241070 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kjudd/ratings_app -https://github.com/kjudd/ratings_app -Entry file: ratings_app/judgement.py -Scanned: 2016-10-20 08:56:27.859120 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: ratings_app/env/lib/python2.7/genericpath.py - -samgclarke/sms_sender -https://github.com/samgclarke/sms_sender -Entry file: sms_sender/application.py -Scanned: 2016-10-20 08:56:29.106256 -No vulnerabilities found. - - -Max00355/FileUpload -https://github.com/Max00355/FileUpload -Entry file: FileUpload/main.py -Scanned: 2016-10-20 08:56:30.658463 -No vulnerabilities found. - - -joel-briggs/microblog -https://github.com/joel-briggs/microblog -Entry file: None -Scanned: 2016-10-20 08:56:31.219925 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gonewandering/TwitterLogin -https://github.com/gonewandering/TwitterLogin -Entry file: TwitterLogin/app.py -Scanned: 2016-10-20 08:56:32.460938 -No vulnerabilities found. - - -flebel/yt-redirector -https://github.com/flebel/yt-redirector -Entry file: yt-redirector/yt-redirector.py -Scanned: 2016-10-20 08:56:33.784116 -Vulnerability 1: -File: yt-redirector/yt-redirector.py - > User input at line 17, trigger word "get(": - video_id = requests.get(video_url).json()['items'][0]['id']['videoId'] -Reassigned in: - File: yt-redirector/yt-redirector.py - > Line 18: player_url = 'https://www.youtube.com/watch?v=%s' % (video_id) -File: yt-redirector/yt-redirector.py - > reaches line 19, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(player_url, 301) - - - -mattupstate/flask-jsonschema -https://github.com/mattupstate/flask-jsonschema -Entry file: flask-jsonschema/tests.py -Scanned: 2016-10-20 08:56:36.338889 -No vulnerabilities found. - - -mharrys/flask-blog -https://github.com/mharrys/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 08:56:36.890216 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -kienpham2000/airbrake-flask -https://github.com/kienpham2000/airbrake-flask -Entry file: airbrake-flask/setup.py -Scanned: 2016-10-20 08:56:39.390321 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -florapdx/My-Blog -https://github.com/florapdx/My-Blog -Entry file: My-Blog/sitebuilder.py -Scanned: 2016-10-20 08:56:49.290262 -No vulnerabilities found. - - -zeuxisoo/python-flask-social-oauth-facebook -https://github.com/zeuxisoo/python-flask-social-oauth-facebook -Entry file: None -Scanned: 2016-10-20 08:56:49.801346 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeuxisoo/python-flask-social-oauth-facebook. - -lpolepeddi/sightings -https://github.com/lpolepeddi/sightings -Entry file: sightings/routes.py -Scanned: 2016-10-20 08:57:12.309412 -No vulnerabilities found. - - -sholsapp/flask-skeleton -https://github.com/sholsapp/flask-skeleton -Entry file: None -Scanned: 2016-10-20 08:57:13.326720 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sholsapp/flask-skeleton. - -adatlabor/soa-demo -https://github.com/adatlabor/soa-demo -Entry file: soa-demo/service.py -Scanned: 2016-10-20 08:57:14.679916 -No vulnerabilities found. - - -speakingcode/pres-soa-flask-backbone -https://github.com/speakingcode/pres-soa-flask-backbone -Entry file: pres-soa-flask-backbone/notes.py -Scanned: 2016-10-20 08:57:18.457273 -No vulnerabilities found. - - -kirang89/flask-boiler -https://github.com/kirang89/flask-boiler -Entry file: None -Scanned: 2016-10-20 08:57:18.964284 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -microamp/flaskel -https://github.com/microamp/flaskel -Entry file: flaskel/flaskel.py -Scanned: 2016-10-20 08:57:19.979124 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -a2lin/flaskapp -https://github.com/a2lin/flaskapp -Entry file: None -Scanned: 2016-10-20 08:57:20.508271 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/a2lin/flaskapp. - -MrFichter/flask1 -https://github.com/MrFichter/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-20 08:57:21.140160 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -Bob-Thomas/webshopFlask -https://github.com/Bob-Thomas/webshopFlask -Entry file: webshopFlask/webshop.py -Scanned: 2016-10-20 08:57:21.728656 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smdmustaffa/PythonFlask -https://github.com/smdmustaffa/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 08:57:27.588163 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -bogavante/mitsuhiko-flask -https://github.com/bogavante/mitsuhiko-flask -Entry file: mitsuhiko-flask/setup.py -Scanned: 2016-10-20 08:57:28.164945 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stephanienkram/Flask-Log-Tracker -https://github.com/stephanienkram/Flask-Log-Tracker -Entry file: Flask-Log-Tracker/main.py -Scanned: 2016-10-20 08:57:29.820975 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dylanvee/flask-hello-world -https://github.com/dylanvee/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 08:57:30.363988 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ndrwdn/flat_flask_layout -https://github.com/ndrwdn/flat_flask_layout -Entry file: flat_flask_layout/sitebuilder.py -Scanned: 2016-10-20 08:57:31.851154 -No vulnerabilities found. - - -akshar-raaj/flaks -https://github.com/akshar-raaj/flaks -Entry file: flaks/hello.py -Scanned: 2016-10-20 08:57:33.150548 -No vulnerabilities found. - - -ajith-herga/searchflask -https://github.com/ajith-herga/searchflask -Entry file: searchflask/new_world.py -Scanned: 2016-10-20 08:57:33.694162 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -willmcmain/blag -https://github.com/willmcmain/blag -Entry file: blag/blag/__init__.py -Scanned: 2016-10-20 08:57:34.964357 -No vulnerabilities found. - - -mihneasim/iphy -https://github.com/mihneasim/iphy -Entry file: None -Scanned: 2016-10-20 08:57:35.488055 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mihneasim/iphy. - -dnajd/pyrest -https://github.com/dnajd/pyrest -Entry file: pyrest/src/main/rest_test.py -Scanned: 2016-10-20 08:57:36.008818 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MinnPost/jsonproxy -https://github.com/MinnPost/jsonproxy -Entry file: jsonproxy/app.py -Scanned: 2016-10-20 08:57:36.535666 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BigBlueHat/recshackday -https://github.com/BigBlueHat/recshackday -Entry file: recshackday/app.py -Scanned: 2016-10-20 08:57:37.811918 -No vulnerabilities found. - - -capellayee/remake -https://github.com/capellayee/remake -Entry file: remake/Flasktest/__init__.py -Scanned: 2016-10-20 08:57:40.332539 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -corydolphin/ifighthunger -https://github.com/corydolphin/ifighthunger -Entry file: ifighthunger/ifighthunger/__init__.py -Scanned: 2016-10-20 08:57:41.853190 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zoowii/VerySimpleBlog -https://github.com/zoowii/VerySimpleBlog -Entry file: VerySimpleBlog/main.py -Scanned: 2016-10-20 08:57:44.138995 -No vulnerabilities found. - - -lxchavez/CSULB-Confessions -https://github.com/lxchavez/CSULB-Confessions -Entry file: CSULB-Confessions/confessions_app/__init__.py -Scanned: 2016-10-20 08:57:55.789336 -No vulnerabilities found. - - -ashcrow/flask-track-usage -https://github.com/ashcrow/flask-track-usage -Entry file: flask-track-usage/test/__init__.py -Scanned: 2016-10-20 08:58:13.670676 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lepture/flask-shorturl -https://github.com/lepture/flask-shorturl -Entry file: flask-shorturl/test_shorturl.py -Scanned: 2016-10-20 08:58:15.062283 -No vulnerabilities found. - - -mharrys/flask-blog -https://github.com/mharrys/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 08:58:15.600129 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -btomashvili/flasb -https://github.com/btomashvili/flasb -Entry file: None -Scanned: 2016-10-20 08:58:19.602585 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/btomashvili/flasb. - -krushton/flask-api-example -https://github.com/krushton/flask-api-example -Entry file: flask-api-example/app.py -Scanned: 2016-10-20 08:58:20.984316 -No vulnerabilities found. - - -jph98/flaskdmg -https://github.com/jph98/flaskdmg -Entry file: flaskdmg/flaskexample.py -Scanned: 2016-10-20 08:58:22.293729 -No vulnerabilities found. - - -roshow/flasktutorial -https://github.com/roshow/flasktutorial -Entry file: None -Scanned: 2016-10-20 08:58:22.865929 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -akshar-raaj/flaskr -https://github.com/akshar-raaj/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 08:58:23.370886 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -codergirl/flaskbabar -https://github.com/codergirl/flaskbabar -Entry file: flaskbabar/hello.py -Scanned: 2016-10-20 08:58:24.766295 -Vulnerability 1: -File: flaskbabar/hello.py - > User input at line 44, trigger word "get(": - new_user = BabarUser(request.args.get('username'), request.args.get('email')) -Reassigned in: - File: flaskbabar/hello.py - > Line 47: json = new_user.id'username''email'new_user.namenew_user.email -File: flaskbabar/hello.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 2: -File: flaskbabar/hello.py - > User input at line 61, trigger word "get(": - the_user = db.session.query(BabarUser).filter_by(id=request.args.get('user_id')).first() -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 3: -File: flaskbabar/hello.py - > User input at line 62, trigger word "get(": - task_name = request.args.get('name') -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 4: -File: flaskbabar/hello.py - > User input at line 63, trigger word "get(": - task_description = request.args.get('description') -Reassigned in: - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 5: -File: flaskbabar/hello.py - > User input at line 64, trigger word "get(": - dismissable = request.args.get('dismissable') -Reassigned in: - File: flaskbabar/hello.py - > Line 66: dismissable = True - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - -Vulnerability 6: -File: flaskbabar/hello.py - > User input at line 67, trigger word "get(": - due_date = request.args.get('due_date') -Reassigned in: - File: flaskbabar/hello.py - > Line 69: due_date = datetime.datetime.fromtimestamp(float(due_date)) - File: flaskbabar/hello.py - > Line 70: new_task = Task(user_id=the_user.id, name=task_name, description=task_description, dismissable=dismissable, due_date=due_date, active=True) - File: flaskbabar/hello.py - > Line 73: json = new_task.idget_task_view(new_task) -File: flaskbabar/hello.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(json) - - - -rajendrakrp/GAE-Flask-OpenID -https://github.com/rajendrakrp/GAE-Flask-OpenID -Entry file: GAE-Flask-OpenID/flask/sessions.py -Scanned: 2016-10-20 08:58:25.335857 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Bob-Thomas/webshopFlask -https://github.com/Bob-Thomas/webshopFlask -Entry file: webshopFlask/webshop.py -Scanned: 2016-10-20 08:58:28.959521 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -haburibe/flask-myapps -https://github.com/haburibe/flask-myapps -Entry file: flask-myapps/todos/todos.py -Scanned: 2016-10-20 08:58:30.702175 -No vulnerabilities found. - - -mykolasmith/flask-leaderboard -https://github.com/mykolasmith/flask-leaderboard -Entry file: flask-leaderboard/leaderboard/__init__.py -Scanned: 2016-10-20 08:58:33.263218 -Vulnerability 1: -File: flask-leaderboard/leaderboard/endpoints/login.py - > User input at line 13, trigger word "form[": - user = User.query.filter(User.name == request.form['username']).first() -Reassigned in: - File: flask-leaderboard/leaderboard/endpoints/login.py - > Line 19: session['user_id'] = user.id -File: flask-leaderboard/leaderboard/endpoints/login.py - > reaches line 13, trigger word "filter(": - user = User.query.filter(User.name == request.form['username']).first() - - - -betobaz/app_flask -https://github.com/betobaz/app_flask -Entry file: app_flask/app/routes.py -Scanned: 2016-10-20 08:58:34.550354 -No vulnerabilities found. - - -elimgoodman/Personnel-Flask -https://github.com/elimgoodman/Personnel-Flask -Entry file: Personnel-Flask/app/__init__.py -Scanned: 2016-10-20 08:58:37.089685 -Vulnerability 1: -File: Personnel-Flask/app/users/views.py - > User input at line 68, trigger word "get(": - salt = app.config.get('PW_SALT') -Reassigned in: - File: Personnel-Flask/app/users/views.py - > Line 69: password_hash = bcrypt.hashpw(form.password.data, salt) - File: Personnel-Flask/app/users/views.py - > Line 71: clause = and_(User.email == form.email.data, User.password_hash == password_hash) -File: Personnel-Flask/app/users/views.py - > reaches line 74, trigger word "filter(": - user = User.query.filter(clause).one() - -Vulnerability 2: -File: Personnel-Flask/app/users/views.py - > User input at line 69, trigger word ".data": - password_hash = bcrypt.hashpw(form.password.data, salt) -Reassigned in: - File: Personnel-Flask/app/users/views.py - > Line 71: clause = and_(User.email == form.email.data, User.password_hash == password_hash) -File: Personnel-Flask/app/users/views.py - > reaches line 74, trigger word "filter(": - user = User.query.filter(clause).one() - -Vulnerability 3: -File: Personnel-Flask/app/users/views.py - > User input at line 71, trigger word ".data": - clause = and_(User.email == form.email.data, User.password_hash == password_hash) -File: Personnel-Flask/app/users/views.py - > reaches line 74, trigger word "filter(": - user = User.query.filter(clause).one() - - - -erikgrueter/flask_app -https://github.com/erikgrueter/flask_app -Entry file: None -Scanned: 2016-10-20 08:58:38.108384 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/erikgrueter/flask_app. - -Duelist/ianb-flask -https://github.com/Duelist/ianb-flask -Entry file: ianb-flask/ianb/__init__.py -Scanned: 2016-10-20 08:58:39.498942 -No vulnerabilities found. - - -jonascj/flask_logger_test -https://github.com/jonascj/flask_logger_test -Entry file: flask_logger_test/flask_logger_test.py -Scanned: 2016-10-20 08:58:41.267859 -No vulnerabilities found. - - -stephanienkram/Flask-Money-Tracker -https://github.com/stephanienkram/Flask-Money-Tracker -Entry file: Flask-Money-Tracker/main.py -Scanned: 2016-10-20 08:58:41.858633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cismet/sqlparse-flask-webservice -https://github.com/cismet/sqlparse-flask-webservice -Entry file: sqlparse-flask-webservice/sqlparse_webservice.py -Scanned: 2016-10-20 08:58:42.374225 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luckypool/flask-blueprints-template -https://github.com/luckypool/flask-blueprints-template -Entry file: flask-blueprints-template/hello/__init__.py -Scanned: 2016-10-20 08:58:43.653505 -No vulnerabilities found. - - -dylanvee/flask-hello-world -https://github.com/dylanvee/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 08:58:44.174711 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -adamjmarkham/flask-micro-blog -https://github.com/adamjmarkham/flask-micro-blog -Entry file: flask-micro-blog/micro_blog_flask.py -Scanned: 2016-10-20 08:58:45.541556 -No vulnerabilities found. - - -chrismeono1022/microblog_flask_tutorial -https://github.com/chrismeono1022/microblog_flask_tutorial -Entry file: microblog_flask_tutorial/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 08:58:52.866998 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jsutterfield/flaskr-buildout -https://github.com/jsutterfield/flaskr-buildout -Entry file: flaskr-buildout/src/flaskr/flaskr.py -Scanned: 2016-10-20 08:59:07.715110 -No vulnerabilities found. - - -corydolphin/boilerflask-facebook -https://github.com/corydolphin/boilerflask-facebook -Entry file: boilerflask-facebook/boilerflask/__init__.py -Scanned: 2016-10-20 08:59:13.261551 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -subdesign/temp_Flaskblog -https://github.com/subdesign/temp_Flaskblog -Entry file: temp_Flaskblog/app.py -Scanned: 2016-10-20 08:59:14.839433 -Vulnerability 1: -File: temp_Flaskblog/app.py - > User input at line 107, trigger word ".data": - cur = g.db.execute('INSERT INTO fblog (title, content, date, status) VALUES (?, ?, ?, 1)', [form.title.data, form.content.data, d]) -File: temp_Flaskblog/app.py - > reaches line 107, trigger word "execute(": - cur = g.db.execute('INSERT INTO fblog (title, content, date, status) VALUES (?, ?, ?, 1)', [form.title.data, form.content.data, d]) - -Vulnerability 2: -File: temp_Flaskblog/app.py - > User input at line 129, trigger word ".data": - cur = g.db.execute('UPDATE fblog SET title =' + form.title.data + ', content =' + form.content.data + ' WHERE blog_id=' + str(blog_id)) -File: temp_Flaskblog/app.py - > reaches line 129, trigger word "execute(": - cur = g.db.execute('UPDATE fblog SET title =' + form.title.data + ', content =' + form.content.data + ' WHERE blog_id=' + str(blog_id)) - - - -farresmoidu/weather -https://github.com/farresmoidu/weather -Entry file: weather/weather.py -Scanned: 2016-10-20 08:59:15.355989 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thensgens/vvs -https://github.com/thensgens/vvs -Entry file: vvs/src/flask/sessions.py -Scanned: 2016-10-20 08:59:15.887712 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mwieler/soccer -https://github.com/mwieler/soccer -Entry file: soccer/soccer/main.py -Scanned: 2016-10-20 08:59:19.398668 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shiroyuki/tori-sample-blog -https://github.com/shiroyuki/tori-sample-blog -Entry file: tori-sample-blog/main.py -Scanned: 2016-10-20 08:59:20.666950 -No vulnerabilities found. - - -jackvnimble/jackvnimble -https://github.com/jackvnimble/jackvnimble -Entry file: jackvnimble/flaskblog.py -Scanned: 2016-10-20 08:59:23.940236 -No vulnerabilities found. - - -micahwalter/hello-mysql -https://github.com/micahwalter/hello-mysql -Entry file: hello-mysql/hello-mysql.py -Scanned: 2016-10-20 08:59:25.675035 -No vulnerabilities found. - - -itsme300/assignment -https://github.com/itsme300/assignment -Entry file: assignment/iptables.py -Scanned: 2016-10-20 08:59:26.201575 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yhyap/lipsum -https://github.com/yhyap/lipsum -Entry file: lipsum/flask/app.py -Scanned: 2016-10-20 08:59:29.769243 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lxchavez/CSULB-Confessions -https://github.com/lxchavez/CSULB-Confessions -Entry file: CSULB-Confessions/confessions_app/__init__.py -Scanned: 2016-10-20 08:59:36.810532 -No vulnerabilities found. - - -tornado-utils/tornado-restless -https://github.com/tornado-utils/tornado-restless -Entry file: tornado-restless/tests/base.py -Scanned: 2016-10-20 08:59:41.362339 -No vulnerabilities found. - - -btomashvili/flasb -https://github.com/btomashvili/flasb -Entry file: None -Scanned: 2016-10-20 08:59:41.859801 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/btomashvili/flasb. - -maxcountryman/flask-simpleoauth -https://github.com/maxcountryman/flask-simpleoauth -Entry file: flask-simpleoauth/flask_simpleoauth/app.py -Scanned: 2016-10-20 08:59:43.207447 -Vulnerability 1: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 30, trigger word "get(": - next_url = request.args.get('next_url', url_for('.index')) -Reassigned in: - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 30, trigger word "url_for(": - next_url = request.args.get('next_url', url_for('.index')) - -Vulnerability 2: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 30, trigger word "get(": - next_url = request.args.get('next_url', url_for('.index')) -Reassigned in: - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 36, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 3: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 42, trigger word "get(": - next_url = request.args.get('next_url', url_for('.login')) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 42, trigger word "url_for(": - next_url = request.args.get('next_url', url_for('.login')) - -Vulnerability 4: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 42, trigger word "get(": - next_url = request.args.get('next_url', url_for('.login')) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 44, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 5: -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > User input at line 53, trigger word ".data": - consumer = Consumer(name=form.name.data, callback_uri=form.callback_uri.data) -Reassigned in: - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 58: args = 'key''secret'consumer.keyconsumer.secret - File: flask-simpleoauth/flask_simpleoauth/frontend.py - > Line 62: consumer = Consumer.objects.with_id(consumer_id) -File: flask-simpleoauth/flask_simpleoauth/frontend.py - > reaches line 59, trigger word "flash(": - flash('Consumer created. Key {key} Secret {secret}'.format(args)) - - - -bayazee/flask-mosession -https://github.com/bayazee/flask-mosession -Entry file: flask-mosession/example/example.py -Scanned: 2016-10-20 08:59:44.558642 -No vulnerabilities found. - - -fabin/Flaskr -https://github.com/fabin/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 08:59:45.056202 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dorajistyle/proposal_center_python_flask_sqlalchemy_jade -https://github.com/dorajistyle/proposal_center_python_flask_sqlalchemy_jade -Entry file: proposal_center_python_flask_sqlalchemy_jade/application/__init__.py -Scanned: 2016-10-20 08:59:47.148735 -Vulnerability 1: -File: proposal_center_python_flask_sqlalchemy_jade/application/manager.py - > User input at line 58, trigger word "get(": - feedback = Feedback.query.get(feedback_id) -File: proposal_center_python_flask_sqlalchemy_jade/application/manager.py - > reaches line 59, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(feedback_id=feedback_id, vote_count=feedback.vote_count()) - - - -fabin/Flask-Upload -https://github.com/fabin/Flask-Upload -Entry file: Flask-Upload/upload/__init__.py -Scanned: 2016-10-20 08:59:48.478760 -Vulnerability 1: -File: Flask-Upload/upload/__init__.py - > User input at line 24, trigger word "files[": - uploadedFile = request.files['file'] -Reassigned in: - File: Flask-Upload/upload/__init__.py - > Line 26: filename = uploadedFile.filename - File: Flask-Upload/upload/__init__.py - > Line 36: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File (in package)

-
-

- -

- ' -File: Flask-Upload/upload/__init__.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(s.put(DOMAIN_NAME, filename, ob)) - - - -gabrielengel/learn-flask -https://github.com/gabrielengel/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 08:59:49.205014 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mutaku/alfred_flask -https://github.com/mutaku/alfred_flask -Entry file: alfred_flask/alfred.py -Scanned: 2016-10-20 08:59:49.737468 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -erikgrueter/flask_app -https://github.com/erikgrueter/flask_app -Entry file: None -Scanned: 2016-10-20 08:59:50.226379 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/erikgrueter/flask_app. - -marksteve/flask-nsq -https://github.com/marksteve/flask-nsq -Entry file: flask-nsq/test.py -Scanned: 2016-10-20 08:59:51.753391 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luxuia/gene_designer -https://github.com/luxuia/gene_designer -Entry file: gene_designer/geneDesigne.py -Scanned: 2016-10-20 09:00:13.768626 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rubinovitz/flask-gevent-boiler -https://github.com/rubinovitz/flask-gevent-boiler -Entry file: flask-gevent-boiler/app.py -Scanned: 2016-10-20 09:00:14.269785 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andyhmltn/stripe-flask-test -https://github.com/andyhmltn/stripe-flask-test -Entry file: stripe-flask-test/main.py -Scanned: 2016-10-20 09:00:15.781765 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -manuclementz/shrt -https://github.com/manuclementz/shrt -Entry file: shrt/app.py -Scanned: 2016-10-20 09:00:17.174104 -Vulnerability 1: -File: shrt/app.py - > User input at line 46, trigger word "form[": - link = ShortLink(request.form['url']) -Reassigned in: - File: shrt/app.py - > Line 49: link.encoded_id = encode_id(link.id) - File: shrt/app.py - > Line 53: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: shrt/app.py - > reaches line 52, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('link_info',link_id=link.encoded_id)) - -Vulnerability 2: -File: shrt/app.py - > User input at line 46, trigger word "form[": - link = ShortLink(request.form['url']) -Reassigned in: - File: shrt/app.py - > Line 49: link.encoded_id = encode_id(link.id) - File: shrt/app.py - > Line 53: ret_MAYBE_FUNCTION_NAME = render_template('index.html') -File: shrt/app.py - > reaches line 52, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('link_info',link_id=link.encoded_id)) - - - -liontree/lemonbook -https://github.com/liontree/lemonbook -Entry file: lemonbook/__init__.py -Scanned: 2016-10-20 09:00:25.036200 -Vulnerability 1: -File: lemonbook/common/flask_login.py - > User input at line 227, trigger word "get(": - cookie_name = config.get('REMEMBER_COOKIE_NAME', COOKIE_NAME) -File: lemonbook/common/flask_login.py - > reaches line 237, trigger word "set_cookie(": - response.set_cookie(cookie_name, data,expires=expires, domain=domain) - -Vulnerability 2: -File: lemonbook/common/flask_login.py - > User input at line 228, trigger word "get(": - duration = config.get('REMEMBER_COOKIE_DURATION', COOKIE_DURATION) -Reassigned in: - File: lemonbook/common/flask_login.py - > Line 235: expires = datetime.utcnow() + duration -File: lemonbook/common/flask_login.py - > reaches line 237, trigger word "set_cookie(": - response.set_cookie(cookie_name, data,expires=expires, domain=domain) - -Vulnerability 3: -File: lemonbook/common/flask_login.py - > User input at line 229, trigger word "get(": - domain = config.get('REMEMBER_COOKIE_DOMAIN', None) -File: lemonbook/common/flask_login.py - > reaches line 237, trigger word "set_cookie(": - response.set_cookie(cookie_name, data,expires=expires, domain=domain) - -Vulnerability 4: -File: lemonbook/views/notes.py - > User input at line 50, trigger word "form[": - date = request.form['date'].strip() -Reassigned in: - File: lemonbook/views/notes.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents) - File: lemonbook/views/notes.py - > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest')) -File: lemonbook/views/notes.py - > reaches line 55, trigger word "replace(": - date = date.replace('/', '') - -Vulnerability 5: -File: lemonbook/views/notes.py - > User input at line 50, trigger word "form[": - date = request.form['date'].strip() -Reassigned in: - File: lemonbook/views/notes.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('latest.html',contents=contents) - File: lemonbook/views/notes.py - > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(url_for('latest')) -File: lemonbook/views/notes.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('date',id=user_id, date=date)) - - - -willkg/fredrik -https://github.com/willkg/fredrik -Entry file: fredrik/fredrik/project-template/PROJECTMODULE/main.py -Scanned: 2016-10-20 09:00:25.538473 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scotfu/gae-twitter -https://github.com/scotfu/gae-twitter -Entry file: gae-twitter/lib/flask/sessions.py -Scanned: 2016-10-20 09:00:26.534716 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -richardmonette/webremote -https://github.com/richardmonette/webremote -Entry file: webremote/app.py -Scanned: 2016-10-20 09:00:27.532709 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -micahwalter/hello-mysql -https://github.com/micahwalter/hello-mysql -Entry file: hello-mysql/hello-mysql.py -Scanned: 2016-10-20 09:00:28.785003 -No vulnerabilities found. - - -joshsee/GAE-Online-Apparel-Survey-Form -https://github.com/joshsee/GAE-Online-Apparel-Survey-Form -Entry file: GAE-Online-Apparel-Survey-Form/flask/sessions.py -Scanned: 2016-10-20 09:00:30.329360 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samsolariusleo/Flask -https://github.com/samsolariusleo/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 09:00:38.045975 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adamgreenhall/flask-haml-sass-coffee-template -https://github.com/adamgreenhall/flask-haml-sass-coffee-template -Entry file: flask-haml-sass-coffee-template/app.py -Scanned: 2016-10-20 09:00:39.801311 -No vulnerabilities found. - - -prakhar1989/flask-tuts -https://github.com/prakhar1989/flask-tuts -Entry file: flask-tuts/lesson-2/blogs/__init__.py -Scanned: 2016-10-20 09:00:43.755590 -No vulnerabilities found. - - -damour/flaskr -https://github.com/damour/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 09:00:44.736072 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fabin/Flaskr -https://github.com/fabin/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 09:00:45.234308 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Aussiroth/FlaskPractical -https://github.com/Aussiroth/FlaskPractical -Entry file: FlaskPractical/flask/routes.py -Scanned: 2016-10-20 09:00:46.031165 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fabin/Flask-Upload -https://github.com/fabin/Flask-Upload -Entry file: Flask-Upload/upload/__init__.py -Scanned: 2016-10-20 09:00:49.277374 -Vulnerability 1: -File: Flask-Upload/upload/__init__.py - > User input at line 24, trigger word "files[": - uploadedFile = request.files['file'] -Reassigned in: - File: Flask-Upload/upload/__init__.py - > Line 26: filename = uploadedFile.filename - File: Flask-Upload/upload/__init__.py - > Line 36: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File (in package)

-
-

- -

- ' -File: Flask-Upload/upload/__init__.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(s.put(DOMAIN_NAME, filename, ob)) - - - -lachezar/tada_backend -https://github.com/lachezar/tada_backend -Entry file: tada_backend/todo.py -Scanned: 2016-10-20 09:00:51.567788 -No vulnerabilities found. - - -krushton/flask-location-example -https://github.com/krushton/flask-location-example -Entry file: flask-location-example/app.py -Scanned: 2016-10-20 09:00:53.282269 -No vulnerabilities found. - - -david-torres/flask-rest-quickstart -https://github.com/david-torres/flask-rest-quickstart -Entry file: flask-rest-quickstart/application/__init__.py -Scanned: 2016-10-20 09:01:04.543134 -No vulnerabilities found. - - -Syerram/maintenance-server -https://github.com/Syerram/maintenance-server -Entry file: maintenance-server/run.py -Scanned: 2016-10-20 09:01:14.053499 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bettertest-org/flask_app_skeleton_on_gae -https://github.com/bettertest-org/flask_app_skeleton_on_gae -Entry file: flask_app_skeleton_on_gae/lib/flask/sessions.py -Scanned: 2016-10-20 09:01:14.806865 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -abhiomkar/contacts-rest -https://github.com/abhiomkar/contacts-rest -Entry file: contacts-rest/contacts.py -Scanned: 2016-10-20 09:01:16.312680 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Giorgix/thor -https://github.com/Giorgix/thor -Entry file: thor/thor.py -Scanned: 2016-10-20 09:01:17.554587 -No vulnerabilities found. - - -dyim42/wiki -https://github.com/dyim42/wiki -Entry file: None -Scanned: 2016-10-20 09:01:20.549371 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aromanovich/flask-webtest -https://github.com/aromanovich/flask-webtest -Entry file: flask-webtest/tests/core.py -Scanned: 2016-10-20 09:01:29.227628 -No vulnerabilities found. - - -sintezcs/flask -https://github.com/sintezcs/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 09:01:30.285993 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -wangzexin/flask -https://github.com/wangzexin/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 09:01:30.843059 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Treeki/bitBoard -https://github.com/Treeki/bitBoard -Entry file: bitBoard/bitBoard/__init__.py -Scanned: 2016-10-20 09:01:33.249825 -Vulnerability 1: -File: bitBoard/bitBoard/views/board.py - > User input at line 173, trigger word "get(": - pagenum = int(request.args.get('page', 1)) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 175: pagination = query.paginate(pagenum, THREADS_PER_PAGE,error_out=False) - File: bitBoard/bitBoard/views/board.py - > Line 180: pagination.items = add_null_entities(pagination.items) -File: bitBoard/bitBoard/views/board.py - > reaches line 183, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('thread_list.html',mode='forum', forum=forum, stickies=stickies, threads=pagination.items, pagination=pagination) - -Vulnerability 2: -File: bitBoard/bitBoard/views/board.py - > User input at line 210, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 219: ret_MAYBE_FUNCTION_NAME = _base_view_thread(thread) -File: bitBoard/bitBoard/views/board.py - > reaches line 218, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=301) - -Vulnerability 3: -File: bitBoard/bitBoard/views/board.py - > User input at line 224, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 233: ret_MAYBE_FUNCTION_NAME = _base_view_thread(thread) -File: bitBoard/bitBoard/views/board.py - > reaches line 232, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=301) - -Vulnerability 4: -File: bitBoard/bitBoard/views/board.py - > User input at line 239, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303) - File: bitBoard/bitBoard/views/board.py - > Line 291: user = post.creator - File: bitBoard/bitBoard/views/board.py - > Line 296: ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply) -File: bitBoard/bitBoard/views/board.py - > reaches line 250, trigger word "filter(": - post = Post.query.filter(Post.thread == thread, Post.created_at > timestamp).order_by(db.asc(Post.created_at)).first() - -Vulnerability 5: -File: bitBoard/bitBoard/views/board.py - > User input at line 239, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303) - File: bitBoard/bitBoard/views/board.py - > Line 291: user = post.creator - File: bitBoard/bitBoard/views/board.py - > Line 296: ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply) -File: bitBoard/bitBoard/views/board.py - > reaches line 255, trigger word "filter(": - post = Post.query.filter(Post.thread == thread).order_by(db.asc(Post.created_at)).first() - -Vulnerability 6: -File: bitBoard/bitBoard/views/board.py - > User input at line 286, trigger word "get(": - pagenum = int(request.args.get('page', 1)) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 287: pagination = query.paginate(pagenum, POSTS_PER_PAGE,error_out=False) - File: bitBoard/bitBoard/views/board.py - > Line 244: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 260: ret_MAYBE_FUNCTION_NAME = redirect_to_post(thread, post) - File: bitBoard/bitBoard/views/board.py - > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url,code=303) -File: bitBoard/bitBoard/views/board.py - > reaches line 296, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('view_thread.html',forum=thread.forum, thread=thread, posts=pagination.items, pagination=pagination, qr_form=quick_reply) - -Vulnerability 7: -File: bitBoard/bitBoard/views/board.py - > User input at line 366, trigger word ".data": - thread = Thread(title=form.title.data, subtitle=form.subtitle.data, forum=forum, creator=g.user, type=is_privateThread.PRIVATEThread.BASIC_THREAD, post_count=1) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 382: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 400: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 407: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 412: notify = Notification(thread=thread, recipient=user, type=Notification.NEW_PRIVATE_THREAD) - File: bitBoard/bitBoard/views/board.py - > Line 422: ret_MAYBE_FUNCTION_NAME = render_template('post.html',is_thread=True, is_private=is_private, recipient_errors=recipient_errors, form=form, forum=forum, pm_recipient_limit=PM_RECIPIENT_LIMIT, url=url) -File: bitBoard/bitBoard/views/board.py - > reaches line 420, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=303) - -Vulnerability 8: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 459, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(thread.reply_url,code=301) - -Vulnerability 9: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 504, trigger word "filter(": - notify_which = db.session.query(u_table.c.user_id, Notification.id).filter(u_table.c.thread_id == thread.id).filter(u_table.c.user_id != g.user.id).outerjoin(Notification, notify_join) - -Vulnerability 10: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 534, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303) - -Vulnerability 11: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 536, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=True, post_id=post.id, post_html=render_template('post_box.html',post=post, postNumber=thread.post_count), layout_extra=get_layout_extra(post)) - -Vulnerability 12: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 536, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=True, post_id=post.id, post_html=render_template('post_box.html',post=post, postNumber=thread.post_count), layout_extra=get_layout_extra(post)) - -Vulnerability 13: -File: bitBoard/bitBoard/views/board.py - > User input at line 443, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 471: post = Post(thread=thread, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr, version_count=1, number=post_number) - File: bitBoard/bitBoard/views/board.py - > Line 480: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 487: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 552: ret_MAYBE_FUNCTION_NAME = jsonify(was_posted=False, errors=jsonify_errors(form)) -File: bitBoard/bitBoard/views/board.py - > reaches line 546, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, thread=thread, forum=thread.forum, url=thread.reply_url) - -Vulnerability 14: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 577, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(post.edit_url,code=301) - -Vulnerability 15: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 579, trigger word "filter(": - posts_before = Post.query.filter(Post.thread == thread, Post.id < post.id).count() - -Vulnerability 16: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 595, trigger word "render_template(": - html = render_template('inline_edit.html',post=post, is_thread=edits_thread, form=form, url=post.edit_url) - -Vulnerability 17: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 627, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303) - -Vulnerability 18: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 629, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=True, post_html=escape(parse_text(version.content))) - -Vulnerability 19: -File: bitBoard/bitBoard/views/board.py - > User input at line 604, trigger word ".data": - version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 635: ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, is_thread=edits_thread, is_edit=True, thread=thread, forum=thread.forum, url=post.edit_url) - File: bitBoard/bitBoard/views/board.py - > Line 643: ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=False, errors=jsonify_errors(form)) - File: bitBoard/bitBoard/views/board.py - > Line 577: ret_MAYBE_FUNCTION_NAME = redirect(post.edit_url,code=301) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 627: ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303) -File: bitBoard/bitBoard/views/board.py - > reaches line 629, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=True, post_html=escape(parse_text(version.content))) - -Vulnerability 20: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 635, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',form=form, is_thread=edits_thread, is_edit=True, thread=thread, forum=thread.forum, url=post.edit_url) - -Vulnerability 21: -File: bitBoard/bitBoard/views/board.py - > User input at line 564, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 568: thread = post.thread - File: bitBoard/bitBoard/views/board.py - > Line 583: edits_thread = thread.is_basic_thread and posts_before == 0 - File: bitBoard/bitBoard/views/board.py - > Line 587: cur_version = post.current_version - File: bitBoard/bitBoard/views/board.py - > Line 588: form_cls = edits_threadThreadFormPostForm - File: bitBoard/bitBoard/views/board.py - > Line 589: form = form_cls(obj=post, content=cur_version.content, title=thread.title, subtitle=thread.subtitle) - File: bitBoard/bitBoard/views/board.py - > Line 600: ret_MAYBE_FUNCTION_NAME = jsonify(form_html=html) - File: bitBoard/bitBoard/views/board.py - > Line 604: version = PostVersion(content=form.content.data, post=post, creator=g.user, created_at=datetime.datetime.now(), created_ip=request.remote_addr) - File: bitBoard/bitBoard/views/board.py - > Line 613: post.current_version = version - File: bitBoard/bitBoard/views/board.py - > Line 616: version = cur_version - File: bitBoard/bitBoard/views/board.py - > Line 619: thread.title = form.title.data - File: bitBoard/bitBoard/views/board.py - > Line 620: thread.subtitle = form.subtitle.data - File: bitBoard/bitBoard/views/board.py - > Line 621: thread.slug = slugify(thread.title) -File: bitBoard/bitBoard/views/board.py - > reaches line 643, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_edited=False, errors=jsonify_errors(form)) - -Vulnerability 22: -File: bitBoard/bitBoard/views/board.py - > User input at line 656, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 660: thread = post.thread -File: bitBoard/bitBoard/views/board.py - > reaches line 669, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(post.delete_url,code=301) - -Vulnerability 23: -File: bitBoard/bitBoard/views/board.py - > User input at line 656, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 660: thread = post.thread -File: bitBoard/bitBoard/views/board.py - > reaches line 679, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(post.url,code=303) - -Vulnerability 24: -File: bitBoard/bitBoard/views/board.py - > User input at line 656, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 660: thread = post.thread -File: bitBoard/bitBoard/views/board.py - > reaches line 681, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_deleted=True, post_html=render_template('post_box.html',post=post)) - -Vulnerability 25: -File: bitBoard/bitBoard/views/board.py - > User input at line 656, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 660: thread = post.thread -File: bitBoard/bitBoard/views/board.py - > reaches line 681, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(was_deleted=True, post_html=render_template('post_box.html',post=post)) - -Vulnerability 26: -File: bitBoard/bitBoard/views/board.py - > User input at line 656, trigger word "get(": - post = Post.query.get(post_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 660: thread = post.thread -File: bitBoard/bitBoard/views/board.py - > reaches line 686, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('confirm_post_delete.html',post=post, thread=post.thread, forum=post.thread.forum, url=post.delete_url) - -Vulnerability 27: -File: bitBoard/bitBoard/views/board.py - > User input at line 696, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 703: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 704: url = thread.move_url - File: bitBoard/bitBoard/views/board.py - > Line 730: form = MoveThreadForm(destforum=thread.forum_id) - File: bitBoard/bitBoard/views/board.py - > Line 734: new_forum_id = form.destforum.data - File: bitBoard/bitBoard/views/board.py - > Line 741: old_forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 743: old_forum.post_count -= thread.post_count - File: bitBoard/bitBoard/views/board.py - > Line 745: thread.forum_id = new_forum_id - File: bitBoard/bitBoard/views/board.py - > Line 749: new_forum.post_count += thread.post_count -File: bitBoard/bitBoard/views/board.py - > reaches line 710, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url,code=301) - -Vulnerability 28: -File: bitBoard/bitBoard/views/board.py - > User input at line 696, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 703: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 704: url = thread.move_url - File: bitBoard/bitBoard/views/board.py - > Line 730: form = MoveThreadForm(destforum=thread.forum_id) - File: bitBoard/bitBoard/views/board.py - > Line 734: new_forum_id = form.destforum.data - File: bitBoard/bitBoard/views/board.py - > Line 741: old_forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 743: old_forum.post_count -= thread.post_count - File: bitBoard/bitBoard/views/board.py - > Line 745: thread.forum_id = new_forum_id - File: bitBoard/bitBoard/views/board.py - > Line 749: new_forum.post_count += thread.post_count -File: bitBoard/bitBoard/views/board.py - > reaches line 757, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(thread.url,code=303) - -Vulnerability 29: -File: bitBoard/bitBoard/views/board.py - > User input at line 696, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 703: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 704: url = thread.move_url - File: bitBoard/bitBoard/views/board.py - > Line 730: form = MoveThreadForm(destforum=thread.forum_id) - File: bitBoard/bitBoard/views/board.py - > Line 734: new_forum_id = form.destforum.data - File: bitBoard/bitBoard/views/board.py - > Line 741: old_forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 743: old_forum.post_count -= thread.post_count - File: bitBoard/bitBoard/views/board.py - > Line 745: thread.forum_id = new_forum_id - File: bitBoard/bitBoard/views/board.py - > Line 749: new_forum.post_count += thread.post_count -File: bitBoard/bitBoard/views/board.py - > reaches line 760, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('move_thread.html',form=form, forum=forum, thread=thread, url=url) - -Vulnerability 30: -File: bitBoard/bitBoard/views/board.py - > User input at line 775, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 782: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 785: url = thread.sticky_url - File: bitBoard/bitBoard/views/board.py - > Line 787: url = thread.lock_url - File: bitBoard/bitBoard/views/board.py - > Line 791: url = thread.follow_url - File: bitBoard/bitBoard/views/board.py - > Line 808: old_value = thread.is_stickied - File: bitBoard/bitBoard/views/board.py - > Line 822: old_value = thread.is_locked - File: bitBoard/bitBoard/views/board.py - > Line 836: old_value = thread.is_followed_by(g.user) - File: bitBoard/bitBoard/views/board.py - > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title) -File: bitBoard/bitBoard/views/board.py - > reaches line 802, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url,code=301) - -Vulnerability 31: -File: bitBoard/bitBoard/views/board.py - > User input at line 775, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 782: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 785: url = thread.sticky_url - File: bitBoard/bitBoard/views/board.py - > Line 787: url = thread.lock_url - File: bitBoard/bitBoard/views/board.py - > Line 791: url = thread.follow_url - File: bitBoard/bitBoard/views/board.py - > Line 808: old_value = thread.is_stickied - File: bitBoard/bitBoard/views/board.py - > Line 822: old_value = thread.is_locked - File: bitBoard/bitBoard/views/board.py - > Line 836: old_value = thread.is_followed_by(g.user) - File: bitBoard/bitBoard/views/board.py - > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title) -File: bitBoard/bitBoard/views/board.py - > reaches line 869, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = form.redirect(url=thread.url) - -Vulnerability 32: -File: bitBoard/bitBoard/views/board.py - > User input at line 775, trigger word "get(": - thread = Thread.query.get(thread_id) -Reassigned in: - File: bitBoard/bitBoard/views/board.py - > Line 782: forum = thread.forum - File: bitBoard/bitBoard/views/board.py - > Line 785: url = thread.sticky_url - File: bitBoard/bitBoard/views/board.py - > Line 787: url = thread.lock_url - File: bitBoard/bitBoard/views/board.py - > Line 791: url = thread.follow_url - File: bitBoard/bitBoard/views/board.py - > Line 808: old_value = thread.is_stickied - File: bitBoard/bitBoard/views/board.py - > Line 822: old_value = thread.is_locked - File: bitBoard/bitBoard/views/board.py - > Line 836: old_value = thread.is_followed_by(g.user) - File: bitBoard/bitBoard/views/board.py - > Line 866: ret_MAYBE_FUNCTION_NAME = jsonify(toast=msg, link_title=link_title) -File: bitBoard/bitBoard/views/board.py - > reaches line 871, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('confirm.html',form=form, crumbs_type='thread', forum=forum, thread=thread, final_crumb='%s Thread' % cap_verb, message=message, url=url) - -Vulnerability 33: -File: bitBoard/bitBoard/views/base.py - > User input at line 49, trigger word "get(": - target = get_redirect_target() or url -Reassigned in: - File: bitBoard/bitBoard/views/base.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data) -File: bitBoard/bitBoard/views/base.py - > reaches line 50, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303) - -Vulnerability 34: -File: bitBoard/bitBoard/views/base.py - > User input at line 49, trigger word "get(": - target = get_redirect_target() or url -Reassigned in: - File: bitBoard/bitBoard/views/base.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data) -File: bitBoard/bitBoard/views/base.py - > reaches line 50, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values),code=303) - -Vulnerability 35: -File: bitBoard/bitBoard/views/wiki.py - > User input at line 31, trigger word "get(": - revision = WikiRevision.query.get(revision_id) -Reassigned in: - File: bitBoard/bitBoard/views/wiki.py - > Line 29: ret_MAYBE_FUNCTION_NAME = redirect(page.url,code=303) -File: bitBoard/bitBoard/views/wiki.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('wiki_page.html',is_old_revision=True, page=page, revision=revision) - -Vulnerability 36: -File: bitBoard/bitBoard/views/user.py - > User input at line 36, trigger word ".data": - user = User.query.filter(db.func.lower(User.name) == db.func.lower(self.name.data)).first() -Reassigned in: - File: bitBoard/bitBoard/views/user.py - > Line 44: self.user = user -File: bitBoard/bitBoard/views/user.py - > reaches line 36, trigger word "filter(": - user = User.query.filter(db.func.lower(User.name) == db.func.lower(self.name.data)).first() - -Vulnerability 37: -File: bitBoard/bitBoard/views/user.py - > User input at line 124, trigger word "get(": - user = User.query.get(id) -File: bitBoard/bitBoard/views/user.py - > reaches line 128, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(user.url,code=301) - -Vulnerability 38: -File: bitBoard/bitBoard/views/user.py - > User input at line 124, trigger word "get(": - user = User.query.get(id) -File: bitBoard/bitBoard/views/user.py - > reaches line 129, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('profile.html',user=user) - - - -byu-osl/familytree-sample-app -https://github.com/byu-osl/familytree-sample-app -Entry file: familytree-sample-app/app.py -Scanned: 2016-10-20 09:01:33.767461 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kmiasko/flask-barcode -https://github.com/kmiasko/flask-barcode -Entry file: flask-barcode/wsgi.py -Scanned: 2016-10-20 09:01:35.260714 -No vulnerabilities found. - - -jayzcode/helloflask -https://github.com/jayzcode/helloflask -Entry file: helloflask/hello.py -Scanned: 2016-10-20 09:01:38.785491 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: helloflask/vene/lib/python2.6/genericpath.py - -bootandy/flask-sample -https://github.com/bootandy/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-20 09:01:39.276175 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lee814/flaskr -https://github.com/lee814/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 09:01:39.777898 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JLtheking/FlaskExample -https://github.com/JLtheking/FlaskExample -Entry file: FlaskExample/routes.py -Scanned: 2016-10-20 09:01:41.299086 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -redfive/python-flask -https://github.com/redfive/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 09:01:44.317486 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -atbaker/flask-tutorial -https://github.com/atbaker/flask-tutorial -Entry file: None -Scanned: 2016-10-20 09:01:45.321600 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bradmerlin/porty_flask -https://github.com/bradmerlin/porty_flask -Entry file: porty_flask/app.py -Scanned: 2016-10-20 09:01:45.853882 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marcilioleite/flask-saude -https://github.com/marcilioleite/flask-saude -Entry file: flask-saude/app/__init__.py -Scanned: 2016-10-20 09:01:52.424237 -Vulnerability 1: -File: flask-saude/app/views.py - > User input at line 11, trigger word "get(": - m = Medico.query.get(1) -File: flask-saude/app/views.py - > reaches line 12, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('medico.html',medico=m) - - - -asap/watchman.flask -https://github.com/asap/watchman.flask -Entry file: None -Scanned: 2016-10-20 09:01:52.947430 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bradmerlin/mxit-spock_flask -https://github.com/bradmerlin/mxit-spock_flask -Entry file: mxit-spock_flask/app.py -Scanned: 2016-10-20 09:01:53.454498 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rartavia/flask-babel-example -https://github.com/rartavia/flask-babel-example -Entry file: flask-babel-example/flask-babel-example.py -Scanned: 2016-10-20 09:01:54.748600 -No vulnerabilities found. - - -elidickinson/flask-proxy-demo -https://github.com/elidickinson/flask-proxy-demo -Entry file: flask-proxy-demo/hello.py -Scanned: 2016-10-20 09:02:04.993893 -No vulnerabilities found. - - -bradmerlin/mxit-blackjack_flask -https://github.com/bradmerlin/mxit-blackjack_flask -Entry file: mxit-blackjack_flask/app.py -Scanned: 2016-10-20 09:02:15.037901 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -geunieve/ratemyfirefart -https://github.com/geunieve/ratemyfirefart -Entry file: ratemyfirefart/views.py -Scanned: 2016-10-20 09:02:17.322723 -No vulnerabilities found. - - -wangxiaoxiao88/python-bookmanager -https://github.com/wangxiaoxiao88/python-bookmanager -Entry file: python-bookmanager/app.py -Scanned: 2016-10-20 09:02:18.696106 -No vulnerabilities found. - - -bettertest-org/flask_app_skeleton_on_gae -https://github.com/bettertest-org/flask_app_skeleton_on_gae -Entry file: flask_app_skeleton_on_gae/lib/flask/sessions.py -Scanned: 2016-10-20 09:02:20.265786 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChannelIQ/redis-explorer -https://github.com/ChannelIQ/redis-explorer -Entry file: redis-explorer/redis_explorer/__init__.py -Scanned: 2016-10-20 09:02:20.786498 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -dougdragon/fuckyeanouns.com -https://github.com/dougdragon/fuckyeanouns.com -Entry file: None -Scanned: 2016-10-20 09:02:26.296281 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -brocksamson/minesweeper -https://github.com/brocksamson/minesweeper -Entry file: minesweeper/minesweeper/__init__.py -Scanned: 2016-10-20 09:02:27.532099 -No vulnerabilities found. - - -Sadhanandh/Chat-thumbnailer -https://github.com/Sadhanandh/Chat-thumbnailer -Entry file: Chat-thumbnailer/urllib2-enabled/flask_app.py -Scanned: 2016-10-20 09:02:28.029803 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -znewman01/creepy -https://github.com/znewman01/creepy -Entry file: creepy/creepy/app.py -Scanned: 2016-10-20 09:02:30.528388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aliismayilov/microblog -https://github.com/aliismayilov/microblog -Entry file: None -Scanned: 2016-10-20 09:02:31.058045 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -konrad/annotation_helper_web_app -https://github.com/konrad/annotation_helper_web_app -Entry file: annotation_helper_web_app/annotate.py -Scanned: 2016-10-20 09:02:32.425187 -No vulnerabilities found. - - -smerritt/tempurl-signer -https://github.com/smerritt/tempurl-signer -Entry file: tempurl-signer/app.py -Scanned: 2016-10-20 09:02:33.687137 -No vulnerabilities found. - - -laiqing/crossFireWall-Search -https://github.com/laiqing/crossFireWall-Search -Entry file: crossFireWall-Search/google-enchance.py -Scanned: 2016-10-20 09:02:35.260947 -No vulnerabilities found. - - -lepture/flask-oauthlib -https://github.com/lepture/flask-oauthlib -Entry file: flask-oauthlib/flask_oauthlib/provider/oauth1.py -Scanned: 2016-10-20 09:02:43.121433 -Vulnerability 1: -File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > User input at line 87, trigger word "get(": - error_endpoint = self.app.config.get('OAUTH1_PROVIDER_ERROR_ENDPOINT') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > Line 90: ret_MAYBE_FUNCTION_NAME = '/oauth/errors' - File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > Line 86: ret_MAYBE_FUNCTION_NAME = error_uri -File: flask-oauthlib/flask_oauthlib/provider/oauth1.py - > reaches line 89, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint) - -Vulnerability 2: -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > User input at line 104, trigger word "get(": - error_endpoint = self.app.config.get('OAUTH2_PROVIDER_ERROR_ENDPOINT') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 107: ret_MAYBE_FUNCTION_NAME = '/oauth/errors' - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 103: ret_MAYBE_FUNCTION_NAME = error_uri -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > reaches line 106, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = url_for(error_endpoint) - -Vulnerability 3: -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > User input at line 447, trigger word "get(": - redirect_uri = credentials.get('redirect_uri') -Reassigned in: - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 464: ret_MAYBE_FUNCTION_NAME = redirect(add_params_to_uri(self.error_uri, 'error'str(e))) - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 455: ret_MAYBE_FUNCTION_NAME = create_response(ret) - File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > Line 458: ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(self.error_uri)) -File: flask-oauthlib/flask_oauthlib/provider/oauth2.py - > reaches line 461, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(e.in_uri(redirect_uri or self.error_uri)) - - - -miguelgrinberg/Flask-HTTPAuth -https://github.com/miguelgrinberg/Flask-HTTPAuth -Entry file: Flask-HTTPAuth/examples/basic_auth.py -Scanned: 2016-10-20 09:02:45.031833 -No vulnerabilities found. - - -plastboks/Flaskmarks -https://github.com/plastboks/Flaskmarks -Entry file: Flaskmarks/flaskmarks/__init__.py -Scanned: 2016-10-20 09:02:49.648228 -Vulnerability 1: -File: Flaskmarks/flaskmarks/views/marks.py - > User input at line 92, trigger word "get(": - q = request.args.get('q') -Reassigned in: - File: Flaskmarks/flaskmarks/views/marks.py - > Line 98: m = g.user.q_marks_by_string(page, q, t) - File: Flaskmarks/flaskmarks/views/marks.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('marks.allmarks')) -File: Flaskmarks/flaskmarks/views/marks.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('mark/index.html',title='Search results for: %s' % q, header='Search results for: '%s'' % q, marks=m) - -Vulnerability 2: -File: Flaskmarks/flaskmarks/views/marks.py - > User input at line 93, trigger word "get(": - t = request.args.get('type') -Reassigned in: - File: Flaskmarks/flaskmarks/views/marks.py - > Line 98: m = g.user.q_marks_by_string(page, q, t) - File: Flaskmarks/flaskmarks/views/marks.py - > Line 96: ret_MAYBE_FUNCTION_NAME = redirect(url_for('marks.allmarks')) -File: Flaskmarks/flaskmarks/views/marks.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('mark/index.html',title='Search results for: %s' % q, header='Search results for: '%s'' % q, marks=m) - -Vulnerability 3: -File: Flaskmarks/flaskmarks/views/auth.py - > User input at line 33, trigger word ".data": - u = User.by_uname_or_email(form.username.data) -File: Flaskmarks/flaskmarks/views/auth.py - > reaches line 38, trigger word "flash(": - flash('Welcome %s.' % u.username,category='success') - - - -sintezcs/flask -https://github.com/sintezcs/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 09:02:50.208050 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -klen/mixer -https://github.com/klen/mixer -Entry file: mixer/tests/test_flask.py -Scanned: 2016-10-20 09:02:54.381461 -No vulnerabilities found. - - -fedenusy/flaskr -https://github.com/fedenusy/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 09:02:55.359682 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lee814/flaskr -https://github.com/lee814/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 09:02:55.854231 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paraboul/FlaskPress -https://github.com/paraboul/FlaskPress -Entry file: None -Scanned: 2016-10-20 09:02:56.366792 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/paraboul/FlaskPress. - -AlexeyMK/gglto_flask -https://github.com/AlexeyMK/gglto_flask -Entry file: gglto_flask/gglto.py -Scanned: 2016-10-20 09:02:57.583570 -Vulnerability 1: -File: gglto_flask/gglto.py - > User input at line 27, trigger word "get(": - base_path = domain_to_redirect_url.get(request.headers['Host'], 'http://google.com/search?q={}') -File: gglto_flask/gglto.py - > reaches line 30, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(base_path.format(query_escaped)) - - - -DamnedFacts/flask-contact -https://github.com/DamnedFacts/flask-contact -Entry file: flask-contact/main.py -Scanned: 2016-10-20 09:02:58.087657 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxbucknell/vanilla_flask -https://github.com/maxbucknell/vanilla_flask -Entry file: vanilla_flask/vanilla/__init__.py -Scanned: 2016-10-20 09:02:59.978826 -No vulnerabilities found. - - -sammyrulez/flask-grolla -https://github.com/sammyrulez/flask-grolla -Entry file: flask-grolla/tests.py -Scanned: 2016-10-20 09:03:02.747870 -Vulnerability 1: -File: flask-grolla/flask_grolla.py - > User input at line 22, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -File: flask-grolla/flask_grolla.py - > reaches line 22, trigger word "url_for(": - next_url = request.args.get('next') or url_for('index') - -Vulnerability 2: -File: flask-grolla/flask_grolla.py - > User input at line 22, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -File: flask-grolla/flask_grolla.py - > reaches line 25, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - -Vulnerability 3: -File: flask-grolla/flask_grolla.py - > User input at line 22, trigger word "get(": - next_url = request.args.get('next') or url_for('index') -File: flask-grolla/flask_grolla.py - > reaches line 32, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url) - - - -duffy25/sample_flask -https://github.com/duffy25/sample_flask -Entry file: sample_flask/sample_flask.py -Scanned: 2016-10-20 09:03:05.255718 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Joinhack/agent -https://github.com/Joinhack/agent -Entry file: agent/flask_sqlalchemy.py -Scanned: 2016-10-20 09:03:16.580430 -Vulnerability 1: -File: agent/agent/views/user.py - > User input at line 14, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/user.py - > Line 17: user = um.getByLoginId(loginid) - File: agent/agent/views/user.py - > Line 18: company = um.getUserCompany(user) - File: agent/agent/views/user.py - > Line 19: region = user.department.region - File: agent/agent/views/user.py - > Line 20: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/user.py - > reaches line 22, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',user=user, company=company, region=region, cities=cities) - -Vulnerability 2: -File: agent/agent/views/user.py - > User input at line 44, trigger word "form[": - area = request.form['area'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 3: -File: agent/agent/views/user.py - > User input at line 45, trigger word "form[": - name = request.form['section'] -Reassigned in: - File: agent/agent/views/user.py - > Line 46: reg = Region(type=3, name=name, parent_id=area) - File: agent/agent/views/user.py - > Line 49: data = 'value''content''selected'reg.idreg.nameTrue -File: agent/agent/views/user.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0data) - -Vulnerability 4: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 5: -File: agent/agent/views/house.py - > User input at line 12, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 15: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 16: company = um.getUserCompany(user) - File: agent/agent/views/house.py - > Line 17: cities = dm.getCitiesOfCompany(company) -File: agent/agent/views/house.py - > reaches line 18, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''content'0render_template('/house/community_add.html',cities=cities)) - -Vulnerability 6: -File: agent/agent/views/house.py - > User input at line 34, trigger word "get(": - loginid = session.get(LOGINID) -Reassigned in: - File: agent/agent/views/house.py - > Line 36: user = um.getByLoginId(loginid) - File: agent/agent/views/house.py - > Line 38: data = cmgmt.queryCommunitiesByUserId(user, q) - File: agent/agent/views/house.py - > Line 33: ret_MAYBE_FUNCTION_NAME = jsonify('code''msg'-1'unkown query') -File: agent/agent/views/house.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0toselect(data)) - -Vulnerability 7: -File: agent/agent/views/house.py - > User input at line 45, trigger word "form[": - community_name = request.form['community'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - -Vulnerability 8: -File: agent/agent/views/house.py - > User input at line 46, trigger word "form[": - location = request.form['location'] -Reassigned in: - File: agent/agent/views/house.py - > Line 55: community = Community(name=community_name, location=location) -File: agent/agent/views/house.py - > reaches line 67, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('code''data'0'value''content'community.idcommunity.name) - - - -vasnake/mapfeatureserver -https://github.com/vasnake/mapfeatureserver -Entry file: None -Scanned: 2016-10-20 09:03:17.102371 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vasnake/mapfeatureserver. - -cldershem/WebFlask-CleanTemplate -https://github.com/cldershem/WebFlask-CleanTemplate -Entry file: None -Scanned: 2016-10-20 09:03:17.643554 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tonilxm/1stFlask -https://github.com/tonilxm/1stFlask -Entry file: 1stFlask/src/lib/flask/sessions.py -Scanned: 2016-10-20 09:03:18.167505 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brooks/python-flask-sample -https://github.com/brooks/python-flask-sample -Entry file: python-flask-sample/hello.py -Scanned: 2016-10-20 09:03:20.764503 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py - -palei/Just-Another-Flask-App -https://github.com/palei/Just-Another-Flask-App -Entry file: Just-Another-Flask-App/app/__init__.py -Scanned: 2016-10-20 09:03:21.275967 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -FriendCode/python-flask-sample -https://github.com/FriendCode/python-flask-sample -Entry file: python-flask-sample/hello.py -Scanned: 2016-10-20 09:03:26.802653 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-flask-sample/venv/lib/python2.7/genericpath.py - -thrisp/flarf -https://github.com/thrisp/flarf -Entry file: flarf/examples/example.py -Scanned: 2016-10-20 09:03:29.857642 -No vulnerabilities found. - - -geunieve/ratemyfirefart -https://github.com/geunieve/ratemyfirefart -Entry file: ratemyfirefart/views.py -Scanned: 2016-10-20 09:03:32.175274 -No vulnerabilities found. - - -lhr530124/nozomiServer -https://github.com/lhr530124/nozomiServer -Entry file: None -Scanned: 2016-10-20 09:13:35.307126 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ChannelIQ/redis-explorer -https://github.com/ChannelIQ/redis-explorer -Entry file: redis-explorer/redis_explorer/__init__.py -Scanned: 2016-10-20 09:13:35.859960 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sangallimarco/arduino_raspberry_garden_ui -https://github.com/sangallimarco/arduino_raspberry_garden_ui -Entry file: arduino_raspberry_garden_ui/main.py -Scanned: 2016-10-20 09:13:36.402188 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -carlosvin/cmsflask -https://github.com/carlosvin/cmsflask -Entry file: None -Scanned: 2016-10-20 09:15:44.201132 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lpolepeddi/intro-to-flask -https://github.com/lpolepeddi/intro-to-flask -Entry file: intro-to-flask/intro_to_flask/__init__.py -Scanned: 2016-10-20 09:44:07.174301 -No vulnerabilities found. - - -saltycrane/flask-jquery-ajax-example -https://github.com/saltycrane/flask-jquery-ajax-example -Entry file: None -Scanned: 2016-10-20 09:44:07.670867 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saltycrane/flask-jquery-ajax-example. - -bh45k4r/flask -https://github.com/bh45k4r/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 10:55:49.015185 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -gd452/flask -https://github.com/gd452/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 10:55:49.570463 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -llh335/flask -https://github.com/llh335/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 10:55:50.153913 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -paulmin55/flask -https://github.com/paulmin55/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 10:55:50.694965 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -CarlEkerot/flask-orm -https://github.com/CarlEkerot/flask-orm -Entry file: flask-orm/webapp/__init__.py -Scanned: 2016-10-20 10:55:52.080810 -No vulnerabilities found. - - -ibininja/upload_file_python -https://github.com/ibininja/upload_file_python -Entry file: upload_file_python/src/app.py -Scanned: 2016-10-20 10:55:53.354691 -No vulnerabilities found. - - -fraoustin/flaskserver -https://github.com/fraoustin/flaskserver -Entry file: None -Scanned: 2016-10-20 10:55:53.872570 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fraoustin/flaskserver. - -ecerami/hello_flask -https://github.com/ecerami/hello_flask -Entry file: hello_flask/Flask.py -Scanned: 2016-10-20 10:55:54.747922 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -milinbhakta/flaskmaterialdesign -https://github.com/milinbhakta/flaskmaterialdesign -Entry file: flaskmaterialdesign/venv/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-20 10:56:03.323562 -No vulnerabilities found. - - -Hellemos/flaskapp -https://github.com/Hellemos/flaskapp -Entry file: None -Scanned: 2016-10-20 10:56:04.396691 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Hellemos/flaskapp. - -ssssergey/flaskengine -https://github.com/ssssergey/flaskengine -Entry file: flaskengine/flaskengine/__init__.py -Scanned: 2016-10-20 10:56:04.913875 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kai1/flasktest -https://github.com/kai1/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 10:56:05.428965 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -willianribeiro/flaskr -https://github.com/willianribeiro/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 10:56:05.954757 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -StuartChristie/Flasky -https://github.com/StuartChristie/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-20 10:56:06.462159 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -milinbhakta/flaskjinja -https://github.com/milinbhakta/flaskjinja -Entry file: flaskjinja/hello.py -Scanned: 2016-10-20 10:56:10.521454 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -saucecode/flaskcat -https://github.com/saucecode/flaskcat -Entry file: flaskcat/flaskcat.py -Scanned: 2016-10-20 10:56:11.033738 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wiggitywalt/flasktaskr -https://github.com/wiggitywalt/flasktaskr -Entry file: None -Scanned: 2016-10-20 10:56:11.545912 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ashishkx/Flaskr -https://github.com/ashishkx/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 10:56:12.057025 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jward1/flasktaskr -https://github.com/jward1/flasktaskr -Entry file: None -Scanned: 2016-10-20 10:56:12.549536 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -schoolofcode-me/web_blog -https://github.com/schoolofcode-me/web_blog -Entry file: web_blog/src/app.py -Scanned: 2016-10-20 10:56:14.281493 -No vulnerabilities found. - - -iKalin/flask1 -https://github.com/iKalin/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-20 10:56:15.069575 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -iamrajhans/FlaskPYDemo -https://github.com/iamrajhans/FlaskPYDemo -Entry file: None -Scanned: 2016-10-20 10:56:15.583376 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/iamrajhans/FlaskPYDemo. - -arpm/FlaskTaskr -https://github.com/arpm/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-20 10:56:16.269829 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -MortalCatalyst/flaskTR -https://github.com/MortalCatalyst/flaskTR -Entry file: flaskTR/flasktaskr/views.py -Scanned: 2016-10-20 10:56:16.793705 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -QuadPiece/Quad-Devices-Two -https://github.com/QuadPiece/Quad-Devices-Two -Entry file: Quad-Devices-Two/run.py -Scanned: 2016-10-20 10:56:18.079191 -No vulnerabilities found. - - -dbunker/Flask-Tread -https://github.com/dbunker/Flask-Tread -Entry file: Flask-Tread/examples/blog/app/mainapp/__init__.py -Scanned: 2016-10-20 10:56:18.591907 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -martincalvert/GAE-Flask -https://github.com/martincalvert/GAE-Flask -Entry file: GAE-Flask/routes.py -Scanned: 2016-10-20 10:56:19.906197 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fergyfresh/flask-staysafe -https://github.com/fergyfresh/flask-staysafe -Entry file: None -Scanned: 2016-10-20 10:56:48.471433 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -arvelt/hello-flask -https://github.com/arvelt/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 10:56:49.056844 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -andrewheekin/flask-metatag -https://github.com/andrewheekin/flask-metatag -Entry file: flask-metatag/app.py -Scanned: 2016-10-20 10:56:50.332891 -No vulnerabilities found. - - -Seneckiy/workwithFlask -https://github.com/Seneckiy/workwithFlask -Entry file: workwithFlask/hello.py -Scanned: 2016-10-20 10:56:52.503267 -No vulnerabilities found. - - -xuefeng-huang/flask_task -https://github.com/xuefeng-huang/flask_task -Entry file: flask_task/__init__.py -Scanned: 2016-10-20 10:56:53.744348 -No vulnerabilities found. - - -ichy-wayland/flask-temp -https://github.com/ichy-wayland/flask-temp -Entry file: flask-temp/main.py -Scanned: 2016-10-20 10:56:54.984922 -No vulnerabilities found. - - -RodrigoVillatoro/flask_blog -https://github.com/RodrigoVillatoro/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 10:56:55.507052 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -patrickyoung/simple-flask -https://github.com/patrickyoung/simple-flask -Entry file: simple-flask/hello.py -Scanned: 2016-10-20 10:56:56.730523 -No vulnerabilities found. - - -sancarbar/flask-auth -https://github.com/sancarbar/flask-auth -Entry file: flask-auth/example.py -Scanned: 2016-10-20 10:56:57.271162 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lifayi2008/my_flask -https://github.com/lifayi2008/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-20 10:57:04.904797 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -staticor/learnFlask -https://github.com/staticor/learnFlask -Entry file: None -Scanned: 2016-10-20 10:57:05.392341 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/staticor/learnFlask. - -mehmettaskiner/flask-skeleton -https://github.com/mehmettaskiner/flask-skeleton -Entry file: None -Scanned: 2016-10-20 10:57:05.899871 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mehmettaskiner/flask-skeleton. - -robin-lee/flask-tutorial -https://github.com/robin-lee/flask-tutorial -Entry file: None -Scanned: 2016-10-20 10:57:06.419845 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zonzpoo/blog-flask -https://github.com/zonzpoo/blog-flask -Entry file: blog-flask/project/views.py -Scanned: 2016-10-20 10:57:07.108245 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arpm/flask-blog -https://github.com/arpm/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 10:57:07.694027 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -raejoon/lype-flask -https://github.com/raejoon/lype-flask -Entry file: lype-flask/lyre.py -Scanned: 2016-10-20 10:57:09.060936 -Vulnerability 1: -File: lype-flask/lyre.py - > User input at line 239, trigger word "get(": - splid = request.args.get('spl', None) -Reassigned in: - File: lype-flask/lyre.py - > Line 252: plid = splid - File: lype-flask/lyre.py - > Line 256: videos = serv.get_videos(youtube, plid) - File: lype-flask/lyre.py - > Line 257: session['playq'] = videos - File: lype-flask/lyre.py - > Line 258: session['nowplaying'] = -1 - File: lype-flask/lyre.py - > Line 267: title = serv.get_title_from_plid(playlists, plid) - File: lype-flask/lyre.py - > Line 269: title = serv.get_title_from_plid(searched_playlists, plid) - File: lype-flask/lyre.py - > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback')) - File: lype-flask/lyre.py - > Line 231: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback')) - File: lype-flask/lyre.py - > Line 240: plid = request.args.get('pl', None) - File: lype-flask/lyre.py - > Line 244: videos = None - File: lype-flask/lyre.py - > Line 246: session['shuffle'] = False - File: lype-flask/lyre.py - > Line 249: session['nowplaying'] = -1 -File: lype-flask/lyre.py - > reaches line 271, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show_player.html',isMine=isMine, playlists=playlists, spls=searched_playlists, pltitle=title, videos=videos) - -Vulnerability 2: -File: lype-flask/lyre.py - > User input at line 240, trigger word "get(": - plid = request.args.get('pl', None) -Reassigned in: - File: lype-flask/lyre.py - > Line 252: plid = splid - File: lype-flask/lyre.py - > Line 256: videos = serv.get_videos(youtube, plid) - File: lype-flask/lyre.py - > Line 257: session['playq'] = videos - File: lype-flask/lyre.py - > Line 258: session['nowplaying'] = -1 - File: lype-flask/lyre.py - > Line 267: title = serv.get_title_from_plid(playlists, plid) - File: lype-flask/lyre.py - > Line 269: title = serv.get_title_from_plid(searched_playlists, plid) - File: lype-flask/lyre.py - > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback')) - File: lype-flask/lyre.py - > Line 231: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback')) - File: lype-flask/lyre.py - > Line 244: videos = None - File: lype-flask/lyre.py - > Line 246: session['shuffle'] = False - File: lype-flask/lyre.py - > Line 249: session['nowplaying'] = -1 -File: lype-flask/lyre.py - > reaches line 271, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show_player.html',isMine=isMine, playlists=playlists, spls=searched_playlists, pltitle=title, videos=videos) - - - -ayusharma/flask-mysql -https://github.com/ayusharma/flask-mysql -Entry file: flask-mysql/app.py -Scanned: 2016-10-20 10:57:11.681919 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-mysql/venv/lib/python2.7/genericpath.py - -zolaneta/hello_flask -https://github.com/zolaneta/hello_flask -Entry file: hello_flask/Flask.py -Scanned: 2016-10-20 10:57:12.198768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrasband/flask-seed -https://github.com/mrasband/flask-seed -Entry file: None -Scanned: 2016-10-20 10:57:12.705770 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrasband/flask-seed. - -zhaojf85/docker-flask -https://github.com/zhaojf85/docker-flask -Entry file: docker-flask/hello-flask/app.py -Scanned: 2016-10-20 10:57:13.907090 -No vulnerabilities found. - - -higoreduardo/flask-blog -https://github.com/higoreduardo/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 10:57:14.442018 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -sholsapp/flask-science -https://github.com/sholsapp/flask-science -Entry file: flask-science/flaskscience/__init__.py -Scanned: 2016-10-20 10:57:15.670472 -No vulnerabilities found. - - -luoluohang/flask_blog -https://github.com/luoluohang/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 10:57:16.160029 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mnzr/MegaFlask -https://github.com/mnzr/MegaFlask -Entry file: MegaFlask/app/__init__.py -Scanned: 2016-10-20 10:57:17.517410 -No vulnerabilities found. - - -rchibana/MicroBlog -https://github.com/rchibana/MicroBlog -Entry file: None -Scanned: 2016-10-20 10:57:18.021064 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -damstrom/flask-hello-world -https://github.com/damstrom/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 10:57:18.574565 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -atf1999/Flask-Mega-Tutorial -https://github.com/atf1999/Flask-Mega-Tutorial -Entry file: Flask-Mega-Tutorial/app/__init__.py -Scanned: 2016-10-20 10:57:19.071686 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ThukralAman/flaskApp2 -https://github.com/ThukralAman/flaskApp2 -Entry file: flaskApp2/app.py -Scanned: 2016-10-20 10:57:20.394033 -No vulnerabilities found. - - -apeete/flaskHelloWorld -https://github.com/apeete/flaskHelloWorld -Entry file: flaskHelloWorld/app.py -Scanned: 2016-10-20 10:57:49.021814 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lucidfrontier45/FlaskRethinkDBProject -https://github.com/lucidfrontier45/FlaskRethinkDBProject -Entry file: FlaskRethinkDBProject/webapp/factory.py -Scanned: 2016-10-20 10:57:50.324977 -No vulnerabilities found. - - -jwnwilson/flask_gae_example -https://github.com/jwnwilson/flask_gae_example -Entry file: flask_gae_example/hello_world.py -Scanned: 2016-10-20 10:57:51.966468 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -saichandra286/BlogSpot-using-flask -https://github.com/saichandra286/BlogSpot-using-flask -Entry file: BlogSpot-using-flask/BlogSpot/app/__init__.py -Scanned: 2016-10-20 10:57:53.443771 -No vulnerabilities found. - - -Hyvjan/flask-hello-world -https://github.com/Hyvjan/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 10:57:54.045921 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -auslander70/flask_hello_world -https://github.com/auslander70/flask_hello_world -Entry file: None -Scanned: 2016-10-20 10:57:54.567598 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/auslander70/flask_hello_world. - -BugisDev/AppSurvey-Flask -https://github.com/BugisDev/AppSurvey-Flask -Entry file: AppSurvey-Flask/app.py -Scanned: 2016-10-20 10:57:55.925873 -No vulnerabilities found. - - -purpleP/flask_alchemy_rest -https://github.com/purpleP/flask_alchemy_rest -Entry file: flask_alchemy_rest/tests/test_endpoints.py -Scanned: 2016-10-20 10:57:58.175913 -No vulnerabilities found. - - -yueyehm/flask_hello_world -https://github.com/yueyehm/flask_hello_world -Entry file: None -Scanned: 2016-10-20 10:57:58.665885 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yueyehm/flask_hello_world. - -lhr0916/flask_redis_task_q -https://github.com/lhr0916/flask_redis_task_q -Entry file: flask_redis_task_q/web/app.py -Scanned: 2016-10-20 10:57:59.905967 -No vulnerabilities found. - - -PrettyPrinted/flask-request-decorators -https://github.com/PrettyPrinted/flask-request-decorators -Entry file: flask-request-decorators/request_decorators.py -Scanned: 2016-10-20 10:58:01.125636 -No vulnerabilities found. - - -ics/Flask-GnuPG -https://github.com/ics/Flask-GnuPG -Entry file: Flask-GnuPG/test_flask_gnupg.py -Scanned: 2016-10-20 10:58:06.351273 -No vulnerabilities found. - - -johnkabler/flask_dash_learn -https://github.com/johnkabler/flask_dash_learn -Entry file: flask_dash_learn/first_app.py -Scanned: 2016-10-20 10:58:07.559735 -No vulnerabilities found. - - -leitu/netscaler-flask-api -https://github.com/leitu/netscaler-flask-api -Entry file: netscaler-flask-api/netscaler_api/__init__.py -Scanned: 2016-10-20 10:58:08.895558 -No vulnerabilities found. - - -shilpasanthosh/flask-user-login-app -https://github.com/shilpasanthosh/flask-user-login-app -Entry file: flask-user-login-app/loginapp/__init__.py -Scanned: 2016-10-20 10:58:09.530108 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rasselpratomo/simple_flask_restful -https://github.com/rasselpratomo/simple_flask_restful -Entry file: simple_flask_restful/app/__init__.py -Scanned: 2016-10-20 10:58:10.030809 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PrettyPrinted/flask-uploads-intro -https://github.com/PrettyPrinted/flask-uploads-intro -Entry file: flask-uploads-intro/upload.py -Scanned: 2016-10-20 10:58:11.539158 -No vulnerabilities found. - - -kojoidrissa/flask_intro_video -https://github.com/kojoidrissa/flask_intro_video -Entry file: flask_intro_video/8c/app/__init__.py -Scanned: 2016-10-20 10:58:12.936812 -No vulnerabilities found. - - -joe8767/flask-restful-example -https://github.com/joe8767/flask-restful-example -Entry file: flask-restful-example/api.py -Scanned: 2016-10-20 10:58:13.477499 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrkewen/flask-hello-world -https://github.com/mrkewen/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 10:58:13.995889 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -jmsalcido/python-flask-microblog -https://github.com/jmsalcido/python-flask-microblog -Entry file: python-flask-microblog/microblog/app/__init__.py -Scanned: 2016-10-20 10:58:15.668284 -Vulnerability 1: -File: python-flask-microblog/microblog/app/views.py - > User input at line 107, trigger word ".data": - username = form.username.data -Reassigned in: - File: python-flask-microblog/microblog/app/views.py - > Line 108: g.user.username = username - File: python-flask-microblog/microblog/app/views.py - > Line 115: ret_MAYBE_FUNCTION_NAME = render_template('user/edit_user.html',user=user, form=form) -File: python-flask-microblog/microblog/app/views.py - > reaches line 111, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_profile',username=username)) - -Vulnerability 2: -File: python-flask-microblog/microblog/app/views.py - > User input at line 107, trigger word ".data": - username = form.username.data -Reassigned in: - File: python-flask-microblog/microblog/app/views.py - > Line 108: g.user.username = username - File: python-flask-microblog/microblog/app/views.py - > Line 115: ret_MAYBE_FUNCTION_NAME = render_template('user/edit_user.html',user=user, form=form) -File: python-flask-microblog/microblog/app/views.py - > reaches line 111, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_profile',username=username)) - -Vulnerability 3: -File: python-flask-microblog/microblog/app/forms.py - > User input at line 34, trigger word ".data": - users = User.query.filter(or_(User.username == self.username.data, User.email == self.email.data)).all() -File: python-flask-microblog/microblog/app/forms.py - > reaches line 34, trigger word "filter(": - users = User.query.filter(or_(User.username == self.username.data, User.email == self.email.data)).all() - - - -ettanany/flask-angular-contact-manager -https://github.com/ettanany/flask-angular-contact-manager -Entry file: flask-angular-contact-manager/server/app/__init__.py -Scanned: 2016-10-20 10:58:17.453918 -No vulnerabilities found. - - -nausheenfatma/WebAppWithFlask -https://github.com/nausheenfatma/WebAppWithFlask -Entry file: WebAppWithFlask/model.py -Scanned: 2016-10-20 10:58:18.760912 -Vulnerability 1: -File: WebAppWithFlask/controller.py - > User input at line 21, trigger word "form[": - post = Post(request.form['author'], request.form['title'], request.form['content'], request.form['published']) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 22: post_add = post.add(post) - File: WebAppWithFlask/controller.py - > Line 27: error = post_add -File: WebAppWithFlask/controller.py - > reaches line 28, trigger word "flash(": - flash(error) - -Vulnerability 2: -File: WebAppWithFlask/controller.py - > User input at line 35, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index')) - File: WebAppWithFlask/controller.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index')) -File: WebAppWithFlask/controller.py - > reaches line 52, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('update.html',post=post) - -Vulnerability 3: -File: WebAppWithFlask/controller.py - > User input at line 57, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 62: post_delete = post.delete(post) - File: WebAppWithFlask/controller.py - > Line 66: error = post_delete -File: WebAppWithFlask/controller.py - > reaches line 67, trigger word "flash(": - flash(error) - - - -marcfilba/videoStreamingFlask -https://github.com/marcfilba/videoStreamingFlask -Entry file: videoStreamingFlask/main.py -Scanned: 2016-10-20 10:58:19.972577 -No vulnerabilities found. - - -Jacob234/Flask-hello-world -https://github.com/Jacob234/Flask-hello-world -Entry file: Flask-hello-world/hello_world.py -Scanned: 2016-10-20 10:58:21.179666 -No vulnerabilities found. - - -PrettyPrinted/flask-restless-post -https://github.com/PrettyPrinted/flask-restless-post -Entry file: flask-restless-post/restless.py -Scanned: 2016-10-20 10:58:22.377693 -No vulnerabilities found. - - -austindavid/flasktaskr-cont -https://github.com/austindavid/flasktaskr-cont -Entry file: flasktaskr-cont/project/__init__.py -Scanned: 2016-10-20 10:58:23.718432 -No vulnerabilities found. - - -RicoChou/MyFlasky -https://github.com/RicoChou/MyFlasky -Entry file: MyFlasky/app/__init__.py -Scanned: 2016-10-20 10:58:25.496222 -Vulnerability 1: -File: MyFlasky/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 55: posts = pagination.items - File: MyFlasky/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlasky/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: MyFlasky/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 45: show_followed = False - File: MyFlasky/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlasky/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: MyFlasky/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 67: posts = pagination.items -File: MyFlasky/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: MyFlasky/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: MyFlasky/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 134: comments = pagination.items - File: MyFlasky/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: MyFlasky/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: MyFlasky/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: MyFlasky/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlasky/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: MyFlasky/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: MyFlasky/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlasky/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: MyFlasky/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 246: comments = pagination.items -File: MyFlasky/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: MyFlasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 23: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: MyFlasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 23: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: MyFlasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 23: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: MyFlasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 45: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: MyFlasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 45: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: MyFlasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 45: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: MyFlasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlasky/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlasky/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlasky/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: MyFlasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlasky/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlasky/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlasky/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: MyFlasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlasky/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlasky/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlasky/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -alexwilkerson/microblog -https://github.com/alexwilkerson/microblog -Entry file: None -Scanned: 2016-10-20 10:58:25.997341 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tdvtoan/scorecard-recognition -https://github.com/tdvtoan/scorecard-recognition -Entry file: scorecard-recognition/project/__init__.py -Scanned: 2016-10-20 10:58:49.530298 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -quiqua/docker-flask-celery-redis-example -https://github.com/quiqua/docker-flask-celery-redis-example -Entry file: docker-flask-celery-redis-example/src/myapp/app.py -Scanned: 2016-10-20 10:58:50.783375 -No vulnerabilities found. - - -saichandra286/Complete-Angularjs-Flask-Todo-App -https://github.com/saichandra286/Complete-Angularjs-Flask-Todo-App -Entry file: None -Scanned: 2016-10-20 10:58:51.295246 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saichandra286/Complete-Angularjs-Flask-Todo-App. - -MakeSchool-17/trip-planner-flask-backend-thetopplayer -https://github.com/MakeSchool-17/trip-planner-flask-backend-thetopplayer -Entry file: trip-planner-flask-backend-thetopplayer/server.py -Scanned: 2016-10-20 10:58:55.010978 -No vulnerabilities found. - - -MacHu-GWU/flask-restless-api-client-project -https://github.com/MacHu-GWU/flask-restless-api-client-project -Entry file: flask-restless-api-client-project/tests/CustomizeSerialization/run_server.py -Scanned: 2016-10-20 10:58:56.330703 -No vulnerabilities found. - - -whiskeyromeo/bucketlist -https://github.com/whiskeyromeo/bucketlist -Entry file: None -Scanned: 2016-10-20 10:58:56.876870 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CHHLeo/foruV1home_flask_pycharm_practice -https://github.com/CHHLeo/foruV1home_flask_pycharm_practice -Entry file: foruV1home_flask_pycharm_practice/flask_pycharm_practice.py -Scanned: 2016-10-20 10:58:57.402374 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -heamon7/learn-restful -https://github.com/heamon7/learn-restful -Entry file: learn-restful/app.py -Scanned: 2016-10-20 10:59:00.110986 -Vulnerability 1: -File: learn-restful/app.py - > User input at line 82, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: learn-restful/app.py - > reaches line 89, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -goodyvn/flask -https://github.com/goodyvn/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 10:59:07.655912 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -stevebannon/flask -https://github.com/stevebannon/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 10:59:08.210127 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -sebkouba/dynamic-flask-form -https://github.com/sebkouba/dynamic-flask-form -Entry file: dynamic-flask-form/multimodel.py -Scanned: 2016-10-20 10:59:10.530727 -No vulnerabilities found. - - -solutionspecialist/flaskr -https://github.com/solutionspecialist/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 10:59:11.030515 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -XingxinLi/flaskr -https://github.com/XingxinLi/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 10:59:11.546821 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -willianribeiro/flaskr -https://github.com/willianribeiro/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 10:59:12.068445 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wiggitywalt/flasktaskr -https://github.com/wiggitywalt/flasktaskr -Entry file: None -Scanned: 2016-10-20 10:59:13.558691 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mg6/flaskr -https://github.com/mg6/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 10:59:14.067582 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sourHobbes/flaskdemo -https://github.com/sourHobbes/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 10:59:14.588130 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Bayaz/flasktaskr -https://github.com/Bayaz/flasktaskr -Entry file: None -Scanned: 2016-10-20 10:59:17.088401 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kewsie/flasky -https://github.com/kewsie/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 10:59:17.609978 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -metakermit/resin-home-automator -https://github.com/metakermit/resin-home-automator -Entry file: resin-home-automator/src/main.py -Scanned: 2016-10-20 10:59:20.474699 -No vulnerabilities found. - - -zerodaemon/flask1 -https://github.com/zerodaemon/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-20 10:59:21.079309 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -guiti1/FlaskAp -https://github.com/guiti1/FlaskAp -Entry file: FlaskAp/FlaskApp/__init__.py -Scanned: 2016-10-20 10:59:21.731888 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskAp/FlaskApp/venv/lib/python2.7/genericpath.py - -JoshLandry/FlaskBlog -https://github.com/JoshLandry/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 10:59:22.373948 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Bayaz/FlaskBlog -https://github.com/Bayaz/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 10:59:23.964001 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -colindjk/flaskTest -https://github.com/colindjk/flaskTest -Entry file: flaskTest/url.py -Scanned: 2016-10-20 10:59:24.481758 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Arsh23/random-crossword-generater -https://github.com/Arsh23/random-crossword-generater -Entry file: random-crossword-generater/app.py -Scanned: 2016-10-20 10:59:26.978459 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zengyifa/flask-starter -https://github.com/zengyifa/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-20 10:59:51.000834 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mauriciorey/learning_flask -https://github.com/mauriciorey/learning_flask -Entry file: learning_flask/routes.py -Scanned: 2016-10-20 10:59:53.995983 -Vulnerability 1: -File: learning_flask/routes.py - > User input at line 85, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/routes.py - > Line 89: my_coordinates = p.address_to_latlng(address) - File: learning_flask/routes.py - > Line 90: places = p.query(address) - File: learning_flask/routes.py - > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/routes.py - > Line 77: places = [] - File: learning_flask/routes.py - > Line 78: my_coordinates = (42.335647, -71.07505600000002) - File: learning_flask/routes.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/routes.py - > reaches line 93, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - -Vulnerability 2: -File: learning_flask/routes.py - > User input at line 85, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/routes.py - > Line 89: my_coordinates = p.address_to_latlng(address) - File: learning_flask/routes.py - > Line 90: places = p.query(address) - File: learning_flask/routes.py - > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/routes.py - > Line 77: places = [] - File: learning_flask/routes.py - > Line 78: my_coordinates = (42.335647, -71.07505600000002) - File: learning_flask/routes.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/routes.py - > reaches line 96, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - - - -petrgru/flask-remenarna -https://github.com/petrgru/flask-remenarna -Entry file: flask-remenarna/app/__init__.py -Scanned: 2016-10-20 10:59:54.983466 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spark0128/flask-intro -https://github.com/spark0128/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 10:59:55.505414 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bcb/flask-uploads -https://github.com/bcb/flask-uploads -Entry file: flask-uploads/tests/test-uploads.py -Scanned: 2016-10-20 10:59:57.056671 -No vulnerabilities found. - - -kumaraswins/flask-angular -https://github.com/kumaraswins/flask-angular -Entry file: None -Scanned: 2016-10-20 10:59:57.593387 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rookiebulls/flask-learn -https://github.com/rookiebulls/flask-learn -Entry file: flask-learn/app/__init__.py -Scanned: 2016-10-20 11:00:05.385465 -Vulnerability 1: -File: flask-learn/app/main/views.py - > User input at line 65, trigger word "get(": - post = Post.query.get(post_id) -File: flask-learn/app/main/views.py - > reaches line 67, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('main/article.html',post=post, catergories=catergories) - - - -climberwb/flask-blog -https://github.com/climberwb/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:00:05.963154 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Hyvjan/flask-blog -https://github.com/Hyvjan/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:00:06.508123 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -xingyz/flask_thebutton -https://github.com/xingyz/flask_thebutton -Entry file: flask_thebutton/app/__init__.py -Scanned: 2016-10-20 11:00:07.004023 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brittanymcgarr/learningFlask -https://github.com/brittanymcgarr/learningFlask -Entry file: learningFlask/hello.py -Scanned: 2016-10-20 11:00:07.647075 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py - -PrettyPrinted/flask-sessions -https://github.com/PrettyPrinted/flask-sessions -Entry file: flask-sessions/web.py -Scanned: 2016-10-20 11:00:08.142637 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pfig/flask-elasticsearch -https://github.com/pfig/flask-elasticsearch -Entry file: flask-elasticsearch/flask_elasticsearch.py -Scanned: 2016-10-20 11:00:09.476480 -No vulnerabilities found. - - -nimeshkverma/Ideal_Flask -https://github.com/nimeshkverma/Ideal_Flask -Entry file: None -Scanned: 2016-10-20 11:00:10.002753 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tholsapp/flask_framework -https://github.com/tholsapp/flask_framework -Entry file: flask_framework/app/__init__.py -Scanned: 2016-10-20 11:00:12.319799 -No vulnerabilities found. - - -evansa/flask-sqlalchemy -https://github.com/evansa/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-20 11:00:12.855935 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Kajvdh/nao-flask -https://github.com/Kajvdh/nao-flask -Entry file: nao-flask/app.py -Scanned: 2016-10-20 11:00:13.371529 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -anbasile/flask_sample -https://github.com/anbasile/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-20 11:00:13.903864 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -androidzhibinw/Flask-reg -https://github.com/androidzhibinw/Flask-reg -Entry file: Flask-reg/app.py -Scanned: 2016-10-20 11:00:14.432786 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrasband/flask-seed -https://github.com/mrasband/flask-seed -Entry file: None -Scanned: 2016-10-20 11:00:14.923937 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrasband/flask-seed. - -vrokida/demo-flask -https://github.com/vrokida/demo-flask -Entry file: demo-flask/app.py -Scanned: 2016-10-20 11:00:17.427583 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -Clarity-89/server_flask -https://github.com/Clarity-89/server_flask -Entry file: server_flask/Flask Test.py -Scanned: 2016-10-20 11:00:19.256246 -No vulnerabilities found. - - -jcmflenso/flask-udemy -https://github.com/jcmflenso/flask-udemy -Entry file: flask-udemy/hello.py -Scanned: 2016-10-20 11:00:22.484160 -No vulnerabilities found. - - -schakalakka/flask-project -https://github.com/schakalakka/flask-project -Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py -Scanned: 2016-10-20 11:00:29.565816 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -simongareste/flask-dummy -https://github.com/simongareste/flask-dummy -Entry file: flask-dummy/flask_dummy/__init__.py -Scanned: 2016-10-20 11:00:31.237080 -No vulnerabilities found. - - -liu1020269358/learn-flask -https://github.com/liu1020269358/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 11:00:31.958188 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -foobaar/flask-expt -https://github.com/foobaar/flask-expt -Entry file: flask-expt/flask-experiment.py -Scanned: 2016-10-20 11:00:33.311517 -No vulnerabilities found. - - -lucafaggianelli/flask-skeleton -https://github.com/lucafaggianelli/flask-skeleton -Entry file: None -Scanned: 2016-10-20 11:00:33.826345 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lucafaggianelli/flask-skeleton. - -econne01/flask_blog -https://github.com/econne01/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:00:51.318768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mdeamon/flask_app -https://github.com/mdeamon/flask_app -Entry file: None -Scanned: 2016-10-20 11:00:51.839532 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mdeamon/flask_app. - -dlrice/hello-flask -https://github.com/dlrice/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 11:00:52.388936 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -euler1337/flask_tutorial -https://github.com/euler1337/flask_tutorial -Entry file: None -Scanned: 2016-10-20 11:00:54.929858 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -devyash/Intelligent-Public-Grievance-System -https://github.com/devyash/Intelligent-Public-Grievance-System -Entry file: Intelligent-Public-Grievance-System/app.py -Scanned: 2016-10-20 11:00:56.439036 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elphinkuo/ji_python_flask -https://github.com/elphinkuo/ji_python_flask -Entry file: ji_python_flask/app/__init__.py -Scanned: 2016-10-20 11:00:56.966226 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -afaki077/minitweet -https://github.com/afaki077/minitweet -Entry file: None -Scanned: 2016-10-20 11:00:58.505841 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/afaki077/minitweet. - -ThukralAman/flaskApp2 -https://github.com/ThukralAman/flaskApp2 -Entry file: flaskApp2/app.py -Scanned: 2016-10-20 11:00:59.844969 -No vulnerabilities found. - - -sbm367/flaskTest2 -https://github.com/sbm367/flaskTest2 -Entry file: flaskTest2/flaskTest.py -Scanned: 2016-10-20 11:01:07.127606 -No vulnerabilities found. - - -emil-k/climate-compare_FlaskApp -https://github.com/emil-k/climate-compare_FlaskApp -Entry file: climate-compare_FlaskApp/__init__.py -Scanned: 2016-10-20 11:01:07.707101 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: climate-compare_FlaskApp/venv/lib/python2.7/genericpath.py - -daytonight/Flask-Web-Development-code -https://github.com/daytonight/Flask-Web-Development-code -Entry file: Flask-Web-Development-code/venv/lib/python2.7/site-packages/flask/sessions.py -Scanned: 2016-10-20 11:01:16.245093 -No vulnerabilities found. - - -lkpanganiban/flask-mega-tutorial -https://github.com/lkpanganiban/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-20 11:01:16.820083 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Cosaquee/flask-weather-app -https://github.com/Cosaquee/flask-weather-app -Entry file: flask-weather-app/main.py -Scanned: 2016-10-20 11:01:23.675689 -No vulnerabilities found. - - -saichandra286/BlogSpot-using-flask -https://github.com/saichandra286/BlogSpot-using-flask -Entry file: BlogSpot-using-flask/BlogSpot/app/__init__.py -Scanned: 2016-10-20 11:01:25.222899 -No vulnerabilities found. - - -afborodin/simple-mysql-flask-app -https://github.com/afborodin/simple-mysql-flask-app -Entry file: simple-mysql-flask-app/app/__init__.py -Scanned: 2016-10-20 11:01:25.759343 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dternyak/my-react-flask-blog -https://github.com/dternyak/my-react-flask-blog -Entry file: my-react-flask-blog/index.py -Scanned: 2016-10-20 11:01:27.039595 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -skriems/flask-cherrypy-dockerized -https://github.com/skriems/flask-cherrypy-dockerized -Entry file: flask-cherrypy-dockerized/app.py -Scanned: 2016-10-20 11:01:28.339505 -No vulnerabilities found. - - -johnkabler/flask_dash_learn -https://github.com/johnkabler/flask_dash_learn -Entry file: flask_dash_learn/first_app.py -Scanned: 2016-10-20 11:01:29.635216 -No vulnerabilities found. - - -broak/flask-hello-world -https://github.com/broak/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:01:30.285760 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ABaldwinHunter/flask-clone-classic -https://github.com/ABaldwinHunter/flask-clone-classic -Entry file: flask-clone-classic/setup.py -Scanned: 2016-10-20 11:01:31.914127 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ldrunner100/flask_hello_world -https://github.com/ldrunner100/flask_hello_world -Entry file: None -Scanned: 2016-10-20 11:01:32.435897 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ldrunner100/flask_hello_world. - -FinleySmile/flask_blog_demo -https://github.com/FinleySmile/flask_blog_demo -Entry file: flask_blog_demo/flask_blog_demo.py -Scanned: 2016-10-20 11:01:35.119831 -Vulnerability 1: -File: flask_blog_demo/flask_blog_demo.py - > User input at line 63, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flask_blog_demo/flask_blog_demo.py - > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_entries')) -File: flask_blog_demo/flask_blog_demo.py - > reaches line 71, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',username=username, error=error) - - - -quandrei/godzilla-foxfire-flask -https://github.com/quandrei/godzilla-foxfire-flask -Entry file: godzilla-foxfire-flask/app/__init__.py -Scanned: 2016-10-20 11:01:37.808537 -No vulnerabilities found. - - -ArTrics/Flask_Angular_Project -https://github.com/ArTrics/Flask_Angular_Project -Entry file: Flask_Angular_Project/index.py -Scanned: 2016-10-20 11:01:38.508220 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Angular_Project/venv/lib/python2.7/genericpath.py - -RodrigoVillatoro/flask_social_network -https://github.com/RodrigoVillatoro/flask_social_network -Entry file: flask_social_network/app/__init__.py -Scanned: 2016-10-20 11:01:41.577372 -Vulnerability 1: -File: flask_social_network/app/main/views.py - > User input at line 47, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 56: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 61: posts = pagination.items - File: flask_social_network/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask_social_network/app/main/views.py - > reaches line 62, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flask_social_network/app/main/views.py - > User input at line 50, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 48: show_followed = False - File: flask_social_network/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask_social_network/app/main/views.py - > reaches line 62, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flask_social_network/app/main/views.py - > User input at line 74, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 75: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 80: posts = pagination.items -File: flask_social_network/app/main/views.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flask_social_network/app/main/views.py - > User input at line 146, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 148: page = post.comments.count() - 1 // current_app.config['APP_COMMENTS_PER_PAGE'] + 1 - File: flask_social_network/app/main/views.py - > Line 150: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 155: comments = pagination.items - File: flask_social_network/app/main/views.py - > Line 145: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.post',id=post.id, page=-1)) -File: flask_social_network/app/main/views.py - > reaches line 156, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flask_social_network/app/main/views.py - > User input at line 220, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 221: pagination = user.followers.paginate(page,per_page=current_app.config['APP_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 226: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_social_network/app/main/views.py - > Line 219: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask_social_network/app/main/views.py - > reaches line 228, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='main.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flask_social_network/app/main/views.py - > User input at line 244, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 245: pagination = user.followed.paginate(page,per_page=current_app.config['APP_FOLLOWING_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 250: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask_social_network/app/main/views.py - > Line 243: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask_social_network/app/main/views.py - > reaches line 252, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='main.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flask_social_network/app/main/views.py - > User input at line 282, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 283: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 288: comments = pagination.items -File: flask_social_network/app/main/views.py - > reaches line 289, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flask_social_network/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 21: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 22: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 25: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 24, trigger word "url_for(": - prev_page = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flask_social_network/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 21: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 22: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 25: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 27, trigger word "url_for(": - next_page = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flask_social_network/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 21: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 22: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 25: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 28, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 11: -File: flask_social_network/app/api_1_0/users.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 46: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 49: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - prev_page = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flask_social_network/app/api_1_0/users.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 46: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 49: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 51, trigger word "url_for(": - next_page = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flask_social_network/app/api_1_0/users.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 46: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 49: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 52, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 14: -File: flask_social_network/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/posts.py - > Line 17: posts = pagination.items - File: flask_social_network/app/api_1_0/posts.py - > Line 18: prev_page = None - File: flask_social_network/app/api_1_0/posts.py - > Line 21: next_page = None -File: flask_social_network/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - prev_page = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flask_social_network/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/posts.py - > Line 17: posts = pagination.items - File: flask_social_network/app/api_1_0/posts.py - > Line 18: prev_page = None - File: flask_social_network/app/api_1_0/posts.py - > Line 21: next_page = None -File: flask_social_network/app/api_1_0/posts.py - > reaches line 23, trigger word "url_for(": - next_page = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flask_social_network/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/posts.py - > Line 17: posts = pagination.items - File: flask_social_network/app/api_1_0/posts.py - > Line 18: prev_page = None - File: flask_social_network/app/api_1_0/posts.py - > Line 21: next_page = None -File: flask_social_network/app/api_1_0/posts.py - > reaches line 24, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 17: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 16: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 17: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 20: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 19, trigger word "url_for(": - prev_page = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 16: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 17: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 20: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 22, trigger word "url_for(": - next_page = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 16: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 17: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 20: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prev_pagenext_pagepagination.total) - -Vulnerability 20: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 44: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 45: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 48: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 47, trigger word "url_for(": - prev_page = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 44: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 45: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 48: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 50, trigger word "url_for(": - next_page = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 44: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 45: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 48: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prev_pagenext_pagepagination.total) - - - -mdublin/Flask-CRUD-template -https://github.com/mdublin/Flask-CRUD-template -Entry file: Flask-CRUD-template/blog/__init__.py -Scanned: 2016-10-20 11:01:42.116729 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -p00gz/flask-imdbratings-app-backend -https://github.com/p00gz/flask-imdbratings-app-backend -Entry file: flask-imdbratings-app-backend/imdbRatings/__init__.py -Scanned: 2016-10-20 11:01:42.661494 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -moonlitesolutions/flask_rest_template -https://github.com/moonlitesolutions/flask_rest_template -Entry file: flask_rest_template/flask_rest/api/api.py -Scanned: 2016-10-20 11:01:55.959618 -No vulnerabilities found. - - -mrkewen/flask-hello-world -https://github.com/mrkewen/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:01:56.530915 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -wasw100/flask-sqlalchemy-demo2 -https://github.com/wasw100/flask-sqlalchemy-demo2 -Entry file: flask-sqlalchemy-demo2/hello.py -Scanned: 2016-10-20 11:01:57.050868 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -artisanofcode/flask-generic-views -https://github.com/artisanofcode/flask-generic-views -Entry file: flask-generic-views/tests/__init__.py -Scanned: 2016-10-20 11:01:57.564714 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -mekanix/flask-bootstrap-sql-rest -https://github.com/mekanix/flask-bootstrap-sql-rest -Entry file: flask-bootstrap-sql-rest/manage.py -Scanned: 2016-10-20 11:01:58.923293 -No vulnerabilities found. - - -ayesandarmoe/microblog_flask_tutorial -https://github.com/ayesandarmoe/microblog_flask_tutorial -Entry file: microblog_flask_tutorial/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 11:02:00.799597 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alexwilkerson/flask-hello-world -https://github.com/alexwilkerson/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:02:01.351327 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -nausheenfatma/WebAppWithFlask -https://github.com/nausheenfatma/WebAppWithFlask -Entry file: WebAppWithFlask/model.py -Scanned: 2016-10-20 11:02:02.750852 -Vulnerability 1: -File: WebAppWithFlask/controller.py - > User input at line 21, trigger word "form[": - post = Post(request.form['author'], request.form['title'], request.form['content'], request.form['published']) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 22: post_add = post.add(post) - File: WebAppWithFlask/controller.py - > Line 27: error = post_add -File: WebAppWithFlask/controller.py - > reaches line 28, trigger word "flash(": - flash(error) - -Vulnerability 2: -File: WebAppWithFlask/controller.py - > User input at line 35, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index')) - File: WebAppWithFlask/controller.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index')) -File: WebAppWithFlask/controller.py - > reaches line 52, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('update.html',post=post) - -Vulnerability 3: -File: WebAppWithFlask/controller.py - > User input at line 57, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 62: post_delete = post.delete(post) - File: WebAppWithFlask/controller.py - > Line 66: error = post_delete -File: WebAppWithFlask/controller.py - > reaches line 67, trigger word "flash(": - flash(error) - - - -yaoelvon/flask-uwsgi-demo -https://github.com/yaoelvon/flask-uwsgi-demo -Entry file: flask-uwsgi-demo/DeployingFlask/myflaskapp.py -Scanned: 2016-10-20 11:02:08.070493 -No vulnerabilities found. - - -Owen-Gillespie/FeatureLabsFlaskDemo -https://github.com/Owen-Gillespie/FeatureLabsFlaskDemo -Entry file: FeatureLabsFlaskDemo/main.py -Scanned: 2016-10-20 11:02:08.775452 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sheldonsmickley/flaskemail_app -https://github.com/sheldonsmickley/flaskemail_app -Entry file: flaskemail_app/emails.py -Scanned: 2016-10-20 11:02:10.195218 -Vulnerability 1: -File: flaskemail_app/emails.py - > User input at line 57, trigger word "form[": - url = c.execute('select url from emails where company_name like ?', (request.form['existing_company'])) -Reassigned in: - File: flaskemail_app/emails.py - > Line 58: url = url.fetchall()[0][0] -File: flaskemail_app/emails.py - > reaches line 57, trigger word "execute(": - url = c.execute('select url from emails where company_name like ?', (request.form['existing_company'])) - -Vulnerability 2: -File: flaskemail_app/emails.py - > User input at line 57, trigger word "form[": - url = c.execute('select url from emails where company_name like ?', (request.form['existing_company'])) -Reassigned in: - File: flaskemail_app/emails.py - > Line 58: url = url.fetchall()[0][0] -File: flaskemail_app/emails.py - > reaches line 59, trigger word "execute(": - c.execute('INSERT into emails (company_name, email, url) values (?, ?, ?)', (request.form['existing_company'], request.form['email'], url)) - - - -tianxie/my_flasky -https://github.com/tianxie/my_flasky -Entry file: None -Scanned: 2016-10-20 11:02:10.725620 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tianxie/my_flasky. - -richardsop/REST-API -https://github.com/richardsop/REST-API -Entry file: REST-API/app.py -Scanned: 2016-10-20 11:02:17.247589 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shas15/Betting-Chips -https://github.com/shas15/Betting-Chips -Entry file: Betting-Chips/test.py -Scanned: 2016-10-20 11:02:18.669321 -Vulnerability 1: -File: Betting-Chips/Models/User.py - > User input at line 20, trigger word "form[": - login_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 22, trigger word "filter(": - found = User.query.filter(User.id == login_id, User.password == login_password).first() - -Vulnerability 2: -File: Betting-Chips/Models/User.py - > User input at line 21, trigger word "form[": - login_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 22, trigger word "filter(": - found = User.query.filter(User.id == login_id, User.password == login_password).first() - -Vulnerability 3: -File: Betting-Chips/Models/User.py - > User input at line 20, trigger word "form[": - login_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 27, trigger word "jsonify(": - print(jsonify('id''password''stats'login_idlogin_password'success').get_data(as_text=True)) - -Vulnerability 4: -File: Betting-Chips/Models/User.py - > User input at line 21, trigger word "form[": - login_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 27, trigger word "jsonify(": - print(jsonify('id''password''stats'login_idlogin_password'success').get_data(as_text=True)) - -Vulnerability 5: -File: Betting-Chips/Models/User.py - > User input at line 20, trigger word "form[": - login_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 32, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats'login_idlogin_password'success') - -Vulnerability 6: -File: Betting-Chips/Models/User.py - > User input at line 21, trigger word "form[": - login_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 32, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats'login_idlogin_password'success') - -Vulnerability 7: -File: Betting-Chips/Models/User.py - > User input at line 45, trigger word "form[": - signup_name = request.form['name'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 49: user.name = signup_name -File: Betting-Chips/Models/User.py - > reaches line 54, trigger word "jsonify(": - print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True)) - -Vulnerability 8: -File: Betting-Chips/Models/User.py - > User input at line 46, trigger word "form[": - signup_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 50: user.id = signup_id -File: Betting-Chips/Models/User.py - > reaches line 54, trigger word "jsonify(": - print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True)) - -Vulnerability 9: -File: Betting-Chips/Models/User.py - > User input at line 47, trigger word "form[": - signup_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 51: user.password = signup_password -File: Betting-Chips/Models/User.py - > reaches line 54, trigger word "jsonify(": - print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True)) - -Vulnerability 10: -File: Betting-Chips/Models/User.py - > User input at line 45, trigger word "form[": - signup_name = request.form['name'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 49: user.name = signup_name -File: Betting-Chips/Models/User.py - > reaches line 60, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success') - -Vulnerability 11: -File: Betting-Chips/Models/User.py - > User input at line 46, trigger word "form[": - signup_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 50: user.id = signup_id -File: Betting-Chips/Models/User.py - > reaches line 60, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success') - -Vulnerability 12: -File: Betting-Chips/Models/User.py - > User input at line 47, trigger word "form[": - signup_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 51: user.password = signup_password -File: Betting-Chips/Models/User.py - > reaches line 60, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success') - - - -malong5219/SampleBlog -https://github.com/malong5219/SampleBlog -Entry file: SampleBlog/app/__init__.py -Scanned: 2016-10-20 11:02:25.209943 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alexwilkerson/microblog -https://github.com/alexwilkerson/microblog -Entry file: None -Scanned: 2016-10-20 11:02:26.709360 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tusharpawar/Agrostar_Flaskr -https://github.com/tusharpawar/Agrostar_Flaskr -Entry file: None -Scanned: 2016-10-20 11:02:27.218902 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -eunseo9808/fakeArtist -https://github.com/eunseo9808/fakeArtist -Entry file: fakeArtist/test.py -Scanned: 2016-10-20 11:02:28.620461 -No vulnerabilities found. - - -semonalbertyeah/quickflask -https://github.com/semonalbertyeah/quickflask -Entry file: quickflask/app.py -Scanned: 2016-10-20 11:02:29.143921 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jyang22/Flasky_blog -https://github.com/jyang22/Flasky_blog -Entry file: Flasky_blog/app/__init__.py -Scanned: 2016-10-20 11:02:30.706141 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aceokay/microblog -https://github.com/aceokay/microblog -Entry file: None -Scanned: 2016-10-20 11:02:31.278943 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dantin/microblog -https://github.com/dantin/microblog -Entry file: None -Scanned: 2016-10-20 11:02:32.771549 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -suzf/Flask -https://github.com/suzf/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:02:39.133029 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -buntyke/Flask -https://github.com/buntyke/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:02:39.676361 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nowaja/flask -https://github.com/nowaja/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:02:40.210528 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -b-e/flask -https://github.com/b-e/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:02:42.808229 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -psuong/FlaskWorkshop -https://github.com/psuong/FlaskWorkshop -Entry file: FlaskWorkshop/jinja-templating/app.py -Scanned: 2016-10-20 11:02:45.550825 -No vulnerabilities found. - - -BLKStone/flask_image_search -https://github.com/BLKStone/flask_image_search -Entry file: flask_image_search/app/app.py -Scanned: 2016-10-20 11:03:02.139799 -No vulnerabilities found. - - -yj0914/flask- -https://github.com/yj0914/flask- -Entry file: flask-/num1.py -Scanned: 2016-10-20 11:03:03.397646 -No vulnerabilities found. - - -Bleezworld/flask_skeleton -https://github.com/Bleezworld/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-20 11:03:03.900960 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -TwilioDevEd/lead-alerts-flask -https://github.com/TwilioDevEd/lead-alerts-flask -Entry file: None -Scanned: 2016-10-20 11:03:04.398207 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/TwilioDevEd/lead-alerts-flask. - -soasme/flask-perm -https://github.com/soasme/flask-perm -Entry file: flask-perm/example.py -Scanned: 2016-10-20 11:03:09.093476 -Vulnerability 1: -File: flask-perm/tests/test_blueprint.py - > User input at line 68, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permissions')) -File: flask-perm/tests/test_blueprint.py - > reaches line 68, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permissions')) - -Vulnerability 2: -File: flask-perm/tests/test_blueprint.py - > User input at line 73, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}') -File: flask-perm/tests/test_blueprint.py - > reaches line 73, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}') - -Vulnerability 3: -File: flask-perm/tests/test_blueprint.py - > User input at line 80, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 80, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id']) - -Vulnerability 4: -File: flask-perm/tests/test_blueprint.py - > User input at line 87, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) -File: flask-perm/tests/test_blueprint.py - > reaches line 87, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) - -Vulnerability 5: -File: flask-perm/tests/test_blueprint.py - > User input at line 121, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) -File: flask-perm/tests/test_blueprint.py - > reaches line 114, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.delete_permission',permission_id=permission['id'])) - -Vulnerability 6: -File: flask-perm/tests/test_blueprint.py - > User input at line 121, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) -File: flask-perm/tests/test_blueprint.py - > reaches line 121, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) - -Vulnerability 7: -File: flask-perm/tests/test_blueprint.py - > User input at line 172, trigger word ".data": - id = json.loads(resp.data)['data']['id'] -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 171: resp = add_user_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 173, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.revoke_user_permission',user_permission_id=id)) - -Vulnerability 8: -File: flask-perm/tests/test_blueprint.py - > User input at line 188, trigger word ".data": - id = json.loads(resp.data)['data']['id'] -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 187: resp = add_user_group_permission(client, user_group['id'], permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 189, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.revoke_user_group_permission',user_group_permission_id=id)) - -Vulnerability 9: -File: flask-perm/tests/test_blueprint.py - > User input at line 199, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}') -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 198: resp = add_user_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 199, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}') - -Vulnerability 10: -File: flask-perm/tests/test_blueprint.py - > User input at line 210, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 209: resp = add_user_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 210, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) - -Vulnerability 11: -File: flask-perm/tests/test_blueprint.py - > User input at line 221, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}') -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 220: resp = add_user_group_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 221, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}') - -Vulnerability 12: -File: flask-perm/tests/test_blueprint.py - > User input at line 232, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 231: resp = add_user_group_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 232, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) - -Vulnerability 13: -File: flask-perm/tests/test_blueprint.py - > User input at line 245, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_groups')) -File: flask-perm/tests/test_blueprint.py - > reaches line 245, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_groups')) - -Vulnerability 14: -File: flask-perm/tests/test_blueprint.py - > User input at line 280, trigger word ".data": - id = json.loads(resp.data)['data']['id'] -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 279: resp = add_user_group_member(client, 1, user_group['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 281, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.delete_user_from_user_group',user_group_member_id=id)) - -Vulnerability 15: -File: flask-perm/tests/test_blueprint.py - > User input at line 291, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 291, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id']) - -Vulnerability 16: -File: flask-perm/tests/test_blueprint.py - > User input at line 304, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_users')) -File: flask-perm/tests/test_blueprint.py - > reaches line 304, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_users')) - -Vulnerability 17: -File: flask-perm/tests/test_blueprint.py - > User input at line 309, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user',user_id=1)) -File: flask-perm/tests/test_blueprint.py - > reaches line 309, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user',user_id=1)) - -Vulnerability 18: -File: flask-perm/flask_perm/admin.py - > User input at line 12, trigger word "get(": - render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERM_ADMIN_PREFIX') + '/api'current_app.config.get('PERM_ADMIN_PREFIX')current_app.config.get('DEBUG') -Reassigned in: - File: flask-perm/flask_perm/admin.py - > Line 10: ret_MAYBE_FUNCTION_NAME = redirect(url_for('perm-admin.login')) -File: flask-perm/flask_perm/admin.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/perm-admin/index.html',render_data) - - - -rishipuri/flasktodo -https://github.com/rishipuri/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-20 11:03:09.870651 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Hyvjan/flasktaskr -https://github.com/Hyvjan/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:03:10.390175 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zachary-russell/Flaskr -https://github.com/zachary-russell/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 11:03:10.898877 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -storress/Flaskserver -https://github.com/storress/Flaskserver -Entry file: Flaskserver/main.py -Scanned: 2016-10-20 11:03:12.169068 -No vulnerabilities found. - - -dadasoz-cuelogic/flaskapp -https://github.com/dadasoz-cuelogic/flaskapp -Entry file: None -Scanned: 2016-10-20 11:03:12.671520 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dadasoz-cuelogic/flaskapp. - -expersso/flaskr -https://github.com/expersso/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:03:13.174881 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gileez/flasker -https://github.com/gileez/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-20 11:03:17.691102 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sindhus/flaskr -https://github.com/sindhus/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:03:18.196905 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nickaustinlee/flasktaskr -https://github.com/nickaustinlee/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:03:25.713359 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Bayaz/flasktaskr -https://github.com/Bayaz/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:03:27.231580 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -xavinso/flasktaskr -https://github.com/xavinso/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:03:27.742252 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CharlieWinters/flaskapi -https://github.com/CharlieWinters/flaskapi -Entry file: flaskapi/aydaapi3.py -Scanned: 2016-10-20 11:03:28.439607 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapi/flaskenv/lib/python2.7/genericpath.py - -kewsie/flasky -https://github.com/kewsie/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:03:30.004358 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -land-pack/flaskBlog -https://github.com/land-pack/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-20 11:03:31.652181 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py - -apeete/flaskBlog -https://github.com/apeete/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-20 11:03:32.266429 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py - -OscarMelin/learning-flask-bootstrap -https://github.com/OscarMelin/learning-flask-bootstrap -Entry file: learning-flask-bootstrap/__init__.py -Scanned: 2016-10-20 11:03:34.026898 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/genericpath.py - -cyan-blue/my_flask -https://github.com/cyan-blue/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-20 11:03:34.675208 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -zachary-russell/Flask-Microblog -https://github.com/zachary-russell/Flask-Microblog -Entry file: Flask-Microblog/microblog/app/__init__.py -Scanned: 2016-10-20 11:03:37.744200 -No vulnerabilities found. - - -samwuu/flask_demo -https://github.com/samwuu/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 11:03:39.273335 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hnb2/flask-customers -https://github.com/hnb2/flask-customers -Entry file: flask-customers/customers/__init__.py -Scanned: 2016-10-20 11:03:40.716385 -Vulnerability 1: -File: flask-customers/customers/front/view.py - > User input at line 32, trigger word ".data": - customer = Customer(email=form.email.data, password=form.password.data) -Reassigned in: - File: flask-customers/customers/front/view.py - > Line 30: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors) -File: flask-customers/customers/front/view.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(id=customer.id) - -Vulnerability 2: -File: flask-customers/customers/back/view.py - > User input at line 71, trigger word ".data": - customer = Customer(email=form.email.data, password=AdminCustomer._generate_password()) -Reassigned in: - File: flask-customers/customers/back/view.py - > Line 69: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors) -File: flask-customers/customers/back/view.py - > reaches line 82, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(customer=customer.json) - -Vulnerability 3: -File: flask-customers/customers/back/view.py - > User input at line 147, trigger word ".data": - page = form.page.data -Reassigned in: - File: flask-customers/customers/back/view.py - > Line 151: start = page * CustomerService.RESULTS_PER_PAGE - File: flask-customers/customers/back/view.py - > Line 152: stop = start + CustomerService.RESULTS_PER_PAGE - File: flask-customers/customers/back/view.py - > Line 154: raw_customers = CustomerService.get_customers(start=start, stop=stop) - File: flask-customers/customers/back/view.py - > Line 145: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors) -File: flask-customers/customers/back/view.py - > reaches line 159, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(current_page=page, total_pages=int(total_pages), customers=[customer.json for customer in raw_customers]) - - - -LeonNie52/Learn_Flask -https://github.com/LeonNie52/Learn_Flask -Entry file: Learn_Flask/hello.py -Scanned: 2016-10-20 11:03:45.511261 -Vulnerability 1: -File: Learn_Flask/app/main/views.py - > User input at line 42, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 50: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Learn_Flask/app/main/views.py - > Line 52: posts = pagination.items - File: Learn_Flask/app/main/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.blog')) -File: Learn_Flask/app/main/views.py - > reaches line 53, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Learn_Flask/app/main/views.py - > User input at line 45, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 43: show_followed = False - File: Learn_Flask/app/main/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.blog')) -File: Learn_Flask/app/main/views.py - > reaches line 53, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Learn_Flask/app/main/views.py - > User input at line 68, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 70: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Learn_Flask/app/main/views.py - > Line 72: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Learn_Flask/app/main/views.py - > Line 75: comments = pagination.items - File: Learn_Flask/app/main/views.py - > Line 67: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Learn_Flask/app/main/views.py - > reaches line 76, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: Learn_Flask/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Learn_Flask/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Learn_Flask/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Learn_Flask/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: Learn_Flask/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Learn_Flask/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Learn_Flask/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Learn_Flask/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Learn_Flask/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Learn_Flask/app/main/views.py - > Line 246: comments = pagination.items -File: Learn_Flask/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -penguin-penpen/learnFlask -https://github.com/penguin-penpen/learnFlask -Entry file: None -Scanned: 2016-10-20 11:03:46.038397 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/penguin-penpen/learnFlask. - -raindrop4steven/tornadoFlask -https://github.com/raindrop4steven/tornadoFlask -Entry file: tornadoFlask/hello.py -Scanned: 2016-10-20 11:03:47.596642 -No vulnerabilities found. - - -mauriciorey/learning_flask -https://github.com/mauriciorey/learning_flask -Entry file: learning_flask/routes.py -Scanned: 2016-10-20 11:03:50.800664 -Vulnerability 1: -File: learning_flask/routes.py - > User input at line 85, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/routes.py - > Line 89: my_coordinates = p.address_to_latlng(address) - File: learning_flask/routes.py - > Line 90: places = p.query(address) - File: learning_flask/routes.py - > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/routes.py - > Line 77: places = [] - File: learning_flask/routes.py - > Line 78: my_coordinates = (42.335647, -71.07505600000002) - File: learning_flask/routes.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/routes.py - > reaches line 93, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - -Vulnerability 2: -File: learning_flask/routes.py - > User input at line 85, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/routes.py - > Line 89: my_coordinates = p.address_to_latlng(address) - File: learning_flask/routes.py - > Line 90: places = p.query(address) - File: learning_flask/routes.py - > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/routes.py - > Line 77: places = [] - File: learning_flask/routes.py - > Line 78: my_coordinates = (42.335647, -71.07505600000002) - File: learning_flask/routes.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/routes.py - > reaches line 96, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - - - -cjmochrie/Flask-Demo -https://github.com/cjmochrie/Flask-Demo -Entry file: None -Scanned: 2016-10-20 11:03:53.344614 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cjmochrie/Flask-Demo. - -zengyifa/flask-starter -https://github.com/zengyifa/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-20 11:03:57.894288 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pfig/flask-elasticsearch -https://github.com/pfig/flask-elasticsearch -Entry file: flask-elasticsearch/flask_elasticsearch.py -Scanned: 2016-10-20 11:04:04.238747 -No vulnerabilities found. - - -olive42/moz-flask -https://github.com/olive42/moz-flask -Entry file: moz-flask/hello.py -Scanned: 2016-10-20 11:04:05.449054 -No vulnerabilities found. - - -nimeshkverma/Ideal_Flask -https://github.com/nimeshkverma/Ideal_Flask -Entry file: None -Scanned: 2016-10-20 11:04:05.987176 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tholsapp/flask_framework -https://github.com/tholsapp/flask_framework -Entry file: flask_framework/app/__init__.py -Scanned: 2016-10-20 11:04:07.199061 -No vulnerabilities found. - - -nivanko/flask-catalog -https://github.com/nivanko/flask-catalog -Entry file: flask-catalog/application.py -Scanned: 2016-10-20 11:04:09.740035 -Vulnerability 1: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 162, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edit.html',categories=categories, category_id=category.id, item=item, login=login_session.get('username')) - -Vulnerability 2: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 186, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name)) - -Vulnerability 3: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 186, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name)) - - - -jaramago/flask-basic -https://github.com/jaramago/flask-basic -Entry file: flask-basic/app/__init__.py -Scanned: 2016-10-20 11:04:12.109939 -No vulnerabilities found. - - -valdemarpereira/flask_tutorial -https://github.com/valdemarpereira/flask_tutorial -Entry file: None -Scanned: 2016-10-20 11:04:13.095709 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jit-1/flask-microblog -https://github.com/jit-1/flask-microblog -Entry file: None -Scanned: 2016-10-20 11:04:13.595072 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nof4444/Flask-mongodb -https://github.com/nof4444/Flask-mongodb -Entry file: Flask-mongodb/app.py -Scanned: 2016-10-20 11:04:14.162063 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-mongodb/env/lib/python2.7/genericpath.py - -anbasile/flask_sample -https://github.com/anbasile/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-20 11:04:18.719888 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -VictorDMor/flask-app -https://github.com/VictorDMor/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 11:04:19.260403 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sunway1988/MyFlask -https://github.com/sunway1988/MyFlask -Entry file: MyFlask/app/__init__.py -Scanned: 2016-10-20 11:04:26.547461 -No vulnerabilities found. - - -setiaji/learn_flask -https://github.com/setiaji/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 11:04:28.094279 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -catcoderphp/flask-test -https://github.com/catcoderphp/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:04:28.629584 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -ottoman91/flask_tutorial -https://github.com/ottoman91/flask_tutorial -Entry file: None -Scanned: 2016-10-20 11:04:30.632594 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -HiagoMayk/projetoFlask -https://github.com/HiagoMayk/projetoFlask -Entry file: projetoFlask/routes.py -Scanned: 2016-10-20 11:04:32.944866 -No vulnerabilities found. - - -nimeshkverma/Versioned_Flask -https://github.com/nimeshkverma/Versioned_Flask -Entry file: Versioned_Flask/app/__init__.py -Scanned: 2016-10-20 11:04:34.705666 -No vulnerabilities found. - - -huyquyet/flask-demo -https://github.com/huyquyet/flask-demo -Entry file: None -Scanned: 2016-10-20 11:04:36.758928 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/huyquyet/flask-demo. - -seonhyeshin/flask-mysql -https://github.com/seonhyeshin/flask-mysql -Entry file: flask-mysql/app.py -Scanned: 2016-10-20 11:04:40.857329 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-mysql/venv/lib/python2.7/genericpath.py - -euler1337/flask_tutorial -https://github.com/euler1337/flask_tutorial -Entry file: None -Scanned: 2016-10-20 11:04:41.342685 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -PhilipGough/flask_api -https://github.com/PhilipGough/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-20 11:04:46.883426 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lauradebella/treinamentoFlask -https://github.com/lauradebella/treinamentoFlask -Entry file: treinamentoFlask/tutorialPythonClub/app.py -Scanned: 2016-10-20 11:04:55.288310 -No vulnerabilities found. - - -seanbehan/flask_websockets -https://github.com/seanbehan/flask_websockets -Entry file: flask_websockets/app.py -Scanned: 2016-10-20 11:04:56.554635 -No vulnerabilities found. - - -mburke05/flask_tutorial -https://github.com/mburke05/flask_tutorial -Entry file: None -Scanned: 2016-10-20 11:04:57.067163 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -elphinkuo/ji_python_flask -https://github.com/elphinkuo/ji_python_flask -Entry file: ji_python_flask/app/__init__.py -Scanned: 2016-10-20 11:04:58.607363 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rjuppa/microblog -https://github.com/rjuppa/microblog -Entry file: None -Scanned: 2016-10-20 11:05:04.123185 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -depaoli/FlaskAppSample -https://github.com/depaoli/FlaskAppSample -Entry file: FlaskAppSample/flask_app_sample/__init__.py -Scanned: 2016-10-20 11:05:06.390674 -No vulnerabilities found. - - -webon100/ross_flask01 -https://github.com/webon100/ross_flask01 -Entry file: None -Scanned: 2016-10-20 11:05:06.931366 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AlexProv/flaskRestApiSkeleton -https://github.com/AlexProv/flaskRestApiSkeleton -Entry file: flaskRestApiSkeleton/flaskServer.py -Scanned: 2016-10-20 11:05:09.910773 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xavinso/flask_hello_world -https://github.com/xavinso/flask_hello_world -Entry file: None -Scanned: 2016-10-20 11:05:11.454022 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xavinso/flask_hello_world. - -aetherwu/Flask-Docker-Template -https://github.com/aetherwu/Flask-Docker-Template -Entry file: Flask-Docker-Template/flask/web/__init__.py -Scanned: 2016-10-20 11:05:21.733159 -Vulnerability 1: -File: Flask-Docker-Template/flask/web/views.py - > User input at line 234, trigger word ".data": - kw = form.name.data -File: Flask-Docker-Template/flask/web/views.py - > reaches line 236, trigger word "filter(": - user = User.query.filter(User.nickname == kw).first() - -Vulnerability 2: -File: Flask-Docker-Template/flask/web/views.py - > User input at line 562, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Docker-Template/flask/web/views.py - > Line 550: user = User.query.filter_by(email=user_email).first() - File: Flask-Docker-Template/flask/web/views.py - > Line 552: current_user.id = user.id - File: Flask-Docker-Template/flask/web/views.py - > Line 577: current_user.id = user.id -File: Flask-Docker-Template/flask/web/views.py - > reaches line 554, trigger word "set_cookie(": - response.set_cookie('user_email', str(user.email),expires=time.time() + 6000 * 60) - -Vulnerability 3: -File: Flask-Docker-Template/flask/web/views.py - > User input at line 562, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Docker-Template/flask/web/views.py - > Line 550: user = User.query.filter_by(email=user_email).first() - File: Flask-Docker-Template/flask/web/views.py - > Line 552: current_user.id = user.id - File: Flask-Docker-Template/flask/web/views.py - > Line 577: current_user.id = user.id -File: Flask-Docker-Template/flask/web/views.py - > reaches line 587, trigger word "set_cookie(": - response.set_cookie('user_email', str(user.email),expires=time.time() + 6000 * 60) - - - -tommyblue/flask-react-blog -https://github.com/tommyblue/flask-react-blog -Entry file: flask-react-blog/initializer.py -Scanned: 2016-10-20 11:05:23.175997 -No vulnerabilities found. - - -MikeHannon/python_flask_teams -https://github.com/MikeHannon/python_flask_teams -Entry file: python_flask_teams/server.py -Scanned: 2016-10-20 11:05:23.702892 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomquirk/js-flavoured-flask -https://github.com/tomquirk/js-flavoured-flask -Entry file: js-flavoured-flask/app/__init__.py -Scanned: 2016-10-20 11:05:25.731113 -No vulnerabilities found. - - -gtlambert/first_flask_app -https://github.com/gtlambert/first_flask_app -Entry file: first_flask_app/project.py -Scanned: 2016-10-20 11:05:26.293844 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AngelMunoz/Flask-Blueprints-Template -https://github.com/AngelMunoz/Flask-Blueprints-Template -Entry file: Flask-Blueprints-Template/app/__init__.py -Scanned: 2016-10-20 11:05:27.569922 -Vulnerability 1: -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > User input at line 15, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > Line 17: session['user_id'] = user.id -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > reaches line 18, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -Cosaquee/flask-weather-app -https://github.com/Cosaquee/flask-weather-app -Entry file: flask-weather-app/main.py -Scanned: 2016-10-20 11:05:34.367679 -No vulnerabilities found. - - -Ryanglambert/playing_with_flask -https://github.com/Ryanglambert/playing_with_flask -Entry file: playing_with_flask/hello.py -Scanned: 2016-10-20 11:05:34.903661 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ArTrics/Flask_Angular_Project -https://github.com/ArTrics/Flask_Angular_Project -Entry file: Flask_Angular_Project/index.py -Scanned: 2016-10-20 11:05:35.492857 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Angular_Project/venv/lib/python2.7/genericpath.py - -orjanv/ESVtoLeetFlaskApp -https://github.com/orjanv/ESVtoLeetFlaskApp -Entry file: ESVtoLeetFlaskApp/app.py -Scanned: 2016-10-20 11:05:36.016780 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ptmccarthy/flask-microblog-tutorial -https://github.com/ptmccarthy/flask-microblog-tutorial -Entry file: flask-microblog-tutorial/app/__init__.py -Scanned: 2016-10-20 11:05:37.398746 -No vulnerabilities found. - - -bronka/flask-hello-world -https://github.com/bronka/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:05:37.939188 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -sidthakur/docker-single-nginx-flask -https://github.com/sidthakur/docker-single-nginx-flask -Entry file: docker-single-nginx-flask/app/app.py -Scanned: 2016-10-20 11:05:39.271672 -No vulnerabilities found. - - -mbreisch/flask-hello-world -https://github.com/mbreisch/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:05:39.832591 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -zxqwerxz/test_flask_deploy -https://github.com/zxqwerxz/test_flask_deploy -Entry file: test_flask_deploy/hello.py -Scanned: 2016-10-20 11:05:41.112805 -No vulnerabilities found. - - -mdublin/Flask-CRUD-template -https://github.com/mdublin/Flask-CRUD-template -Entry file: Flask-CRUD-template/blog/__init__.py -Scanned: 2016-10-20 11:05:41.647652 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lwjones/flask-hello-world -https://github.com/lwjones/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:05:42.196677 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -Pensu/flask-ppc64le -https://github.com/Pensu/flask-ppc64le -Entry file: flask-ppc64le/app.py -Scanned: 2016-10-20 11:05:42.710805 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leonidas/flask-spa-routing-example -https://github.com/leonidas/flask-spa-routing-example -Entry file: None -Scanned: 2016-10-20 11:05:43.210173 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/leonidas/flask-spa-routing-example. - -renmmotp/Ren_Learns_Flask -https://github.com/renmmotp/Ren_Learns_Flask -Entry file: Ren_Learns_Flask/flaskr/flaskr.py -Scanned: 2016-10-20 11:05:48.704096 -No vulnerabilities found. - - -posenberg/Flask-Kickstarter-Clone -https://github.com/posenberg/Flask-Kickstarter-Clone -Entry file: Flask-Kickstarter-Clone/punchstarter/__init__.py -Scanned: 2016-10-20 11:05:57.805257 -Vulnerability 1: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 42, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 43: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 2: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 46, trigger word "files[": - cover_photo = request.files['cover_photo'] -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 47: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=600, height=550) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 53: image_filename = uploaded_image['public_id'] - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 3: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 56, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 4: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 42, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 43: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 5: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 46, trigger word "files[": - cover_photo = request.files['cover_photo'] -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 47: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=600, height=550) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 53: image_filename = uploaded_image['public_id'] - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 6: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 56, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 7: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 81, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project) - -Vulnerability 8: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 89, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 94, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project) - -Vulnerability 9: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 89, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 111, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 10: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 89, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 111, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 11: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 115, trigger word "get(": - query = request.args.get('q') or '' -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 124: query_text = query != ''query'all projects' -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 116, trigger word "filter(": - projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all() - -Vulnerability 12: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 115, trigger word "get(": - query = request.args.get('q') or '' -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 124: query_text = query != ''query'all projects' -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 126, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query_text, projects=projects, project_count=project_count) - - - -pythonvietnam/meetup01-flask -https://github.com/pythonvietnam/meetup01-flask -Entry file: meetup01-flask/hello_world.py -Scanned: 2016-10-20 11:05:59.395980 -Vulnerability 1: -File: meetup01-flask/template.py - > User input at line 9, trigger word "get(": - name = request.args.get('name', 'guy') -File: meetup01-flask/template.py - > reaches line 10, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',name=name) - - - -palden/flask-hello-world -https://github.com/palden/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:05:59.961548 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -shane-kercheval/flask-postgresql-template -https://github.com/shane-kercheval/flask-postgresql-template -Entry file: flask-postgresql-template/app_factory.py -Scanned: 2016-10-20 11:06:07.534640 -Vulnerability 1: -File: flask-postgresql-template/app.py - > User input at line 49, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask-postgresql-template/app.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-postgresql-template/app.py - > reaches line 53, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('app_default')) - -Vulnerability 2: -File: flask-postgresql-template/app.py - > User input at line 49, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask-postgresql-template/app.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-postgresql-template/app.py - > reaches line 53, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('app_default')) - - - -charanjp/flask -https://github.com/charanjp/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:06:09.595587 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -yasskh/flask -https://github.com/yasskh/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:06:10.129787 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -poxstone/flask -https://github.com/poxstone/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:06:10.666448 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -FlaskTutorial/Flask -https://github.com/FlaskTutorial/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:06:12.351812 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -OnlySHI/flask -https://github.com/OnlySHI/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:06:13.927225 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -jvuori/flask-uwsgi-nginx-haproxy-docker -https://github.com/jvuori/flask-uwsgi-nginx-haproxy-docker -Entry file: flask-uwsgi-nginx-haproxy-docker/web/app.py -Scanned: 2016-10-20 11:06:23.186644 -No vulnerabilities found. - - -akupara/flask_inspector -https://github.com/akupara/flask_inspector -Entry file: flask_inspector/example/app.py -Scanned: 2016-10-20 11:06:25.732937 -No vulnerabilities found. - - -soasme/flask-personal-access-token -https://github.com/soasme/flask-personal-access-token -Entry file: flask-personal-access-token/example.py -Scanned: 2016-10-20 11:06:29.826455 -Vulnerability 1: -File: flask-personal-access-token/flask_personal_access_token/admin.py - > User input at line 18, trigger word "get(": - render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_API_PREFIX')current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_PREFIX')current_app.config.get('DEBUG') -File: flask-personal-access-token/flask_personal_access_token/admin.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/personal_access_token/index.html',render_data) - - - -shinycoo/flaskmvcsample -https://github.com/shinycoo/flaskmvcsample -Entry file: flaskmvcsample/app.py -Scanned: 2016-10-20 11:06:31.413031 -No vulnerabilities found. - - -alexwilkerson/flasktaskr -https://github.com/alexwilkerson/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:06:31.918707 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gileez/flasker -https://github.com/gileez/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-20 11:06:32.434402 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apeete/flasktaskr -https://github.com/apeete/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:06:34.960300 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sindhus/flaskr -https://github.com/sindhus/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:06:35.459488 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -slippers/flasksec -https://github.com/slippers/flasksec -Entry file: flasksec/main/__init__.py -Scanned: 2016-10-20 11:06:38.782669 -No vulnerabilities found. - - -rui7157/Flask-NvRay-Blog -https://github.com/rui7157/Flask-NvRay-Blog -Entry file: Flask-NvRay-Blog/vendor/flask/sessions.py -Scanned: 2016-10-20 11:06:47.198129 -No vulnerabilities found. - - -Ineeza/FlaskAppBuilder -https://github.com/Ineeza/FlaskAppBuilder -Entry file: FlaskAppBuilder/src/classes/__init__.py -Scanned: 2016-10-20 11:06:47.771574 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yasskh/FlaskProject -https://github.com/yasskh/FlaskProject -Entry file: FlaskProject/views.py -Scanned: 2016-10-20 11:06:48.445175 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DamithaPerera/FlaskApp -https://github.com/DamithaPerera/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 11:06:49.056793 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dreammis/Flask02 -https://github.com/dreammis/Flask02 -Entry file: Flask02/app/__init__.py -Scanned: 2016-10-20 11:06:50.341616 -No vulnerabilities found. - - -junniepat/FlaskApp -https://github.com/junniepat/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 11:06:50.924494 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -YoungGer/FlaskApps -https://github.com/YoungGer/FlaskApps -Entry file: FlaskApps/pdClassifier/app.py -Scanned: 2016-10-20 11:06:53.289213 -Vulnerability 1: -File: FlaskApps/pdClassifier/app.py - > User input at line 81, trigger word "form[": - review = request.form['pdreview'] -Reassigned in: - File: FlaskApps/pdClassifier/app.py - > Line 82: y = classify(review) - File: FlaskApps/pdClassifier/app.py - > Line 82: proba = classify(review) - File: FlaskApps/pdClassifier/app.py - > Line 84: ret_MAYBE_FUNCTION_NAME = render_template('reviewform.html',form=form) -File: FlaskApps/pdClassifier/app.py - > reaches line 83, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',content=review, prediction=y, probability=round(proba * 100, 2)) - - - -land-pack/flaskBlog -https://github.com/land-pack/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-20 11:06:53.861785 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py - -deyoppe/FlaskFire -https://github.com/deyoppe/FlaskFire -Entry file: FlaskFire/core/system/app.py -Scanned: 2016-10-20 11:06:55.230452 -No vulnerabilities found. - - -Njsao/FlaskServer -https://github.com/Njsao/FlaskServer -Entry file: FlaskServer/untitled.py -Scanned: 2016-10-20 11:06:55.766640 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -OscarMelin/learning-flask-bootstrap -https://github.com/OscarMelin/learning-flask-bootstrap -Entry file: learning-flask-bootstrap/__init__.py -Scanned: 2016-10-20 11:06:56.374085 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/genericpath.py - -allianRoman/flask-intro -https://github.com/allianRoman/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:06:56.868991 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hunt3ri/temp-flask -https://github.com/hunt3ri/temp-flask -Entry file: temp-flask/app/__init__.py -Scanned: 2016-10-20 11:06:59.309816 -No vulnerabilities found. - - -noamoss/flask-blog -https://github.com/noamoss/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:07:00.948603 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Jiezhi/HelloFlask -https://github.com/Jiezhi/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-20 11:07:05.465364 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -szhjia/flask-blog -https://github.com/szhjia/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:07:09.013401 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -amybethx/flask-intro -https://github.com/amybethx/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:10.528649 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -terriwong/flask-intro -https://github.com/terriwong/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:11.026892 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arkenidar/flask-example -https://github.com/arkenidar/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-20 11:07:11.544532 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ztomazin/flask_exp -https://github.com/ztomazin/flask_exp -Entry file: None -Scanned: 2016-10-20 11:07:13.080863 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ltaziri/Flask-Intro -https://github.com/ltaziri/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-20 11:07:14.612018 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alitsiya/flask-intro -https://github.com/alitsiya/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:23.124461 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -taisa007/timeliner-flask -https://github.com/taisa007/timeliner-flask -Entry file: timeliner-flask/timeliner/timeliner/__init__.py -Scanned: 2016-10-20 11:07:25.551932 -No vulnerabilities found. - - -sandiego206/flask_microblog -https://github.com/sandiego206/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-20 11:07:27.091944 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Odava/flask-jwt -https://github.com/Odava/flask-jwt -Entry file: flask-jwt/tests/conftest.py -Scanned: 2016-10-20 11:07:32.133128 -No vulnerabilities found. - - -nivanko/flask-catalog -https://github.com/nivanko/flask-catalog -Entry file: flask-catalog/application.py -Scanned: 2016-10-20 11:07:38.932854 -Vulnerability 1: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 162, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edit.html',categories=categories, category_id=category.id, item=item, login=login_session.get('username')) - -Vulnerability 2: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 186, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name)) - -Vulnerability 3: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 186, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name)) - - - -ajoshdee/flask-test -https://github.com/ajoshdee/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:07:40.396912 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -palden/flask-blog -https://github.com/palden/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:07:40.930796 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -humaneu/flask_app -https://github.com/humaneu/flask_app -Entry file: None -Scanned: 2016-10-20 11:07:41.461935 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/humaneu/flask_app. - -cclittle13/flask-intro -https://github.com/cclittle13/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:47.983099 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -emlam/flask-intro -https://github.com/emlam/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:48.492405 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spyapali/Flask-intro -https://github.com/spyapali/Flask-intro -Entry file: Flask-intro/nice.py -Scanned: 2016-10-20 11:07:49.006630 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -celiawaggoner/flask-intro -https://github.com/celiawaggoner/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:50.502431 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cachar/flask-intro -https://github.com/cachar/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:50.998164 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KTAtkinson/flask-intro -https://github.com/KTAtkinson/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:51.495743 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pasysxa/flask-mall -https://github.com/pasysxa/flask-mall -Entry file: flask-mall/myapp/__init__.py -Scanned: 2016-10-20 11:07:54.704296 -No vulnerabilities found. - - -fendouai/venv_flask -https://github.com/fendouai/venv_flask -Entry file: venv_flask/cookie.py -Scanned: 2016-10-20 11:07:55.310031 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: venv_flask/venv/lib/python2.7/genericpath.py - -bekkam/flask-intro -https://github.com/bekkam/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:55.834054 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -anniehe/flask-intro -https://github.com/anniehe/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:56.327002 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Vianey81/flask-intro -https://github.com/Vianey81/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:57.854801 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mcbishop/flask-intro -https://github.com/mcbishop/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:07:59.359731 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alenakruchkova/flask-intro -https://github.com/alenakruchkova/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:08:00.858473 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -florenceloi/flask-intro -https://github.com/florenceloi/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:08:06.396263 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DoriRunyon/flask-intro -https://github.com/DoriRunyon/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:08:09.935062 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kooder18/flask_Ecommerce -https://github.com/kooder18/flask_Ecommerce -Entry file: flask_Ecommerce/project.py -Scanned: 2016-10-20 11:08:11.918919 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leiyue/learning_flask -https://github.com/leiyue/learning_flask -Entry file: learning_flask/miniblog/miniblog.py -Scanned: 2016-10-20 11:08:13.191597 -No vulnerabilities found. - - -qistchan/WebhookFlask -https://github.com/qistchan/WebhookFlask -Entry file: WebhookFlask/WebHook_Listener.py -Scanned: 2016-10-20 11:08:14.474611 -No vulnerabilities found. - - -Bandurin/Test-flask -https://github.com/Bandurin/Test-flask -Entry file: Test-flask/db_app.py -Scanned: 2016-10-20 11:08:24.403095 -No vulnerabilities found. - - -GeetikaBatra/Flask_intro -https://github.com/GeetikaBatra/Flask_intro -Entry file: Flask_intro/flask_app/__init__.py -Scanned: 2016-10-20 11:08:24.924920 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -0phelia/flask-app -https://github.com/0phelia/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 11:08:27.434306 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lauradebella/treinamentoFlask -https://github.com/lauradebella/treinamentoFlask -Entry file: treinamentoFlask/tutorialPythonClub/app.py -Scanned: 2016-10-20 11:08:39.498388 -No vulnerabilities found. - - -seanbehan/flask_websockets -https://github.com/seanbehan/flask_websockets -Entry file: flask_websockets/app.py -Scanned: 2016-10-20 11:08:40.795774 -No vulnerabilities found. - - -ssam123/flask-tutorial -https://github.com/ssam123/flask-tutorial -Entry file: None -Scanned: 2016-10-20 11:08:41.311838 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ziyoung/learningFlask -https://github.com/ziyoung/learningFlask -Entry file: learningFlask/hello.py -Scanned: 2016-10-20 11:08:42.494115 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py - -karayount/flask-intro -https://github.com/karayount/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:08:42.991471 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -go-bears/flask-intro -https://github.com/go-bears/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:08:43.509443 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mlpeters12/flask-intro -https://github.com/mlpeters12/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:08:48.036504 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arbonap/flask-intro -https://github.com/arbonap/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:08:48.560273 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nimeshkverma/SolrFlask -https://github.com/nimeshkverma/SolrFlask -Entry file: SolrFlask/app/app_config.py -Scanned: 2016-10-20 11:08:49.073064 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gaozhidf/flask_websocket -https://github.com/gaozhidf/flask_websocket -Entry file: flask_websocket/websocket_py3/manage.py -Scanned: 2016-10-20 11:08:51.428366 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hilyas/flask-blog -https://github.com/hilyas/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:08:51.995771 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -dimy407/NBC_Flask -https://github.com/dimy407/NBC_Flask -Entry file: NBC_Flask/flask_app.py -Scanned: 2016-10-20 11:08:52.508727 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ltaziri/Flask-Shopping -https://github.com/ltaziri/Flask-Shopping -Entry file: Flask-Shopping/shoppingsite.py -Scanned: 2016-10-20 11:08:54.033822 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jefersondaniel/notebook-api -https://github.com/jefersondaniel/notebook-api -Entry file: notebook-api/app/__init__.py -Scanned: 2016-10-20 11:08:56.459704 -No vulnerabilities found. - - -ddrsmile/flask-hello-world -https://github.com/ddrsmile/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:08:56.995713 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -saviour123/flaskStudentData -https://github.com/saviour123/flaskStudentData -Entry file: flaskStudentData/app.py -Scanned: 2016-10-20 11:08:58.267309 -Vulnerability 1: -File: flaskStudentData/app.py - > User input at line 29, trigger word "form[": - name = request.form['nm'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - -Vulnerability 2: -File: flaskStudentData/app.py - > User input at line 30, trigger word "form[": - addr = request.form['add'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - -Vulnerability 3: -File: flaskStudentData/app.py - > User input at line 31, trigger word "form[": - city = request.form['city'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - -Vulnerability 4: -File: flaskStudentData/app.py - > User input at line 32, trigger word "form[": - pin = request.form['pin'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - - - -webon100/ross_flask01 -https://github.com/webon100/ross_flask01 -Entry file: None -Scanned: 2016-10-20 11:08:58.808865 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -QLGu/flask-zhihu-demo -https://github.com/QLGu/flask-zhihu-demo -Entry file: flask-zhihu-demo/www/__init__.py -Scanned: 2016-10-20 11:09:06.898485 -Vulnerability 1: -File: flask-zhihu-demo/www/main/views.py - > User input at line 35, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 33: show_followed = False - File: flask-zhihu-demo/www/main/views.py - > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.signin')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 55, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',show_followed=show_followed, quoras=quoras, users=users) - -Vulnerability 2: -File: flask-zhihu-demo/www/main/views.py - > User input at line 312, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 313: pagination = user.followed.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 314: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 311: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 316, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注的人', endpoint='main.followed_by', pagination=pagination, follows=follows) - -Vulnerability 3: -File: flask-zhihu-demo/www/main/views.py - > User input at line 327, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 328: pagination = user.followers.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 329: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 326: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 331, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='的关注者', endpoint='main.followers', pagination=pagination, follows=follows) - -Vulnerability 4: -File: flask-zhihu-demo/www/main/views.py - > User input at line 430, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 431: pagination = user.tags.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 432: following_tags = ['tag'item.tag_set for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 429: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 433, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('following_topics.html',user=user, title='关注的话题', endpoint='main.following_tag', pagination=pagination, following_tags=following_tags) - -Vulnerability 5: -File: flask-zhihu-demo/www/main/views.py - > User input at line 444, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 445: pagination = topic.users.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 446: tag_followers = ['user'item.user_set for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 443: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 447, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('topic_followers.html',topic=topic, title='人关注了该话题', endpoint='main.tag_followers', pagination=pagination, tag_followers=tag_followers) - -Vulnerability 6: -File: flask-zhihu-demo/www/main/views.py - > User input at line 500, trigger word ".data": - question = Question(title=form.title.data, content=form.content.data) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 523: ret_MAYBE_FUNCTION_NAME = render_template('question_add.html',form=form) -File: flask-zhihu-demo/www/main/views.py - > reaches line 522, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.question',id=question.id)) - -Vulnerability 7: -File: flask-zhihu-demo/www/main/views.py - > User input at line 500, trigger word ".data": - question = Question(title=form.title.data, content=form.content.data) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 523: ret_MAYBE_FUNCTION_NAME = render_template('question_add.html',form=form) -File: flask-zhihu-demo/www/main/views.py - > reaches line 522, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.question',id=question.id)) - -Vulnerability 8: -File: flask-zhihu-demo/www/main/views.py - > User input at line 563, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 564: pagination = user.user_questions.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 565: questions = pagination.items - File: flask-zhihu-demo/www/main/views.py - > Line 569: questions[j] = questions[j + 1] - File: flask-zhihu-demo/www/main/views.py - > Line 569: questions[j + 1] = questions[j] - File: flask-zhihu-demo/www/main/views.py - > Line 562: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 570, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('following_questions.html',user=user, endpoint='main.people_questions', pagination=pagination, questions=questions) - -Vulnerability 9: -File: flask-zhihu-demo/www/main/views.py - > User input at line 617, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 618: pagination = question.users.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 619: question_followers = ['user'item.q_user for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 616: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 620, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('question_followers.html',question=question, endpoint='main.question_followers', pagination=pagination, question_followers=question_followers) - -Vulnerability 10: -File: flask-zhihu-demo/www/main/views.py - > User input at line 705, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 706: pagination = user.user_answers.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 707: answers = pagination.items - File: flask-zhihu-demo/www/main/views.py - > Line 711: answers[j] = answers[j + 1] - File: flask-zhihu-demo/www/main/views.py - > Line 711: answers[j + 1] = answers[j] - File: flask-zhihu-demo/www/main/views.py - > Line 704: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 712, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('following_answers.html',user=user, endpoint='main.people_answers', pagination=pagination, answers=answers) - -Vulnerability 11: -File: flask-zhihu-demo/www/main/views.py - > User input at line 791, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 792: pagination = answer.users.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 793: answer_followers = ['user'item.a_user for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 790: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 794, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('answer_followers.html',answer=answer, endpoint='main.answer_followers', pagination=pagination, answer_followers=answer_followers) - -Vulnerability 12: -File: flask-zhihu-demo/www/main/views.py - > User input at line 855, trigger word ".data": - collection = Collection(title=form.title.data, desc=form.desc.data) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 865: ret_MAYBE_FUNCTION_NAME = render_template('collection_add.html',form=form) -File: flask-zhihu-demo/www/main/views.py - > reaches line 864, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.collection',id=collection.id)) - -Vulnerability 13: -File: flask-zhihu-demo/www/main/views.py - > User input at line 855, trigger word ".data": - collection = Collection(title=form.title.data, desc=form.desc.data) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 865: ret_MAYBE_FUNCTION_NAME = render_template('collection_add.html',form=form) -File: flask-zhihu-demo/www/main/views.py - > reaches line 864, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.collection',id=collection.id)) - - - -AndyMcLEOD/PythonFlaskApp -https://github.com/AndyMcLEOD/PythonFlaskApp -Entry file: PythonFlaskApp/app.py -Scanned: 2016-10-20 11:10:08.053571 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mlsh2387/Ex_20160119_Flask-Intro -https://github.com/mlsh2387/Ex_20160119_Flask-Intro -Entry file: Ex_20160119_Flask-Intro/nice.py -Scanned: 2016-10-20 11:10:08.568863 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jkravanja/paypal_flask_payment -https://github.com/jkravanja/paypal_flask_payment -Entry file: paypal_flask_payment/payment.py -Scanned: 2016-10-20 11:10:09.077119 -Vulnerability 1: -File: paypal_flask_payment/payment.py - > User input at line 36, trigger word "get(": - paymentId = request.args.get('paymentId') -Reassigned in: - File: paypal_flask_payment/payment.py - > Line 40: payment = paypalrestsdk.Payment.find(paymentId) - File: paypal_flask_payment/payment.py - > Line 42: ret_MAYBE_FUNCTION_NAME = 'OK
paymentId: {}
PayerID: {}
'.format(paymentId, PayerID) - File: paypal_flask_payment/payment.py - > Line 45: ret_MAYBE_FUNCTION_NAME = payment.error -File: paypal_flask_payment/payment.py - > reaches line 41, trigger word "execute(": - if payment.execute('payer_id'PayerID): - -Vulnerability 2: -File: paypal_flask_payment/payment.py - > User input at line 37, trigger word "get(": - PayerID = request.args.get('PayerID') -Reassigned in: - File: paypal_flask_payment/payment.py - > Line 42: ret_MAYBE_FUNCTION_NAME = 'OK
paymentId: {}
PayerID: {}
'.format(paymentId, PayerID) - File: paypal_flask_payment/payment.py - > Line 45: ret_MAYBE_FUNCTION_NAME = payment.error -File: paypal_flask_payment/payment.py - > reaches line 41, trigger word "execute(": - if payment.execute('payer_id'PayerID): - - - -yalove/flask-nginx-gunicorn -https://github.com/yalove/flask-nginx-gunicorn -Entry file: flask-nginx-gunicorn/app/hello.py -Scanned: 2016-10-20 11:10:10.350239 -No vulnerabilities found. - - -tolmun/flask-ng-sample -https://github.com/tolmun/flask-ng-sample -Entry file: flask-ng-sample/project/__init__.py -Scanned: 2016-10-20 11:10:12.290598 -Vulnerability 1: -File: flask-ng-sample/project/api/views.py - > User input at line 132, trigger word ".data": - users = schema.dump(results,many=True).data -File: flask-ng-sample/project/api/views.py - > reaches line 133, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users'users) - -Vulnerability 2: -File: flask-ng-sample/project/api/views.py - > User input at line 154, trigger word ".data": - user = schema.dump(results).data -File: flask-ng-sample/project/api/views.py - > reaches line 155, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('user'user) - - - -Michotastico/NetworkInformationFlaskServer -https://github.com/Michotastico/NetworkInformationFlaskServer -Entry file: NetworkInformationFlaskServer/main.py -Scanned: 2016-10-20 11:10:12.829215 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tjhakseth/Nice-Flask-Intro -https://github.com/tjhakseth/Nice-Flask-Intro -Entry file: Nice-Flask-Intro/nice.py -Scanned: 2016-10-20 11:10:14.123900 -No vulnerabilities found. - - -adamphillips/pi-flask-video-streaming -https://github.com/adamphillips/pi-flask-video-streaming -Entry file: pi-flask-video-streaming/app/main.py -Scanned: 2016-10-20 11:10:15.492768 -No vulnerabilities found. - - -AngelMunoz/Flask-Blueprints-Template -https://github.com/AngelMunoz/Flask-Blueprints-Template -Entry file: Flask-Blueprints-Template/app/__init__.py -Scanned: 2016-10-20 11:10:16.761278 -Vulnerability 1: -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > User input at line 15, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > Line 17: session['user_id'] = user.id -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > reaches line 18, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -SeventhResolve/Flask-Intro-Nice-File -https://github.com/SeventhResolve/Flask-Intro-Nice-File -Entry file: Flask-Intro-Nice-File/nice.py -Scanned: 2016-10-20 11:10:18.055733 -No vulnerabilities found. - - -torykit/docker-flask-console -https://github.com/torykit/docker-flask-console -Entry file: docker-flask-console/start.py -Scanned: 2016-10-20 11:10:19.428362 -No vulnerabilities found. - - -koulanurag/Simple-Flask-Application -https://github.com/koulanurag/Simple-Flask-Application -Entry file: Simple-Flask-Application/app.py -Scanned: 2016-10-20 11:10:19.946219 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -graphql-python/flask-graphql -https://github.com/graphql-python/flask-graphql -Entry file: flask-graphql/tests/app.py -Scanned: 2016-10-20 11:10:24.719723 -Vulnerability 1: -File: flask-graphql/tests/test_graphiqlview.py - > User input at line 13, trigger word "get(": - response = client.get(url_for('graphql'),headers='Accept''text/html') -File: flask-graphql/tests/test_graphiqlview.py - > reaches line 13, trigger word "url_for(": - response = client.get(url_for('graphql'),headers='Accept''text/html') - - - -hhstore/flask-annotated -https://github.com/hhstore/flask-annotated -Entry file: flask-annotated/flask-0.5/flask/app.py -Scanned: 2016-10-20 11:10:25.267917 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prakxys/flask -https://github.com/prakxys/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:10:25.859854 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -galacticpy/flask -https://github.com/galacticpy/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:10:26.540918 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -zhiliang729/flask -https://github.com/zhiliang729/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:10:27.117791 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -iFe1er/flask -https://github.com/iFe1er/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:10:27.699284 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -jarogers095/flask-hello-world -https://github.com/jarogers095/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:10:28.265877 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -alex-paterson/Barebones-Flask-and-Caffe-Classifier -https://github.com/alex-paterson/Barebones-Flask-and-Caffe-Classifier -Entry file: Barebones-Flask-and-Caffe-Classifier/app.py -Scanned: 2016-10-20 11:10:28.779275 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -drone-demos/drone-with-python -https://github.com/drone-demos/drone-with-python -Entry file: drone-with-python/dronedemo/main.py -Scanned: 2016-10-20 11:10:30.269827 -No vulnerabilities found. - - -amirziai/sklearnflask -https://github.com/amirziai/sklearnflask -Entry file: sklearnflask/main.py -Scanned: 2016-10-20 11:10:30.813771 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fengyc/flasky -https://github.com/fengyc/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:10:31.335400 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sshimp/flasktaskr -https://github.com/sshimp/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:10:31.840363 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sharma-abhi/flaskr -https://github.com/sharma-abhi/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:10:32.359348 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kwikiel/flaskr -https://github.com/kwikiel/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:10:32.858557 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tehasdf/flaskexample -https://github.com/tehasdf/flaskexample -Entry file: flaskexample/flaskexample/app.py -Scanned: 2016-10-20 11:10:34.633711 -No vulnerabilities found. - - -sanghyunjooPurdue/flaskr -https://github.com/sanghyunjooPurdue/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:10:35.142257 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -becsully/flasktest -https://github.com/becsully/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 11:11:08.714737 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SFurnace/flaskr -https://github.com/SFurnace/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:11:09.227578 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -noamoss/flasktaskr -https://github.com/noamoss/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:11:09.728109 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AxoSal/GAE-Flask-React-skeleton -https://github.com/AxoSal/GAE-Flask-React-skeleton -Entry file: GAE-Flask-React-skeleton/main.py -Scanned: 2016-10-20 11:11:11.108715 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -yasskh/FlaskProject -https://github.com/yasskh/FlaskProject -Entry file: FlaskProject/views.py -Scanned: 2016-10-20 11:11:11.729581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jrballot/FlaskTaskr -https://github.com/jrballot/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-20 11:11:13.348685 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -AnshuOnGit/FlaskServices -https://github.com/AnshuOnGit/FlaskServices -Entry file: FlaskServices/read_file.py -Scanned: 2016-10-20 11:11:19.649770 -Vulnerability 1: -File: FlaskServices/read_file.py - > User input at line 40, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/read_file.py - > Line 44: filename = secure_filename(file.filename) -File: FlaskServices/read_file.py - > reaches line 50, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: FlaskServices/read_file.py - > User input at line 40, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/read_file.py - > Line 44: filename = secure_filename(file.filename) -File: FlaskServices/read_file.py - > reaches line 50, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 3: -File: FlaskServices/uploads/read_file.py - > User input at line 50, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/uploads/read_file.py - > Line 54: filename = secure_filename(file.filename) -File: FlaskServices/uploads/read_file.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 4: -File: FlaskServices/uploads/read_file.py - > User input at line 50, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/uploads/read_file.py - > Line 54: filename = secure_filename(file.filename) -File: FlaskServices/uploads/read_file.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -ftanevski4/FlaskPycharm -https://github.com/ftanevski4/FlaskPycharm -Entry file: FlaskPycharm/FlaskPycharm.py -Scanned: 2016-10-20 11:11:20.945320 -No vulnerabilities found. - - -yukoga/flasksample1 -https://github.com/yukoga/flasksample1 -Entry file: flasksample1/hello.py -Scanned: 2016-10-20 11:11:22.174677 -No vulnerabilities found. - - -Njsao/FlaskServer -https://github.com/Njsao/FlaskServer -Entry file: FlaskServer/untitled.py -Scanned: 2016-10-20 11:11:22.691963 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -noamoss/flask-blog -https://github.com/noamoss/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:11:23.227323 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -ddrsmile/flask-blog -https://github.com/ddrsmile/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:11:23.769882 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -dasdachs/flask-blog -https://github.com/dasdachs/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:11:24.324139 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -yuz989/uwsgi-flask -https://github.com/yuz989/uwsgi-flask -Entry file: uwsgi-flask/main.py -Scanned: 2016-10-20 11:11:25.569163 -No vulnerabilities found. - - -hugoren/flask_login -https://github.com/hugoren/flask_login -Entry file: None -Scanned: 2016-10-20 11:11:26.091742 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hugoren/flask_login. - -jlents/discover-flask -https://github.com/jlents/discover-flask -Entry file: discover-flask/project/__init__.py -Scanned: 2016-10-20 11:11:27.704308 -No vulnerabilities found. - - -jaleskinen/PythonFlask -https://github.com/jaleskinen/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:11:34.305679 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -mhgit1/PythonFlask -https://github.com/mhgit1/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:11:39.729221 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -maukka76/PythonFlask -https://github.com/maukka76/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:11:45.702611 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -Namelessi/PythonFlask -https://github.com/Namelessi/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:11:51.578427 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -nimeshkverma/BootstrapFlask -https://github.com/nimeshkverma/BootstrapFlask -Entry file: BootstrapFlask/chehra/test_server/driver.py -Scanned: 2016-10-20 11:11:52.130620 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -feeman1989/backstage_flask -https://github.com/feeman1989/backstage_flask -Entry file: backstage_flask/app.py -Scanned: 2016-10-20 11:11:52.677259 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -charanjp/flask_blog -https://github.com/charanjp/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:11:53.209517 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -taisa007/timeliner-flask -https://github.com/taisa007/timeliner-flask -Entry file: timeliner-flask/timeliner/timeliner/__init__.py -Scanned: 2016-10-20 11:11:54.592051 -No vulnerabilities found. - - -ddrsmile/flask-taskr -https://github.com/ddrsmile/flask-taskr -Entry file: flask-taskr/views.py -Scanned: 2016-10-20 11:11:55.330117 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-taskr/env/lib/python2.7/genericpath.py - -Roconda/flask-bootstrap -https://github.com/Roconda/flask-bootstrap -Entry file: flask-bootstrap/src/api/__init__.py -Scanned: 2016-10-20 11:11:56.536997 -No vulnerabilities found. - - -maxcell/flask-workshop -https://github.com/maxcell/flask-workshop -Entry file: flask-workshop/hello_world/hello.py -Scanned: 2016-10-20 11:11:57.535949 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sshimp/flask-blog -https://github.com/sshimp/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:11:58.086254 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -PavelMPD/flask_auth -https://github.com/PavelMPD/flask_auth -Entry file: flask_auth/web/server.py -Scanned: 2016-10-20 11:12:00.645618 -No vulnerabilities found. - - -seanwbarry/thinkful_flask -https://github.com/seanwbarry/thinkful_flask -Entry file: thinkful_flask/hello_world_original.py -Scanned: 2016-10-20 11:12:09.362032 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -OrionsSuspenders/flask-blog -https://github.com/OrionsSuspenders/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:12:09.927468 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -DaTimsta/flask-test -https://github.com/DaTimsta/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:12:10.457002 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -sstriatlon/PyFlask -https://github.com/sstriatlon/PyFlask -Entry file: PyFlask/app.py -Scanned: 2016-10-20 11:12:11.094908 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: PyFlask/venv/lib/python2.7/genericpath.py - -Vianey81/Flask-sql -https://github.com/Vianey81/Flask-sql -Entry file: Flask-sql/hackbright.py -Scanned: 2016-10-20 11:12:14.101997 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -timoparv65/PythonFlask -https://github.com/timoparv65/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:12:20.144226 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -JRaisala/PythonFlask -https://github.com/JRaisala/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:12:25.891879 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -jraappan/PythonFlask -https://github.com/jraappan/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:12:31.162227 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -hannu78/PythonFlask -https://github.com/hannu78/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:12:37.012193 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -marcosf63/flask_app -https://github.com/marcosf63/flask_app -Entry file: None -Scanned: 2016-10-20 11:12:37.539124 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/marcosf63/flask_app. - -maratkanov-a/flask_project -https://github.com/maratkanov-a/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-20 11:12:39.126957 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bellcliff/practice-flask -https://github.com/bellcliff/practice-flask -Entry file: practice-flask/hello.py -Scanned: 2016-10-20 11:12:42.377012 -No vulnerabilities found. - - -GeetikaBatra/Flask_intro -https://github.com/GeetikaBatra/Flask_intro -Entry file: Flask_intro/flask_app/__init__.py -Scanned: 2016-10-20 11:12:42.906726 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -changddcn/dd-flask -https://github.com/changddcn/dd-flask -Entry file: None -Scanned: 2016-10-20 11:12:43.451205 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/changddcn/dd-flask. - -Decus12/PythonFlask -https://github.com/Decus12/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:12:48.910465 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -thiltunen78/PythonFlask -https://github.com/thiltunen78/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:12:55.235650 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -tere15/PythonFlask -https://github.com/tere15/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:13:01.124491 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -ttakkula/flask_example -https://github.com/ttakkula/flask_example -Entry file: None -Scanned: 2016-10-20 11:13:01.689751 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -satyadevi-nyros/werckers_flask -https://github.com/satyadevi-nyros/werckers_flask -Entry file: werckers_flask/app.py -Scanned: 2016-10-20 11:13:02.996252 -No vulnerabilities found. - - -ltaziri/SQL-Flask -https://github.com/ltaziri/SQL-Flask -Entry file: SQL-Flask/hackbright.py -Scanned: 2016-10-20 11:13:03.518095 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -psavela/PythonFlask -https://github.com/psavela/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:13:08.898810 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -KariR61/PythonFlask -https://github.com/KariR61/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:13:14.765847 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -dhruvsrivastava/flask-intro -https://github.com/dhruvsrivastava/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:13:15.289912 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cjohns38/flask-intro -https://github.com/cjohns38/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:13:15.823098 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -notaweelos/openshift_flask -https://github.com/notaweelos/openshift_flask -Entry file: openshift_flask/helloflask.py -Scanned: 2016-10-20 11:13:17.131147 -No vulnerabilities found. - - -jkeung/flask_microblog -https://github.com/jkeung/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-20 11:13:17.680117 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shank7485/Flask-APIs -https://github.com/shank7485/Flask-APIs -Entry file: Flask-APIs/APIs/__init__.py -Scanned: 2016-10-20 11:13:19.092280 -Vulnerability 1: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 49, trigger word "get(": - from_address = request.args.get('f_addr') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 52: comp = comparer_address(from_address, to_address, geo_api_key, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 53, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - -Vulnerability 2: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 50, trigger word "get(": - to_address = request.args.get('t_addr') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 52: comp = comparer_address(from_address, to_address, geo_api_key, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 53, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - -Vulnerability 3: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 58, trigger word "get(": - from_latitude = request.args.get('f_lat') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 64, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - -Vulnerability 4: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 59, trigger word "get(": - from_longitude = request.args.get('f_long') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 64, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - -Vulnerability 5: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 60, trigger word "get(": - to_latitude = request.args.get('t_lat') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 64, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - -Vulnerability 6: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 61, trigger word "get(": - to_longitude = request.args.get('t_long') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 64, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - - - -mattyait/Flask_webapp -https://github.com/mattyait/Flask_webapp -Entry file: Flask_webapp/routes.py -Scanned: 2016-10-20 11:13:20.483247 -Vulnerability 1: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 2: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 3: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 73, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 4: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 78, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 5: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 6: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 89, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 7: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 95, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 8: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - - - -nntndfrk/untitled -https://github.com/nntndfrk/untitled -Entry file: untitled/untitled.py -Scanned: 2016-10-20 11:13:21.768369 -No vulnerabilities found. - - -jrballot/FlaskBlogApp -https://github.com/jrballot/FlaskBlogApp -Entry file: FlaskBlogApp/blog.py -Scanned: 2016-10-20 11:13:23.068861 -No vulnerabilities found. - - -jgabrielfreitas/FlaskAndParse -https://github.com/jgabrielfreitas/FlaskAndParse -Entry file: FlaskAndParse/hello_flask.py -Scanned: 2016-10-20 11:13:23.604274 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -Buuntu/TicTacToe-Flask -https://github.com/Buuntu/TicTacToe-Flask -Entry file: TicTacToe-Flask/tictactoe.py -Scanned: 2016-10-20 11:13:25.035270 -No vulnerabilities found. - - -emlam/project-tracker-flask -https://github.com/emlam/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-20 11:13:25.616303 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bernaerdik/Flask_on_CF -https://github.com/bernaerdik/Flask_on_CF -Entry file: Flask_on_CF/hello.py -Scanned: 2016-10-20 11:13:26.923622 -No vulnerabilities found. - - -knoxilla/web-flask-dockerized -https://github.com/knoxilla/web-flask-dockerized -Entry file: web-flask-dockerized/app.py -Scanned: 2016-10-20 11:13:28.783441 -No vulnerabilities found. - - -julyano/MiniCursoFlaskPETCC -https://github.com/julyano/MiniCursoFlaskPETCC -Entry file: MiniCursoFlaskPETCC/routes.py -Scanned: 2016-10-20 11:13:30.484412 -No vulnerabilities found. - - -go-bears/sql-with-flask -https://github.com/go-bears/sql-with-flask -Entry file: sql-with-flask/hackbright.py -Scanned: 2016-10-20 11:13:31.061525 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -anniehe/project-tracker-flask -https://github.com/anniehe/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-20 11:13:31.574476 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neonbadger/project-tracker-flask -https://github.com/neonbadger/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-20 11:13:32.140985 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DoriRunyon/Project-tracker-flask -https://github.com/DoriRunyon/Project-tracker-flask -Entry file: Project-tracker-flask/hackbright-web.py -Scanned: 2016-10-20 11:13:37.676722 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EdilvoLima/CursoPythonFlask -https://github.com/EdilvoLima/CursoPythonFlask -Entry file: CursoPythonFlask/routes.py -Scanned: 2016-10-20 11:13:39.143848 -No vulnerabilities found. - - -dternyak/Flask-Postgres-Docker -https://github.com/dternyak/Flask-Postgres-Docker -Entry file: Flask-Postgres-Docker/web/index.py -Scanned: 2016-10-20 11:13:42.463868 -No vulnerabilities found. - - -info3180/python-flask-example -https://github.com/info3180/python-flask-example -Entry file: python-flask-example/hello.py -Scanned: 2016-10-20 11:13:43.739415 -Vulnerability 1: -File: python-flask-example/hello.py - > User input at line 17, trigger word "get(": - name = request.args.get('name') -File: python-flask-example/hello.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('process.html',name=name) - - - -janeygak/Hackbright--SQL-with-Flask -https://github.com/janeygak/Hackbright--SQL-with-Flask -Entry file: Hackbright--SQL-with-Flask/hackbright-web.py -Scanned: 2016-10-20 11:13:44.268592 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SeventhResolve/Project-Tracker-Flask -https://github.com/SeventhResolve/Project-Tracker-Flask -Entry file: Project-Tracker-Flask/hackbright-web.py -Scanned: 2016-10-20 11:13:44.789875 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alitsiya/project-tracker-flask -https://github.com/alitsiya/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-20 11:13:50.337965 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ThomasMarcel/gae-tomalcala-flask -https://github.com/ThomasMarcel/gae-tomalcala-flask -Entry file: gae-tomalcala-flask/main.py -Scanned: 2016-10-20 11:13:56.836530 -No vulnerabilities found. - - -ContinuumIO/flask-kerberos-login -https://github.com/ContinuumIO/flask-kerberos-login -Entry file: flask-kerberos-login/examples/simple.py -Scanned: 2016-10-20 11:14:03.377601 -No vulnerabilities found. - - -badspelr/flask-hello-world -https://github.com/badspelr/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:14:04.046818 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -yoophi/flask-appointment-peewee -https://github.com/yoophi/flask-appointment-peewee -Entry file: flask-appointment-peewee/sched/app.py -Scanned: 2016-10-20 11:14:04.552768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -c1rno/Flask_auth_example -https://github.com/c1rno/Flask_auth_example -Entry file: Flask_auth_example/app/__init__.py -Scanned: 2016-10-20 11:14:10.400808 -No vulnerabilities found. - - -billdwalters/Flask -https://github.com/billdwalters/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:14:18.084578 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prakxys/flask -https://github.com/prakxys/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:14:18.703674 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -galacticpy/flask -https://github.com/galacticpy/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:14:19.357953 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -OneBitSoftware/Office365-SharePoint-Python-Flask-Sample -https://github.com/OneBitSoftware/Office365-SharePoint-Python-Flask-Sample -Entry file: Office365-SharePoint-Python-Flask-Sample/src/Python.Office365.AppAuthentication/app.py -Scanned: 2016-10-20 11:14:21.534353 -No vulnerabilities found. - - -NJIT-SIG-WEBDEV/flask-intro -https://github.com/NJIT-SIG-WEBDEV/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:14:22.052495 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -imperio-wxm/flask-learn -https://github.com/imperio-wxm/flask-learn -Entry file: flask-learn/app/myapp/__init__.py -Scanned: 2016-10-20 11:14:23.815155 -Vulnerability 1: -File: flask-learn/app/myapp/main/views.py - > User input at line 21, trigger word "get(": - page_index = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-learn/app/myapp/main/views.py - > Line 25: pagination = query.paginate(page_index,per_page=20, error_out=False) - File: flask-learn/app/myapp/main/views.py - > Line 27: posts = pagination.items -File: flask-learn/app/myapp/main/views.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',title=_('欢迎来到Ray的博客'), posts=posts, pagination=pagination) - - - -ptrierweiler/myblog -https://github.com/ptrierweiler/myblog -Entry file: None -Scanned: 2016-10-20 11:14:24.361558 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -drone-demos/drone-with-python -https://github.com/drone-demos/drone-with-python -Entry file: drone-with-python/dronedemo/main.py -Scanned: 2016-10-20 11:14:25.629851 -No vulnerabilities found. - - -msopentechcn/aad-graphapi-flask-demo -https://github.com/msopentechcn/aad-graphapi-flask-demo -Entry file: aad-graphapi-flask-demo/app.py -Scanned: 2016-10-20 11:14:26.953804 -Vulnerability 1: -File: aad-graphapi-flask-demo/app.py - > User input at line 100, trigger word "get(": - error_code = messages.get('error_code') -File: aad-graphapi-flask-demo/app.py - > reaches line 102, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message) - -Vulnerability 2: -File: aad-graphapi-flask-demo/app.py - > User input at line 101, trigger word "get(": - error_message = messages.get('error_message') -File: aad-graphapi-flask-demo/app.py - > reaches line 102, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message) - -Vulnerability 3: -File: aad-graphapi-flask-demo/app.py - > User input at line 108, trigger word "get(": - error_code = errors.get('code') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - -Vulnerability 4: -File: aad-graphapi-flask-demo/app.py - > User input at line 109, trigger word "get(": - error_message = errors.get('message').get('value') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - -Vulnerability 5: -File: aad-graphapi-flask-demo/app.py - > User input at line 108, trigger word "get(": - error_code = errors.get('code') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - -Vulnerability 6: -File: aad-graphapi-flask-demo/app.py - > User input at line 109, trigger word "get(": - error_message = errors.get('message').get('value') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - - - -amirziai/sklearnflask -https://github.com/amirziai/sklearnflask -Entry file: sklearnflask/main.py -Scanned: 2016-10-20 11:14:27.462148 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -menglong81/flaskr -https://github.com/menglong81/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:14:27.973789 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chadelder/flasktaskr -https://github.com/chadelder/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:14:29.533883 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kmosho/flaskr -https://github.com/kmosho/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:14:31.051200 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SticksInHand/flaskr -https://github.com/SticksInHand/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:14:32.572784 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jayShepard/Flasky -https://github.com/jayShepard/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-20 11:14:33.081860 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vineethtw/flaskexamples -https://github.com/vineethtw/flaskexamples -Entry file: flaskexamples/api/simulation.py -Scanned: 2016-10-20 11:14:38.620665 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Duncodes/flasky -https://github.com/Duncodes/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:14:39.140798 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -diegogslomp/flaskr -https://github.com/diegogslomp/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:14:43.137758 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Lazyppl/Flaskblog -https://github.com/Lazyppl/Flaskblog -Entry file: Flaskblog/app/__init__.py -Scanned: 2016-10-20 11:14:45.438119 -No vulnerabilities found. - - -playgrdstar/flasktaskr -https://github.com/playgrdstar/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:14:45.975311 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -toricor/flaskr -https://github.com/toricor/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:14:50.497693 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xu00wei/flasky -https://github.com/xu00wei/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:14:56.052110 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zeratullich/flaskr -https://github.com/zeratullich/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:15:02.580874 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -noamoss/flasktaskr -https://github.com/noamoss/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:15:04.089941 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -arose13/HerokuCondaScipyFlaskApp -https://github.com/arose13/HerokuCondaScipyFlaskApp -Entry file: HerokuCondaScipyFlaskApp/Web/app.py -Scanned: 2016-10-20 11:15:05.442648 -No vulnerabilities found. - - -awind/FlaskRestful -https://github.com/awind/FlaskRestful -Entry file: FlaskRestful/app/__init__.py -Scanned: 2016-10-20 11:15:06.861324 -Vulnerability 1: -File: FlaskRestful/app/apis.py - > User input at line 48, trigger word "get(": - user = User.query.get(userid) -File: FlaskRestful/app/apis.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = user_schema.jsonify(user) - - - -jrballot/FlaskTaskr -https://github.com/jrballot/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-20 11:15:10.537811 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -jgabrielfreitas/FlaskFirebase -https://github.com/jgabrielfreitas/FlaskFirebase -Entry file: FlaskFirebase/runner.py -Scanned: 2016-10-20 11:15:16.850326 -No vulnerabilities found. - - -scarabcoder/FlaskSite -https://github.com/scarabcoder/FlaskSite -Entry file: FlaskSite/runServer.py -Scanned: 2016-10-20 11:15:18.509681 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aetherwu/FlaskDocker -https://github.com/aetherwu/FlaskDocker -Entry file: FlaskDocker/app/app.py -Scanned: 2016-10-20 11:15:19.816350 -No vulnerabilities found. - - -anniee/flask-intro -https://github.com/anniee/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:15:20.329673 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -angeloski/flask-sandbox -https://github.com/angeloski/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-20 11:15:20.840325 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jonnybazookatone/flask-watchman -https://github.com/jonnybazookatone/flask-watchman -Entry file: None -Scanned: 2016-10-20 11:15:21.356497 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jonnybazookatone/flask-watchman. - -dritux/flask-spark -https://github.com/dritux/flask-spark -Entry file: flask-spark/spark/__init__.py -Scanned: 2016-10-20 11:15:23.661590 -No vulnerabilities found. - - -arvind-iyer/flask-101 -https://github.com/arvind-iyer/flask-101 -Entry file: flask-101/app/__init__.py -Scanned: 2016-10-20 11:15:25.072321 -No vulnerabilities found. - - -vbalien/flask-skeleton -https://github.com/vbalien/flask-skeleton -Entry file: None -Scanned: 2016-10-20 11:15:25.586808 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vbalien/flask-skeleton. - -robbintt/flask-template -https://github.com/robbintt/flask-template -Entry file: None -Scanned: 2016-10-20 11:15:26.126881 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/robbintt/flask-template. - -Lucky0604/flask-blog -https://github.com/Lucky0604/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:15:26.714662 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -felipemfp/flask-microblog -https://github.com/felipemfp/flask-microblog -Entry file: None -Scanned: 2016-10-20 11:15:28.227092 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bronka/flask-blog -https://github.com/bronka/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:15:28.772141 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -genagain/learning-flask -https://github.com/genagain/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 11:15:33.380878 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -acknowledge/flask-api -https://github.com/acknowledge/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-20 11:15:39.398480 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunQian-Andy/flask_mail -https://github.com/JunQian-Andy/flask_mail -Entry file: flask_mail/app/__init__.py -Scanned: 2016-10-20 11:15:40.740412 -No vulnerabilities found. - - -fabricekwizera/flask_intro -https://github.com/fabricekwizera/flask_intro -Entry file: flask_intro/first_app.py -Scanned: 2016-10-20 11:15:41.266320 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py - -relman/flask-srv -https://github.com/relman/flask-srv -Entry file: flask-srv/service.py -Scanned: 2016-10-20 11:15:44.940798 -No vulnerabilities found. - - -volgoweb/flask_api -https://github.com/volgoweb/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-20 11:15:45.464797 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leiyue/tutorial_flask -https://github.com/leiyue/tutorial_flask -Entry file: tutorial_flask/base/app.py -Scanned: 2016-10-20 11:15:46.001539 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sharma-mohit/flask-mongo -https://github.com/sharma-mohit/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-20 11:15:57.074643 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -samgclarke/flask-starter -https://github.com/samgclarke/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-20 11:16:02.609789 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tmingh/learn_flask -https://github.com/Tmingh/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 11:16:04.117361 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -doobeh/flask-lister -https://github.com/doobeh/flask-lister -Entry file: flask-lister/app/core.py -Scanned: 2016-10-20 11:16:05.418462 -No vulnerabilities found. - - -qiuhaoling/my_flask -https://github.com/qiuhaoling/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-20 11:16:07.058553 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -ahsanwtc/flask-project -https://github.com/ahsanwtc/flask-project -Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py -Scanned: 2016-10-20 11:16:16.514362 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -dfitzgerald3/sg_flask -https://github.com/dfitzgerald3/sg_flask -Entry file: sg_flask/__init__.py -Scanned: 2016-10-20 11:16:17.299726 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: sg_flask/venv/lib/python2.7/genericpath.py - -hbldh/flask-pybankid -https://github.com/hbldh/flask-pybankid -Entry file: flask-pybankid/flask_pybankid.py -Scanned: 2016-10-20 11:16:18.807469 -Vulnerability 1: -File: flask-pybankid/flask_pybankid.py - > User input at line 130, trigger word "get(": - text_to_sign = request.args.get('userVisibleData', '') -Reassigned in: - File: flask-pybankid/flask_pybankid.py - > Line 132: response = self.client.sign(text_to_sign, personal_number) - File: flask-pybankid/flask_pybankid.py - > Line 134: ret_MAYBE_FUNCTION_NAME = self.handle_exception(FlaskPyBankIDError.create_from_pybankid_exception(e)) - File: flask-pybankid/flask_pybankid.py - > Line 136: ret_MAYBE_FUNCTION_NAME = self.handle_exception(FlaskPyBankIDError(str(e), 500)) -File: flask-pybankid/flask_pybankid.py - > reaches line 138, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(response) - - - -krlex/flask-resume -https://github.com/krlex/flask-resume -Entry file: flask-resume/manage.py -Scanned: 2016-10-20 11:16:20.136357 -No vulnerabilities found. - - -chadelder/flask-blog -https://github.com/chadelder/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:16:20.717123 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rdrsh/flask-hello -https://github.com/rdrsh/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-20 11:16:21.249304 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Forumouth/flask-simple -https://github.com/Forumouth/flask-simple -Entry file: flask-simple/tests/data/testapp.py -Scanned: 2016-10-20 11:16:22.663100 -No vulnerabilities found. - - -mattyait/Flask_webapp -https://github.com/mattyait/Flask_webapp -Entry file: Flask_webapp/routes.py -Scanned: 2016-10-20 11:16:24.069175 -Vulnerability 1: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 2: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 3: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 73, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 4: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 78, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 5: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 6: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 89, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 7: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 95, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 8: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - - - -playgrdstar/flask-blog -https://github.com/playgrdstar/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:16:24.656357 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rx3bp/flask-freeze -https://github.com/rx3bp/flask-freeze -Entry file: flask-freeze/app.py -Scanned: 2016-10-20 11:16:28.789475 -No vulnerabilities found. - - -worthlesspenny7/tumblelogFlask -https://github.com/worthlesspenny7/tumblelogFlask -Entry file: tumblelogFlask/__init__.py -Scanned: 2016-10-20 11:16:30.937643 -No vulnerabilities found. - - -NaoYamaguchi/flask_login -https://github.com/NaoYamaguchi/flask_login -Entry file: None -Scanned: 2016-10-20 11:16:31.441201 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/NaoYamaguchi/flask_login. - -njnr/onece -https://github.com/njnr/onece -Entry file: onece/app/__init__.py -Scanned: 2016-10-20 11:16:33.170991 -Vulnerability 1: -File: onece/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: onece/app/main/views.py - > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: onece/app/main/views.py - > Line 26: posts = pagination.items - File: onece/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: onece/app/main/views.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: onece/app/main/views.py - > User input at line 41, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: onece/app/main/views.py - > Line 43: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: onece/app/main/views.py - > Line 45: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: onece/app/main/views.py - > Line 48: comments = pagination.items - File: onece/app/main/views.py - > Line 40: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: onece/app/main/views.py - > reaches line 49, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 3: -File: onece/app/main/views.py - > User input at line 54, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: onece/app/main/views.py - > Line 55: pagination = Location.query.order_by(Location.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: onece/app/main/views.py - > Line 58: locations = pagination.items -File: onece/app/main/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('locations.html',locations=locations, pagination=pagination) - -Vulnerability 4: -File: onece/app/main/views.py - > User input at line 117, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: onece/app/main/views.py - > Line 118: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: onece/app/main/views.py - > Line 121: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: onece/app/main/views.py - > Line 116: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: onece/app/main/views.py - > reaches line 123, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: onece/app/main/views.py - > User input at line 134, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: onece/app/main/views.py - > Line 135: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: onece/app/main/views.py - > Line 138: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: onece/app/main/views.py - > Line 133: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: onece/app/main/views.py - > reaches line 140, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - - - -rmaheshkumarblr/FlaskTestingApp -https://github.com/rmaheshkumarblr/FlaskTestingApp -Entry file: FlaskTestingApp/testingFlaskScript.py -Scanned: 2016-10-20 11:16:33.809681 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jrballot/FlaskBlogApp -https://github.com/jrballot/FlaskBlogApp -Entry file: FlaskBlogApp/blog.py -Scanned: 2016-10-20 11:16:35.073354 -No vulnerabilities found. - - -joyzhaoyang/FlaskDirectUploader -https://github.com/joyzhaoyang/FlaskDirectUploader -Entry file: FlaskDirectUploader/application.py -Scanned: 2016-10-20 11:16:37.122917 -No vulnerabilities found. - - -worthlesspenny7/FlaskYoutubeTutorial -https://github.com/worthlesspenny7/FlaskYoutubeTutorial -Entry file: FlaskYoutubeTutorial/application.py -Scanned: 2016-10-20 11:16:37.769715 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskYoutubeTutorial/lib/python2.7/genericpath.py - -astianseb/flask-simple-distributed-applicaiton -https://github.com/astianseb/flask-simple-distributed-applicaiton -Entry file: flask-simple-distributed-applicaiton/Flasktest/__init__.py -Scanned: 2016-10-20 11:16:40.307648 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bernaerdik/Flask_on_CF -https://github.com/bernaerdik/Flask_on_CF -Entry file: Flask_on_CF/hello.py -Scanned: 2016-10-20 11:16:41.587460 -No vulnerabilities found. - - -knoxilla/web-flask-dockerized -https://github.com/knoxilla/web-flask-dockerized -Entry file: web-flask-dockerized/app.py -Scanned: 2016-10-20 11:16:42.876349 -No vulnerabilities found. - - -mhgit1/PythonFlask_oma -https://github.com/mhgit1/PythonFlask_oma -Entry file: PythonFlask_oma/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:16:50.394323 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -IvanBodnar/fromzero_flask_blog -https://github.com/IvanBodnar/fromzero_flask_blog -Entry file: fromzero_flask_blog/__init__.py -Scanned: 2016-10-20 11:16:51.865659 -Vulnerability 1: -File: fromzero_flask_blog/author/views.py - > User input at line 27, trigger word "get(": - next = session.get('next') -Reassigned in: - File: fromzero_flask_blog/author/views.py - > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: fromzero_flask_blog/author/views.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error) -File: fromzero_flask_blog/author/views.py - > reaches line 29, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - -Vulnerability 2: -File: fromzero_flask_blog/blog/views.py - > User input at line 100, trigger word ".data": - title = form.title.data -Reassigned in: - File: fromzero_flask_blog/blog/views.py - > Line 102: slug = slugify(title) - File: fromzero_flask_blog/blog/views.py - > Line 103: post = Post(blog, author, title, body, category, filename, slug) - File: fromzero_flask_blog/blog/views.py - > Line 110: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new') -File: fromzero_flask_blog/blog/views.py - > reaches line 108, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug)) - -Vulnerability 3: -File: fromzero_flask_blog/blog/views.py - > User input at line 100, trigger word ".data": - title = form.title.data -Reassigned in: - File: fromzero_flask_blog/blog/views.py - > Line 102: slug = slugify(title) - File: fromzero_flask_blog/blog/views.py - > Line 103: post = Post(blog, author, title, body, category, filename, slug) - File: fromzero_flask_blog/blog/views.py - > Line 110: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new') -File: fromzero_flask_blog/blog/views.py - > reaches line 108, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug)) - - - -alexarnautu/simple-flask-blog -https://github.com/alexarnautu/simple-flask-blog -Entry file: simple-flask-blog/blog.py -Scanned: 2016-10-20 11:16:54.146397 -No vulnerabilities found. - - -apiarian/RPi-GPIO-flask -https://github.com/apiarian/RPi-GPIO-flask -Entry file: RPi-GPIO-flask/server.py -Scanned: 2016-10-20 11:16:55.443851 -No vulnerabilities found. - - -tomov/flask-heroku-backend -https://github.com/tomov/flask-heroku-backend -Entry file: flask-heroku-backend/app/__init__.py -Scanned: 2016-10-20 11:16:58.760874 -No vulnerabilities found. - - -MuriloFerraz/intel_edison_flask -https://github.com/MuriloFerraz/intel_edison_flask -Entry file: intel_edison_flask/flask_example/contole.py -Scanned: 2016-10-20 11:17:03.311071 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -akaak/flask-mega-tutorial -https://github.com/akaak/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-20 11:17:04.838424 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thechad12/Flask-Item-Catalog -https://github.com/thechad12/Flask-Item-Catalog -Entry file: Flask-Item-Catalog/application.py -Scanned: 2016-10-20 11:17:05.382863 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -javicacheiro/rest_api_flask -https://github.com/javicacheiro/rest_api_flask -Entry file: rest_api_flask/rest/app/__init__.py -Scanned: 2016-10-20 11:17:12.340264 -No vulnerabilities found. - - -florenceloi/flask-intro-redo -https://github.com/florenceloi/flask-intro-redo -Entry file: flask-intro-redo/nice.py -Scanned: 2016-10-20 11:17:19.128515 -No vulnerabilities found. - - -eric-boone/python-flask-round1 -https://github.com/eric-boone/python-flask-round1 -Entry file: python-flask-round1/app/__init__.py -Scanned: 2016-10-20 11:17:20.439741 -No vulnerabilities found. - - -ddrsmile/flask-taskr-with-blueprint -https://github.com/ddrsmile/flask-taskr-with-blueprint -Entry file: flask-taskr-with-blueprint/project/__init__.py -Scanned: 2016-10-20 11:17:22.707274 -No vulnerabilities found. - - -austinbrovick/flask-book_review_website -https://github.com/austinbrovick/flask-book_review_website -Entry file: flask-book_review_website/app/models/User.py -Scanned: 2016-10-20 11:17:23.720632 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apiaas/gae-flask-base -https://github.com/apiaas/gae-flask-base -Entry file: gae-flask-base/src/main.py -Scanned: 2016-10-20 11:17:26.047607 -No vulnerabilities found. - - -playgrdstar/flask-hello-world -https://github.com/playgrdstar/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:17:26.620938 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -iceskel/flask-restful-api -https://github.com/iceskel/flask-restful-api -Entry file: flask-restful-api/restful/api.py -Scanned: 2016-10-20 11:17:30.157298 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -oscarvazquez/flask_mysql_migrations -https://github.com/oscarvazquez/flask_mysql_migrations -Entry file: None -Scanned: 2016-10-20 11:17:30.725085 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bethesdamd/python_flask_pharma -https://github.com/bethesdamd/python_flask_pharma -Entry file: python_flask_pharma/app.py -Scanned: 2016-10-20 11:17:35.455399 -No vulnerabilities found. - - -billdwalters/Flask -https://github.com/billdwalters/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:17:37.431215 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rlsharpton/flask -https://github.com/rlsharpton/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:17:38.007948 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -ccapudev/flask -https://github.com/ccapudev/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:17:39.110209 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -hezx/flask -https://github.com/hezx/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:17:40.685110 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -its-dirg/Flask-pyoidc -https://github.com/its-dirg/Flask-pyoidc -Entry file: Flask-pyoidc/tests/test_flask_pyoidc.py -Scanned: 2016-10-20 11:17:42.232614 -No vulnerabilities found. - - -NJIT-SIG-WEBDEV/flask-intro -https://github.com/NJIT-SIG-WEBDEV/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:17:42.746848 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -karanj112294/flasktutorial -https://github.com/karanj112294/flasktutorial -Entry file: None -Scanned: 2016-10-20 11:17:45.280212 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chadelder/flasktaskr -https://github.com/chadelder/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:17:51.777536 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jocelynaladin/flaskworkspace -https://github.com/jocelynaladin/flaskworkspace -Entry file: flaskworkspace/__init__.py -Scanned: 2016-10-20 11:17:53.430203 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KDmytro/flasktaskr -https://github.com/KDmytro/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:17:54.949479 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dreamtiger2016/flaskr -https://github.com/dreamtiger2016/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:17:58.463257 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davetromp/flasksqlapi -https://github.com/davetromp/flasksqlapi -Entry file: flasksqlapi/runapi.py -Scanned: 2016-10-20 11:18:04.030838 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xu00wei/flasky -https://github.com/xu00wei/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:18:05.531237 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zzclynn/flaskr -https://github.com/zzclynn/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:18:06.039865 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -psykos/flaskloginskeleton -https://github.com/psykos/flaskloginskeleton -Entry file: flaskloginskeleton/app/__init__.py -Scanned: 2016-10-20 11:18:09.337607 -No vulnerabilities found. - - -AndrewGoldstein/flaskapp -https://github.com/AndrewGoldstein/flaskapp -Entry file: None -Scanned: 2016-10-20 11:18:11.875993 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AndrewGoldstein/flaskapp. - -JamesMilnerUK/Loxo -https://github.com/JamesMilnerUK/Loxo -Entry file: Loxo/loxoapi.py -Scanned: 2016-10-20 11:18:18.398507 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nescode/punchstarter -https://github.com/nescode/punchstarter -Entry file: punchstarter/punchstarter/__init__.py -Scanned: 2016-10-20 11:18:19.810943 -Vulnerability 1: -File: punchstarter/punchstarter/__init__.py - > User input at line 31, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 2: -File: punchstarter/punchstarter/__init__.py - > User input at line 36, trigger word "files[": - cover_photo = request.files['cover_photo'] -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550) - File: punchstarter/punchstarter/__init__.py - > Line 43: image_filename = uploaded_image['public_id'] - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 3: -File: punchstarter/punchstarter/__init__.py - > User input at line 45, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 4: -File: punchstarter/punchstarter/__init__.py - > User input at line 31, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 5: -File: punchstarter/punchstarter/__init__.py - > User input at line 36, trigger word "files[": - cover_photo = request.files['cover_photo'] -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550) - File: punchstarter/punchstarter/__init__.py - > Line 43: image_filename = uploaded_image['public_id'] - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 6: -File: punchstarter/punchstarter/__init__.py - > User input at line 45, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 7: -File: punchstarter/punchstarter/__init__.py - > User input at line 64, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project) - -Vulnerability 8: -File: punchstarter/punchstarter/__init__.py - > User input at line 72, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 77, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project) - -Vulnerability 9: -File: punchstarter/punchstarter/__init__.py - > User input at line 72, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 93, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 10: -File: punchstarter/punchstarter/__init__.py - > User input at line 72, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 93, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 11: -File: punchstarter/punchstarter/__init__.py - > User input at line 97, trigger word "get(": - query = request.args.get('q') or '' -File: punchstarter/punchstarter/__init__.py - > reaches line 98, trigger word "filter(": - projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all() - -Vulnerability 12: -File: punchstarter/punchstarter/__init__.py - > User input at line 97, trigger word "get(": - query = request.args.get('q') or '' -File: punchstarter/punchstarter/__init__.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query, projects=projects, project_count=project_count) - - - -edwardszczepanski/FlaskApplication -https://github.com/edwardszczepanski/FlaskApplication -Entry file: FlaskApplication/app.py -Scanned: 2016-10-20 11:18:20.443063 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskApplication/venv/lib/python2.7/genericpath.py - -AllyW/flaskyDeb -https://github.com/AllyW/flaskyDeb -Entry file: flaskyDeb/app/__init__.py -Scanned: 2016-10-20 11:18:23.372931 -Vulnerability 1: -File: flaskyDeb/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 55: posts = pagination.items - File: flaskyDeb/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskyDeb/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 45: show_followed = False - File: flaskyDeb/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskyDeb/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 67: posts = pagination.items -File: flaskyDeb/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flaskyDeb/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskyDeb/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 134: comments = pagination.items - File: flaskyDeb/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskyDeb/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flaskyDeb/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskyDeb/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flaskyDeb/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskyDeb/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flaskyDeb/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 246: comments = pagination.items -File: flaskyDeb/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -jgabrielfreitas/FlaskFirebase -https://github.com/jgabrielfreitas/FlaskFirebase -Entry file: FlaskFirebase/runner.py -Scanned: 2016-10-20 11:18:24.670349 -No vulnerabilities found. - - -chrismontone/flasktaskr2 -https://github.com/chrismontone/flasktaskr2 -Entry file: flasktaskr2/project/__init__.py -Scanned: 2016-10-20 11:18:26.841565 -No vulnerabilities found. - - -scarabcoder/FlaskSite -https://github.com/scarabcoder/FlaskSite -Entry file: FlaskSite/runServer.py -Scanned: 2016-10-20 11:18:27.573857 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -musicalfish/FlaskApp -https://github.com/musicalfish/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 11:18:28.185775 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -oscarmeanwell/FlaskMusic -https://github.com/oscarmeanwell/FlaskMusic -Entry file: FlaskMusic/app/routesun.py -Scanned: 2016-10-20 11:18:28.865823 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TwilioDevEd/eta-notifications-flask -https://github.com/TwilioDevEd/eta-notifications-flask -Entry file: eta-notifications-flask/eta_notifications_flask/__init__.py -Scanned: 2016-10-20 11:18:30.440840 -Vulnerability 1: -File: eta-notifications-flask/eta_notifications_flask/views.py - > User input at line 29, trigger word "get(": - order = Order.query.get(order_id) -File: eta-notifications-flask/eta_notifications_flask/views.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show.html',order=order) - -Vulnerability 2: -File: eta-notifications-flask/eta_notifications_flask/views.py - > User input at line 63, trigger word "get(": - order = Order.query.get(order_id) -File: eta-notifications-flask/eta_notifications_flask/views.py - > reaches line 67, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show.html',order=order) - - - -johnsliao/flask-sqlite3-chartjs-toy -https://github.com/johnsliao/flask-sqlite3-chartjs-toy -Entry file: flask-sqlite3-chartjs-toy/flaskr/flaskr.py -Scanned: 2016-10-20 11:18:32.179547 -No vulnerabilities found. - - -QsBBQ/flask_test -https://github.com/QsBBQ/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 11:18:32.805115 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pedrocarvalhodev/flask-intro -https://github.com/pedrocarvalhodev/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:18:36.340104 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lawrencexia/flask_notecards -https://github.com/lawrencexia/flask_notecards -Entry file: flask_notecards/app/__init__.py -Scanned: 2016-10-20 11:18:38.756781 -No vulnerabilities found. - - -ameya0909/Flask-Blog -https://github.com/ameya0909/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-20 11:18:39.278929 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chrismontone/flask-blog -https://github.com/chrismontone/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:18:39.817880 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -ziggear/wechat-flask -https://github.com/ziggear/wechat-flask -Entry file: wechat-flask/src/myapp.py -Scanned: 2016-10-20 11:18:41.282666 -No vulnerabilities found. - - -yetship/flask-usages -https://github.com/yetship/flask-usages -Entry file: flask-usages/application/__init__.py -Scanned: 2016-10-20 11:18:42.703340 -Vulnerability 1: -File: flask-usages/application/controllers/todo.py - > User input at line 12, trigger word "get(": - todo_id = request.args.get('todo_id') -Reassigned in: - File: flask-usages/application/controllers/todo.py - > Line 17: ret_MAYBE_FUNCTION_NAME = jsonify() -File: flask-usages/application/controllers/todo.py - > reaches line 15, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(todo_idtodo.content) - -Vulnerability 2: -File: flask-usages/application/controllers/todo.py - > User input at line 21, trigger word "get(": - todo = Todo(content=data.get('content')) -File: flask-usages/application/controllers/todo.py - > reaches line 24, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(todo_id=todo.id, content=todo.content) - - - -drmalex07/flask-helloworld -https://github.com/drmalex07/flask-helloworld -Entry file: flask-helloworld/helloworld/app.py -Scanned: 2016-10-20 11:18:44.448935 -No vulnerabilities found. - - -Oracleli/flask-try -https://github.com/Oracleli/flask-try -Entry file: None -Scanned: 2016-10-20 11:18:44.969687 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Oracleli/flask-try. - -al4/flask-tokenauth -https://github.com/al4/flask-tokenauth -Entry file: flask-tokenauth/test_tokenauth.py -Scanned: 2016-10-20 11:18:46.288086 -No vulnerabilities found. - - -marcosomma/first_flask -https://github.com/marcosomma/first_flask -Entry file: first_flask/app/__init__.py -Scanned: 2016-10-20 11:18:56.692231 -No vulnerabilities found. - - -miracleluchen/blog-flask -https://github.com/miracleluchen/blog-flask -Entry file: blog-flask/project/views.py -Scanned: 2016-10-20 11:18:59.372011 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -meyersj/bootstrap-flask -https://github.com/meyersj/bootstrap-flask -Entry file: bootstrap-flask/app/__init__.py -Scanned: 2016-10-20 11:19:05.678725 -No vulnerabilities found. - - -sharma-mohit/flask-mongo -https://github.com/sharma-mohit/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-20 11:19:06.674688 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jarogers095/flask-blog -https://github.com/jarogers095/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:19:09.241372 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Jelly-Yu/learningFlask -https://github.com/Jelly-Yu/learningFlask -Entry file: learningFlask/hello.py -Scanned: 2016-10-20 11:19:12.913575 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py - -ratherbsurfing/flask-cms -https://github.com/ratherbsurfing/flask-cms -Entry file: flask-cms/flaskCMS/flaskCMS/__init__.py -Scanned: 2016-10-20 11:19:18.491674 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -philtrep/Flask-Skeleton -https://github.com/philtrep/Flask-Skeleton -Entry file: None -Scanned: 2016-10-20 11:19:19.026972 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/philtrep/Flask-Skeleton. - -cynrick/kickstarter-flask -https://github.com/cynrick/kickstarter-flask -Entry file: kickstarter-flask/kickstarter/__init__.py -Scanned: 2016-10-20 11:19:21.465604 -Vulnerability 1: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 29, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 30: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: kickstarter-flask/kickstarter/__init__.py - > Line 32: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now) - File: kickstarter-flask/kickstarter/__init__.py - > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 46, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 2: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 32, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 46, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 3: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 29, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 30: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: kickstarter-flask/kickstarter/__init__.py - > Line 32: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now) - File: kickstarter-flask/kickstarter/__init__.py - > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 46, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 4: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 32, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 46, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 5: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 50, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 55, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project) - -Vulnerability 6: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 59, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 65, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project) - -Vulnerability 7: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 59, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 79, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 8: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 59, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 79, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 9: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 83, trigger word "get(": - query = request.args.get('q') or '' -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 84, trigger word "filter(": - projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all() - -Vulnerability 10: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 83, trigger word "get(": - query = request.args.get('q') or '' -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 92, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query, projects=projects, project_count=project_count) - - - -kessiacastro/flask-blog -https://github.com/kessiacastro/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:19:22.023121 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -doobeh/flask-lister -https://github.com/doobeh/flask-lister -Entry file: flask-lister/app/core.py -Scanned: 2016-10-20 11:19:25.429704 -No vulnerabilities found. - - -rjturek/flask-etf -https://github.com/rjturek/flask-etf -Entry file: flask-etf/flask_etf_main.py -Scanned: 2016-10-20 11:19:26.751142 -No vulnerabilities found. - - -worthlesspenny7/tumblelogFlask -https://github.com/worthlesspenny7/tumblelogFlask -Entry file: tumblelogFlask/__init__.py -Scanned: 2016-10-20 11:19:29.056467 -No vulnerabilities found. - - -axontrust/alexa-flask -https://github.com/axontrust/alexa-flask -Entry file: alexa-flask/app/__init__.py -Scanned: 2016-10-20 11:19:29.607860 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asjedh/flask_tutorial -https://github.com/asjedh/flask_tutorial -Entry file: None -Scanned: 2016-10-20 11:19:30.171324 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -robb216/MyFlask -https://github.com/robb216/MyFlask -Entry file: MyFlask/MyFlask.py -Scanned: 2016-10-20 11:19:31.868917 -No vulnerabilities found. - - -rogerpence/flask-blueprint -https://github.com/rogerpence/flask-blueprint -Entry file: flask-blueprint/api/__init__.py -Scanned: 2016-10-20 11:19:32.404991 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -androidzhibinw/flask-bootstrap -https://github.com/androidzhibinw/flask-bootstrap -Entry file: flask-bootstrap/app/__init__.py -Scanned: 2016-10-20 11:19:34.598340 -No vulnerabilities found. - - -ytanno/PlotFlask -https://github.com/ytanno/PlotFlask -Entry file: PlotFlask/FlaskTest1/FlaskTest1/__init__.py -Scanned: 2016-10-20 11:19:44.575262 -No vulnerabilities found. - - -psykos/psilex-flask -https://github.com/psykos/psilex-flask -Entry file: psilex-flask/app/__init__.py -Scanned: 2016-10-20 11:19:46.034554 -No vulnerabilities found. - - -Hank02/flask_example -https://github.com/Hank02/flask_example -Entry file: None -Scanned: 2016-10-20 11:19:46.565586 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -VerdigrisReader/flask-workshop -https://github.com/VerdigrisReader/flask-workshop -Entry file: flask-workshop/hello_world/hello.py -Scanned: 2016-10-20 11:19:47.077172 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rogerpence/flask-skeleton -https://github.com/rogerpence/flask-skeleton -Entry file: None -Scanned: 2016-10-20 11:19:47.586966 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rogerpence/flask-skeleton. - -rodcox89/FlaskDynamoStarterKit -https://github.com/rodcox89/FlaskDynamoStarterKit -Entry file: FlaskDynamoStarterKit/main.py -Scanned: 2016-10-20 11:19:48.355102 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskDynamoStarterKit/venv/lib/python2.7/genericpath.py - -pulysak/FlaskServer-Tests -https://github.com/pulysak/FlaskServer-Tests -Entry file: FlaskServer-Tests/server.py -Scanned: 2016-10-20 11:19:49.012026 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskServer-Tests/flask_env/lib/python2.7/genericpath.py - -rbtoner/FlaskWebApp -https://github.com/rbtoner/FlaskWebApp -Entry file: FlaskWebApp/FanGuardFlask/__init__.py -Scanned: 2016-10-20 11:19:49.527067 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -worthlesspenny7/FlaskYoutubeTutorial -https://github.com/worthlesspenny7/FlaskYoutubeTutorial -Entry file: FlaskYoutubeTutorial/application.py -Scanned: 2016-10-20 11:19:52.625665 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskYoutubeTutorial/lib/python2.7/genericpath.py - -MGago/flaskBasicApp1 -https://github.com/MGago/flaskBasicApp1 -Entry file: None -Scanned: 2016-10-20 11:19:54.159370 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -skpdvidby0/Flask-Python-App -https://github.com/skpdvidby0/Flask-Python-App -Entry file: Flask-Python-App/flaskapp.py -Scanned: 2016-10-20 11:19:56.745267 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Python-App/virtenv/lib/python2.7/genericpath.py - -sindhus/flask-mega-tutorial -https://github.com/sindhus/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-20 11:20:05.753403 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mbreisch/real-python-flask-bdd -https://github.com/mbreisch/real-python-flask-bdd -Entry file: real-python-flask-bdd/flaskr.py -Scanned: 2016-10-20 11:20:07.595124 -No vulnerabilities found. - - -MuriloFerraz/intel_edison_flask -https://github.com/MuriloFerraz/intel_edison_flask -Entry file: intel_edison_flask/flask_example/contole.py -Scanned: 2016-10-20 11:20:10.098614 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PiyushGoyal443/studentLogin_API_Flask -https://github.com/PiyushGoyal443/studentLogin_API_Flask -Entry file: studentLogin_API_Flask/server.py -Scanned: 2016-10-20 11:20:13.656785 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GertjanvanhetHof/helloworld_with_flask -https://github.com/GertjanvanhetHof/helloworld_with_flask -Entry file: helloworld_with_flask/mypython.py -Scanned: 2016-10-20 11:20:19.960756 -No vulnerabilities found. - - -taromurao/flask-python-logger-experiment -https://github.com/taromurao/flask-python-logger-experiment -Entry file: flask-python-logger-experiment/app.py -Scanned: 2016-10-20 11:20:21.286981 -No vulnerabilities found. - - -mikicaivosevic/flask-simple-todo -https://github.com/mikicaivosevic/flask-simple-todo -Entry file: flask-simple-todo/app.py -Scanned: 2016-10-20 11:20:22.572308 -No vulnerabilities found. - - -KDmytro/flask-hello-world -https://github.com/KDmytro/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:20:23.134313 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -bepetersn/flask-permissions-ex -https://github.com/bepetersn/flask-permissions-ex -Entry file: flask-permissions-ex/ex/__init__.py -Scanned: 2016-10-20 11:20:27.048775 -No vulnerabilities found. - - -EricSchles/db_migrations_flask -https://github.com/EricSchles/db_migrations_flask -Entry file: db_migrations_flask/app/__init__.py -Scanned: 2016-10-20 11:20:31.183354 -No vulnerabilities found. - - -yyssjj33/flask-menu-application -https://github.com/yyssjj33/flask-menu-application -Entry file: flask-menu-application/project.py -Scanned: 2016-10-20 11:20:31.712003 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kessiacastro/flask-hello-world -https://github.com/kessiacastro/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:20:32.303209 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -androidzhibinw/flask-app-builder-example -https://github.com/androidzhibinw/flask-app-builder-example -Entry file: flask-app-builder-example/myapp/app/__init__.py -Scanned: 2016-10-20 11:20:33.668029 -No vulnerabilities found. - - -tim1978/flask-hello-world -https://github.com/tim1978/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:20:34.228467 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -jmcevoy1984/Flask-Restful-Tutorial -https://github.com/jmcevoy1984/Flask-Restful-Tutorial -Entry file: Flask-Restful-Tutorial/app.py -Scanned: 2016-10-20 11:20:38.587452 -No vulnerabilities found. - - -jigen7/python_flask_tutorial -https://github.com/jigen7/python_flask_tutorial -Entry file: python_flask_tutorial/flask/lib/python3.5/site-packages/flask_openid.py -Scanned: 2016-10-20 11:20:53.290818 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -danieltl/python_flask_final -https://github.com/danieltl/python_flask_final -Entry file: python_flask_final/application.py -Scanned: 2016-10-20 11:20:55.202602 -No vulnerabilities found. - - -devizier/flask-hello-world -https://github.com/devizier/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:20:55.778429 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -tomov/flask-location-survey-psych -https://github.com/tomov/flask-location-survey-psych -Entry file: flask-location-survey-psych/app/__init__.py -Scanned: 2016-10-20 11:20:56.313332 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rakou1986/flask-mvt-min -https://github.com/rakou1986/flask-mvt-min -Entry file: flask-mvt-min/webapp/app.py -Scanned: 2016-10-20 11:20:57.630869 -No vulnerabilities found. - - -mbreisch/real-python-reverse-flask -https://github.com/mbreisch/real-python-reverse-flask -Entry file: None -Scanned: 2016-10-20 11:20:58.148620 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mbreisch/real-python-reverse-flask. - -jeet4320/PythonFlask-IBMBluemix -https://github.com/jeet4320/PythonFlask-IBMBluemix -Entry file: PythonFlask-IBMBluemix/welcome.py -Scanned: 2016-10-20 11:20:58.678771 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -junniepat/Python-flask-app -https://github.com/junniepat/Python-flask-app -Entry file: Python-flask-app/app.py -Scanned: 2016-10-20 11:20:59.972317 -No vulnerabilities found. - - -Kwpolska/flask-demo-app -https://github.com/Kwpolska/flask-demo-app -Entry file: flask-demo-app/app.py -Scanned: 2016-10-20 11:21:00.510871 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tiangolo/uwsgi-nginx-flask-docker -https://github.com/tiangolo/uwsgi-nginx-flask-docker -Entry file: uwsgi-nginx-flask-docker/example-flask-python3.5-upload/app/main.py -Scanned: 2016-10-20 11:21:03.539046 -No vulnerabilities found. - - -bobdorff/flask -https://github.com/bobdorff/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:21:06.656305 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -chrisvasey/flask -https://github.com/chrisvasey/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:21:07.226514 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -wildjan/Flask -https://github.com/wildjan/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:21:10.792255 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smltc/Flask -https://github.com/smltc/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:21:14.321192 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rlsharpton/flask -https://github.com/rlsharpton/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:21:19.878389 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -mikelkl/flasky -https://github.com/mikelkl/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:21:21.375354 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -besimaltnok/Flask-Examples -https://github.com/besimaltnok/Flask-Examples -Entry file: Flask-Examples/helloworld.py -Scanned: 2016-10-20 11:21:23.390742 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -luo-jialin/flask- -https://github.com/luo-jialin/flask- -Entry file: flask-/flaskr.py -Scanned: 2016-10-20 11:21:25.714212 -No vulnerabilities found. - - -ubbochum/hb2_flask -https://github.com/ubbochum/hb2_flask -Entry file: hb2_flask/hb2_flask.py -Scanned: 2016-10-20 11:21:32.897326 -Vulnerability 1: -File: hb2_flask/hb2_flask.py - > User input at line 362, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 369: index_solr = Solr(start=page - 1 * 10, query=current_user.email, facet='false') - File: hb2_flask/hb2_flask.py - > Line 372: records = index_solr.results - File: hb2_flask/hb2_flask.py - > Line 376: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 379: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 361: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 363: records = [] - File: hb2_flask/hb2_flask.py - > Line 365: index_solr = '' - File: hb2_flask/hb2_flask.py - > Line 366: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 380, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',header=lazy_gettext('Home'), site=theme(request.access_route), numFound=num_found, records=records, pagination=pagination, offset=mystart - 1) - -Vulnerability 2: -File: hb2_flask/hb2_flask.py - > User input at line 416, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 417: duplicates_solr = Solr(start=page - 1 * 10, fquery=['dedupid:[* TO *]'], group='true', group_field='dedupid', group_limit=100, facet='false') - File: hb2_flask/hb2_flask.py - > Line 424: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('duplicate groups'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 427: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 415: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 423: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 428, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('duplicates.html',groups=duplicates_solr.results, pagination=pagination, header=lazy_gettext('Duplicates'), site=theme(request.access_route), offset=mystart - 1) - -Vulnerability 3: -File: hb2_flask/hb2_flask.py - > User input at line 433, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons')) - File: hb2_flask/hb2_flask.py - > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 434: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 446, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now()) - -Vulnerability 4: -File: hb2_flask/hb2_flask.py - > User input at line 433, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons')) - File: hb2_flask/hb2_flask.py - > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 434: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 455, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), del_redirect='persons') - -Vulnerability 5: -File: hb2_flask/hb2_flask.py - > User input at line 472, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 471: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 6: -File: hb2_flask/hb2_flask.py - > User input at line 474, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 477: query = '*:*' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 7: -File: hb2_flask/hb2_flask.py - > User input at line 480, trigger word "get(": - sorting = request.args.get('sort', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 482: sorting = '' - File: hb2_flask/hb2_flask.py - > Line 484: sorting = 'fdate desc' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 8: -File: hb2_flask/hb2_flask.py - > User input at line 472, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 471: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 9: -File: hb2_flask/hb2_flask.py - > User input at line 474, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 477: query = '*:*' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 10: -File: hb2_flask/hb2_flask.py - > User input at line 480, trigger word "get(": - sorting = request.args.get('sort', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 482: sorting = '' - File: hb2_flask/hb2_flask.py - > Line 484: sorting = 'fdate desc' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 11: -File: hb2_flask/hb2_flask.py - > User input at line 472, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 471: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 499, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery) - -Vulnerability 12: -File: hb2_flask/hb2_flask.py - > User input at line 474, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 477: query = '*:*' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 499, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery) - -Vulnerability 13: -File: hb2_flask/hb2_flask.py - > User input at line 480, trigger word "get(": - sorting = request.args.get('sort', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 482: sorting = '' - File: hb2_flask/hb2_flask.py - > Line 484: sorting = 'fdate desc' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 499, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery) - -Vulnerability 14: -File: hb2_flask/hb2_flask.py - > User input at line 742, trigger word "get(": - bio = requests.get('https://pub.orcid.org/%s/orcid-bio/' % orcid_id,headers='Accept''application/json').json() -File: hb2_flask/hb2_flask.py - > reaches line 744, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''%s, %s' % (bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('family-name').get('value'), bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('given-names').get('value'))) - -Vulnerability 15: -File: hb2_flask/hb2_flask.py - > User input at line 749, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 787: dashboard_solr = Solr(start=page - 1 * 10, query=query, sort='recordCreationDate asc', json_facet=DASHBOARD_FACETS, fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 795: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 798: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 750: mystart = 0 - File: hb2_flask/hb2_flask.py - > Line 791: pagination = '' -File: hb2_flask/hb2_flask.py - > reaches line 801, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dashboard.html',records=dashboard_solr.results, facet_data=dashboard_solr.facets, header=lazy_gettext('Dashboard'), site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), target='dashboard', del_redirect='dashboard') - -Vulnerability 16: -File: hb2_flask/hb2_flask.py - > User input at line 826, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 827: locked_solr = Solr(core='hb2', fquery=['locked:true', 'recordChangeDate:[* TO NOW-1HOUR]'], sort='recordChangeDate asc', start=page - 1 * 10) - File: hb2_flask/hb2_flask.py - > Line 831: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('records'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 834: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 824: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 841, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('superadmin.html',locked_records=locked_solr.results, header=lazy_gettext('Superadmin Board'), import_records=solr_dumps.results, offset=mystart - 1, pagination=pagination, del_redirect='superadmin', form=form, site=theme(request.access_route)) - -Vulnerability 17: -File: hb2_flask/hb2_flask.py - > User input at line 912, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units')) - File: hb2_flask/hb2_flask.py - > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 913: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 925, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now()) - -Vulnerability 18: -File: hb2_flask/hb2_flask.py - > User input at line 912, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units')) - File: hb2_flask/hb2_flask.py - > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 913: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 933, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now()) - -Vulnerability 19: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1110, trigger word "replace(": - solr_data.setdefault('recordCreationDate', form.data.get(field).strip().replace(' ', 'T') + 'Z') - -Vulnerability 20: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1112, trigger word "replace(": - solr_data.setdefault('recordChangeDate', form.data.get(field).strip().replace(' ', 'T') + 'Z') - -Vulnerability 21: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1141, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), action='https://github.com/create', pubtype=pubtype) - -Vulnerability 22: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1160, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), pubtype=pubtype, action='https://github.com/create', record_id=form.id.data) - -Vulnerability 23: -File: hb2_flask/hb2_flask.py - > User input at line 1167, trigger word "get(": - is_part_of = show_record_solr.results[0].get('is_part_of') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 24: -File: hb2_flask/hb2_flask.py - > User input at line 1168, trigger word "get(": - has_part = show_record_solr.results[0].get('has_part') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 25: -File: hb2_flask/hb2_flask.py - > User input at line 1169, trigger word "get(": - other_version = show_record_solr.results[0].get('other_version') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 26: -File: hb2_flask/hb2_flask.py - > User input at line 1171, trigger word "get(": - thedata = json.loads(show_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1173: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 27: -File: hb2_flask/hb2_flask.py - > User input at line 1172, trigger word "get(": - locked = show_record_solr.results[0].get('locked') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 28: -File: hb2_flask/hb2_flask.py - > User input at line 1173, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 29: -File: hb2_flask/hb2_flask.py - > User input at line 1189, trigger word "get(": - thedata = json.loads(show_person_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1190: form = PersonAdminForm.from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1192, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('name'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=person_id, pubtype='person', del_redirect='persons') - -Vulnerability 30: -File: hb2_flask/hb2_flask.py - > User input at line 1200, trigger word "get(": - thedata = json.loads(show_orga_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1201: form = OrgaAdminForm.from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1203, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('pref_label'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=orga_id, pubtype='organisation', del_redirect='organisations') - -Vulnerability 31: -File: hb2_flask/hb2_flask.py - > User input at line 1213, trigger word "get(": - thedata = json.loads(edit_orga_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1218: form = OrgaAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas')) - File: hb2_flask/hb2_flask.py - > Line 1216: form = OrgaAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1223, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update') - -Vulnerability 32: -File: hb2_flask/hb2_flask.py - > User input at line 1213, trigger word "get(": - thedata = json.loads(edit_orga_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1218: form = OrgaAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas')) - File: hb2_flask/hb2_flask.py - > Line 1216: form = OrgaAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1231, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(orga)s',orga=form.data.get('pref_label')), site=theme(request.access_route), action='https://github.com/update', pubtype='organisation') - -Vulnerability 33: -File: hb2_flask/hb2_flask.py - > User input at line 1242, trigger word "get(": - thedata = json.loads(edit_person_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1247: form = PersonAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons')) - File: hb2_flask/hb2_flask.py - > Line 1245: form = PersonAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1253, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update') - -Vulnerability 34: -File: hb2_flask/hb2_flask.py - > User input at line 1242, trigger word "get(": - thedata = json.loads(edit_person_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1247: form = PersonAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons')) - File: hb2_flask/hb2_flask.py - > Line 1245: form = PersonAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1261, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(person)s',person=form.data.get('name')), site=theme(request.access_route), action='https://github.com/update', pubtype='person') - -Vulnerability 35: -File: hb2_flask/hb2_flask.py - > User input at line 1286, trigger word "get(": - thedata = json.loads(edit_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 36: -File: hb2_flask/hb2_flask.py - > User input at line 1289, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 37: -File: hb2_flask/hb2_flask.py - > User input at line 1291, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 38: -File: hb2_flask/hb2_flask.py - > User input at line 1286, trigger word "get(": - thedata = json.loads(edit_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() -File: hb2_flask/hb2_flask.py - > reaches line 1310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - -Vulnerability 39: -File: hb2_flask/hb2_flask.py - > User input at line 1289, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - -Vulnerability 40: -File: hb2_flask/hb2_flask.py - > User input at line 1291, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - -Vulnerability 41: -File: hb2_flask/hb2_flask.py - > User input at line 1286, trigger word "get(": - thedata = json.loads(edit_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() -File: hb2_flask/hb2_flask.py - > reaches line 1321, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) - -Vulnerability 42: -File: hb2_flask/hb2_flask.py - > User input at line 1289, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1321, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) - -Vulnerability 43: -File: hb2_flask/hb2_flask.py - > User input at line 1291, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1321, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) - -Vulnerability 44: -File: hb2_flask/hb2_flask.py - > User input at line 1491, trigger word "form[": - target = request.form['next'] -File: hb2_flask/hb2_flask.py - > reaches line 1493, trigger word "url_for(": - target = url_for(endpoint,values) - -Vulnerability 45: -File: hb2_flask/hb2_flask.py - > User input at line 1491, trigger word "form[": - target = request.form['next'] -File: hb2_flask/hb2_flask.py - > reaches line 1494, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(target) - -Vulnerability 46: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 47: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 48: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 49: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 50: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 51: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 52: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 53: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 54: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1573, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) - -Vulnerability 55: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1573, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) - -Vulnerability 56: -File: hb2_flask/hb2_flask.py - > User input at line 1627, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1628: solr_dumps = Solr(core='hb2_users', query='id:*.json', facet='false', start=page - 1 * 10) - File: hb2_flask/hb2_flask.py - > Line 1631: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('dumps'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 1634: mystart = 1 + pagination.page - 1 * pagination.per_page -File: hb2_flask/hb2_flask.py - > reaches line 1636, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('solr_dumps.html',records=solr_dumps.results, offset=mystart - 1, pagination=pagination, header=lazy_gettext('Import Dump'), del_redirect='import/solr_dumps', form=form) - -Vulnerability 57: -File: hb2_flask/hb2_flask.py - > User input at line 1652, trigger word "get(": - thedata = json.loads(import_solr.results[0].get('dump')[0]) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1645: thedata = '' - File: hb2_flask/hb2_flask.py - > Line 1656: thedata = json.loads(form.file.data.stream.read()) -File: hb2_flask/hb2_flask.py - > reaches line 1665, trigger word "flash(": - flash('%s records imported!' % len(thedata), 'success') - -Vulnerability 58: -File: hb2_flask/hb2_flask.py - > User input at line 1656, trigger word ".data": - thedata = json.loads(form.file.data.stream.read()) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1645: thedata = '' - File: hb2_flask/hb2_flask.py - > Line 1652: thedata = json.loads(import_solr.results[0].get('dump')[0]) -File: hb2_flask/hb2_flask.py - > reaches line 1665, trigger word "flash(": - flash('%s records imported!' % len(thedata), 'success') - -Vulnerability 59: -File: hb2_flask/processors/mods_parser.py - > User input at line 123, trigger word "get(": - pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '') -Reassigned in: - File: hb2_flask/processors/mods_parser.py - > Line 120: pnd = '' -File: hb2_flask/processors/mods_parser.py - > reaches line 123, trigger word "replace(": - pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '') - - - -Vertabelo/flask-oauth-demo-app -https://github.com/Vertabelo/flask-oauth-demo-app -Entry file: flask-oauth-demo-app/models.py -Scanned: 2016-10-20 11:21:33.425035 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -waharnum/inlibraries.com -https://github.com/waharnum/inlibraries.com -Entry file: None -Scanned: 2016-10-20 11:21:33.960525 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -billyfung/flask_shortener -https://github.com/billyfung/flask_shortener -Entry file: flask_shortener/app.py -Scanned: 2016-10-20 11:21:35.282945 -Vulnerability 1: -File: flask_shortener/app.py - > User input at line 41, trigger word "form[": - url_to_parse = request.form['input-url'] -Reassigned in: - File: flask_shortener/app.py - > Line 42: parts = urlparse.urlparse(url_to_parse) - File: flask_shortener/app.py - > Line 47: short_id = shorten(url_to_parse) -File: flask_shortener/app.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',short_id=short_id) - -Vulnerability 2: -File: flask_shortener/app.py - > User input at line 52, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(link_target) - -Vulnerability 3: -File: flask_shortener/app.py - > User input at line 60, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target) - -Vulnerability 4: -File: flask_shortener/app.py - > User input at line 63, trigger word "get(": - click_count = int(redis.get('click-count:' + short_id) or 0) -File: flask_shortener/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target) - - - -MLH/my-mlh-flask-example -https://github.com/MLH/my-mlh-flask-example -Entry file: my-mlh-flask-example/app.py -Scanned: 2016-10-20 11:21:37.100262 -No vulnerabilities found. - - -hammygoonan/Flaskify -https://github.com/hammygoonan/Flaskify -Entry file: Flaskify/project/__init__.py -Scanned: 2016-10-20 11:21:38.636443 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -anujspatel/flaskr -https://github.com/anujspatel/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:21:46.166468 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -williamcaban/flaskrcloud -https://github.com/williamcaban/flaskrcloud -Entry file: flaskrcloud/flaskr.py -Scanned: 2016-10-20 11:21:54.692978 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crazyqipython/flaskdemo -https://github.com/crazyqipython/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 11:21:55.211099 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pythondude325/flaskr -https://github.com/pythondude325/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:21:55.711450 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fenske/flasky -https://github.com/fenske/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:21:57.222534 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fakegit/flasky -https://github.com/fakegit/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:21:57.729938 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Anddor/flaskr -https://github.com/Anddor/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:21:59.201376 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jarogers095/flasktaskr -https://github.com/jarogers095/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:22:00.752901 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zzclynn/flaskr -https://github.com/zzclynn/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:22:01.258671 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -johnpwillman/flasktest -https://github.com/johnpwillman/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 11:22:02.762846 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottmarinoff/Flasky -https://github.com/scottmarinoff/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-20 11:22:06.276852 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JamesMilnerUK/Loxo -https://github.com/JamesMilnerUK/Loxo -Entry file: Loxo/loxoapi.py -Scanned: 2016-10-20 11:22:06.783358 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rkholoniuk/FlaskAPI -https://github.com/rkholoniuk/FlaskAPI -Entry file: None -Scanned: 2016-10-20 11:22:07.298810 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rkholoniuk/FlaskAPI. - -AllyW/flaskyDeb -https://github.com/AllyW/flaskyDeb -Entry file: flaskyDeb/app/__init__.py -Scanned: 2016-10-20 11:22:12.138821 -Vulnerability 1: -File: flaskyDeb/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 55: posts = pagination.items - File: flaskyDeb/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskyDeb/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 45: show_followed = False - File: flaskyDeb/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskyDeb/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 67: posts = pagination.items -File: flaskyDeb/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flaskyDeb/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskyDeb/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 134: comments = pagination.items - File: flaskyDeb/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskyDeb/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flaskyDeb/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskyDeb/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flaskyDeb/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskyDeb/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flaskyDeb/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 246: comments = pagination.items -File: flaskyDeb/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -jmcerv/FlaskTutorial -https://github.com/jmcerv/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 11:22:14.711520 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -LaRueGT/FlaskBlog -https://github.com/LaRueGT/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 11:22:20.361160 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhou18520786640/FlaskWeb -https://github.com/zhou18520786640/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-20 11:22:22.041228 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -ethanphunter/FlaskExperiment -https://github.com/ethanphunter/FlaskExperiment -Entry file: FlaskExperiment/main.py -Scanned: 2016-10-20 11:22:22.623467 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -asimonia/FlaskJeopardy -https://github.com/asimonia/FlaskJeopardy -Entry file: FlaskJeopardy/app/__init__.py -Scanned: 2016-10-20 11:22:33.385203 -Vulnerability 1: -File: FlaskJeopardy/app/main/views.py - > User input at line 17, trigger word ".data": - show_number = form.show_number.data -Reassigned in: - File: FlaskJeopardy/app/main/views.py - > Line 32: questions = Questionbank.objects(show_number=show_number, current_round='Jeopardy!') - File: FlaskJeopardy/app/main/views.py - > Line 33: init_game = Game(state='playing', show_number=show_number, current_round='Jeopardy!') - File: FlaskJeopardy/app/main/views.py - > Line 12: ret_MAYBE_FUNCTION_NAME = render_template('questions/index.html',form=form) -File: FlaskJeopardy/app/main/views.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('questions/game_board.html',game=init_game) - - - -motleytech/flaskPlate -https://github.com/motleytech/flaskPlate -Entry file: flaskPlate/app/app.py -Scanned: 2016-10-20 11:22:35.756640 -No vulnerabilities found. - - -ciricihq/wkhtmltopdf-flask-aas -https://github.com/ciricihq/wkhtmltopdf-flask-aas -Entry file: wkhtmltopdf-flask-aas/app.py -Scanned: 2016-10-20 11:22:37.416509 -No vulnerabilities found. - - -cr8ivecodesmith/save22-flask-course-src -https://github.com/cr8ivecodesmith/save22-flask-course-src -Entry file: save22-flask-course-src/01-hello/app2_1.py -Scanned: 2016-10-20 11:22:38.865248 -No vulnerabilities found. - - -johnsliao/flask-sqlite3-chartjs-toy -https://github.com/johnsliao/flask-sqlite3-chartjs-toy -Entry file: flask-sqlite3-chartjs-toy/flaskr/flaskr.py -Scanned: 2016-10-20 11:22:40.150068 -No vulnerabilities found. - - -swkaen/Flask_LED -https://github.com/swkaen/Flask_LED -Entry file: Flask_LED/hello.py -Scanned: 2016-10-20 11:22:41.449700 -No vulnerabilities found. - - -johnsliao/flask-bp -https://github.com/johnsliao/flask-bp -Entry file: flask-bp/flaskApp.py -Scanned: 2016-10-20 11:22:42.721023 -No vulnerabilities found. - - -MaximeGir/flask_skeleton -https://github.com/MaximeGir/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-20 11:22:43.233614 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -devmtnaing/python_flask -https://github.com/devmtnaing/python_flask -Entry file: None -Scanned: 2016-10-20 11:22:43.764745 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/devmtnaing/python_flask. - -josepablob/flask-blog -https://github.com/josepablob/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:22:44.333083 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -faraday-effect/spectacle-flask -https://github.com/faraday-effect/spectacle-flask -Entry file: spectacle-flask/app/__init__.py -Scanned: 2016-10-20 11:22:47.749863 -No vulnerabilities found. - - -yetship/flask-usages -https://github.com/yetship/flask-usages -Entry file: flask-usages/application/__init__.py -Scanned: 2016-10-20 11:22:56.236937 -Vulnerability 1: -File: flask-usages/application/controllers/todo.py - > User input at line 12, trigger word "get(": - todo_id = request.args.get('todo_id') -Reassigned in: - File: flask-usages/application/controllers/todo.py - > Line 17: ret_MAYBE_FUNCTION_NAME = jsonify() -File: flask-usages/application/controllers/todo.py - > reaches line 15, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(todo_idtodo.content) - -Vulnerability 2: -File: flask-usages/application/controllers/todo.py - > User input at line 21, trigger word "get(": - todo = Todo(content=data.get('content')) -File: flask-usages/application/controllers/todo.py - > reaches line 24, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(todo_id=todo.id, content=todo.content) - - - -raticate/flask-tutorial -https://github.com/raticate/flask-tutorial -Entry file: None -Scanned: 2016-10-20 11:22:56.747378 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cnds/flask_web -https://github.com/cnds/flask_web -Entry file: flask_web/helloflask.py -Scanned: 2016-10-20 11:22:57.357072 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py - -al4/flask-tokenauth -https://github.com/al4/flask-tokenauth -Entry file: flask-tokenauth/test_tokenauth.py -Scanned: 2016-10-20 11:22:58.667142 -No vulnerabilities found. - - -jgoret/flask-dataset -https://github.com/jgoret/flask-dataset -Entry file: flask-dataset/flask_dataset/__init__.py -Scanned: 2016-10-20 11:23:01.827284 -No vulnerabilities found. - - -fenfir/flask_test -https://github.com/fenfir/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 11:23:02.415836 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danjamin/flask-guide -https://github.com/danjamin/flask-guide -Entry file: flask-guide/app/server.py -Scanned: 2016-10-20 11:23:03.680944 -No vulnerabilities found. - - -stevejgoodman/flask-app -https://github.com/stevejgoodman/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 11:23:04.188886 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -devizier/flask-blog -https://github.com/devizier/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:23:04.766885 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rafaelgotts/flask_rest -https://github.com/rafaelgotts/flask_rest -Entry file: None -Scanned: 2016-10-20 11:23:05.275223 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rafaelgotts/flask_rest. - -Orlandohub/flask-tutorial -https://github.com/Orlandohub/flask-tutorial -Entry file: None -Scanned: 2016-10-20 11:23:05.783877 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -python-0/flask_blog -https://github.com/python-0/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:23:06.290195 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bdero/flask-sleep -https://github.com/bdero/flask-sleep -Entry file: flask-sleep/flasksleep.py -Scanned: 2016-10-20 11:23:07.593992 -No vulnerabilities found. - - -miracleluchen/blog-flask -https://github.com/miracleluchen/blog-flask -Entry file: blog-flask/project/views.py -Scanned: 2016-10-20 11:23:08.251062 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -IvanBodnar/flask_relevamientos -https://github.com/IvanBodnar/flask_relevamientos -Entry file: flask_relevamientos/app.py -Scanned: 2016-10-20 11:23:12.944875 -No vulnerabilities found. - - -ravivooda/flask-server -https://github.com/ravivooda/flask-server -Entry file: None -Scanned: 2016-10-20 11:23:15.471930 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ravivooda/flask-server. - -wipatrick/flask-restapi -https://github.com/wipatrick/flask-restapi -Entry file: flask-restapi/api.py -Scanned: 2016-10-20 11:23:21.922128 -No vulnerabilities found. - - -yogeshralhan/flask_1 -https://github.com/yogeshralhan/flask_1 -Entry file: flask_1/2.py -Scanned: 2016-10-20 11:23:23.730387 -No vulnerabilities found. - - -YeWang0/Flask_Blog -https://github.com/YeWang0/Flask_Blog -Entry file: Flask_Blog/Blog/blog.py -Scanned: 2016-10-20 11:23:24.663675 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -windery/flask-blog -https://github.com/windery/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:23:34.241393 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -chuan137/flask_bess -https://github.com/chuan137/flask_bess -Entry file: flask_bess/main.py -Scanned: 2016-10-20 11:23:38.275385 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kgandhi37/flask_blog -https://github.com/kgandhi37/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:23:39.926973 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -krol3/python-flask -https://github.com/krol3/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 11:23:41.441934 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ramhiser/flask-docker -https://github.com/ramhiser/flask-docker -Entry file: flask-docker/app.py -Scanned: 2016-10-20 11:23:43.817332 -No vulnerabilities found. - - -ialamin/flask_hello -https://github.com/ialamin/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-20 11:23:44.492299 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Vasiliy-tech/flask_httpserver -https://github.com/Vasiliy-tech/flask_httpserver -Entry file: flask_httpserver/simple_http.py -Scanned: 2016-10-20 11:23:46.315942 -No vulnerabilities found. - - -jyameo/Flask-Blog -https://github.com/jyameo/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-20 11:23:47.836668 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Yuhuishishishi/Flask_toy -https://github.com/Yuhuishishishi/Flask_toy -Entry file: Flask_toy/MenuApp.py -Scanned: 2016-10-20 11:23:56.140898 -No vulnerabilities found. - - -heyericnelson/flask_apps -https://github.com/heyericnelson/flask_apps -Entry file: flask_apps/flaskr/flaskr.py -Scanned: 2016-10-20 11:23:58.555832 -No vulnerabilities found. - - -datakiss/flask-miguel -https://github.com/datakiss/flask-miguel -Entry file: flask-miguel/app/__init__.py -Scanned: 2016-10-20 11:24:00.001973 -No vulnerabilities found. - - -timotk/flask-login -https://github.com/timotk/flask-login -Entry file: flask-login/app/__init__.py -Scanned: 2016-10-20 11:24:01.376474 -No vulnerabilities found. - - -johnsliao/flask-toy -https://github.com/johnsliao/flask-toy -Entry file: flask-toy/flaskr/flaskr.py -Scanned: 2016-10-20 11:24:01.901189 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jan26th/flask_test -https://github.com/jan26th/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 11:24:02.524513 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dawran6/flask-blog -https://github.com/dawran6/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:24:03.069644 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -msapkota/Flask_Blog -https://github.com/msapkota/Flask_Blog -Entry file: Flask_Blog/Blog/blog.py -Scanned: 2016-10-20 11:24:04.936519 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wish007/MyFlask -https://github.com/wish007/MyFlask -Entry file: MyFlask/app/__init__.py -Scanned: 2016-10-20 11:24:06.332753 -No vulnerabilities found. - - -rogerpence/flask-skeleton -https://github.com/rogerpence/flask-skeleton -Entry file: None -Scanned: 2016-10-20 11:24:06.864146 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rogerpence/flask-skeleton. - -chungsquared/flask-introduction -https://github.com/chungsquared/flask-introduction -Entry file: flask-introduction/app.py -Scanned: 2016-10-20 11:24:10.028777 -No vulnerabilities found. - - -zachbpd/microblog -https://github.com/zachbpd/microblog -Entry file: None -Scanned: 2016-10-20 11:24:10.599349 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -josepablob/flask-hello-world -https://github.com/josepablob/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:24:11.157107 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ipsha21/My-flask-application -https://github.com/ipsha21/My-flask-application -Entry file: My-flask-application/app.py -Scanned: 2016-10-20 11:24:11.670556 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tribe216/microblog -https://github.com/Tribe216/microblog -Entry file: None -Scanned: 2016-10-20 11:24:12.162818 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DonBeck69/FlaskWebProject2 -https://github.com/DonBeck69/FlaskWebProject2 -Entry file: FlaskWebProject2/FlaskWebProject2/FlaskWebProject2/__init__.py -Scanned: 2016-10-20 11:24:15.697178 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laaroussiBadr/FlaskWebProject -https://github.com/laaroussiBadr/FlaskWebProject -Entry file: FlaskWebProject/FlaskWebProject2/FlaskWebProject2/__init__.py -Scanned: 2016-10-20 11:24:21.230915 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Mad1331/FlaskMessageBoard -https://github.com/Mad1331/FlaskMessageBoard -Entry file: FlaskMessageBoard/server.py -Scanned: 2016-10-20 11:24:23.234206 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sasha-ruby/flask2spark -https://github.com/sasha-ruby/flask2spark -Entry file: flask2spark/flask2spark.py -Scanned: 2016-10-20 11:24:25.554907 -No vulnerabilities found. - - -damionlowers/flask -https://github.com/damionlowers/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:24:37.622000 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -smltc/Flask -https://github.com/smltc/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:24:39.131357 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -embasa/FLASK -https://github.com/embasa/FLASK -Entry file: FLASK/app.py -Scanned: 2016-10-20 11:24:41.448546 -No vulnerabilities found. - - -rakeshhegishte/Flask -https://github.com/rakeshhegishte/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:24:41.964700 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -RayneHwang/Flask -https://github.com/RayneHwang/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:24:43.489856 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -RoseOu/flasky -https://github.com/RoseOu/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:24:45.049243 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -materialsvirtuallab/flamyngo -https://github.com/materialsvirtuallab/flamyngo -Entry file: flamyngo/flamyngo/app.py -Scanned: 2016-10-20 11:24:48.446516 -Vulnerability 1: -File: flamyngo/flamyngo/views.py - > User input at line 95, trigger word "get(": - cname = request.args.get('collection') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 96: settings = CSETTINGS[cname] - File: flamyngo/flamyngo/views.py - > Line 98: projection = [t[0] for t in settings['summary']] - File: flamyngo/flamyngo/views.py - > Line 105: criteria = process_search_string(search_string, settings) -File: flamyngo/flamyngo/views.py - > reaches line 130, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message)) - -Vulnerability 2: -File: flamyngo/flamyngo/views.py - > User input at line 97, trigger word "get(": - search_string = request.args.get('search_string') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 105: criteria = process_search_string(search_string, settings) -File: flamyngo/flamyngo/views.py - > reaches line 130, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message)) - -Vulnerability 3: -File: flamyngo/flamyngo/views.py - > User input at line 142, trigger word "get(": - cname = request.args.get('collection') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 4: -File: flamyngo/flamyngo/views.py - > User input at line 145, trigger word "get(": - plot_type = request.args.get('plot_type') or 'scatter' -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 5: -File: flamyngo/flamyngo/views.py - > User input at line 146, trigger word "get(": - search_string = request.args.get('search_string') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 6: -File: flamyngo/flamyngo/views.py - > User input at line 147, trigger word "get(": - xaxis = request.args.get('xaxis') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 7: -File: flamyngo/flamyngo/views.py - > User input at line 148, trigger word "get(": - yaxis = request.args.get('yaxis') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - - - -jonafato/Flask-Copilot -https://github.com/jonafato/Flask-Copilot -Entry file: Flask-Copilot/example/app.py -Scanned: 2016-10-20 11:24:49.835602 -No vulnerabilities found. - - -Upflask/Upflask -https://github.com/Upflask/Upflask -Entry file: Upflask/server.py -Scanned: 2016-10-20 11:24:51.996189 -Vulnerability 1: -File: Upflask/server.py - > User input at line 161, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Upflask/server.py - > Line 165: filename = secure_filename(file.filename) -File: Upflask/server.py - > reaches line 171, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: Upflask/server.py - > User input at line 161, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Upflask/server.py - > Line 165: filename = secure_filename(file.filename) -File: Upflask/server.py - > reaches line 171, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -PrettyPrinted/flask-wtforms -https://github.com/PrettyPrinted/flask-wtforms -Entry file: flask-wtforms/main.py -Scanned: 2016-10-20 11:24:56.331643 -No vulnerabilities found. - - -billyfung/flask_shortener -https://github.com/billyfung/flask_shortener -Entry file: flask_shortener/app.py -Scanned: 2016-10-20 11:24:58.641433 -Vulnerability 1: -File: flask_shortener/app.py - > User input at line 41, trigger word "form[": - url_to_parse = request.form['input-url'] -Reassigned in: - File: flask_shortener/app.py - > Line 42: parts = urlparse.urlparse(url_to_parse) - File: flask_shortener/app.py - > Line 47: short_id = shorten(url_to_parse) -File: flask_shortener/app.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',short_id=short_id) - -Vulnerability 2: -File: flask_shortener/app.py - > User input at line 52, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(link_target) - -Vulnerability 3: -File: flask_shortener/app.py - > User input at line 60, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target) - -Vulnerability 4: -File: flask_shortener/app.py - > User input at line 63, trigger word "get(": - click_count = int(redis.get('click-count:' + short_id) or 0) -File: flask_shortener/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target) - - - -MLH/my-mlh-flask-example -https://github.com/MLH/my-mlh-flask-example -Entry file: my-mlh-flask-example/app.py -Scanned: 2016-10-20 11:24:59.964323 -No vulnerabilities found. - - -boydjohnson/flasktwilio -https://github.com/boydjohnson/flasktwilio -Entry file: flasktwilio/app.py -Scanned: 2016-10-20 11:25:02.255720 -Vulnerability 1: -File: flasktwilio/app.py - > User input at line 14, trigger word "form[": - number = request.form['number'] -File: flasktwilio/app.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon) - -Vulnerability 2: -File: flasktwilio/app.py - > User input at line 15, trigger word "form[": - lat = request.form['latitude'] -File: flasktwilio/app.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon) - -Vulnerability 3: -File: flasktwilio/app.py - > User input at line 16, trigger word "form[": - lon = request.form['longitude'] -File: flasktwilio/app.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon) - - - -yizhianiu/flasky -https://github.com/yizhianiu/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:25:02.771480 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ifcheung2012/flaskanalysis -https://github.com/ifcheung2012/flaskanalysis -Entry file: flaskanalysis/manage.py -Scanned: 2016-10-20 11:25:04.100318 -No vulnerabilities found. - - -wdxfairy/flaskblog -https://github.com/wdxfairy/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 11:25:04.660259 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -Narcissist1/flasktest -https://github.com/Narcissist1/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 11:25:05.162392 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -msapkota/flasktaskr -https://github.com/msapkota/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:25:05.684870 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -super452/flasky -https://github.com/super452/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:25:07.189752 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wish007/flasktest -https://github.com/wish007/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 11:25:07.707610 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wildjan/Flaskr -https://github.com/wildjan/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 11:25:11.235463 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pnilan/flaskr -https://github.com/pnilan/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:25:11.746671 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottmarinoff/Flasky -https://github.com/scottmarinoff/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-20 11:25:12.261027 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cutedogspark/Flask-SocketIO -https://github.com/cutedogspark/Flask-SocketIO -Entry file: None -Scanned: 2016-10-20 11:25:12.781412 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rkholoniuk/FlaskAPI -https://github.com/rkholoniuk/FlaskAPI -Entry file: None -Scanned: 2016-10-20 11:25:16.318920 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rkholoniuk/FlaskAPI. - -VitPN/FlaskRPi -https://github.com/VitPN/FlaskRPi -Entry file: FlaskRPi/go.py -Scanned: 2016-10-20 11:25:21.861615 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EvenYan/FlaskTest -https://github.com/EvenYan/FlaskTest -Entry file: None -Scanned: 2016-10-20 11:25:23.376242 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/EvenYan/FlaskTest. - -jll90/flaskAng -https://github.com/jll90/flaskAng -Entry file: flaskAng/app.py -Scanned: 2016-10-20 11:25:24.051166 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskAng/lib/python2.7/genericpath.py - -edgewood/webfaction-flask0.10-boilerplate -https://github.com/edgewood/webfaction-flask0.10-boilerplate -Entry file: None -Scanned: 2016-10-20 11:25:37.557472 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -garderobin/HelloFlask -https://github.com/garderobin/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-20 11:25:40.077240 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shidante/notes-flask -https://github.com/shidante/notes-flask -Entry file: notes-flask/hello.py -Scanned: 2016-10-20 11:25:42.529004 -No vulnerabilities found. - - -maixianyu/flask_tennis -https://github.com/maixianyu/flask_tennis -Entry file: flask_tennis/app/__init__.py -Scanned: 2016-10-20 11:25:43.106415 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -saalmerol/cds-flask -https://github.com/saalmerol/cds-flask -Entry file: None -Scanned: 2016-10-20 11:25:43.614853 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -trileg/HelloFlask -https://github.com/trileg/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-20 11:25:45.121631 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -M1lan/flask_helloworld -https://github.com/M1lan/flask_helloworld -Entry file: flask_helloworld/flask_helloworld.py -Scanned: 2016-10-20 11:25:45.660620 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -codybousc/flask_practice- -https://github.com/codybousc/flask_practice- -Entry file: flask_practice-/app.py -Scanned: 2016-10-20 11:25:49.331544 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_practice-/venv/lib/python2.7/genericpath.py - -s-kovacevic/elearning-flask -https://github.com/s-kovacevic/elearning-flask -Entry file: elearning-flask/main.py -Scanned: 2016-10-20 11:25:51.810044 -Vulnerability 1: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 71, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'user.to_jsonapi()) - -Vulnerability 2: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[user.to_jsonapi() for user in user.get_many()]) - -Vulnerability 3: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 99, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'question.to_jsonapi()) - -Vulnerability 4: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 102, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[question.to_jsonapi() for question in question.get_many()]) - -Vulnerability 5: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 131, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'category.to_jsonapi()) - -Vulnerability 6: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 134, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[category.to_jsonapi() for category in category.get_many()]) - -Vulnerability 7: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 163, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'answer.to_jsonapi()) - -Vulnerability 8: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 166, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[answer.to_jsonapi() for answer in answer.get_many()]) - -Vulnerability 9: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 195, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'score.to_jsonapi()) - -Vulnerability 10: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 198, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[score.to_jsonapi() for score in score.get_many()]) - - - -xpleaf/flask_catalog -https://github.com/xpleaf/flask_catalog -Entry file: flask_catalog/my_app/__init__.py -Scanned: 2016-10-20 11:25:59.773274 -Vulnerability 1: -File: flask_catalog/my_app/catalog/views.py - > User input at line 41, trigger word "get(": - products = [redis.get(k) for k in keys_alive] -File: flask_catalog/my_app/catalog/views.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('products'products) - -Vulnerability 2: -File: flask_catalog/my_app/catalog/views.py - > User input at line 66, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 79, trigger word "flash(": - flash('The product %s has been created' % name, 'success') - -Vulnerability 3: -File: flask_catalog/my_app/catalog/views.py - > User input at line 66, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 4: -File: flask_catalog/my_app/catalog/views.py - > User input at line 67, trigger word ".data": - price = form.price.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 5: -File: flask_catalog/my_app/catalog/views.py - > User input at line 68, trigger word ".data": - category = Category.query.get_or_404(form.category.data) -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 6: -File: flask_catalog/my_app/catalog/views.py - > User input at line 71, trigger word "files[": - image = request.files['image'] -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 74: filename = secure_filename(image.filename) - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) - File: flask_catalog/my_app/catalog/views.py - > Line 72: filename = '' -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 7: -File: flask_catalog/my_app/catalog/views.py - > User input at line 66, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 8: -File: flask_catalog/my_app/catalog/views.py - > User input at line 67, trigger word ".data": - price = form.price.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 9: -File: flask_catalog/my_app/catalog/views.py - > User input at line 68, trigger word ".data": - category = Category.query.get_or_404(form.category.data) -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 10: -File: flask_catalog/my_app/catalog/views.py - > User input at line 71, trigger word "files[": - image = request.files['image'] -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 74: filename = secure_filename(image.filename) - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) - File: flask_catalog/my_app/catalog/views.py - > Line 72: filename = '' -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 11: -File: flask_catalog/my_app/catalog/views.py - > User input at line 93, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 94: category = Category(name) - File: flask_catalog/my_app/catalog/views.py - > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 97, trigger word "flash(": - flash('The category %s has been created' % name, 'success') - -Vulnerability 12: -File: flask_catalog/my_app/catalog/views.py - > User input at line 93, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 94: category = Category(name) - File: flask_catalog/my_app/catalog/views.py - > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 99, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.create_category',id=category.id)) - -Vulnerability 13: -File: flask_catalog/my_app/catalog/views.py - > User input at line 93, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 94: category = Category(name) - File: flask_catalog/my_app/catalog/views.py - > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 99, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.create_category',id=category.id)) - -Vulnerability 14: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 142, trigger word "filter(": - products = products.filter(Product.name.like('%' + name + '%')) - -Vulnerability 15: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 142, trigger word "filter(": - products = products.filter(Product.name.like('%' + name + '%')) - -Vulnerability 16: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 142, trigger word "filter(": - products = products.filter(Product.name.like('%' + name + '%')) - -Vulnerability 17: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 142, trigger word "filter(": - products = products.filter(Product.name.like('%' + name + '%')) - -Vulnerability 18: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 144, trigger word "filter(": - products = products.filter(Product.price == price) - -Vulnerability 19: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 144, trigger word "filter(": - products = products.filter(Product.price == price) - -Vulnerability 20: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 144, trigger word "filter(": - products = products.filter(Product.price == price) - -Vulnerability 21: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 144, trigger word "filter(": - products = products.filter(Product.price == price) - -Vulnerability 22: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 146, trigger word "filter(": - products = products.filter(Product.company.like('%' + company + '%')) - -Vulnerability 23: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 146, trigger word "filter(": - products = products.filter(Product.company.like('%' + company + '%')) - -Vulnerability 24: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 146, trigger word "filter(": - products = products.filter(Product.company.like('%' + company + '%')) - -Vulnerability 25: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 146, trigger word "filter(": - products = products.filter(Product.company.like('%' + company + '%')) - -Vulnerability 26: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 148, trigger word "filter(": - products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - -Vulnerability 27: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 148, trigger word "filter(": - products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - -Vulnerability 28: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 148, trigger word "filter(": - products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - -Vulnerability 29: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 148, trigger word "filter(": - products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - -Vulnerability 30: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10)) - -Vulnerability 31: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10)) - -Vulnerability 32: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10)) - -Vulnerability 33: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10)) - - - -yizhianiu/flask-blog -https://github.com/yizhianiu/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:26:00.331772 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -zhuwei05/flask-blog -https://github.com/zhuwei05/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:26:00.890406 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -fenfir/flask_test -https://github.com/fenfir/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 11:26:02.481571 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tim1978/flask-blog -https://github.com/tim1978/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:26:03.050714 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -junhl/Flask_Test -https://github.com/junhl/Flask_Test -Entry file: None -Scanned: 2016-10-20 11:26:03.711051 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -anupam0601/flask_off -https://github.com/anupam0601/flask_off -Entry file: flask_off/app.py -Scanned: 2016-10-20 11:26:05.493900 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cdhop/flask_exercises -https://github.com/cdhop/flask_exercises -Entry file: flask_exercises/hello.py -Scanned: 2016-10-20 11:26:06.138044 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_exercises/venv/lib/python2.7/genericpath.py - -AmeetSM/AngularFlask -https://github.com/AmeetSM/AngularFlask -Entry file: AngularFlask/app.py -Scanned: 2016-10-20 11:26:08.931270 -No vulnerabilities found. - - -a358003542/flask-examples -https://github.com/a358003542/flask-examples -Entry file: flask-examples/Guestbook/app.py -Scanned: 2016-10-20 11:26:09.443735 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -slacksec/flask_blog -https://github.com/slacksec/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:26:11.962094 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seabrookmx/flask-demo -https://github.com/seabrookmx/flask-demo -Entry file: None -Scanned: 2016-10-20 11:26:12.478839 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/seabrookmx/flask-demo. - -Desmonddai583/flask-blog -https://github.com/Desmonddai583/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:26:13.030240 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -GreenDragonSoft/refundmytrain-flask -https://github.com/GreenDragonSoft/refundmytrain-flask -Entry file: refundmytrain-flask/app.py -Scanned: 2016-10-20 11:26:14.452750 -No vulnerabilities found. - - -zhiweicai/flask-hello -https://github.com/zhiweicai/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-20 11:26:17.020169 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Yuhuishishishi/Flask_toy -https://github.com/Yuhuishishishi/Flask_toy -Entry file: Flask_toy/MenuApp.py -Scanned: 2016-10-20 11:26:23.348597 -No vulnerabilities found. - - -heyericnelson/flask_apps -https://github.com/heyericnelson/flask_apps -Entry file: flask_apps/flaskr/flaskr.py -Scanned: 2016-10-20 11:26:24.659424 -No vulnerabilities found. - - -abunuwas/flask_experiments -https://github.com/abunuwas/flask_experiments -Entry file: flask_experiments/main.py -Scanned: 2016-10-20 11:26:25.172340 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ykchat/gundam-flask -https://github.com/ykchat/gundam-flask -Entry file: gundam-flask/server.py -Scanned: 2016-10-20 11:26:26.562996 -No vulnerabilities found. - - -datakiss/flask-miguel -https://github.com/datakiss/flask-miguel -Entry file: flask-miguel/app/__init__.py -Scanned: 2016-10-20 11:26:37.017797 -No vulnerabilities found. - - -eltonto187/learn_flask -https://github.com/eltonto187/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 11:26:37.562460 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NickyThreeNames/flask_blog -https://github.com/NickyThreeNames/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:26:40.088247 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -netkicorp/flask-jwe -https://github.com/netkicorp/flask-jwe -Entry file: flask-jwe/server.py -Scanned: 2016-10-20 11:26:41.624251 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chungsquared/flask-introduction -https://github.com/chungsquared/flask-introduction -Entry file: flask-introduction/app.py -Scanned: 2016-10-20 11:26:46.093969 -No vulnerabilities found. - - -dengshilong/flask_example -https://github.com/dengshilong/flask_example -Entry file: None -Scanned: 2016-10-20 11:26:46.639828 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nathanielcompton/flask-tutorial -https://github.com/nathanielcompton/flask-tutorial -Entry file: None -Scanned: 2016-10-20 11:26:47.156300 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -JesseLabruyere/flask_api -https://github.com/JesseLabruyere/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-20 11:26:47.731788 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leon740gk/flask_quick_start -https://github.com/leon740gk/flask_quick_start -Entry file: flask_quick_start/hello.py -Scanned: 2016-10-20 11:26:50.034326 -No vulnerabilities found. - - -dommert/test.dommert.xyz -https://github.com/dommert/test.dommert.xyz -Entry file: None -Scanned: 2016-10-20 11:26:51.569086 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DonBeck69/FlaskWebProject2 -https://github.com/DonBeck69/FlaskWebProject2 -Entry file: FlaskWebProject2/FlaskWebProject2/FlaskWebProject2/__init__.py -Scanned: 2016-10-20 11:26:57.096752 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -poppuyo/FlaskUrlShortener -https://github.com/poppuyo/FlaskUrlShortener -Entry file: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py -Scanned: 2016-10-20 11:27:00.640319 -Vulnerability 1: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 93, trigger word "get(": - requested_shortened = request.args.get('shortened') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 97: cur = g.db.cursor() -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 95, trigger word "replace(": - requested_shortened = requested_shortened.replace(request.url_root, '') - -Vulnerability 2: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 93, trigger word "get(": - requested_shortened = request.args.get('shortened') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 97: cur = g.db.cursor() -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 98, trigger word "execute(": - cur.execute('SELECT url FROM urls where shortened=%s', [requested_shortened]) - -Vulnerability 3: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 93, trigger word "get(": - requested_shortened = request.args.get('shortened') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 97: cur = g.db.cursor() -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 100, trigger word "execute(": - cur = g.db.execute('SELECT url FROM urls where shortened=?', [requested_shortened]) - -Vulnerability 4: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 93, trigger word "get(": - requested_shortened = request.args.get('shortened') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 97: cur = g.db.cursor() -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 104, trigger word "url_for(": - short_url = request.url_root.rstrip('/') + url_for('find_shortened',shortened=requested_shortened) - -Vulnerability 5: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 114, trigger word "form[": - stripped_url = request.form['url'].rstrip(' ').rstrip('/') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 116: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 130: stripped_url = 'http://' + stripped_url - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 131: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 140: untrimmed_shortened = shorten(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length] -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 149, trigger word "execute(": - cur.execute('WITH new_values (url, shortened) as ( values (%s, %s) ), ' + 'upsert as ' + '( update urls u set url = nv.url, shortened = nv.shortened ' + ' FROM new_values nv WHERE u.url = nv.url RETURNING u.* )' + ' INSERT INTO urls (url, shortened) ' + ' SELECT url, shortened FROM new_values WHERE NOT EXISTS ' + ' (SELECT 1 FROM upsert up WHERE up.url = new_values.url)', [stripped_url, untrimmed_shortened[leftstring_length]]) - -Vulnerability 6: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 114, trigger word "form[": - stripped_url = request.form['url'].rstrip(' ').rstrip('/') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 116: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 130: stripped_url = 'http://' + stripped_url - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 131: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 140: untrimmed_shortened = shorten(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length] -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 160, trigger word "execute(": - g.db.execute('UPDATE urls SET url=?, shortened=? WHERE url=?', [stripped_url, untrimmed_shortened[leftstring_length], stripped_url]) - -Vulnerability 7: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 114, trigger word "form[": - stripped_url = request.form['url'].rstrip(' ').rstrip('/') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 116: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 130: stripped_url = 'http://' + stripped_url - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 131: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 140: untrimmed_shortened = shorten(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length] -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 162, trigger word "execute(": - g.db.execute('INSERT OR IGNORE INTO urls (url, shortened) VALUES (?, ?)', [stripped_url, untrimmed_shortened[leftstring_length]]) - -Vulnerability 8: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 114, trigger word "form[": - stripped_url = request.form['url'].rstrip(' ').rstrip('/') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 116: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 130: stripped_url = 'http://' + stripped_url - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 131: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 140: untrimmed_shortened = shorten(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length] -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 166, trigger word "flash(": - flash(Markup('' + short_url + '' + ' now redirects to the following URL: ' + '' + stripped_url + '')) - - - -j1wu/wechat-enterprise-bot -https://github.com/j1wu/wechat-enterprise-bot -Entry file: None -Scanned: 2016-10-20 11:27:02.650821 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/j1wu/wechat-enterprise-bot. - -chamambom/flask_sqlalchemy_crud -https://github.com/chamambom/flask_sqlalchemy_crud -Entry file: flask_sqlalchemy_crud/sqlcrud.py -Scanned: 2016-10-20 11:27:03.167962 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pyd-testing/flask-docker-workflow -https://github.com/pyd-testing/flask-docker-workflow -Entry file: flask-docker-workflow/app/app.py -Scanned: 2016-10-20 11:27:03.675234 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EsmondMoe/flask-globalcache-http-api -https://github.com/EsmondMoe/flask-globalcache-http-api -Entry file: flask-globalcache-http-api/app.py -Scanned: 2016-10-20 11:27:06.214137 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gr8shivam/Flask---Handling-File-Uploads -https://github.com/gr8shivam/Flask---Handling-File-Uploads -Entry file: Flask---Handling-File-Uploads/app/__init__.py -Scanned: 2016-10-20 11:27:07.546298 -No vulnerabilities found. - - -pbsugg/flask_testbed_server -https://github.com/pbsugg/flask_testbed_server -Entry file: flask_testbed_server/main.py -Scanned: 2016-10-20 11:27:08.553344 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -HYL13/flask_project_0 -https://github.com/HYL13/flask_project_0 -Entry file: flask_project_0/app/__init__.py -Scanned: 2016-10-20 11:27:11.376893 -Vulnerability 1: -File: flask_project_0/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 55: posts = pagination.items - File: flask_project_0/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_project_0/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flask_project_0/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 45: show_followed = False - File: flask_project_0/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_project_0/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flask_project_0/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 67: posts = pagination.items -File: flask_project_0/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flask_project_0/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask_project_0/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 134: comments = pagination.items - File: flask_project_0/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask_project_0/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flask_project_0/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_project_0/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_project_0/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flask_project_0/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask_project_0/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_project_0/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flask_project_0/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 246: comments = pagination.items -File: flask_project_0/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flask_project_0/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 20: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 23: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flask_project_0/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 20: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 23: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flask_project_0/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 20: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 23: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flask_project_0/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 42: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 45: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flask_project_0/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 42: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 45: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flask_project_0/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 42: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 45: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flask_project_0/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask_project_0/app/api_1_0/posts.py - > Line 16: prev = None - File: flask_project_0/app/api_1_0/posts.py - > Line 19: next = None -File: flask_project_0/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flask_project_0/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask_project_0/app/api_1_0/posts.py - > Line 16: prev = None - File: flask_project_0/app/api_1_0/posts.py - > Line 19: next = None -File: flask_project_0/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flask_project_0/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask_project_0/app/api_1_0/posts.py - > Line 16: prev = None - File: flask_project_0/app/api_1_0/posts.py - > Line 19: next = None -File: flask_project_0/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 15: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 18: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 15: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 18: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 15: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 18: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 43: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 46: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 43: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 46: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 43: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 46: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -anthonybrown/Flask-web-API-demo -https://github.com/anthonybrown/Flask-web-API-demo -Entry file: Flask-web-API-demo/app.py -Scanned: 2016-10-20 11:27:13.034385 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-web-API-demo/venv/lib/python2.7/genericpath.py - -myCSprojects/PythonFlask-IBMBluemix -https://github.com/myCSprojects/PythonFlask-IBMBluemix -Entry file: PythonFlask-IBMBluemix/welcome.py -Scanned: 2016-10-20 11:27:13.550477 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Kriordan/flask-hello-world -https://github.com/Kriordan/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:27:14.104129 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -mdublin/Flask-SPA-API-Template -https://github.com/mdublin/Flask-SPA-API-Template -Entry file: None -Scanned: 2016-10-20 11:27:14.637628 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dwisulfahnur/My-flask-app -https://github.com/dwisulfahnur/My-flask-app -Entry file: None -Scanned: 2016-10-20 11:27:17.180064 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dwisulfahnur/My-flask-app. - -andreffs18/flask-template-project -https://github.com/andreffs18/flask-template-project -Entry file: flask-template-project/project/__init__.py -Scanned: 2016-10-20 11:27:24.035205 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -valexandersaulys/flask_microblog_tutorial -https://github.com/valexandersaulys/flask_microblog_tutorial -Entry file: flask_microblog_tutorial/app/__init__.py -Scanned: 2016-10-20 11:27:25.480869 -No vulnerabilities found. - - -wenzhihong2003/awesome-flask-todo -https://github.com/wenzhihong2003/awesome-flask-todo -Entry file: None -Scanned: 2016-10-20 11:27:26.006223 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wenzhihong2003/awesome-flask-todo. - -kfiras/cloudfoundry-flask-webservice -https://github.com/kfiras/cloudfoundry-flask-webservice -Entry file: cloudfoundry-flask-webservice/app.py -Scanned: 2016-10-20 11:27:27.448435 -Vulnerability 1: -File: cloudfoundry-flask-webservice/app.py - > User input at line 80, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: cloudfoundry-flask-webservice/app.py - > reaches line 87, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201) - - - -ssam123/flask-blog-tutorial -https://github.com/ssam123/flask-blog-tutorial -Entry file: flask-blog-tutorial/__init__.py -Scanned: 2016-10-20 11:27:38.180346 -Vulnerability 1: -File: flask-blog-tutorial/author/views.py - > User input at line 31, trigger word "get(": - next = session.get('next') -Reassigned in: - File: flask-blog-tutorial/author/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: flask-blog-tutorial/author/views.py - > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error) -File: flask-blog-tutorial/author/views.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - -Vulnerability 2: -File: flask-blog-tutorial/blog/views.py - > User input at line 127, trigger word ".data": - title = form.title.data -Reassigned in: - File: flask-blog-tutorial/blog/views.py - > Line 129: slug = slugify(title) - File: flask-blog-tutorial/blog/views.py - > Line 130: post = Post(blog, author, title, body, category, filename, slug) - File: flask-blog-tutorial/blog/views.py - > Line 134: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new') -File: flask-blog-tutorial/blog/views.py - > reaches line 133, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug)) - -Vulnerability 3: -File: flask-blog-tutorial/blog/views.py - > User input at line 127, trigger word ".data": - title = form.title.data -Reassigned in: - File: flask-blog-tutorial/blog/views.py - > Line 129: slug = slugify(title) - File: flask-blog-tutorial/blog/views.py - > Line 130: post = Post(blog, author, title, body, category, filename, slug) - File: flask-blog-tutorial/blog/views.py - > Line 134: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new') -File: flask-blog-tutorial/blog/views.py - > reaches line 133, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug)) - - - -MrLeeh/flask-mega-tutorial -https://github.com/MrLeeh/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-20 11:27:38.697796 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MatthewHodgson/flask-by-example -https://github.com/MatthewHodgson/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 11:27:40.465158 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yun70/flask-rest-api -https://github.com/yun70/flask-rest-api -Entry file: flask-rest-api/app/__init__.py -Scanned: 2016-10-20 11:27:41.995799 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kevinlondon/flask-hello-world -https://github.com/kevinlondon/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:27:43.585754 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -viney-shih/Flask_App_Template -https://github.com/viney-shih/Flask_App_Template -Entry file: Flask_App_Template/app/__init__.py -Scanned: 2016-10-20 11:27:47.113368 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davehalladay/openr-flask-api -https://github.com/davehalladay/openr-flask-api -Entry file: openr-flask-api/main.py -Scanned: 2016-10-20 11:27:48.555764 -No vulnerabilities found. - - -momotaro98/flask-for-test -https://github.com/momotaro98/flask-for-test -Entry file: flask-for-test/app.py -Scanned: 2016-10-20 11:27:49.844749 -No vulnerabilities found. - - -andela-mochieng/flask-practice-tutorial -https://github.com/andela-mochieng/flask-practice-tutorial -Entry file: flask-practice-tutorial/app/__init__.py -Scanned: 2016-10-20 11:27:51.216947 -No vulnerabilities found. - - -GreenDragonSoft/flask-heroku-template -https://github.com/GreenDragonSoft/flask-heroku-template -Entry file: flask-heroku-template/app.py -Scanned: 2016-10-20 11:27:52.619053 -No vulnerabilities found. - - -mahfuzsust/flask-heroku-intro -https://github.com/mahfuzsust/flask-heroku-intro -Entry file: flask-heroku-intro/app.py -Scanned: 2016-10-20 11:27:58.051856 -No vulnerabilities found. - - -MoodyLyrics/flask -https://github.com/MoodyLyrics/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:28:03.258154 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -sunshine-sjd/Flask -https://github.com/sunshine-sjd/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:28:03.781367 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -unikatsieben/flask -https://github.com/unikatsieben/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:28:04.373687 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Mei-Lin-Chen/Flask -https://github.com/Mei-Lin-Chen/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:28:04.873159 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dannyec/flask -https://github.com/dannyec/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:28:06.482437 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -kakshi3242/Flask -https://github.com/kakshi3242/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:28:06.989361 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Abirdcfly/flask-blog -https://github.com/Abirdcfly/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:28:09.013795 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rainyear/MathModeBot -https://github.com/rainyear/MathModeBot -Entry file: MathModeBot/main.py -Scanned: 2016-10-20 11:28:11.487001 -No vulnerabilities found. - - -jrhuerta/flask-api -https://github.com/jrhuerta/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-20 11:28:13.008620 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -huachen0216/flaskdemo -https://github.com/huachen0216/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 11:28:14.521727 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -MrLokans/flaskr -https://github.com/MrLokans/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:28:15.041054 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -citizen-stig/flaskone -https://github.com/citizen-stig/flaskone -Entry file: flaskone/flask_one.py -Scanned: 2016-10-20 11:28:16.339887 -No vulnerabilities found. - - -ifcheung2012/flaskanalysis -https://github.com/ifcheung2012/flaskanalysis -Entry file: flaskanalysis/manage.py -Scanned: 2016-10-20 11:28:18.772978 -No vulnerabilities found. - - -Robotwing/flaskweb -https://github.com/Robotwing/flaskweb -Entry file: None -Scanned: 2016-10-20 11:28:23.314263 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -super452/flasky -https://github.com/super452/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:28:24.833279 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -srbhtest/flaskwebsite -https://github.com/srbhtest/flaskwebsite -Entry file: flaskwebsite/__init__.py -Scanned: 2016-10-20 11:28:27.131060 -No vulnerabilities found. - - -josepablob/flasktaskr -https://github.com/josepablob/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:28:27.660261 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wangduanyang/flasky -https://github.com/wangduanyang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:28:39.694741 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neo1218/m2m -https://github.com/neo1218/m2m -Entry file: m2m/m2m/app/__init__.py -Scanned: 2016-10-20 11:28:42.264379 -No vulnerabilities found. - - -fhamami/flaskone -https://github.com/fhamami/flaskone -Entry file: flaskone/app/__init__.py -Scanned: 2016-10-20 11:28:43.992240 -No vulnerabilities found. - - -windery/flasky -https://github.com/windery/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:28:44.538056 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kcunning/flask-class-c9 -https://github.com/kcunning/flask-class-c9 -Entry file: flask-class-c9/flaskclass/app/__init__.py -Scanned: 2016-10-20 11:28:49.150238 -Vulnerability 1: -File: flask-class-c9/flaskclass/app/views.py - > User input at line 38, trigger word ".data": - numbers = form.numbers.data -Reassigned in: - File: flask-class-c9/flaskclass/app/views.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form) - File: flask-class-c9/flaskclass/app/views.py - > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form) -File: flask-class-c9/flaskclass/app/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('game.html',game_nums=game_nums, player_nums=numbers, wins=wins) - - - -tangza/FlaskAPP -https://github.com/tangza/FlaskAPP -Entry file: FlaskAPP/myblog/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-20 11:28:57.063715 -No vulnerabilities found. - - -MarHelen/FlaskLogin -https://github.com/MarHelen/FlaskLogin -Entry file: FlaskLogin/sql_declarative.py -Scanned: 2016-10-20 11:29:04.753985 -Vulnerability 1: -File: FlaskLogin/first.py - > User input at line 63, trigger word "get(": - email = request.form.get('email') -Reassigned in: - File: FlaskLogin/first.py - > Line 70: user = User(email, request.form.get('pw')) -File: FlaskLogin/first.py - > reaches line 65, trigger word "filter(": - temp_user_set = User.query.filter(User.email == email).first() - - - -louiskun/flaskGIT -https://github.com/louiskun/flaskGIT -Entry file: flaskGIT/sessionmail.py -Scanned: 2016-10-20 11:29:05.540902 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskGIT/venv/lib/python2.7/genericpath.py - -narakai/FlaskDemo -https://github.com/narakai/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 11:29:06.068893 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sethblack/python-flask-pixel-tracking -https://github.com/sethblack/python-flask-pixel-tracking -Entry file: python-flask-pixel-tracking/pfpt/main.py -Scanned: 2016-10-20 11:29:07.538330 -No vulnerabilities found. - - -kloudsec/py-webkit2png-flask-api -https://github.com/kloudsec/py-webkit2png-flask-api -Entry file: py-webkit2png-flask-api/api/app.py -Scanned: 2016-10-20 11:29:09.490537 -Vulnerability 1: -File: py-webkit2png-flask-api/api/web.py - > User input at line 25, trigger word "get(": - url = request.args.get('url', None) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 2: -File: py-webkit2png-flask-api/api/web.py - > User input at line 26, trigger word "get(": - width = int(request.args.get('width', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 3: -File: py-webkit2png-flask-api/api/web.py - > User input at line 27, trigger word "get(": - height = int(request.args.get('height', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 4: -File: py-webkit2png-flask-api/api/web.py - > User input at line 28, trigger word "get(": - scale = float(request.args.get('scale', 0.5)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 5: -File: py-webkit2png-flask-api/api/web.py - > User input at line 25, trigger word "get(": - url = request.args.get('url', None) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 6: -File: py-webkit2png-flask-api/api/web.py - > User input at line 26, trigger word "get(": - width = int(request.args.get('width', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 7: -File: py-webkit2png-flask-api/api/web.py - > User input at line 27, trigger word "get(": - height = int(request.args.get('height', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 8: -File: py-webkit2png-flask-api/api/web.py - > User input at line 28, trigger word "get(": - scale = float(request.args.get('scale', 0.5)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - - - -Karambir-K/Flask-Intro -https://github.com/Karambir-K/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-20 11:29:10.017774 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -s-kovacevic/elearning-flask -https://github.com/s-kovacevic/elearning-flask -Entry file: elearning-flask/main.py -Scanned: 2016-10-20 11:29:11.603547 -Vulnerability 1: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 71, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'user.to_jsonapi()) - -Vulnerability 2: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[user.to_jsonapi() for user in user.get_many()]) - -Vulnerability 3: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 99, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'question.to_jsonapi()) - -Vulnerability 4: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 102, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[question.to_jsonapi() for question in question.get_many()]) - -Vulnerability 5: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 131, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'category.to_jsonapi()) - -Vulnerability 6: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 134, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[category.to_jsonapi() for category in category.get_many()]) - -Vulnerability 7: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 163, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'answer.to_jsonapi()) - -Vulnerability 8: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 166, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[answer.to_jsonapi() for answer in answer.get_many()]) - -Vulnerability 9: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 195, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'score.to_jsonapi()) - -Vulnerability 10: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 198, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[score.to_jsonapi() for score in score.get_many()]) - - - -logicalicy/flask_boostrap -https://github.com/logicalicy/flask_boostrap -Entry file: flask_boostrap/app/__init__.py -Scanned: 2016-10-20 11:29:13.016612 -No vulnerabilities found. - - -jeffreybergman/flask-blog -https://github.com/jeffreybergman/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:29:13.576835 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -MrLokans/discover_flask -https://github.com/MrLokans/discover_flask -Entry file: discover_flask/app.py -Scanned: 2016-10-20 11:29:15.123894 -No vulnerabilities found. - - -xiazhe/flask-demo -https://github.com/xiazhe/flask-demo -Entry file: None -Scanned: 2016-10-20 11:29:15.649241 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiazhe/flask-demo. - -nikoheikkila/flask-blog -https://github.com/nikoheikkila/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:29:16.200193 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Vatsalgame/flask-try -https://github.com/Vatsalgame/flask-try -Entry file: None -Scanned: 2016-10-20 11:29:16.900513 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Vatsalgame/flask-try. - -bbozhev/flask-test -https://github.com/bbozhev/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:29:17.464919 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -tim1978/flask-blog -https://github.com/tim1978/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:29:18.541706 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -danielcodes/flask-practice -https://github.com/danielcodes/flask-practice -Entry file: None -Scanned: 2016-10-20 11:29:19.068750 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danielcodes/flask-practice. - -zhiweicai/flask-hello -https://github.com/zhiweicai/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-20 11:29:19.587202 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GreenDragonSoft/refundmytrain-flask -https://github.com/GreenDragonSoft/refundmytrain-flask -Entry file: refundmytrain-flask/app.py -Scanned: 2016-10-20 11:29:25.039838 -No vulnerabilities found. - - -keithleit/flask-demo -https://github.com/keithleit/flask-demo -Entry file: None -Scanned: 2016-10-20 11:29:25.570197 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/keithleit/flask-demo. - -wstcpyt/flask-demo -https://github.com/wstcpyt/flask-demo -Entry file: None -Scanned: 2016-10-20 11:29:27.096606 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wstcpyt/flask-demo. - -geraldmc/flask-template -https://github.com/geraldmc/flask-template -Entry file: None -Scanned: 2016-10-20 11:29:28.621645 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/geraldmc/flask-template. - -jordo1ken/flask-fibonacci -https://github.com/jordo1ken/flask-fibonacci -Entry file: flask-fibonacci/Fibonacci.py -Scanned: 2016-10-20 11:29:39.087735 -No vulnerabilities found. - - -bodzio2k/flask-blueprint -https://github.com/bodzio2k/flask-blueprint -Entry file: flask-blueprint/api/__init__.py -Scanned: 2016-10-20 11:29:40.637159 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PeachDew/flask_tutorialwebapp -https://github.com/PeachDew/flask_tutorialwebapp -Entry file: flask_tutorialwebapp/app.py -Scanned: 2016-10-20 11:29:43.939182 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -ktomlee/flask_init -https://github.com/ktomlee/flask_init -Entry file: None -Scanned: 2016-10-20 11:29:44.468047 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ktomlee/flask_init. - -abunuwas/flask_experiments -https://github.com/abunuwas/flask_experiments -Entry file: flask_experiments/main.py -Scanned: 2016-10-20 11:29:48.469140 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Joryang/flask_videos -https://github.com/Joryang/flask_videos -Entry file: flask_videos/videos.py -Scanned: 2016-10-20 11:29:49.993244 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AvijitGhosh82/appengine_flask -https://github.com/AvijitGhosh82/appengine_flask -Entry file: appengine_flask/main.py -Scanned: 2016-10-20 11:29:59.111152 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sadev1/flask-demo -https://github.com/sadev1/flask-demo -Entry file: None -Scanned: 2016-10-20 11:30:05.623829 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sadev1/flask-demo. - -markleung1969/flask-base -https://github.com/markleung1969/flask-base -Entry file: None -Scanned: 2016-10-20 11:30:06.145568 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/markleung1969/flask-base. - -NickyThreeNames/flask_blog -https://github.com/NickyThreeNames/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:30:06.667816 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zmrfzn/Flask_Sample -https://github.com/zmrfzn/Flask_Sample -Entry file: Flask_Sample/app.py -Scanned: 2016-10-20 11:30:08.264379 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JesseLabruyere/flask_api -https://github.com/JesseLabruyere/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-20 11:30:08.791910 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -butovichev/flask-blog -https://github.com/butovichev/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:30:10.331258 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -pyx/flask-simplemde -https://github.com/pyx/flask-simplemde -Entry file: flask-simplemde/examples/simple/app.py -Scanned: 2016-10-20 11:30:12.523214 -No vulnerabilities found. - - -rholmes69/flasky2_1 -https://github.com/rholmes69/flasky2_1 -Entry file: flasky2_1/app/__init__.py -Scanned: 2016-10-20 11:30:16.063752 -Vulnerability 1: -File: flasky2_1/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 55: posts = pagination.items - File: flasky2_1/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2_1/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flasky2_1/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 45: show_followed = False - File: flasky2_1/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2_1/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flasky2_1/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 67: posts = pagination.items -File: flasky2_1/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flasky2_1/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flasky2_1/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 134: comments = pagination.items - File: flasky2_1/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flasky2_1/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flasky2_1/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flasky2_1/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2_1/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flasky2_1/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flasky2_1/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2_1/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flasky2_1/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 246: comments = pagination.items -File: flasky2_1/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flasky2_1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 23: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flasky2_1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 23: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flasky2_1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 23: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flasky2_1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 45: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flasky2_1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 45: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flasky2_1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 45: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flasky2_1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky2_1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky2_1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky2_1/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flasky2_1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky2_1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky2_1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky2_1/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flasky2_1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky2_1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky2_1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky2_1/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -ChellsChen/FlaskSocketIOChart -https://github.com/ChellsChen/FlaskSocketIOChart -Entry file: FlaskSocketIOChart/app/__init__.py -Scanned: 2016-10-20 11:30:18.045844 -Vulnerability 1: -File: FlaskSocketIOChart/app/main/routes.py - > User input at line 31, trigger word "get(": - name = session.get('name', '') -Reassigned in: - File: FlaskSocketIOChart/app/main/routes.py - > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskSocketIOChart/app/main/routes.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room) - -Vulnerability 2: -File: FlaskSocketIOChart/app/main/routes.py - > User input at line 32, trigger word "get(": - room = session.get('room', '') -Reassigned in: - File: FlaskSocketIOChart/app/main/routes.py - > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskSocketIOChart/app/main/routes.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room) - - - -jcerise/openspacesboard-python -https://github.com/jcerise/openspacesboard-python -Entry file: openspacesboard-python/osbp_app/__init__.py -Scanned: 2016-10-20 11:30:20.621628 -Vulnerability 1: -File: openspacesboard-python/osbp_app/openspacesboard.py - > User input at line 44, trigger word "get(": - me = github.get('user') -Reassigned in: - File: openspacesboard-python/osbp_app/openspacesboard.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: openspacesboard-python/osbp_app/openspacesboard.py - > reaches line 45, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(me.data) - -Vulnerability 2: -File: openspacesboard-python/osbp_app/openspacesboard.py - > User input at line 69, trigger word "get(": - me = github.get('user') -Reassigned in: - File: openspacesboard-python/osbp_app/openspacesboard.py - > Line 64: ret_MAYBE_FUNCTION_NAME = 'Access denied: reason=%s error=%s' % (request.args['error'], request.args['error_description']) -File: openspacesboard-python/osbp_app/openspacesboard.py - > reaches line 70, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(me.data) - -Vulnerability 3: -File: openspacesboard-python/osbp_app/mod_spaces/controllers.py - > User input at line 29, trigger word "get(": - space = ConferenceSpace.query.get(space_id) -Reassigned in: - File: openspacesboard-python/osbp_app/mod_spaces/controllers.py - > Line 32: space = dict(id=space.id, space_name=space.space_name, location_id=space.location_id, event_date=space.event_date, start_time=space.start_time, end_time=space.end_time) -File: openspacesboard-python/osbp_app/mod_spaces/controllers.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('space'space) - -Vulnerability 4: -File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > User input at line 39, trigger word "get(": - session = ConferenceSession.query.get(session_id) -Reassigned in: - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 42: session_space = session.space - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 43: session_location = session_space.location - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 44: timespan = 'start_time''end_time'session_space.start_timesession_space.end_time - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 45: session = dict(id=session.id, title=session.title, description=session.description, convener=session.convener, space_name=session_space.space_name, location=session_location.name, date=session_space.event_date, timespan=timespan) -File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('session'session) - -Vulnerability 5: -File: openspacesboard-python/osbp_app/mod_locations/controllers.py - > User input at line 27, trigger word "get(": - location = ConferenceLocation.query.get(location_id) -Reassigned in: - File: openspacesboard-python/osbp_app/mod_locations/controllers.py - > Line 30: location = dict(id=location.id, name=location.name) -File: openspacesboard-python/osbp_app/mod_locations/controllers.py - > reaches line 31, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('location'location) - - - -icecraft/ZhiHuDaemon -https://github.com/icecraft/ZhiHuDaemon -Entry file: ZhiHuDaemon/app/__init__.py -Scanned: 2016-10-20 11:30:22.296293 -Vulnerability 1: -File: ZhiHuDaemon/app/main/views.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 16: pagination = Question.query.order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False) - File: ZhiHuDaemon/app/main/views.py - > Line 19: questions = pagination.items -File: ZhiHuDaemon/app/main/views.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',questions=questions, pagination=pagination) - -Vulnerability 2: -File: ZhiHuDaemon/app/main/views.py - > User input at line 26, trigger word "form[": - keyword = '%' + request.form['search'] + '%' -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html') - File: ZhiHuDaemon/app/main/views.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html') -File: ZhiHuDaemon/app/main/views.py - > reaches line 30, trigger word "filter(": - pagination = Question.query.filter(Question.title.like(keyword)).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False) - -Vulnerability 3: -File: ZhiHuDaemon/app/main/views.py - > User input at line 29, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 33: questions = pagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html') - File: ZhiHuDaemon/app/main/views.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html') -File: ZhiHuDaemon/app/main/views.py - > reaches line 30, trigger word "filter(": - pagination = Question.query.filter(Question.title.like(keyword)).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False) - -Vulnerability 4: -File: ZhiHuDaemon/app/main/views.py - > User input at line 26, trigger word "form[": - keyword = '%' + request.form['search'] + '%' -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html') - File: ZhiHuDaemon/app/main/views.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html') -File: ZhiHuDaemon/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',questions=questions, pagination=pagination, keyword=keyword[1-1]) - -Vulnerability 5: -File: ZhiHuDaemon/app/main/views.py - > User input at line 29, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 33: questions = pagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html') - File: ZhiHuDaemon/app/main/views.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html') -File: ZhiHuDaemon/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',questions=questions, pagination=pagination, keyword=keyword[1-1]) - -Vulnerability 6: -File: ZhiHuDaemon/app/main/views.py - > User input at line 100, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 101: askpagination = Question.query.filter_by(author_id=user.id).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False) - File: ZhiHuDaemon/app/main/views.py - > Line 104: questions = askpagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 105: page = request.args.get('page', 1,type=int) - File: ZhiHuDaemon/app/main/views.py - > Line 106: anspagination = Answer.query.filter_by(author_id=user.id).order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False) - File: ZhiHuDaemon/app/main/views.py - > Line 109: questions = askpagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 110: answers = anspagination.items -File: ZhiHuDaemon/app/main/views.py - > reaches line 111, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, questions=questions, answers=answers, askpagination=askpagination, anspagination=anspagination) - -Vulnerability 7: -File: ZhiHuDaemon/app/main/views.py - > User input at line 105, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 100: page = request.args.get('page', 1,type=int) - File: ZhiHuDaemon/app/main/views.py - > Line 101: askpagination = Question.query.filter_by(author_id=user.id).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False) - File: ZhiHuDaemon/app/main/views.py - > Line 104: questions = askpagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 106: anspagination = Answer.query.filter_by(author_id=user.id).order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False) - File: ZhiHuDaemon/app/main/views.py - > Line 109: questions = askpagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 110: answers = anspagination.items -File: ZhiHuDaemon/app/main/views.py - > reaches line 111, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, questions=questions, answers=answers, askpagination=askpagination, anspagination=anspagination) - -Vulnerability 8: -File: ZhiHuDaemon/app/main/views.py - > User input at line 145, trigger word "get(": - answer_id = request.args.get('answer_id', -1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 147: answer = Answer.query.filter_by(id=answer_id) - File: ZhiHuDaemon/app/main/views.py - > Line 150: answer = Answer(answer=answerForm.body.data, author=current_user._get_current_object(), authorname=current_user.username, question=question) - File: ZhiHuDaemon/app/main/views.py - > Line 159: comment = Comment(comment=commentForm.body.data, author=current_user._get_current_object(), authorname=current_user.username, answer=answer) - File: ZhiHuDaemon/app/main/views.py - > Line 155: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.question',id=id)) - File: ZhiHuDaemon/app/main/views.py - > Line 164: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.question',id=id)) -File: ZhiHuDaemon/app/main/views.py - > reaches line 168, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('question.html',question=question, asker=asker, answerForm=answerForm, answers=answers, comments=comments, commentForm=commentForm, answer_id=answer_id) - - - -AntonisFK/Login_registration_Flask -https://github.com/AntonisFK/Login_registration_Flask -Entry file: None -Scanned: 2016-10-20 11:30:23.309841 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AntonisFK/Login_registration_Flask. - -jeseon/flask-by-example -https://github.com/jeseon/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 11:30:24.482230 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liuenyan/micro-flask-blog -https://github.com/liuenyan/micro-flask-blog -Entry file: micro-flask-blog/app/__init__.py -Scanned: 2016-10-20 11:30:26.028966 -Vulnerability 1: -File: micro-flask-blog/app/main/views.py - > User input at line 17, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: micro-flask-blog/app/main/views.py - > Line 18: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: micro-flask-blog/app/main/views.py - > Line 19: posts = pagination.items -File: micro-flask-blog/app/main/views.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination) - -Vulnerability 2: -File: micro-flask-blog/app/main/views.py - > User input at line 124, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: micro-flask-blog/app/main/views.py - > Line 125: pagination = Post.query.filter_by(category_id=category_id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: micro-flask-blog/app/main/views.py - > Line 126: posts = pagination.items -File: micro-flask-blog/app/main/views.py - > reaches line 127, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.html',posts=posts, pagination=pagination, username=username, category_id=category_id) - - - -maxidrum/Flask_and_Mongo -https://github.com/maxidrum/Flask_and_Mongo -Entry file: Flask_and_Mongo/application/__init__.py -Scanned: 2016-10-20 11:30:26.552250 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mdublin/Flask-SPA-API-Template -https://github.com/mdublin/Flask-SPA-API-Template -Entry file: None -Scanned: 2016-10-20 11:30:28.081121 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -keimos/flask-rest-sql -https://github.com/keimos/flask-rest-sql -Entry file: flask-rest-sql/app.py -Scanned: 2016-10-20 11:30:30.577361 -No vulnerabilities found. - - -jeffreybergman/flask-hello-world -https://github.com/jeffreybergman/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:30:39.139076 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -zolaneta/todo_flask_application -https://github.com/zolaneta/todo_flask_application -Entry file: None -Scanned: 2016-10-20 11:30:40.678968 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zolaneta/todo_flask_application. - -baskervilski/flask-hello-world -https://github.com/baskervilski/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:30:42.253347 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -Bbouley/flask-by-example -https://github.com/Bbouley/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 11:30:44.914213 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wilbert-abreu/realtime_slack_flask_app -https://github.com/wilbert-abreu/realtime_slack_flask_app -Entry file: None -Scanned: 2016-10-20 11:30:45.417335 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ellachao/Flask_GmailAPI_Example -https://github.com/ellachao/Flask_GmailAPI_Example -Entry file: Flask_GmailAPI_Example/main.py -Scanned: 2016-10-20 11:30:48.936294 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NJIT-SIG-WEBDEV/Flask-URL-Shortner -https://github.com/NJIT-SIG-WEBDEV/Flask-URL-Shortner -Entry file: Flask-URL-Shortner/app.py -Scanned: 2016-10-20 11:30:52.043852 -Vulnerability 1: -File: Flask-URL-Shortner/app.py - > User input at line 30, trigger word ".data": - site_id = mongo.db.links.find_one_or_404('url'form.url.data)['site_id'] -Reassigned in: - File: Flask-URL-Shortner/app.py - > Line 33: site_id = '' - File: Flask-URL-Shortner/app.py - > Line 35: site_id += random.choice(string.ascii_letters) - File: Flask-URL-Shortner/app.py - > Line 37: data = 'site_id''url'site_idform.url.data -File: Flask-URL-Shortner/app.py - > reaches line 43, trigger word "url_for(": - flash('URL created! {0} redirects to {1}.'.format(url_for('homepage',_external=True) + site_id, form.url.data)) - -Vulnerability 2: -File: Flask-URL-Shortner/app.py - > User input at line 30, trigger word ".data": - site_id = mongo.db.links.find_one_or_404('url'form.url.data)['site_id'] -Reassigned in: - File: Flask-URL-Shortner/app.py - > Line 33: site_id = '' - File: Flask-URL-Shortner/app.py - > Line 35: site_id += random.choice(string.ascii_letters) - File: Flask-URL-Shortner/app.py - > Line 37: data = 'site_id''url'site_idform.url.data -File: Flask-URL-Shortner/app.py - > reaches line 43, trigger word "flash(": - flash('URL created! {0} redirects to {1}.'.format(url_for('homepage',_external=True) + site_id, form.url.data)) - - - -hilmarh/island-python-flask-example -https://github.com/hilmarh/island-python-flask-example -Entry file: island-python-flask-example/app/__init__.py -Scanned: 2016-10-20 11:30:59.617350 -No vulnerabilities found. - - -dv3/sample-Flask-Application -https://github.com/dv3/sample-Flask-Application -Entry file: None -Scanned: 2016-10-20 11:31:06.149270 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dv3/sample-Flask-Application. - -mml1/flask_multiple_forms -https://github.com/mml1/flask_multiple_forms -Entry file: flask_multiple_forms/server.py -Scanned: 2016-10-20 11:31:07.458041 -No vulnerabilities found. - - -jideobs/flask-gae-ndb-starter -https://github.com/jideobs/flask-gae-ndb-starter -Entry file: flask-gae-ndb-starter/server/main.py -Scanned: 2016-10-20 11:31:07.985795 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marcabomb/flask_hello_world -https://github.com/marcabomb/flask_hello_world -Entry file: None -Scanned: 2016-10-20 11:31:09.003945 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/marcabomb/flask_hello_world. - -kevin-js/azure-flask-tutorial -https://github.com/kevin-js/azure-flask-tutorial -Entry file: azure-flask-tutorial/run.py -Scanned: 2016-10-20 11:31:11.314240 -No vulnerabilities found. - - -ShawnPengxy/Flask-madeBlog -https://github.com/ShawnPengxy/Flask-madeBlog -Entry file: Flask-madeBlog/site-packages/flask/sessions.py -Scanned: 2016-10-20 11:31:21.628231 -No vulnerabilities found. - - -vinayraghavan/pyacacemy-flask-workshop -https://github.com/vinayraghavan/pyacacemy-flask-workshop -Entry file: pyacacemy-flask-workshop/bookmarks.py -Scanned: 2016-10-20 11:31:23.009081 -No vulnerabilities found. - - -drbrightside/first-flask-app -https://github.com/drbrightside/first-flask-app -Entry file: None -Scanned: 2016-10-20 11:31:23.526823 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -D10221/gae_flask_ndb_test -https://github.com/D10221/gae_flask_ndb_test -Entry file: gae_flask_ndb_test/main.py -Scanned: 2016-10-20 11:31:24.939739 -No vulnerabilities found. - - -micahcourey/FirstFlaskApp -https://github.com/micahcourey/FirstFlaskApp -Entry file: FirstFlaskApp/flask_app.py -Scanned: 2016-10-20 11:31:26.221159 -No vulnerabilities found. - - -commandknight/cs125-fooddy-flask -https://github.com/commandknight/cs125-fooddy-flask -Entry file: cs125-fooddy-flask/fooddy2.py -Scanned: 2016-10-20 11:31:32.182950 -Vulnerability 1: -File: cs125-fooddy-flask/fooddy2.py - > User input at line 177, trigger word "get(": - long = request.form.get('current_location_longitude') -Reassigned in: - File: cs125-fooddy-flask/fooddy2.py - > Line 195: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address)) - File: cs125-fooddy-flask/fooddy2.py - > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location) -File: cs125-fooddy-flask/fooddy2.py - > reaches line 185, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)])) - -Vulnerability 2: -File: cs125-fooddy-flask/fooddy2.py - > User input at line 178, trigger word "get(": - lat = request.form.get('current_location_latitude') -Reassigned in: - File: cs125-fooddy-flask/fooddy2.py - > Line 195: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address)) - File: cs125-fooddy-flask/fooddy2.py - > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location) -File: cs125-fooddy-flask/fooddy2.py - > reaches line 185, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)])) - -Vulnerability 3: -File: cs125-fooddy-flask/fooddy2.py - > User input at line 191, trigger word "form[": - a1 = request.form['addressline1'] -Reassigned in: - File: cs125-fooddy-flask/fooddy2.py - > Line 194: address = a1 + ' ' + city + ' ' + state - File: cs125-fooddy-flask/fooddy2.py - > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location) - File: cs125-fooddy-flask/fooddy2.py - > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)])) -File: cs125-fooddy-flask/fooddy2.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address)) - -Vulnerability 4: -File: cs125-fooddy-flask/fooddy2.py - > User input at line 192, trigger word "form[": - city = request.form['addresscity'] -Reassigned in: - File: cs125-fooddy-flask/fooddy2.py - > Line 194: address = a1 + ' ' + city + ' ' + state - File: cs125-fooddy-flask/fooddy2.py - > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location) - File: cs125-fooddy-flask/fooddy2.py - > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)])) -File: cs125-fooddy-flask/fooddy2.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address)) - -Vulnerability 5: -File: cs125-fooddy-flask/fooddy2.py - > User input at line 193, trigger word "form[": - state = request.form['addressstate'] -Reassigned in: - File: cs125-fooddy-flask/fooddy2.py - > Line 194: address = a1 + ' ' + city + ' ' + state - File: cs125-fooddy-flask/fooddy2.py - > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location) - File: cs125-fooddy-flask/fooddy2.py - > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)])) -File: cs125-fooddy-flask/fooddy2.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address)) - - - -GreenDragonSoft/flask-heroku-template -https://github.com/GreenDragonSoft/flask-heroku-template -Entry file: flask-heroku-template/app.py -Scanned: 2016-10-20 11:31:33.633115 -No vulnerabilities found. - - -rfmapp/TheFlaskMegaTutorial -https://github.com/rfmapp/TheFlaskMegaTutorial -Entry file: None -Scanned: 2016-10-20 11:31:34.183319 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -candyer/Flask -https://github.com/candyer/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:31:36.339790 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scripterkaran/flask -https://github.com/scripterkaran/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:31:36.922014 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -JadyLiu/flask -https://github.com/JadyLiu/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:31:37.512160 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -itsrifat/flask-celery-docker-scale -https://github.com/itsrifat/flask-celery-docker-scale -Entry file: flask-celery-docker-scale/flask-app/app.py -Scanned: 2016-10-20 11:31:38.807388 -No vulnerabilities found. - - -sinscary/Flask-Social-Networking -https://github.com/sinscary/Flask-Social-Networking -Entry file: Flask-Social-Networking/app.py -Scanned: 2016-10-20 11:31:40.714757 -Vulnerability 1: -File: Flask-Social-Networking/app.py - > User input at line 111, trigger word "get(": - user = models.User.select().where(models.User.username ** username).get() -Reassigned in: - File: Flask-Social-Networking/app.py - > Line 118: user = current_user -File: Flask-Social-Networking/app.py - > reaches line 121, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user) - -Vulnerability 2: -File: Flask-Social-Networking/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 146, trigger word "flash(": - flash('You are now following {}'.format(to_user.username), 'success') - -Vulnerability 3: -File: Flask-Social-Networking/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 147, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 4: -File: Flask-Social-Networking/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 147, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 5: -File: Flask-Social-Networking/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 165, trigger word "flash(": - flash('You have unfollowed {}'.format(to_user.username), 'success') - -Vulnerability 6: -File: Flask-Social-Networking/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 166, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 7: -File: Flask-Social-Networking/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 166, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - - - -osuosl/timesync-frontend-flask -https://github.com/osuosl/timesync-frontend-flask -Entry file: None -Scanned: 2016-10-20 11:31:41.272318 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/osuosl/timesync-frontend-flask. - -CBR09/flaskapp -https://github.com/CBR09/flaskapp -Entry file: None -Scanned: 2016-10-20 11:31:41.785892 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/CBR09/flaskapp. - -narakai/flaskblog -https://github.com/narakai/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 11:31:42.310753 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -josepablob/flasktaskr -https://github.com/josepablob/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:31:42.821776 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wangduanyang/flasky -https://github.com/wangduanyang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:31:45.340998 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adrianneperedo/flaskr -https://github.com/adrianneperedo/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:31:45.849505 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -darrenhankins/flaskr -https://github.com/darrenhankins/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:31:49.367979 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mirukushake/flaskr -https://github.com/mirukushake/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:31:50.879918 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Looncall/Flaskr -https://github.com/Looncall/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 11:31:59.393682 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jeffreybergman/flasktaskr -https://github.com/jeffreybergman/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:32:06.902508 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -marcabomb/flasktaskr -https://github.com/marcabomb/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:32:07.417916 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -czy1238677/flasky -https://github.com/czy1238677/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:32:08.934428 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Pink-Moon/flaskr -https://github.com/Pink-Moon/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:32:09.454304 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AlexGrek/FlaskLib -https://github.com/AlexGrek/FlaskLib -Entry file: None -Scanned: 2016-10-20 11:32:09.976409 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -daveweber/FlaskBar -https://github.com/daveweber/FlaskBar -Entry file: FlaskBar/index.py -Scanned: 2016-10-20 11:32:11.489396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danleyb2/flaskMe -https://github.com/danleyb2/flaskMe -Entry file: flaskMe/flaskREST.py -Scanned: 2016-10-20 11:32:12.840981 -Vulnerability 1: -File: flaskMe/flaskREST.py - > User input at line 73, trigger word "get(": - name = data.get('name') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 76, trigger word "execute(": - db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color]) - -Vulnerability 2: -File: flaskMe/flaskREST.py - > User input at line 74, trigger word "get(": - color = data.get('color') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 76, trigger word "execute(": - db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color]) - -Vulnerability 3: -File: flaskMe/flaskREST.py - > User input at line 73, trigger word "get(": - name = data.get('name') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 78, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color)) - -Vulnerability 4: -File: flaskMe/flaskREST.py - > User input at line 74, trigger word "get(": - color = data.get('color') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 78, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color)) - - - -Rikka-chan/flaskCharts -https://github.com/Rikka-chan/flaskCharts -Entry file: None -Scanned: 2016-10-20 11:32:22.423328 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mcmcgonagle/flasktaskr2 -https://github.com/mcmcgonagle/flasktaskr2 -Entry file: flasktaskr2/project/views.py -Scanned: 2016-10-20 11:32:24.792754 -No vulnerabilities found. - - -AlexFransis/FlaskyProject -https://github.com/AlexFransis/FlaskyProject -Entry file: FlaskyProject/app/__init__.py -Scanned: 2016-10-20 11:32:26.660184 -No vulnerabilities found. - - -bunkdeath/FlaskTemplate -https://github.com/bunkdeath/FlaskTemplate -Entry file: FlaskTemplate/application.py -Scanned: 2016-10-20 11:32:27.957444 -No vulnerabilities found. - - -zding5/FlaskDemo -https://github.com/zding5/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 11:32:28.476896 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -diggzhang/flaskMaze -https://github.com/diggzhang/flaskMaze -Entry file: None -Scanned: 2016-10-20 11:32:33.022765 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/diggzhang/flaskMaze. - -narakai/FlaskDemo -https://github.com/narakai/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 11:32:34.542909 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -deanmax/FlaskAPP -https://github.com/deanmax/FlaskAPP -Entry file: FlaskAPP/app/__init__.py -Scanned: 2016-10-20 11:32:41.372486 -No vulnerabilities found. - - -hugoantunes/base-flask -https://github.com/hugoantunes/base-flask -Entry file: base-flask/service/__init__.py -Scanned: 2016-10-20 11:32:43.163571 -No vulnerabilities found. - - -haburibe/docker-flask -https://github.com/haburibe/docker-flask -Entry file: docker-flask/main.py -Scanned: 2016-10-20 11:32:44.454578 -No vulnerabilities found. - - -timyi1212/flask-demo -https://github.com/timyi1212/flask-demo -Entry file: None -Scanned: 2016-10-20 11:32:44.973146 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/timyi1212/flask-demo. - -mmingle/flask-blog -https://github.com/mmingle/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:32:45.513597 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -namickey/hello-flask -https://github.com/namickey/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 11:32:46.106239 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -justinwp/flask-urs -https://github.com/justinwp/flask-urs -Entry file: flask-urs/tests/conftest.py -Scanned: 2016-10-20 11:32:47.731228 -No vulnerabilities found. - - -krisekenes/flask_deployment -https://github.com/krisekenes/flask_deployment -Entry file: flask_deployment/server.py -Scanned: 2016-10-20 11:32:49.043036 -No vulnerabilities found. - - -SawHigh/flask_cdn -https://github.com/SawHigh/flask_cdn -Entry file: flask_cdn/cdn.py -Scanned: 2016-10-20 11:32:50.835814 -No vulnerabilities found. - - -crq/flask-scaffold -https://github.com/crq/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-20 11:32:51.414483 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asielen/Woodles_Flask -https://github.com/asielen/Woodles_Flask -Entry file: Woodles_Flask/app/__init__.py -Scanned: 2016-10-20 11:32:53.300673 -Vulnerability 1: -File: Woodles_Flask/app/views/app_views.py - > User input at line 22, trigger word "get(": - current_card = Card.query.get(card_id) -File: Woodles_Flask/app/views/app_views.py - > reaches line 23, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string)) - -Vulnerability 2: -File: Woodles_Flask/app/views/app_views.py - > User input at line 22, trigger word "get(": - current_card = Card.query.get(card_id) -File: Woodles_Flask/app/views/app_views.py - > reaches line 23, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string)) - - - -honmaple/flask-word -https://github.com/honmaple/flask-word -Entry file: flask-word/app/__init__.py -Scanned: 2016-10-20 11:32:56.483608 -Vulnerability 1: -File: flask-word/app/paginate/views.py - > User input at line 42, trigger word "get(": - page = is_num(request.args.get('page')) -Reassigned in: - File: flask-word/app/paginate/views.py - > Line 43: topics = Topic.query.paginate(page, app.config['PER_PAGE'],error_out=True) -File: flask-word/app/paginate/views.py - > reaches line 44, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('page/page.html',topics=topics) - -Vulnerability 2: -File: flask-word/app/count/views.py - > User input at line 17, trigger word "cookies[": - count = int(request.cookies['count']) + 1 -Reassigned in: - File: flask-word/app/count/views.py - > Line 19: count = 0 - File: flask-word/app/count/views.py - > Line 20: response = make_response(str(count)) - File: flask-word/app/count/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = response -File: flask-word/app/count/views.py - > reaches line 21, trigger word "set_cookie(": - response.set_cookie('count',value=str(count), max_age=1800) - -Vulnerability 3: -File: flask-word/app/chat/views.py - > User input at line 38, trigger word "get(": - username = session.get('username', '') -Reassigned in: - File: flask-word/app/chat/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-word/app/chat/views.py - > reaches line 42, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat/chat.html',username=username, room=room) - -Vulnerability 4: -File: flask-word/app/chat/views.py - > User input at line 39, trigger word "get(": - room = session.get('room', '') -Reassigned in: - File: flask-word/app/chat/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-word/app/chat/views.py - > reaches line 42, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat/chat.html',username=username, room=room) - - - -marcabomb/flask-blog -https://github.com/marcabomb/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:32:57.071474 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -studiomezklador/flask_api -https://github.com/studiomezklador/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-20 11:32:59.612666 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rinechran/flask-tutorial -https://github.com/rinechran/flask-tutorial -Entry file: None -Scanned: 2016-10-20 11:33:07.149002 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Savvis/flask-phonebook -https://github.com/Savvis/flask-phonebook -Entry file: flask-phonebook/app/__init__.py -Scanned: 2016-10-20 11:33:10.132579 -No vulnerabilities found. - - -a-r-g-v/flask-template -https://github.com/a-r-g-v/flask-template -Entry file: None -Scanned: 2016-10-20 11:33:10.650112 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/a-r-g-v/flask-template. - -aksareen/Flask-learn -https://github.com/aksareen/Flask-learn -Entry file: Flask-learn/app.py -Scanned: 2016-10-20 11:33:11.186462 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aqisnotliquid/flask_rpg -https://github.com/aqisnotliquid/flask_rpg -Entry file: flask_rpg/app/__init__.py -Scanned: 2016-10-20 11:33:12.664554 -No vulnerabilities found. - - -jordo1ken/flask-fibonacci -https://github.com/jordo1ken/flask-fibonacci -Entry file: flask-fibonacci/Fibonacci.py -Scanned: 2016-10-20 11:33:14.064492 -No vulnerabilities found. - - -bodzio2k/flask-blueprint -https://github.com/bodzio2k/flask-blueprint -Entry file: flask-blueprint/api/__init__.py -Scanned: 2016-10-20 11:33:22.615350 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PeachDew/flask_tutorialwebapp -https://github.com/PeachDew/flask_tutorialwebapp -Entry file: flask_tutorialwebapp/app.py -Scanned: 2016-10-20 11:33:25.357385 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -Kriordan/flask-blog -https://github.com/Kriordan/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:33:25.906311 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -textbook/flask-forecaster -https://github.com/textbook/flask-forecaster -Entry file: flask-forecaster/flask_forecaster/flask_app.py -Scanned: 2016-10-20 11:33:28.678890 -Vulnerability 1: -File: flask-forecaster/flask_forecaster/flask_app.py - > User input at line 34, trigger word ".data": - token = form.token.data -Reassigned in: - File: flask-forecaster/flask_forecaster/flask_app.py - > Line 36: projects = Tracker.validate_token(token) - File: flask-forecaster/flask_forecaster/flask_app.py - > Line 38: session['token'] = token - File: flask-forecaster/flask_forecaster/flask_app.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, version=__version__) -File: flask-forecaster/flask_forecaster/flask_app.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, projects=projects, version=__version__) - -Vulnerability 2: -File: flask-forecaster/flask_forecaster/flask_app.py - > User input at line 52, trigger word "get(": - token = session.get('token') -Reassigned in: - File: flask-forecaster/flask_forecaster/flask_app.py - > Line 55: api = Tracker(token) -File: flask-forecaster/flask_forecaster/flask_app.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('project.html',project=api.get_project(project_id)) - - - -nava45/flask-routelogger -https://github.com/nava45/flask-routelogger -Entry file: flask-routelogger/flask_app_example.py -Scanned: 2016-10-20 11:33:29.220522 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MattHealy/flask-skeleton -https://github.com/MattHealy/flask-skeleton -Entry file: None -Scanned: 2016-10-20 11:33:33.747285 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MattHealy/flask-skeleton. - -Xavier-Lam/flask-wechat -https://github.com/Xavier-Lam/flask-wechat -Entry file: flask-wechat/fenghuang/__init__.py -Scanned: 2016-10-20 11:33:35.276935 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Ty-WDFW/Flask-Tickets -https://github.com/Ty-WDFW/Flask-Tickets -Entry file: Flask-Tickets/main.py -Scanned: 2016-10-20 11:33:36.613595 -Vulnerability 1: -File: Flask-Tickets/main.py - > User input at line 15, trigger word "form[": - fishticket = request.form['text'] -Reassigned in: - File: Flask-Tickets/main.py - > Line 16: response = get_fish_ticket(fishticket) -File: Flask-Tickets/main.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('bioinfo.html',entries=response, ticket=fishticket) - - - -makudesu/flask-thesis -https://github.com/makudesu/flask-thesis -Entry file: flask-thesis/bnhs.py -Scanned: 2016-10-20 11:33:42.137409 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ivanenko/flask-webcrawler -https://github.com/ivanenko/flask-webcrawler -Entry file: flask-webcrawler/ww2.py -Scanned: 2016-10-20 11:33:42.663527 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pyx/flask-simplemde -https://github.com/pyx/flask-simplemde -Entry file: flask-simplemde/examples/simple/app.py -Scanned: 2016-10-20 11:33:45.835218 -No vulnerabilities found. - - -kubabu/flask_blog -https://github.com/kubabu/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:33:46.830692 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MichaelDaniello/LearnFlask -https://github.com/MichaelDaniello/LearnFlask -Entry file: LearnFlask/ex1_URL解析.py -Scanned: 2016-10-20 11:33:47.378193 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bplabombarda/fdr -https://github.com/bplabombarda/fdr -Entry file: fdr/server/__init__.py -Scanned: 2016-10-20 11:33:51.260658 -No vulnerabilities found. - - -gzxultra/FlaskLoginManagement -https://github.com/gzxultra/FlaskLoginManagement -Entry file: FlaskLoginManagement/app/__init__.py -Scanned: 2016-10-20 11:33:51.806615 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -metajemo/testapp -https://github.com/metajemo/testapp -Entry file: testapp/testapp.py -Scanned: 2016-10-20 11:33:52.335630 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -victorcuervo/FlaskMongoDB -https://github.com/victorcuervo/FlaskMongoDB -Entry file: FlaskMongoDB/welcome.py -Scanned: 2016-10-20 11:33:53.738447 -No vulnerabilities found. - - -ChellsChen/FlaskSocketIOChart -https://github.com/ChellsChen/FlaskSocketIOChart -Entry file: FlaskSocketIOChart/app/__init__.py -Scanned: 2016-10-20 11:33:55.673233 -Vulnerability 1: -File: FlaskSocketIOChart/app/main/routes.py - > User input at line 31, trigger word "get(": - name = session.get('name', '') -Reassigned in: - File: FlaskSocketIOChart/app/main/routes.py - > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskSocketIOChart/app/main/routes.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room) - -Vulnerability 2: -File: FlaskSocketIOChart/app/main/routes.py - > User input at line 32, trigger word "get(": - room = session.get('room', '') -Reassigned in: - File: FlaskSocketIOChart/app/main/routes.py - > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskSocketIOChart/app/main/routes.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room) - - - -sasha42/Mailchimp-utility -https://github.com/sasha42/Mailchimp-utility -Entry file: None -Scanned: 2016-10-20 11:33:56.191789 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sasha42/Mailchimp-utility. - -auliude/flask_hello_world -https://github.com/auliude/flask_hello_world -Entry file: None -Scanned: 2016-10-20 11:33:56.699940 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/auliude/flask_hello_world. - -yogeshdixit41/PyFlaskWebApp -https://github.com/yogeshdixit41/PyFlaskWebApp -Entry file: PyFlaskWebApp/hello.py -Scanned: 2016-10-20 11:33:57.347146 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liuenyan/micro-flask-blog -https://github.com/liuenyan/micro-flask-blog -Entry file: micro-flask-blog/app/__init__.py -Scanned: 2016-10-20 11:34:00.858228 -Vulnerability 1: -File: micro-flask-blog/app/main/views.py - > User input at line 17, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: micro-flask-blog/app/main/views.py - > Line 18: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: micro-flask-blog/app/main/views.py - > Line 19: posts = pagination.items -File: micro-flask-blog/app/main/views.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination) - -Vulnerability 2: -File: micro-flask-blog/app/main/views.py - > User input at line 124, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: micro-flask-blog/app/main/views.py - > Line 125: pagination = Post.query.filter_by(category_id=category_id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: micro-flask-blog/app/main/views.py - > Line 126: posts = pagination.items -File: micro-flask-blog/app/main/views.py - > reaches line 127, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.html',posts=posts, pagination=pagination, username=username, category_id=category_id) - - - -znss1989/flask_blog_ex -https://github.com/znss1989/flask_blog_ex -Entry file: flask_blog_ex/blog.py -Scanned: 2016-10-20 11:34:08.243303 -No vulnerabilities found. - - -rtorres90/rest-flask-tutorial -https://github.com/rtorres90/rest-flask-tutorial -Entry file: rest-flask-tutorial/rest_flask/endpoints_project2sol.py -Scanned: 2016-10-20 11:34:08.944756 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jz314/flask-demo-copy -https://github.com/jz314/flask-demo-copy -Entry file: None -Scanned: 2016-10-20 11:34:09.461886 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jz314/flask-demo-copy. - -willelson/flask-app-template -https://github.com/willelson/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-20 11:34:11.007553 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -acbart/lti-flask-skeleton -https://github.com/acbart/lti-flask-skeleton -Entry file: lti-flask-skeleton/main.py -Scanned: 2016-10-20 11:34:11.548788 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GreatBedAwake/flask_lab_web -https://github.com/GreatBedAwake/flask_lab_web -Entry file: flask_lab_web/app/__init__.py -Scanned: 2016-10-20 11:34:13.131349 -Vulnerability 1: -File: flask_lab_web/app/views.py - > User input at line 46, trigger word "form[": - find_component = request.form['find_component'] -Reassigned in: - File: flask_lab_web/app/views.py - > Line 47: dates = select_where_db(find_component) - File: flask_lab_web/app/views.py - > Line 54: dates = select_data() - File: flask_lab_web/app/views.py - > Line 56: dates = select_data() -File: flask_lab_web/app/views.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show.html',component=dates) - - - -Derfirm/hello-docker-flask -https://github.com/Derfirm/hello-docker-flask -Entry file: hello-docker-flask/app.py -Scanned: 2016-10-20 11:34:14.424947 -No vulnerabilities found. - - -arvvvs/Flask-Practice-Metis-Delivery -https://github.com/arvvvs/Flask-Practice-Metis-Delivery -Entry file: Flask-Practice-Metis-Delivery/app.py -Scanned: 2016-10-20 11:34:25.607792 -Vulnerability 1: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 30, trigger word "form(": - form = request_phone_form() -Reassigned in: - File: Flask-Practice-Metis-Delivery/app.py - > Line 32: session['phone'] = form.phone.data - File: Flask-Practice-Metis-Delivery/app.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('lookup')) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form) - -Vulnerability 2: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 57, trigger word "get(": - address = request.args.get('address', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 65, trigger word "execute(": - cur.execute('INSERT INTO tbl_deliveries (customer_name, delivery_status, customer_address, delivery_person) VALUES("' + name + '", "' + status + '","' + address + '","' + driver + '");') - -Vulnerability 3: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 59, trigger word "get(": - name = request.args.get('name', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 65, trigger word "execute(": - cur.execute('INSERT INTO tbl_deliveries (customer_name, delivery_status, customer_address, delivery_person) VALUES("' + name + '", "' + status + '","' + address + '","' + driver + '");') - -Vulnerability 4: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 127, trigger word "form[": - _phone = request.form['submitPhone'] -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 128, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('lookup.html',phone=_phone) - -Vulnerability 5: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 148, trigger word "get(": - phone = request.args.get('phone', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - -Vulnerability 6: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 149, trigger word "get(": - name = request.args.get('name', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - -Vulnerability 7: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 150, trigger word "get(": - address = request.args.get('address', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - -Vulnerability 8: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 151, trigger word "get(": - phone_value = request.args.get('phone_value', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - - - -nosuchip/flask-video-streaming -https://github.com/nosuchip/flask-video-streaming -Entry file: flask-video-streaming/main.py -Scanned: 2016-10-20 11:34:29.153655 -No vulnerabilities found. - - -VistaarJ/REST-API-Using-Flask- -https://github.com/VistaarJ/REST-API-Using-Flask- -Entry file: REST-API-Using-Flask-/app.py -Scanned: 2016-10-20 11:34:37.600063 -No vulnerabilities found. - - -n-batalha/flask-api-template -https://github.com/n-batalha/flask-api-template -Entry file: flask-api-template/web/journey_predict/__init__.py -Scanned: 2016-10-20 11:34:39.042547 -No vulnerabilities found. - - -knight-zhou/Web.py_Flask -https://github.com/knight-zhou/Web.py_Flask -Entry file: None -Scanned: 2016-10-20 11:34:39.631672 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dv3/sample-Flask-Application -https://github.com/dv3/sample-Flask-Application -Entry file: None -Scanned: 2016-10-20 11:34:40.167600 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dv3/sample-Flask-Application. - -blackmad/flask-google-login-example -https://github.com/blackmad/flask-google-login-example -Entry file: flask-google-login-example/main.py -Scanned: 2016-10-20 11:34:40.686808 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DEV3L/openshift-python-flask-example -https://github.com/DEV3L/openshift-python-flask-example -Entry file: openshift-python-flask-example/wsgi/run.py -Scanned: 2016-10-20 11:34:43.084094 -No vulnerabilities found. - - -mml1/flask_multiple_forms -https://github.com/mml1/flask_multiple_forms -Entry file: flask_multiple_forms/server.py -Scanned: 2016-10-20 11:34:44.382890 -No vulnerabilities found. - - -jideobs/flask-gae-ndb-starter -https://github.com/jideobs/flask-gae-ndb-starter -Entry file: flask-gae-ndb-starter/server/main.py -Scanned: 2016-10-20 11:34:44.903432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tim9Liu9/Flask_Bootstrap_Blog -https://github.com/Tim9Liu9/Flask_Bootstrap_Blog -Entry file: Flask_Bootstrap_Blog/doc/app.py -Scanned: 2016-10-20 11:34:48.101899 -No vulnerabilities found. - - -cerealcake/flask-ldap3 -https://github.com/cerealcake/flask-ldap3 -Entry file: flask-ldap3/app.py -Scanned: 2016-10-20 11:34:49.498520 -No vulnerabilities found. - - -willelson/flask-login-template -https://github.com/willelson/flask-login-template -Entry file: None -Scanned: 2016-10-20 11:34:50.143051 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zolaneta/books_flask_app -https://github.com/zolaneta/books_flask_app -Entry file: None -Scanned: 2016-10-20 11:34:50.652801 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zolaneta/books_flask_app. - -Anivarth/quiz-python-flask -https://github.com/Anivarth/quiz-python-flask -Entry file: quiz-python-flask/quiz.py -Scanned: 2016-10-20 11:34:52.986579 -No vulnerabilities found. - - -richyvk/flask-url-shortener -https://github.com/richyvk/flask-url-shortener -Entry file: flask-url-shortener/app.py -Scanned: 2016-10-20 11:34:53.523031 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -susantshrestha/flask -https://github.com/susantshrestha/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:34:57.058970 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -SunchunZhou/flask -https://github.com/SunchunZhou/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:34:57.659551 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -zbc/Flask -https://github.com/zbc/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:34:58.168746 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cobra0914/flask -https://github.com/cobra0914/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:35:00.751420 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -k-hung/FlaskApp -https://github.com/k-hung/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 11:35:09.827157 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -w84miracle/flask-sb-admin2 -https://github.com/w84miracle/flask-sb-admin2 -Entry file: flask-sb-admin2/sbadmin.py -Scanned: 2016-10-20 11:35:13.944967 -No vulnerabilities found. - - -yoshiya0503/Flask-Best-Practices -https://github.com/yoshiya0503/Flask-Best-Practices -Entry file: Flask-Best-Practices/methodview.py -Scanned: 2016-10-20 11:35:15.334768 -No vulnerabilities found. - - -ThunderousFigs/Genomes -https://github.com/ThunderousFigs/Genomes -Entry file: Genomes/server.py -Scanned: 2016-10-20 11:35:15.887293 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Python-Project-Simple/flask-blog -https://github.com/Python-Project-Simple/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:35:23.458210 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -keer2345/flasky -https://github.com/keer2345/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:35:24.973993 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PansFortress/flasktasker -https://github.com/PansFortress/flasktasker -Entry file: flasktasker/views.py -Scanned: 2016-10-20 11:35:27.585828 -No vulnerabilities found. - - -olegzhoglo/flasktaskr -https://github.com/olegzhoglo/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:35:30.100612 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -adrianneperedo/flaskr -https://github.com/adrianneperedo/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:35:38.618411 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mirukushake/flaskr -https://github.com/mirukushake/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:35:40.129488 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -schen2011/flaskandazure -https://github.com/schen2011/flaskandazure -Entry file: None -Scanned: 2016-10-20 11:35:40.687123 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DXZ/flaskr -https://github.com/DXZ/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:35:41.196421 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tim1978/flasktaskr -https://github.com/tim1978/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:35:42.716224 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kriordan/flasktaskr -https://github.com/Kriordan/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:35:44.228825 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -haoweibo1987/flasker -https://github.com/haoweibo1987/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-20 11:35:45.795865 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -egonvb/flaskplayground -https://github.com/egonvb/flaskplayground -Entry file: flaskplayground/api.py -Scanned: 2016-10-20 11:35:47.459911 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liteng123/flaskr -https://github.com/liteng123/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:35:48.972461 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -salazar35/FlaskWeb -https://github.com/salazar35/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-20 11:35:51.044898 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -pchartrand/FlaskTemp -https://github.com/pchartrand/FlaskTemp -Entry file: FlaskTemp/tempreport.py -Scanned: 2016-10-20 11:35:52.676838 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hattwick/flask2 -https://github.com/hattwick/flask2 -Entry file: flask2/app.py -Scanned: 2016-10-20 11:35:54.236313 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -narakai/FlaskServer -https://github.com/narakai/FlaskServer -Entry file: FlaskServer/untitled.py -Scanned: 2016-10-20 11:35:54.757284 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paoloo1995/FlaskBlog -https://github.com/paoloo1995/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 11:35:55.365431 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -julywoo/flaskWeb -https://github.com/julywoo/flaskWeb -Entry file: flaskWeb/flaskWeb.py -Scanned: 2016-10-20 11:36:00.994465 -No vulnerabilities found. - - -tmlima/flask-intro -https://github.com/tmlima/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:36:01.505715 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sourcelair-blueprints/flask-mongo -https://github.com/sourcelair-blueprints/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-20 11:36:02.011612 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mmingle/flask-blog -https://github.com/mmingle/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:36:02.553660 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -justinwp/flask-urs -https://github.com/justinwp/flask-urs -Entry file: flask-urs/tests/conftest.py -Scanned: 2016-10-20 11:36:10.240229 -No vulnerabilities found. - - -SawHigh/flask_cdn -https://github.com/SawHigh/flask_cdn -Entry file: flask_cdn/cdn.py -Scanned: 2016-10-20 11:36:11.567392 -No vulnerabilities found. - - -crq/flask-scaffold -https://github.com/crq/flask-scaffold -Entry file: flask-scaffold/[appname].py -Scanned: 2016-10-20 11:36:12.082429 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asielen/Woodles_Flask -https://github.com/asielen/Woodles_Flask -Entry file: Woodles_Flask/app/__init__.py -Scanned: 2016-10-20 11:36:15.988580 -Vulnerability 1: -File: Woodles_Flask/app/views/app_views.py - > User input at line 22, trigger word "get(": - current_card = Card.query.get(card_id) -File: Woodles_Flask/app/views/app_views.py - > reaches line 23, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string)) - -Vulnerability 2: -File: Woodles_Flask/app/views/app_views.py - > User input at line 22, trigger word "get(": - current_card = Card.query.get(card_id) -File: Woodles_Flask/app/views/app_views.py - > reaches line 23, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string)) - - - -amitbn/flask-docker -https://github.com/amitbn/flask-docker -Entry file: flask-docker/app.py -Scanned: 2016-10-20 11:36:17.879228 -No vulnerabilities found. - - -julywoo/flask_login -https://github.com/julywoo/flask_login -Entry file: None -Scanned: 2016-10-20 11:36:23.900560 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/julywoo/flask_login. - -LovroM/Flask-test -https://github.com/LovroM/Flask-test -Entry file: Flask-test/webserver.py -Scanned: 2016-10-20 11:36:26.914428 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danleyb2/flask-cloudinary -https://github.com/danleyb2/flask-cloudinary -Entry file: None -Scanned: 2016-10-20 11:36:30.482977 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danleyb2/flask-cloudinary. - -OpenTrons/labsuite_flask -https://github.com/OpenTrons/labsuite_flask -Entry file: labsuite_flask/app.py -Scanned: 2016-10-20 11:36:40.192357 -No vulnerabilities found. - - -YaGiNA/study-flask -https://github.com/YaGiNA/study-flask -Entry file: study-flask/flaskr/__init__.py -Scanned: 2016-10-20 11:36:45.564050 -No vulnerabilities found. - - -seanhelm/flask-test -https://github.com/seanhelm/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:36:46.121439 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -Viredery/python_flask -https://github.com/Viredery/python_flask -Entry file: None -Scanned: 2016-10-20 11:36:46.637300 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Viredery/python_flask. - -josanabr/flask-vbox -https://github.com/josanabr/flask-vbox -Entry file: flask-vbox/flask-vbox.py -Scanned: 2016-10-20 11:36:47.934870 -No vulnerabilities found. - - -simeon-xx/simeon-flask -https://github.com/simeon-xx/simeon-flask -Entry file: simeon-flask/app/init.py -Scanned: 2016-10-20 11:36:49.257613 -No vulnerabilities found. - - -cherry-hyx/flask_t -https://github.com/cherry-hyx/flask_t -Entry file: None -Scanned: 2016-10-20 11:36:49.798994 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cherry-hyx/flask_t. - -abcsds/flask-tests -https://github.com/abcsds/flask-tests -Entry file: flask-tests/streaming/stream.py -Scanned: 2016-10-20 11:36:51.625066 -No vulnerabilities found. - - -tanzhixu/Flask-oauth -https://github.com/tanzhixu/Flask-oauth -Entry file: Flask-oauth/app/__init__.py -Scanned: 2016-10-20 11:36:52.923422 -Vulnerability 1: -File: Flask-oauth/app/user_manager_views.py - > User input at line 32, trigger word "get(": - password = request.json.get('password', None) -Reassigned in: - File: Flask-oauth/app/user_manager_views.py - > Line 38: newpasswd = pwd_context.encrypt(password) -File: Flask-oauth/app/user_manager_views.py - > reaches line 41, trigger word "filter(": - query.filter(User.id == userid).update(User.password_hashnewpasswd) - - - -brandonfujii/flask-microblog -https://github.com/brandonfujii/flask-microblog -Entry file: None -Scanned: 2016-10-20 11:36:53.438971 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dylannnnn/flask_study -https://github.com/dylannnnn/flask_study -Entry file: flask_study/views.py -Scanned: 2016-10-20 11:36:53.977739 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -huasu/InstantFlask -https://github.com/huasu/InstantFlask -Entry file: InstantFlask/app_return_values.py -Scanned: 2016-10-20 11:36:55.722233 -No vulnerabilities found. - - -maricante/flask-blog -https://github.com/maricante/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:36:56.295426 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -christopherL91/pythonflask -https://github.com/christopherL91/pythonflask -Entry file: pythonflask/app/main.py -Scanned: 2016-10-20 11:36:57.587372 -No vulnerabilities found. - - -ysicing/Pangu -https://github.com/ysicing/Pangu -Entry file: Pangu/Pangu.py -Scanned: 2016-10-20 11:36:59.668319 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -rbcolson9/flask4kids -https://github.com/rbcolson9/flask4kids -Entry file: flask4kids/hello.py -Scanned: 2016-10-20 11:37:00.921290 -No vulnerabilities found. - - -charlestondance/FlaskStartUp -https://github.com/charlestondance/FlaskStartUp -Entry file: FlaskStartUp/app/__init__.py -Scanned: 2016-10-20 11:37:03.444248 -No vulnerabilities found. - - -erik-farmer/flask-auth-wysiwyg-blog -https://github.com/erik-farmer/flask-auth-wysiwyg-blog -Entry file: flask-auth-wysiwyg-blog/app.py -Scanned: 2016-10-20 11:37:04.731128 -No vulnerabilities found. - - -guilleJB/flask-web-book -https://github.com/guilleJB/flask-web-book -Entry file: flask-web-book/hello.py -Scanned: 2016-10-20 11:37:06.259783 -Vulnerability 1: -File: flask-web-book/hello.py - > User input at line 120, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask-web-book/hello.py - > Line 117: name = None -File: flask-web-book/hello.py - > reaches line 122, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('boots.html',name=name, form=form) - - - -dongheelee1/simple_flask_wall -https://github.com/dongheelee1/simple_flask_wall -Entry file: simple_flask_wall/server.py -Scanned: 2016-10-20 11:37:09.799085 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ynifamily3/CRUD-with-Flask-MVC -https://github.com/ynifamily3/CRUD-with-Flask-MVC -Entry file: CRUD-with-Flask-MVC/test.py -Scanned: 2016-10-20 11:37:11.333805 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -duncan60/flask-github-api -https://github.com/duncan60/flask-github-api -Entry file: flask-github-api/app/__init__.py -Scanned: 2016-10-20 11:37:13.757529 -No vulnerabilities found. - - -mnzr/Flask-Blueprint-test -https://github.com/mnzr/Flask-Blueprint-test -Entry file: Flask-Blueprint-test/app/__init__.py -Scanned: 2016-10-20 11:37:16.232985 -Vulnerability 1: -File: Flask-Blueprint-test/app/users/views.py - > User input at line 33, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Blueprint-test/app/users/views.py - > Line 38: session['user_id'] = user.id -File: Flask-Blueprint-test/app/users/views.py - > reaches line 39, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -znss1989/flask_blog_ex -https://github.com/znss1989/flask_blog_ex -Entry file: flask_blog_ex/blog.py -Scanned: 2016-10-20 11:37:18.362398 -No vulnerabilities found. - - -aquang9124/flask_semi_restful_routes -https://github.com/aquang9124/flask_semi_restful_routes -Entry file: flask_semi_restful_routes/server.py -Scanned: 2016-10-20 11:37:19.750386 -No vulnerabilities found. - - -PeggyZWY/blog-with-flask -https://github.com/PeggyZWY/blog-with-flask -Entry file: blog-with-flask/app/__init__.py -Scanned: 2016-10-20 11:37:23.636159 -Vulnerability 1: -File: blog-with-flask/app/main/views.py - > User input at line 186, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 189: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: blog-with-flask/app/main/views.py - > Line 192: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 195: comments = pagination.items - File: blog-with-flask/app/main/views.py - > Line 184: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id)) -File: blog-with-flask/app/main/views.py - > reaches line 204, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, categories=category, comments=comments, pagination=pagination) - -Vulnerability 2: -File: blog-with-flask/app/main/views.py - > User input at line 293, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 294: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 298: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: blog-with-flask/app/main/views.py - > Line 291: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: blog-with-flask/app/main/views.py - > reaches line 301, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='他们关注了', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 3: -File: blog-with-flask/app/main/views.py - > User input at line 311, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 312: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 315: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: blog-with-flask/app/main/views.py - > Line 310: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: blog-with-flask/app/main/views.py - > reaches line 317, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注了他们', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 4: -File: blog-with-flask/app/main/views.py - > User input at line 349, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 350: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 353: comments = pagination.items -File: blog-with-flask/app/main/views.py - > reaches line 354, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 5: -File: blog-with-flask/app/main/views.py - > User input at line 431, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 452: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 456: posts = pagination.items -File: blog-with-flask/app/main/views.py - > reaches line 460, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('article.html',posts=posts, categories=category, show_followed=show_followed, pagination=pagination) - -Vulnerability 6: -File: blog-with-flask/app/main/views.py - > User input at line 471, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 475: pagination = Post.query.filter_by(category_id=_category.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 478: posts = pagination.items -File: blog-with-flask/app/main/views.py - > reaches line 482, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('article.html',posts=posts, categories=category, show_followed=show_followed, pagination=pagination) - - - -TwilioDevEd/browser-calls-flask -https://github.com/TwilioDevEd/browser-calls-flask -Entry file: browser-calls-flask/browser_calls_flask/__init__.py -Scanned: 2016-10-20 11:37:29.187629 -No vulnerabilities found. - - -terryllowery/flask-hello-world -https://github.com/terryllowery/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:37:30.310578 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -aquang9124/flask_wall_test -https://github.com/aquang9124/flask_wall_test -Entry file: flask_wall_test/server.py -Scanned: 2016-10-20 11:37:31.772202 -No vulnerabilities found. - - -ynejati/MyFlaskApp -https://github.com/ynejati/MyFlaskApp -Entry file: MyFlaskApp/MyFlaskWebApp.py -Scanned: 2016-10-20 11:37:40.254943 -No vulnerabilities found. - - -TheCypher/flask-boiler-plate -https://github.com/TheCypher/flask-boiler-plate -Entry file: flask-boiler-plate/app/__init__.py -Scanned: 2016-10-20 11:37:41.670580 -Vulnerability 1: -File: flask-boiler-plate/app/module_one/views.py - > User input at line 30, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-boiler-plate/app/module_one/views.py - > Line 34: session['user_id'] = user.id -File: flask-boiler-plate/app/module_one/views.py - > reaches line 36, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -TheCypher/flask-api-test -https://github.com/TheCypher/flask-api-test -Entry file: flask-api-test/api.py -Scanned: 2016-10-20 11:37:46.334714 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-api-test/lib/python2.7/genericpath.py - -vstanev1/heroku-flask-app -https://github.com/vstanev1/heroku-flask-app -Entry file: heroku-flask-app/app.py -Scanned: 2016-10-20 11:37:50.249744 -No vulnerabilities found. - - -bellcodo/bellcodo-flask-microblog -https://github.com/bellcodo/bellcodo-flask-microblog -Entry file: bellcodo-flask-microblog/app/__init__.py -Scanned: 2016-10-20 11:37:52.909174 -No vulnerabilities found. - - -megrela/python-flask-skeleton -https://github.com/megrela/python-flask-skeleton -Entry file: None -Scanned: 2016-10-20 11:37:53.440480 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/megrela/python-flask-skeleton. - -plablo09/minimal-flask-dev -https://github.com/plablo09/minimal-flask-dev -Entry file: minimal-flask-dev/hello.py -Scanned: 2016-10-20 11:37:54.840875 -No vulnerabilities found. - - -knight-zhou/Web.py_Flask -https://github.com/knight-zhou/Web.py_Flask -Entry file: None -Scanned: 2016-10-20 11:37:55.908867 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -shyba/browser-calls-flask -https://github.com/shyba/browser-calls-flask -Entry file: browser-calls-flask/browser_calls_flask/__init__.py -Scanned: 2016-10-20 11:37:57.206539 -No vulnerabilities found. - - -jdgramajo/LearningFlaskFramework -https://github.com/jdgramajo/LearningFlaskFramework -Entry file: LearningFlaskFramework/blog/app/app.py -Scanned: 2016-10-20 11:37:58.502240 -No vulnerabilities found. - - -liuer99cn/awesome-flask-todo -https://github.com/liuer99cn/awesome-flask-todo -Entry file: None -Scanned: 2016-10-20 11:37:59.017809 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/liuer99cn/awesome-flask-todo. - -seiya-tsukada/instant_flask_server -https://github.com/seiya-tsukada/instant_flask_server -Entry file: instant_flask_server/main.py -Scanned: 2016-10-20 11:38:00.352736 -No vulnerabilities found. - - -Journo-App/flask-by-example -https://github.com/Journo-App/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 11:38:01.071485 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bobquest33/testRestFlask -https://github.com/bobquest33/testRestFlask -Entry file: testRestFlask/testRestFlask/testRestFlask/apps/testRest/models.py -Scanned: 2016-10-20 11:38:01.566921 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jjapp/flask-hello-world -https://github.com/jjapp/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:38:02.118148 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -snehasankavaram/donorRegistryFlask -https://github.com/snehasankavaram/donorRegistryFlask -Entry file: donorRegistryFlask/run.py -Scanned: 2016-10-20 11:38:03.410718 -No vulnerabilities found. - - -ayusharma/Drug-discovery-flask -https://github.com/ayusharma/Drug-discovery-flask -Entry file: Drug-discovery-flask/app.py -Scanned: 2016-10-20 11:38:04.924702 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vishaljain3991/flask_oauth_example_template -https://github.com/vishaljain3991/flask_oauth_example_template -Entry file: flask_oauth_example_template/app/__init__.py -Scanned: 2016-10-20 11:38:11.376760 -No vulnerabilities found. - - -F483/flask-data-migration-example -https://github.com/F483/flask-data-migration-example -Entry file: flask-data-migration-example/app.py -Scanned: 2016-10-20 11:38:12.702610 -No vulnerabilities found. - - -studiomezklador/flask_api_2 -https://github.com/studiomezklador/flask_api_2 -Entry file: flask_api_2/__init__.py -Scanned: 2016-10-20 11:38:14.151695 -No vulnerabilities found. - - -SarthakS93/Flask-WebApp -https://github.com/SarthakS93/Flask-WebApp -Entry file: Flask-WebApp/app/__init__.py -Scanned: 2016-10-20 11:38:15.510910 -No vulnerabilities found. - - -dorneanu/flask-app-template -https://github.com/dorneanu/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-20 11:38:16.037519 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aquang9124/flask_friends_full -https://github.com/aquang9124/flask_friends_full -Entry file: flask_friends_full/server.py -Scanned: 2016-10-20 11:38:18.377680 -No vulnerabilities found. - - -huasu/LearningFlaskFramework -https://github.com/huasu/LearningFlaskFramework -Entry file: LearningFlaskFramework/hello.py -Scanned: 2016-10-20 11:38:19.672901 -No vulnerabilities found. - - -sd16spring/Toolbox-Flask -https://github.com/sd16spring/Toolbox-Flask -Entry file: Toolbox-Flask/hello.py -Scanned: 2016-10-20 11:38:25.351778 -No vulnerabilities found. - - -pavelrib/flask -https://github.com/pavelrib/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:38:29.987058 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -octt/flask -https://github.com/octt/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:38:30.696123 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Bwooklyn/flask -https://github.com/Bwooklyn/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:38:31.314747 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -HRKpython/flask -https://github.com/HRKpython/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:38:39.918533 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -ZhenghaoZhu/Flask -https://github.com/ZhenghaoZhu/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:38:41.454437 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SeanVaysburd/flask -https://github.com/SeanVaysburd/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:38:47.041288 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -kartheek3011/Flask -https://github.com/kartheek3011/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:38:47.551603 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TerbiumLabs/flask-developer-challenge -https://github.com/TerbiumLabs/flask-developer-challenge -Entry file: flask-developer-challenge/gistapi/gistapi.py -Scanned: 2016-10-20 11:38:51.997913 -No vulnerabilities found. - - -sunscrapers/flask-boilerplate -https://github.com/sunscrapers/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 11:38:53.529269 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sunscrapers/flask-boilerplate. - -jabbalaci/DigitalOceanFlask -https://github.com/jabbalaci/DigitalOceanFlask -Entry file: DigitalOceanFlask/home/demo/projects/ave_caesar/main.py -Scanned: 2016-10-20 11:38:55.172479 -No vulnerabilities found. - - -w84miracle/flask-sb-admin2 -https://github.com/w84miracle/flask-sb-admin2 -Entry file: flask-sb-admin2/sbadmin.py -Scanned: 2016-10-20 11:38:59.268325 -No vulnerabilities found. - - -pyx/flask-diced -https://github.com/pyx/flask-diced -Entry file: flask-diced/examples/simple/app.py -Scanned: 2016-10-20 11:39:00.774987 -No vulnerabilities found. - - -basco-johnkevin/note-taking-app -https://github.com/basco-johnkevin/note-taking-app -Entry file: note-taking-app/part1/main.py -Scanned: 2016-10-20 11:39:02.055846 -No vulnerabilities found. - - -Miserlou/serverless-imagehost -https://github.com/Miserlou/serverless-imagehost -Entry file: serverless-imagehost/my_app.py -Scanned: 2016-10-20 11:39:03.358797 -No vulnerabilities found. - - -MRamakri/flaskworkshop -https://github.com/MRamakri/flaskworkshop -Entry file: flaskworkshop/app.py -Scanned: 2016-10-20 11:39:04.646332 -No vulnerabilities found. - - -imhuwq/flasky -https://github.com/imhuwq/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:39:05.161341 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coolmile23/flaskr -https://github.com/coolmile23/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:39:05.669974 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hellohuangjin/flaskblog -https://github.com/hellohuangjin/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 11:39:06.226518 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -zhangyuhaomei/flasky -https://github.com/zhangyuhaomei/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:39:06.740540 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -antonsoroko/flaskapimongo -https://github.com/antonsoroko/flaskapimongo -Entry file: flaskapimongo/flaskapimongo/__init__.py -Scanned: 2016-10-20 11:39:08.255445 -No vulnerabilities found. - - -haoweibo1987/flasker -https://github.com/haoweibo1987/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-20 11:39:08.784891 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -egonvb/flaskplayground -https://github.com/egonvb/flaskplayground -Entry file: flaskplayground/api.py -Scanned: 2016-10-20 11:39:09.385818 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhkmxx9302013/flaskmysql -https://github.com/zhkmxx9302013/flaskmysql -Entry file: flaskmysql/flaskmysql.py -Scanned: 2016-10-20 11:39:12.808164 -No vulnerabilities found. - - -xiaomao361/flaskr -https://github.com/xiaomao361/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:39:13.331346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alvaro893/flaskcinemaapp -https://github.com/alvaro893/flaskcinemaapp -Entry file: flaskcinemaapp/FlaskWebProject/__init__.py -Scanned: 2016-10-20 11:39:17.776452 -No vulnerabilities found. - - -yuyiwei305/flaskr -https://github.com/yuyiwei305/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:39:18.309805 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -retozero/FlaskDemo -https://github.com/retozero/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 11:39:19.329887 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -saurabh1e/FlaskStructure -https://github.com/saurabh1e/FlaskStructure -Entry file: FlaskStructure/src/utils/__init__.py -Scanned: 2016-10-20 11:39:22.765540 -No vulnerabilities found. - - -uklineale/flaskTut -https://github.com/uklineale/flaskTut -Entry file: None -Scanned: 2016-10-20 11:39:25.355045 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zupeiza/FlaskTaskr -https://github.com/zupeiza/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-20 11:39:30.987945 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -yxun/FlaskSample -https://github.com/yxun/FlaskSample -Entry file: FlaskSample/hello.py -Scanned: 2016-10-20 11:39:32.327253 -No vulnerabilities found. - - -paoloo1995/FlaskBlog -https://github.com/paoloo1995/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 11:39:32.953832 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DearX-dlx/FlaskBlog -https://github.com/DearX-dlx/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 11:39:40.573139 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tahoe/flask-restless -https://github.com/tahoe/flask-restless -Entry file: flask-restless/examples/clients/jquery/__main__.py -Scanned: 2016-10-20 11:39:42.154780 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhkmxx9302013/RPiFlask -https://github.com/zhkmxx9302013/RPiFlask -Entry file: RPiFlask/main.py -Scanned: 2016-10-20 11:39:47.706193 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mkubaczyk/flask-structure -https://github.com/mkubaczyk/flask-structure -Entry file: flask-structure/apps/__init__.py -Scanned: 2016-10-20 11:39:49.164470 -No vulnerabilities found. - - -PavelMPD/flask_oauth -https://github.com/PavelMPD/flask_oauth -Entry file: flask_oauth/server.py -Scanned: 2016-10-20 11:39:52.467569 -No vulnerabilities found. - - -sourcelair-blueprints/flask-mongo -https://github.com/sourcelair-blueprints/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-20 11:39:53.993532 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -doubtingben/flask-mongo -https://github.com/doubtingben/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-20 11:39:54.514558 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -farridav/flask_friends -https://github.com/farridav/flask_friends -Entry file: flask_friends/src/friends/__init__.py -Scanned: 2016-10-20 11:39:57.159395 -No vulnerabilities found. - - -doubtingben/flask-jobs -https://github.com/doubtingben/flask-jobs -Entry file: flask-jobs/code/web.py -Scanned: 2016-10-20 11:40:01.515824 -No vulnerabilities found. - - -gh-tcbd/flask-test -https://github.com/gh-tcbd/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:40:02.048756 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -askewseth/StatsFlask -https://github.com/askewseth/StatsFlask -Entry file: StatsFlask/run.py -Scanned: 2016-10-20 11:40:03.583503 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bzerroug/flask_appbuilder -https://github.com/bzerroug/flask_appbuilder -Entry file: flask_appbuilder/meteo/__init__.py -Scanned: 2016-10-20 11:40:04.099379 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BlackMud/flask_blog -https://github.com/BlackMud/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:40:05.614832 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sohje/__flask_psgr -https://github.com/sohje/__flask_psgr -Entry file: __flask_psgr/app.py -Scanned: 2016-10-20 11:40:06.146520 -No vulnerabilities found. - - -hoikin-yiu/flask-blog -https://github.com/hoikin-yiu/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:40:06.709505 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Cloudwick-BT/flask_project -https://github.com/Cloudwick-BT/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-20 11:40:07.509454 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gyonghua/flask-blog -https://github.com/gyonghua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:40:08.065690 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -g-rich/flask-blog -https://github.com/g-rich/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:40:09.622956 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Zhgong/flask_microblog -https://github.com/Zhgong/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-20 11:40:10.149945 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chensdream/learn-flask -https://github.com/chensdream/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 11:40:12.826891 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coolmile23/flask_practice -https://github.com/coolmile23/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-20 11:40:13.371097 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -k9luo/Flask-Tutorial -https://github.com/k9luo/Flask-Tutorial -Entry file: Flask-Tutorial/microblog-version-0.2/app/__init__.py -Scanned: 2016-10-20 11:40:23.994155 -No vulnerabilities found. - - -Harry-Yao/learn-flask -https://github.com/Harry-Yao/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 11:40:24.758180 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danleyb2/flask-cloudinary -https://github.com/danleyb2/flask-cloudinary -Entry file: None -Scanned: 2016-10-20 11:40:25.274956 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danleyb2/flask-cloudinary. - -juan-castano/todo-flask -https://github.com/juan-castano/todo-flask -Entry file: None -Scanned: 2016-10-20 11:40:25.795726 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/juan-castano/todo-flask. - -mullaned/Flask-Test -https://github.com/mullaned/Flask-Test -Entry file: Flask-Test/flask_test.py -Scanned: 2016-10-20 11:40:27.148708 -Vulnerability 1: -File: Flask-Test/flask_test.py - > User input at line 13, trigger word "get(": - age = ages.get(user) -File: Flask-Test/flask_test.py - > reaches line 14, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users.html',user=user, age=age) - - - -zupeiza/flask-blog -https://github.com/zupeiza/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:40:27.708882 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -shopetan/flask-api -https://github.com/shopetan/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-20 11:40:31.225451 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jungkoo/flask-dmango -https://github.com/jungkoo/flask-dmango -Entry file: flask-dmango/sample/blueprint_find.py -Scanned: 2016-10-20 11:40:31.769506 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -raghureddyram/flask-hello -https://github.com/raghureddyram/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-20 11:40:33.288028 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hrushikesh198/flask-server -https://github.com/hrushikesh198/flask-server -Entry file: None -Scanned: 2016-10-20 11:40:40.802901 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hrushikesh198/flask-server. - -omarkurt/flask-injection -https://github.com/omarkurt/flask-injection -Entry file: flask-injection/index.py -Scanned: 2016-10-20 11:40:49.188963 -No vulnerabilities found. - - -Datalker/Flask_sandbox -https://github.com/Datalker/Flask_sandbox -Entry file: Flask_sandbox/hello.py -Scanned: 2016-10-20 11:40:52.637251 -No vulnerabilities found. - - -getsentry/demo-flask -https://github.com/getsentry/demo-flask -Entry file: demo-flask/app.py -Scanned: 2016-10-20 11:40:56.142184 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -technocake/flask-eksempel -https://github.com/technocake/flask-eksempel -Entry file: flask-eksempel/webserver.py -Scanned: 2016-10-20 11:41:01.676051 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wkzhu/flask_example -https://github.com/wkzhu/flask_example -Entry file: None -Scanned: 2016-10-20 11:41:02.174980 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rgsingh/flask-timetrack -https://github.com/rgsingh/flask-timetrack -Entry file: flask-timetrack/app/__init__.py -Scanned: 2016-10-20 11:41:04.640149 -Vulnerability 1: -File: flask-timetrack/app/views.py - > User input at line 29, trigger word "get(": - taskid = request.args.get('id') -Reassigned in: - File: flask-timetrack/app/views.py - > Line 33: filtered_task = [x for x in tasks_file] - File: flask-timetrack/app/views.py - > Line 35: task = json.dumps(filtered_task) -File: flask-timetrack/app/views.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edittask.html',taskid=taskid, task=task) - - - -pultitom/study-flask -https://github.com/pultitom/study-flask -Entry file: study-flask/microblog/app/__init__.py -Scanned: 2016-10-20 11:41:05.982453 -No vulnerabilities found. - - -StarsHu/ll-flask -https://github.com/StarsHu/ll-flask -Entry file: ll-flask/LikeLines/server.py -Scanned: 2016-10-20 11:41:06.501490 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -morphee31/flask_example -https://github.com/morphee31/flask_example -Entry file: None -Scanned: 2016-10-20 11:41:07.026270 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wumb0/flask-examples -https://github.com/wumb0/flask-examples -Entry file: flask-examples/Guestbook/app.py -Scanned: 2016-10-20 11:41:07.539731 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vladimirdotk/flask-boilerplate -https://github.com/vladimirdotk/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 11:41:08.524372 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vladimirdotk/flask-boilerplate. - -zubairah/Flask_App -https://github.com/zubairah/Flask_App -Entry file: Flask_App/Flask_App/app.py -Scanned: 2016-10-20 11:41:10.045188 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ramwin/flask_tutorial -https://github.com/ramwin/flask_tutorial -Entry file: None -Scanned: 2016-10-20 11:41:13.069654 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -f-guitart/progcoms3-flask -https://github.com/f-guitart/progcoms3-flask -Entry file: progcoms3-flask/app.py -Scanned: 2016-10-20 11:41:18.417432 -Vulnerability 1: -File: progcoms3-flask/app.py - > User input at line 73, trigger word "get(": - zone = request.form.get('area') -Reassigned in: - File: progcoms3-flask/app.py - > Line 75: zone_data = get_zone_data(zone) - File: progcoms3-flask/app.py - > Line 71: zone_data = [] -File: progcoms3-flask/app.py - > reaches line 76, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('zone_data_table.html',zone_data=zone_data, zones=zones) - - - -christopherL91/pythonflask -https://github.com/christopherL91/pythonflask -Entry file: pythonflask/app/main.py -Scanned: 2016-10-20 11:41:19.776909 -No vulnerabilities found. - - -kolapapa/blog_kola -https://github.com/kolapapa/blog_kola -Entry file: blog_kola/db.py -Scanned: 2016-10-20 11:41:25.556291 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: blog_kola/.venv/lib/python2.7/genericpath.py - -jackeylu/microblog -https://github.com/jackeylu/microblog -Entry file: None -Scanned: 2016-10-20 11:41:26.067743 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -garaud/pyris -https://github.com/garaud/pyris -Entry file: pyris/pyris/api/__init__.py -Scanned: 2016-10-20 11:41:27.752192 -No vulnerabilities found. - - -nicc777/flask-webservice-wsgi-python3-demo -https://github.com/nicc777/flask-webservice-wsgi-python3-demo -Entry file: flask-webservice-wsgi-python3-demo/fwsdemo/app.py -Scanned: 2016-10-20 11:41:29.193298 -No vulnerabilities found. - - -MicahSteinbrecher/mini-blog -https://github.com/MicahSteinbrecher/mini-blog -Entry file: mini-blog/flaskr.py -Scanned: 2016-10-20 11:41:33.539641 -No vulnerabilities found. - - -rjantos/flask-hello-world -https://github.com/rjantos/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:41:34.094671 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -remarcbalisi/rest-demo-flask- -https://github.com/remarcbalisi/rest-demo-flask- -Entry file: rest-demo-flask-/app.py -Scanned: 2016-10-20 11:41:44.051097 -No vulnerabilities found. - - -duncan60/flask-github-api -https://github.com/duncan60/flask-github-api -Entry file: flask-github-api/app/__init__.py -Scanned: 2016-10-20 11:41:45.489908 -No vulnerabilities found. - - -merryHunter/chat-flask-socketio -https://github.com/merryHunter/chat-flask-socketio -Entry file: chat-flask-socketio/chat.py -Scanned: 2016-10-20 11:41:48.257880 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mattvisco/flask_test_2 -https://github.com/mattvisco/flask_test_2 -Entry file: flask_test_2/insta.py -Scanned: 2016-10-20 11:41:49.669630 -No vulnerabilities found. - - -pavelchalyk/blackjack_on_flask -https://github.com/pavelchalyk/blackjack_on_flask -Entry file: blackjack_on_flask/blackjack.py -Scanned: 2016-10-20 11:41:52.200761 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sd16spring/Toolbox-Flask -https://github.com/sd16spring/Toolbox-Flask -Entry file: Toolbox-Flask/hello.py -Scanned: 2016-10-20 11:41:57.640853 -No vulnerabilities found. - - -bsteinberg/flask -https://github.com/bsteinberg/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:42:02.236063 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -HRKpython/flask -https://github.com/HRKpython/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:42:02.829790 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -ninadmhatre/zual -https://github.com/ninadmhatre/zual -Entry file: zual/local_mods/flask-blogging/test/__init__.py -Scanned: 2016-10-20 11:42:10.326700 -No vulnerabilities found. - - -taogeT/flask-celery -https://github.com/taogeT/flask-celery -Entry file: flask-celery/example/app/__init__.py -Scanned: 2016-10-20 11:42:11.759248 -No vulnerabilities found. - - -frankV/flask-sendgrid -https://github.com/frankV/flask-sendgrid -Entry file: flask-sendgrid/setup.py -Scanned: 2016-10-20 11:42:13.055097 -No vulnerabilities found. - - -islandev/flaskweb -https://github.com/islandev/flaskweb -Entry file: None -Scanned: 2016-10-20 11:42:13.588101 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gyonghua/flasktaskr -https://github.com/gyonghua/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:42:14.110540 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Rothschild0120/flaskyblog -https://github.com/Rothschild0120/flaskyblog -Entry file: flaskyblog/app/__init__.py -Scanned: 2016-10-20 11:42:14.643065 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yuyiwei305/flaskr -https://github.com/yuyiwei305/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:42:15.146924 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stalwart201/flaskimgupload -https://github.com/stalwart201/flaskimgupload -Entry file: flaskimgupload/upload.py -Scanned: 2016-10-20 11:42:16.453545 -Vulnerability 1: -File: flaskimgupload/upload.py - > User input at line 19, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flaskimgupload/upload.py - > Line 21: filename = secure_filename(file.filename) - File: flaskimgupload/upload.py - > Line 25: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' -File: flaskimgupload/upload.py - > reaches line 23, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: flaskimgupload/upload.py - > User input at line 19, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flaskimgupload/upload.py - > Line 21: filename = secure_filename(file.filename) - File: flaskimgupload/upload.py - > Line 25: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' -File: flaskimgupload/upload.py - > reaches line 23, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -zixuzhang/flasky -https://github.com/zixuzhang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:42:16.990342 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoobalias/Flaskr -https://github.com/hoobalias/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 11:42:17.507432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -azureappserviceoss/FlaskAzure -https://github.com/azureappserviceoss/FlaskAzure -Entry file: FlaskAzure/FlaskWebProject1/__init__.py -Scanned: 2016-10-20 11:42:25.809379 -No vulnerabilities found. - - -yhappy/FlaskProjects -https://github.com/yhappy/FlaskProjects -Entry file: FlaskProjects/FlaskProjects.py -Scanned: 2016-10-20 11:42:27.164442 -No vulnerabilities found. - - -tajihiro/FlaskBluemix -https://github.com/tajihiro/FlaskBluemix -Entry file: FlaskBluemix/index.py -Scanned: 2016-10-20 11:42:28.455911 -No vulnerabilities found. - - -Leyawiin/FlaskDemo -https://github.com/Leyawiin/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 11:42:28.978432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KotiyaSenya/FlaskLearn -https://github.com/KotiyaSenya/FlaskLearn -Entry file: FlaskLearn/flask_learn/__init__.py -Scanned: 2016-10-20 11:42:30.889857 -Vulnerability 1: -File: FlaskLearn/flask_learn/main/views/index.py - > User input at line 10, trigger word "get(": - user_agent = request.headers.get('User-Agent') -File: FlaskLearn/flask_learn/main/views/index.py - > reaches line 11, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',user_agent=user_agent, current_time=datetime.utcnow()) - - - -Patreon/cartographer -https://github.com/Patreon/cartographer -Entry file: cartographer/example/generic_social_network/app/__init__.py -Scanned: 2016-10-20 11:42:33.231775 -No vulnerabilities found. - - -Ketouem/flask-boto3 -https://github.com/Ketouem/flask-boto3 -Entry file: flask-boto3/example.py -Scanned: 2016-10-20 11:42:34.644460 -No vulnerabilities found. - - -Pushould/pushould-flask-sample -https://github.com/Pushould/pushould-flask-sample -Entry file: pushould-flask-sample/app.py -Scanned: 2016-10-20 11:42:36.031438 -No vulnerabilities found. - - -miaoihan/qulook_flask -https://github.com/miaoihan/qulook_flask -Entry file: qulook_flask/qulook.py -Scanned: 2016-10-20 11:42:36.752748 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: qulook_flask/ENV/lib/python2.7/genericpath.py - -rogerpence/Flask-App -https://github.com/rogerpence/Flask-App -Entry file: Flask-App/app/__init__.py -Scanned: 2016-10-20 11:42:44.162963 -No vulnerabilities found. - - -sandmarq/flask_test -https://github.com/sandmarq/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 11:42:44.772439 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -barcai/Flask_Megatutorial -https://github.com/barcai/Flask_Megatutorial -Entry file: Flask_Megatutorial/app/__init__.py -Scanned: 2016-10-20 11:42:49.252517 -No vulnerabilities found. - - -kessiacastro/flask-hello -https://github.com/kessiacastro/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-20 11:42:52.292766 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -renaldopringle/flask_heroku -https://github.com/renaldopringle/flask_heroku -Entry file: flask_heroku/app.py -Scanned: 2016-10-20 11:42:54.921421 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sunhughees/flask-blog -https://github.com/sunhughees/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:42:56.962399 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -AVandelay/flask_blog -https://github.com/AVandelay/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:43:02.495338 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -uyoaix/learn-flask -https://github.com/uyoaix/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 11:43:03.177321 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -frenos/flask-sample -https://github.com/frenos/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-20 11:43:04.704587 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gyonghua/flask-blog -https://github.com/gyonghua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:43:11.246233 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Zhgong/flask_microblog -https://github.com/Zhgong/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-20 11:43:12.764152 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhangcheng/flask-example -https://github.com/zhangcheng/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-20 11:43:14.324737 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gemimarosier/flask_project -https://github.com/gemimarosier/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-20 11:43:15.772340 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gchange/flask_server -https://github.com/gchange/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-20 11:43:16.300772 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Nickyzj/flask-first -https://github.com/Nickyzj/flask-first -Entry file: flask-first/flask-first-notes.py -Scanned: 2016-10-20 11:43:16.842429 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -propupul/Flask_app -https://github.com/propupul/Flask_app -Entry file: Flask_app/test.py -Scanned: 2016-10-20 11:43:17.352520 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -m18664319351/Blog_Flask -https://github.com/m18664319351/Blog_Flask -Entry file: Blog_Flask/app.py -Scanned: 2016-10-20 11:43:17.978567 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Blog_Flask/lib/python2.7/genericpath.py - -testforvln/flask-learning -https://github.com/testforvln/flask-learning -Entry file: flask-learning/hello.py -Scanned: 2016-10-20 11:43:19.308869 -No vulnerabilities found. - - -Unicomcat/flask_test -https://github.com/Unicomcat/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 11:43:19.912842 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jidn/flask-obscure -https://github.com/jidn/flask-obscure -Entry file: flask-obscure/tests/test_url.py -Scanned: 2016-10-20 11:43:21.344947 -No vulnerabilities found. - - -cdaidone/small_flask -https://github.com/cdaidone/small_flask -Entry file: small_flask/small_flask.py -Scanned: 2016-10-20 11:43:26.995469 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -morphee31/flask_example -https://github.com/morphee31/flask_example -Entry file: None -Scanned: 2016-10-20 11:43:28.537194 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pedrogaudencio/refunite-flask -https://github.com/pedrogaudencio/refunite-flask -Entry file: refunite-flask/app.py -Scanned: 2016-10-20 11:43:30.546724 -No vulnerabilities found. - - -master105/flask_server -https://github.com/master105/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-20 11:43:31.095205 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -d3prof3t/flask-intro -https://github.com/d3prof3t/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:43:31.666811 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zubairah/Flask_App -https://github.com/zubairah/Flask_App -Entry file: Flask_App/Flask_App/app.py -Scanned: 2016-10-20 11:43:34.185234 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shinstev/flask_server -https://github.com/shinstev/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-20 11:43:35.744813 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vramakin/LearnFlask -https://github.com/vramakin/LearnFlask -Entry file: LearnFlask/ex1_URL解析.py -Scanned: 2016-10-20 11:43:37.274951 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nbeede/docker-flask -https://github.com/nbeede/docker-flask -Entry file: docker-flask/app.py -Scanned: 2016-10-20 11:43:43.697848 -No vulnerabilities found. - - -runningstrawberry/microblog -https://github.com/runningstrawberry/microblog -Entry file: None -Scanned: 2016-10-20 11:43:45.260862 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kolapapa/blog_kola -https://github.com/kolapapa/blog_kola -Entry file: blog_kola/db.py -Scanned: 2016-10-20 11:43:48.939579 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: blog_kola/.venv/lib/python2.7/genericpath.py - -B2Crypt/Random-Gamemode- -https://github.com/B2Crypt/Random-Gamemode- -Entry file: Random-Gamemode-/FLASK/__init__.py -Scanned: 2016-10-20 11:43:52.987832 -No vulnerabilities found. - - -Lich2013/learnflask -https://github.com/Lich2013/learnflask -Entry file: None -Scanned: 2016-10-20 11:43:53.524509 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Lich2013/learnflask. - -jbisasky/flaskProtoBuffer -https://github.com/jbisasky/flaskProtoBuffer -Entry file: flaskProtoBuffer/flaskHello.py -Scanned: 2016-10-20 11:43:55.207861 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -WangShengguang/FlaskWebDevelopment -https://github.com/WangShengguang/FlaskWebDevelopment -Entry file: FlaskWebDevelopment/Full_Stack_Foundations/finalproject.py -Scanned: 2016-10-20 11:43:55.742422 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JunliuHub/FlaskWebDevelopment -https://github.com/JunliuHub/FlaskWebDevelopment -Entry file: FlaskWebDevelopment/Full_Stack_Foundations/finalproject.py -Scanned: 2016-10-20 11:43:57.261239 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adrianomaringolo/py-flask-tuts -https://github.com/adrianomaringolo/py-flask-tuts -Entry file: None -Scanned: 2016-10-20 11:44:02.796365 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rjantos/flask-hello-world -https://github.com/rjantos/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:44:03.338480 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -ishwarya-iyer/nuage_proj_flask_app -https://github.com/ishwarya-iyer/nuage_proj_flask_app -Entry file: nuage_proj_flask_app/app.py -Scanned: 2016-10-20 11:44:04.882144 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SamirKanaan/PlantillaFlaskREST1 -https://github.com/SamirKanaan/PlantillaFlaskREST1 -Entry file: PlantillaFlaskREST1/plantilla1.py -Scanned: 2016-10-20 11:44:13.793613 -No vulnerabilities found. - - -remarcbalisi/flask-angular-auth -https://github.com/remarcbalisi/flask-angular-auth -Entry file: flask-angular-auth/project/__init__.py -Scanned: 2016-10-20 11:44:15.100738 -No vulnerabilities found. - - -jarosenb/flask_ionratio_V2 -https://github.com/jarosenb/flask_ionratio_V2 -Entry file: flask_ionratio_V2/hello.py -Scanned: 2016-10-20 11:44:16.545428 -No vulnerabilities found. - - -themuppet2/flask-hello-world -https://github.com/themuppet2/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:44:17.112377 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -kindoprec/Flask-SecureHeaders -https://github.com/kindoprec/Flask-SecureHeaders -Entry file: Flask-SecureHeaders/tests/core_test.py -Scanned: 2016-10-20 11:44:18.443412 -No vulnerabilities found. - - -ishwarya-iyer/nuage_flask_app -https://github.com/ishwarya-iyer/nuage_flask_app -Entry file: nuage_flask_app/app.py -Scanned: 2016-10-20 11:44:19.071057 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Christomas/flask_project_skeleton -https://github.com/Christomas/flask_project_skeleton -Entry file: flask_project_skeleton/app/__init__.py -Scanned: 2016-10-20 11:44:20.475278 -No vulnerabilities found. - - -pranavn-cuelogic/flask_video_conference_room -https://github.com/pranavn-cuelogic/flask_video_conference_room -Entry file: flask_video_conference_room/video_conf/main.py -Scanned: 2016-10-20 11:44:20.991214 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -llxxee/A-website-by-Flask -https://github.com/llxxee/A-website-by-Flask -Entry file: None -Scanned: 2016-10-20 11:44:21.508392 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/llxxee/A-website-by-Flask. - -micah-cal-sandbox/flask-heroku-sandbox -https://github.com/micah-cal-sandbox/flask-heroku-sandbox -Entry file: flask-heroku-sandbox/app.py -Scanned: 2016-10-20 11:44:22.800189 -No vulnerabilities found. - - -lkpanganiban/flask-rest-example -https://github.com/lkpanganiban/flask-rest-example -Entry file: flask-rest-example/app.py -Scanned: 2016-10-20 11:44:28.224403 -Vulnerability 1: -File: flask-rest-example/app.py - > User input at line 48, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flask-rest-example/app.py - > reaches line 55, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -rodcox89/flask-restful-blueprint-boilerplate -https://github.com/rodcox89/flask-restful-blueprint-boilerplate -Entry file: flask-restful-blueprint-boilerplate/main.py -Scanned: 2016-10-20 11:44:29.900339 -No vulnerabilities found. - - -bellkev/docker-flask-browserify -https://github.com/bellkev/docker-flask-browserify -Entry file: docker-flask-browserify/src/python/hello.py -Scanned: 2016-10-20 11:44:31.367934 -No vulnerabilities found. - - -braddmiller/flask-by-example -https://github.com/braddmiller/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 11:44:32.043229 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tych0/flask-demo-app -https://github.com/tych0/flask-demo-app -Entry file: flask-demo-app/app.py -Scanned: 2016-10-20 11:44:35.062633 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -technocake/flask-user-profiles-example -https://github.com/technocake/flask-user-profiles-example -Entry file: flask-user-profiles-example/pyhtml.py -Scanned: 2016-10-20 11:44:37.384821 -No vulnerabilities found. - - -Christomas/i_dev_flask -https://github.com/Christomas/i_dev_flask -Entry file: i_dev_flask/app/__init__.py -Scanned: 2016-10-20 11:44:38.927593 -Vulnerability 1: -File: i_dev_flask/app/auth/views.py - > User input at line 121, trigger word ".data": - user = models.User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: i_dev_flask/app/auth/views.py - > Line 123: token = options.dump_token('reset_password', user.id) -File: i_dev_flask/app/auth/views.py - > reaches line 124, trigger word "url_for(": - options.send_email(user.email, '重置密码', 'auth/mail/reset_password',user=user, url=url_for('auth.reset_confirm',token=token, _external=True)) - -Vulnerability 2: -File: i_dev_flask/app/auth/views.py - > User input at line 139, trigger word "get(": - user = models.User.query.get(user_id) -Reassigned in: - File: i_dev_flask/app/auth/views.py - > Line 143: form = forms.ResetPasswordForm(email=user.email) - File: i_dev_flask/app/auth/views.py - > Line 147: user.password = form.password.data - File: i_dev_flask/app/auth/views.py - > Line 138: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.login')) - File: i_dev_flask/app/auth/views.py - > Line 142: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.lgoin')) - File: i_dev_flask/app/auth/views.py - > Line 150: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.login')) -File: i_dev_flask/app/auth/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('auth/reset_confirm.html',form=form) - - - -paulsavala/flask_aws_demo -https://github.com/paulsavala/flask_aws_demo -Entry file: None -Scanned: 2016-10-20 11:44:43.475119 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -udpcloud/flask-rest-api -https://github.com/udpcloud/flask-rest-api -Entry file: flask-rest-api/app/__init__.py -Scanned: 2016-10-20 11:44:46.043627 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AndersonQ/appengine-flask-contacts-api -https://github.com/AndersonQ/appengine-flask-contacts-api -Entry file: appengine-flask-contacts-api/application/__init__.py -Scanned: 2016-10-20 11:44:51.472941 -No vulnerabilities found. - - -dhiraka/flask_basic_app -https://github.com/dhiraka/flask_basic_app -Entry file: flask_basic_app/test_rest_app.py -Scanned: 2016-10-20 11:44:52.794835 -No vulnerabilities found. - - -aaronja38/assignment10-flask -https://github.com/aaronja38/assignment10-flask -Entry file: assignment10-flask/winners.py -Scanned: 2016-10-20 11:44:54.441241 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: assignment10-flask/env/lib/python2.7/genericpath.py - -avikantz/Flask-API-Demo -https://github.com/avikantz/Flask-API-Demo -Entry file: Flask-API-Demo/app/__init__.py -Scanned: 2016-10-20 11:44:57.756482 -No vulnerabilities found. - - -deenaacree/flask_app1 -https://github.com/deenaacree/flask_app1 -Entry file: flask_app1/songsapp.py -Scanned: 2016-10-20 11:44:58.403494 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_app1/env/lib/python2.7/genericpath.py - -AMontalva/flask_hello_world -https://github.com/AMontalva/flask_hello_world -Entry file: None -Scanned: 2016-10-20 11:44:58.914686 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AMontalva/flask_hello_world. - -xiewenlongs/Flask-CacheOBJ -https://github.com/xiewenlongs/Flask-CacheOBJ -Entry file: Flask-CacheOBJ/tests.py -Scanned: 2016-10-20 11:45:04.652870 -No vulnerabilities found. - - -thefunkjunky/python-flask-boilerplate -https://github.com/thefunkjunky/python-flask-boilerplate -Entry file: python-flask-boilerplate/mainapp/__init__.py -Scanned: 2016-10-20 11:45:06.055657 -No vulnerabilities found. - - -harryoh/flask-rest-api -https://github.com/harryoh/flask-rest-api -Entry file: flask-rest-api/app/__init__.py -Scanned: 2016-10-20 11:45:06.585333 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DanBlakeman/flask-deploy-practice -https://github.com/DanBlakeman/flask-deploy-practice -Entry file: flask-deploy-practice/src/app.py -Scanned: 2016-10-20 11:45:12.945361 -No vulnerabilities found. - - -MoxmiNu/flask-mongo-test -https://github.com/MoxmiNu/flask-mongo-test -Entry file: flask-mongo-test/provisioning/files/dr-app.py -Scanned: 2016-10-20 11:45:30.163768 -No vulnerabilities found. - - -medev21/Social-Network---Flask -https://github.com/medev21/Social-Network---Flask -Entry file: Social-Network---Flask/app.py -Scanned: 2016-10-20 11:45:31.738882 -No vulnerabilities found. - - -sealzjh/flask-celery-test -https://github.com/sealzjh/flask-celery-test -Entry file: None -Scanned: 2016-10-20 11:45:32.276707 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sealzjh/flask-celery-test. - -Glaun/flask-hello-world -https://github.com/Glaun/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:45:32.819936 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -PushpakPati/flask-by-example -https://github.com/PushpakPati/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 11:45:33.505594 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aintmetho/flask -https://github.com/aintmetho/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:45:35.492073 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -acouderc/flask -https://github.com/acouderc/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:45:36.077047 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -MapEntryManagement/flask -https://github.com/MapEntryManagement/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:45:36.647749 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -klen/flask-pw -https://github.com/klen/flask-pw -Entry file: flask-pw/tests.py -Scanned: 2016-10-20 11:45:38.228035 -No vulnerabilities found. - - -KujiraProject/Flask-PAM -https://github.com/KujiraProject/Flask-PAM -Entry file: Flask-PAM/example/www.py -Scanned: 2016-10-20 11:45:39.766944 -No vulnerabilities found. - - -colingorrie/flask-boilerplate -https://github.com/colingorrie/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 11:45:40.288712 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/colingorrie/flask-boilerplate. - -TwilioDevEd/automated-survey-flask -https://github.com/TwilioDevEd/automated-survey-flask -Entry file: automated-survey-flask/automated_survey_flask/__init__.py -Scanned: 2016-10-20 11:45:45.550497 -No vulnerabilities found. - - -wangxuan007/flasky -https://github.com/wangxuan007/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:45:46.112520 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lambdaplus/flasko -https://github.com/lambdaplus/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-20 11:45:46.840921 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py - -xiaohu2015/Flasky -https://github.com/xiaohu2015/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-20 11:45:47.355217 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yu66s/flaskr -https://github.com/yu66s/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:45:47.874416 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cwywang/flasky -https://github.com/cwywang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:45:48.399399 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gene1wood/flaskoktaapp -https://github.com/gene1wood/flaskoktaapp -Entry file: flaskoktaapp/flaskoktaapp/__init__.py -Scanned: 2016-10-20 11:45:49.945351 -Vulnerability 1: -File: flaskoktaapp/flaskoktaapp/__init__.py - > User input at line 201, trigger word "form[": - url = request.form['RelayState'] -File: flaskoktaapp/flaskoktaapp/__init__.py - > reaches line 196, trigger word "url_for(": - url = url_for('user') - -Vulnerability 2: -File: flaskoktaapp/flaskoktaapp/__init__.py - > User input at line 201, trigger word "form[": - url = request.form['RelayState'] -File: flaskoktaapp/flaskoktaapp/__init__.py - > reaches line 204, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - - - -SSUHan/flasktutorial -https://github.com/SSUHan/flasktutorial -Entry file: None -Scanned: 2016-10-20 11:45:50.469065 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ma53192190/flaskwork -https://github.com/ma53192190/flaskwork -Entry file: flaskwork/flaskwork.py -Scanned: 2016-10-20 11:45:51.895729 -No vulnerabilities found. - - -hoobalias/Flaskr -https://github.com/hoobalias/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 11:45:52.410678 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NapoleonYoung/FlaskWeb -https://github.com/NapoleonYoung/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-20 11:45:54.983868 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -zhouyang2640/FlaskInit -https://github.com/zhouyang2640/FlaskInit -Entry file: FlaskInit/hello.py -Scanned: 2016-10-20 11:45:57.416953 -No vulnerabilities found. - - -s3c0nDD/FlaskTutorial -https://github.com/s3c0nDD/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 11:45:58.937711 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ZaighumRajput/flaskPractice -https://github.com/ZaighumRajput/flaskPractice -Entry file: flaskPractice/chapter3/hello.py -Scanned: 2016-10-20 11:46:00.400868 -No vulnerabilities found. - - -rmotr/flask-api-example -https://github.com/rmotr/flask-api-example -Entry file: flask-api-example/api/_04_delete_method.py -Scanned: 2016-10-20 11:46:06.242501 -No vulnerabilities found. - - -frankpiva/mastering-flask -https://github.com/frankpiva/mastering-flask -Entry file: mastering-flask/main.py -Scanned: 2016-10-20 11:46:13.058826 -No vulnerabilities found. - - -sandmarq/flask_test -https://github.com/sandmarq/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 11:46:13.669869 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -barcai/Flask_Megatutorial -https://github.com/barcai/Flask_Megatutorial -Entry file: Flask_Megatutorial/app/__init__.py -Scanned: 2016-10-20 11:46:32.210770 -No vulnerabilities found. - - -kosen10spajam/f-flask -https://github.com/kosen10spajam/f-flask -Entry file: f-flask/main.py -Scanned: 2016-10-20 11:46:33.643798 -Vulnerability 1: -File: f-flask/main.py - > User input at line 132, trigger word "get(": - since = int(request.args.get('since')) -File: f-flask/main.py - > reaches line 134, trigger word "execute(": - sql.execute('SELECT time, animal, message FROM messages WHERE time >= %d' % since) - -Vulnerability 2: -File: f-flask/main.py - > User input at line 142, trigger word "get(": - animal = request.values.get('animal') -File: f-flask/main.py - > reaches line 146, trigger word "execute(": - sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message)) - -Vulnerability 3: -File: f-flask/main.py - > User input at line 143, trigger word "get(": - message = request.values.get('message') -File: f-flask/main.py - > reaches line 146, trigger word "execute(": - sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message)) - -Vulnerability 4: -File: f-flask/main.py - > User input at line 144, trigger word "get(": - time = int(request.values.get('time')) -File: f-flask/main.py - > reaches line 146, trigger word "execute(": - sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message)) - - - -jjapp/flask-blog -https://github.com/jjapp/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:46:34.224348 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -engfilipe/curso_flask -https://github.com/engfilipe/curso_flask -Entry file: curso_flask/photolog/__init__.py -Scanned: 2016-10-20 11:46:43.022211 -Vulnerability 1: -File: curso_flask/photolog/login_view.py - > User input at line 39, trigger word "get(": - next_ = request.args.get('next') -Reassigned in: - File: curso_flask/photolog/login_view.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect('/index') - File: curso_flask/photolog/login_view.py - > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Autenticação', form=form) - File: curso_flask/photolog/login_view.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: curso_flask/photolog/login_view.py - > reaches line 40, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_ or url_for('lista')) - -Vulnerability 2: -File: curso_flask/photolog/login_view.py - > User input at line 39, trigger word "get(": - next_ = request.args.get('next') -Reassigned in: - File: curso_flask/photolog/login_view.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect('/index') - File: curso_flask/photolog/login_view.py - > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Autenticação', form=form) - File: curso_flask/photolog/login_view.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: curso_flask/photolog/login_view.py - > reaches line 40, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next_ or url_for('lista')) - - - -zhang-zhang/learning-flask -https://github.com/zhang-zhang/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 11:46:43.674059 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mihai011/flask_server -https://github.com/mihai011/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-20 11:46:44.184170 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -morganvdavis/boilerplate-flask -https://github.com/morganvdavis/boilerplate-flask -Entry file: None -Scanned: 2016-10-20 11:46:44.693651 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/morganvdavis/boilerplate-flask. - -jwg4/flask_converter -https://github.com/jwg4/flask_converter -Entry file: flask_converter/examples/app_with_constructor.py -Scanned: 2016-10-20 11:46:46.156503 -No vulnerabilities found. - - -AVandelay/flask_blog -https://github.com/AVandelay/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:46:46.688693 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Davidthecoolsmartguy/weasyprint-Flask -https://github.com/Davidthecoolsmartguy/weasyprint-Flask -Entry file: weasyprint-Flask/app.py -Scanned: 2016-10-20 11:46:47.998172 -No vulnerabilities found. - - -rajdeepd/flask-helloworld -https://github.com/rajdeepd/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-20 11:46:55.613529 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-helloworld/venv/lib/python2.7/genericpath.py - -honeeWong/Flask-Blog -https://github.com/honeeWong/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-20 11:46:56.590231 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -frenos/flask-sample -https://github.com/frenos/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-20 11:46:57.114142 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lockie/flask_ldap -https://github.com/lockie/flask_ldap -Entry file: flask_ldap/index.py -Scanned: 2016-10-20 11:46:58.501002 -Vulnerability 1: -File: flask_ldap/index.py - > User input at line 28, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask_ldap/index.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask_ldap/index.py - > reaches line 29, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - -Vulnerability 2: -File: flask_ldap/index.py - > User input at line 28, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask_ldap/index.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask_ldap/index.py - > reaches line 29, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - - - -AndreyBalandin/flask-test -https://github.com/AndreyBalandin/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:46:59.034904 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -kessiacastro/imdb-flask -https://github.com/kessiacastro/imdb-flask -Entry file: imdb-flask/app.py -Scanned: 2016-10-20 11:47:06.609505 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -Y-Rookie/flask_blog -https://github.com/Y-Rookie/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:47:07.757330 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lizmeister321/flask_practice -https://github.com/lizmeister321/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-20 11:47:08.286756 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AmI-2016/python-Flask -https://github.com/AmI-2016/python-Flask -Entry file: python-Flask/PYTHON_FLASK/friends/server.py -Scanned: 2016-10-20 11:47:08.883472 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-Flask/PYTHON_FLASK/friends/venv/lib/python2.7/genericpath.py - -phillip-hopper/flask-test -https://github.com/phillip-hopper/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:47:09.409155 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -thewhitedingo/MenuFlask -https://github.com/thewhitedingo/MenuFlask -Entry file: MenuFlask/flaskserver.py -Scanned: 2016-10-20 11:47:11.453803 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -anazard/zardify_flask -https://github.com/anazard/zardify_flask -Entry file: zardify_flask/main/__init__.py -Scanned: 2016-10-20 11:47:19.599543 -No vulnerabilities found. - - -anazard/flask_project -https://github.com/anazard/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-20 11:47:20.411781 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -buckeye76guy/learning-flask -https://github.com/buckeye76guy/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 11:47:20.989097 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wkqzxh/flask_leaklib -https://github.com/wkqzxh/flask_leaklib -Entry file: flask_leaklib/flask_leaklib/leaklib_app/__init__.py -Scanned: 2016-10-20 11:47:22.441753 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brightforme/flask-sqlalchemy -https://github.com/brightforme/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-20 11:47:23.449132 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pedrogaudencio/refunite-flask -https://github.com/pedrogaudencio/refunite-flask -Entry file: refunite-flask/app.py -Scanned: 2016-10-20 11:47:33.447613 -No vulnerabilities found. - - -holmandw/flask-arduino -https://github.com/holmandw/flask-arduino -Entry file: flask-arduino/app/__init__.py -Scanned: 2016-10-20 11:47:35.395762 -No vulnerabilities found. - - -zenyui/flask-test -https://github.com/zenyui/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:47:35.957299 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -vobine/JobFlask -https://github.com/vobine/JobFlask -Entry file: None -Scanned: 2016-10-20 11:47:37.594739 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vobine/JobFlask. - -Lobster1991/learn_flask -https://github.com/Lobster1991/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 11:47:44.119361 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SarahJaine/flask-tutorial -https://github.com/SarahJaine/flask-tutorial -Entry file: None -Scanned: 2016-10-20 11:47:44.626875 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vatseek/flask_lessons -https://github.com/vatseek/flask_lessons -Entry file: flask_lessons/app/__init__.py -Scanned: 2016-10-20 11:47:46.064443 -No vulnerabilities found. - - -Michael-F-Bryan/flask_template -https://github.com/Michael-F-Bryan/flask_template -Entry file: None -Scanned: 2016-10-20 11:47:46.585388 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Michael-F-Bryan/flask_template. - -ol3j/azureday-flask -https://github.com/ol3j/azureday-flask -Entry file: azureday-flask/FlaskWebProject/__init__.py -Scanned: 2016-10-20 11:47:49.945825 -Vulnerability 1: -File: azureday-flask/FlaskWebProject/views.py - > User input at line 57, trigger word "form[": - mobile = request.form['yourmobile'] -Reassigned in: - File: azureday-flask/FlaskWebProject/views.py - > Line 74: task = 'PartitionKey''RowKey''mobile''file''tasksPoznan'suffixmobilefilename - File: azureday-flask/FlaskWebProject/views.py - > Line 77: new = db.Log(suffix=suffix, mobile=mobile, image=filename) -File: azureday-flask/FlaskWebProject/views.py - > reaches line 86, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('form_action.html',mobile=mobile, url=url, important_metric=important_metric) - -Vulnerability 2: -File: azureday-flask/FlaskWebProject/views.py - > User input at line 58, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: azureday-flask/FlaskWebProject/views.py - > Line 59: basename = file.filename - File: azureday-flask/FlaskWebProject/views.py - > Line 61: filename = '_'.join([suffix, basename]) - File: azureday-flask/FlaskWebProject/views.py - > Line 68: url = blob_service.make_blob_url(https://github.com/container_name='images',%20blob_name=filename) - File: azureday-flask/FlaskWebProject/views.py - > Line 72: body = json.dumps('suffix''image'str(suffix)str(url)) - File: azureday-flask/FlaskWebProject/views.py - > Line 74: task = 'PartitionKey''RowKey''mobile''file''tasksPoznan'suffixmobilefilename - File: azureday-flask/FlaskWebProject/views.py - > Line 77: new = db.Log(suffix=suffix, mobile=mobile, image=filename) -File: azureday-flask/FlaskWebProject/views.py - > reaches line 86, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('form_action.html',mobile=mobile, url=url, important_metric=important_metric) - - - -runningstrawberry/microblog -https://github.com/runningstrawberry/microblog -Entry file: None -Scanned: 2016-10-20 11:47:50.468265 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ShivamMahajan/my_first_flask_project -https://github.com/ShivamMahajan/my_first_flask_project -Entry file: my_first_flask_project/hello.py -Scanned: 2016-10-20 11:48:04.411840 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_first_flask_project/venv/lib/python2.7/genericpath.py - -sakib3/flask_Cartridge_openshift -https://github.com/sakib3/flask_Cartridge_openshift -Entry file: flask_Cartridge_openshift/flaskapp.py -Scanned: 2016-10-20 11:48:05.745820 -No vulnerabilities found. - - -AdamHumphrey/housing2016flask -https://github.com/AdamHumphrey/housing2016flask -Entry file: None -Scanned: 2016-10-20 11:48:07.590194 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AdamHumphrey/housing2016flask. - -sakib3/flask_cartridge_Heroku -https://github.com/sakib3/flask_cartridge_Heroku -Entry file: flask_cartridge_Heroku/app.py -Scanned: 2016-10-20 11:48:08.896464 -No vulnerabilities found. - - -gclabon/Twilio-Flask-CSV -https://github.com/gclabon/Twilio-Flask-CSV -Entry file: Twilio-Flask-CSV/twilioFlaskBasic/twilioFlaskBasic.py -Scanned: 2016-10-20 11:48:10.343014 -No vulnerabilities found. - - -mfyock/flask_hello_world -https://github.com/mfyock/flask_hello_world -Entry file: None -Scanned: 2016-10-20 11:48:10.874759 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mfyock/flask_hello_world. - -SamirKanaan/PlantillaFlaskREST2 -https://github.com/SamirKanaan/PlantillaFlaskREST2 -Entry file: PlantillaFlaskREST2/inicia.py -Scanned: 2016-10-20 11:48:12.311389 -No vulnerabilities found. - - -3130000547/musicbox-base-on-flask -https://github.com/3130000547/musicbox-base-on-flask -Entry file: musicbox-base-on-flask/musicbox.py -Scanned: 2016-10-20 11:48:13.860956 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AjithPanneerselvam/my_flask_project -https://github.com/AjithPanneerselvam/my_flask_project -Entry file: my_flask_project/project.py -Scanned: 2016-10-20 11:48:15.281538 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pravinthsam/MnistFlaskKeras -https://github.com/pravinthsam/MnistFlaskKeras -Entry file: MnistFlaskKeras/flaskserver.py -Scanned: 2016-10-20 11:48:16.699129 -No vulnerabilities found. - - -rfmapp/flask-by-example -https://github.com/rfmapp/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 11:48:17.384554 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -macloo/flask_project1 -https://github.com/macloo/flask_project1 -Entry file: flask_project1/winners_BAK.py -Scanned: 2016-10-20 11:48:18.797894 -No vulnerabilities found. - - -dschuler36/SimpleFlaskBlog -https://github.com/dschuler36/SimpleFlaskBlog -Entry file: SimpleFlaskBlog/main.py -Scanned: 2016-10-20 11:48:27.960722 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -avikantz/Flask-API-Demo -https://github.com/avikantz/Flask-API-Demo -Entry file: Flask-API-Demo/app/__init__.py -Scanned: 2016-10-20 11:48:30.248494 -No vulnerabilities found. - - -dengjonathan/flask_first_project -https://github.com/dengjonathan/flask_first_project -Entry file: flask_first_project/final_project.py -Scanned: 2016-10-20 11:48:34.038717 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -boyombo/asterisk-pycall-flask -https://github.com/boyombo/asterisk-pycall-flask -Entry file: asterisk-pycall-flask/calldemo/app.py -Scanned: 2016-10-20 11:48:35.436761 -No vulnerabilities found. - - -kaslemr/sample_flask_project -https://github.com/kaslemr/sample_flask_project -Entry file: sample_flask_project/app2.py -Scanned: 2016-10-20 11:48:36.919097 -Vulnerability 1: -File: sample_flask_project/app.py - > User input at line 81, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: sample_flask_project/app.py - > reaches line 88, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201) - -Vulnerability 2: -File: sample_flask_project/app2.py - > User input at line 129, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: sample_flask_project/app2.py - > Line 135: user = User(username=username) -File: sample_flask_project/app2.py - > reaches line 139, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: sample_flask_project/app2.py - > User input at line 129, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: sample_flask_project/app2.py - > Line 135: user = User(username=username) -File: sample_flask_project/app2.py - > reaches line 139, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 4: -File: sample_flask_project/app2.py - > User input at line 145, trigger word "get(": - user = User.query.get(id) -File: sample_flask_project/app2.py - > reaches line 148, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username) - - - -mapingfan/Flask-Mail-Test -https://github.com/mapingfan/Flask-Mail-Test -Entry file: Flask-Mail-Test/Mail-Test.py -Scanned: 2016-10-20 11:48:39.306433 -No vulnerabilities found. - - -4Catalyzer/flask-resty-tenants -https://github.com/4Catalyzer/flask-resty-tenants -Entry file: flask-resty-tenants/tests/conftest.py -Scanned: 2016-10-20 11:48:40.977661 -No vulnerabilities found. - - -lucaswadedavis/iguanodon -https://github.com/lucaswadedavis/iguanodon -Entry file: iguanodon/server.py -Scanned: 2016-10-20 11:48:43.165765 -No vulnerabilities found. - - -ederavilaprado/paas-app-example-python-flask -https://github.com/ederavilaprado/paas-app-example-python-flask -Entry file: paas-app-example-python-flask/app.py -Scanned: 2016-10-20 11:48:45.958243 -No vulnerabilities found. - - -afh/yabab -https://github.com/afh/yabab -Entry file: yabab/yabab/__init__.py -Scanned: 2016-10-20 11:48:47.848623 -No vulnerabilities found. - - -Michael-F-Bryan/mfb_website -https://github.com/Michael-F-Bryan/mfb_website -Entry file: mfb_website/app/__init__.py -Scanned: 2016-10-20 11:48:49.271442 -No vulnerabilities found. - - -Yelloworking/SlackWebservice -https://github.com/Yelloworking/SlackWebservice -Entry file: None -Scanned: 2016-10-20 11:48:51.543547 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Yelloworking/SlackWebservice. - -TrailBlazerZ/imgaptcha--api -https://github.com/TrailBlazerZ/imgaptcha--api -Entry file: imgaptcha--api/app.py -Scanned: 2016-10-20 11:48:54.286516 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NSBum/AnkiStatsServer -https://github.com/NSBum/AnkiStatsServer -Entry file: AnkiStatsServer/app.py -Scanned: 2016-10-20 11:48:58.241346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yobuntu/laboratory -https://github.com/yobuntu/laboratory -Entry file: laboratory/laboratory/fooflask.py -Scanned: 2016-10-20 11:49:06.663150 -Vulnerability 1: -File: laboratory/laboratory/tests/test_base.py - > User input at line 5, trigger word "get(": - response = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 5, trigger word "url_for(": - response = client.get(url_for('hello')) - -Vulnerability 2: -File: laboratory/laboratory/tests/test_base.py - > User input at line 11, trigger word "get(": - r = client.get(url_for('add',name='test')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 11, trigger word "url_for(": - r = client.get(url_for('add',name='test')) - -Vulnerability 3: -File: laboratory/laboratory/tests/test_base.py - > User input at line 12, trigger word "get(": - r = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 11, trigger word "url_for(": - r = client.get(url_for('add',name='test')) - -Vulnerability 4: -File: laboratory/laboratory/tests/test_base.py - > User input at line 11, trigger word "get(": - r = client.get(url_for('add',name='test')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 12, trigger word "url_for(": - r = client.get(url_for('hello')) - -Vulnerability 5: -File: laboratory/laboratory/tests/test_base.py - > User input at line 12, trigger word "get(": - r = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 12, trigger word "url_for(": - r = client.get(url_for('hello')) - -Vulnerability 6: -File: laboratory/laboratory/tests/test_base.py - > User input at line 19, trigger word "get(": - response = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 19, trigger word "url_for(": - response = client.get(url_for('hello')) - -Vulnerability 7: -File: laboratory/laboratory/tests/test_base.py - > User input at line 26, trigger word "get(": - r = client.get(url_for('add',name='test0')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 26, trigger word "url_for(": - r = client.get(url_for('add',name='test0')) - -Vulnerability 8: -File: laboratory/laboratory/tests/test_base.py - > User input at line 27, trigger word "get(": - r = client.get(url_for('add',name='test1')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 26, trigger word "url_for(": - r = client.get(url_for('add',name='test0')) - -Vulnerability 9: -File: laboratory/laboratory/tests/test_base.py - > User input at line 28, trigger word "get(": - r = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 26, trigger word "url_for(": - r = client.get(url_for('add',name='test0')) - -Vulnerability 10: -File: laboratory/laboratory/tests/test_base.py - > User input at line 26, trigger word "get(": - r = client.get(url_for('add',name='test0')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 27, trigger word "url_for(": - r = client.get(url_for('add',name='test1')) - -Vulnerability 11: -File: laboratory/laboratory/tests/test_base.py - > User input at line 27, trigger word "get(": - r = client.get(url_for('add',name='test1')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 27, trigger word "url_for(": - r = client.get(url_for('add',name='test1')) - -Vulnerability 12: -File: laboratory/laboratory/tests/test_base.py - > User input at line 28, trigger word "get(": - r = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 27, trigger word "url_for(": - r = client.get(url_for('add',name='test1')) - -Vulnerability 13: -File: laboratory/laboratory/tests/test_base.py - > User input at line 26, trigger word "get(": - r = client.get(url_for('add',name='test0')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 28, trigger word "url_for(": - r = client.get(url_for('hello')) - -Vulnerability 14: -File: laboratory/laboratory/tests/test_base.py - > User input at line 27, trigger word "get(": - r = client.get(url_for('add',name='test1')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 28, trigger word "url_for(": - r = client.get(url_for('hello')) - -Vulnerability 15: -File: laboratory/laboratory/tests/test_base.py - > User input at line 28, trigger word "get(": - r = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 28, trigger word "url_for(": - r = client.get(url_for('hello')) - -Vulnerability 16: -File: laboratory/laboratory/tests/test_base.py - > User input at line 36, trigger word "get(": - response = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 36, trigger word "url_for(": - response = client.get(url_for('hello')) - - - -hkalexling/Twitter-Like-Count -https://github.com/hkalexling/Twitter-Like-Count -Entry file: Twitter-Like-Count/__init__.py -Scanned: 2016-10-20 11:49:08.474805 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ljxxcaijing/flask -https://github.com/ljxxcaijing/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:49:10.393134 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -migrateup/flaskr -https://github.com/migrateup/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:49:10.901974 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PacktPublishing/Mastering-Flask -https://github.com/PacktPublishing/Mastering-Flask -Entry file: Mastering-Flask/Chapter 4_Code/chapter_4/main.py -Scanned: 2016-10-20 11:49:14.729167 -No vulnerabilities found. - - -reparadocs/Flask-HelloWorldBot -https://github.com/reparadocs/Flask-HelloWorldBot -Entry file: Flask-HelloWorldBot/HelloWorldBot.py -Scanned: 2016-10-20 11:49:16.060135 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -singingwolfboy/flask-sse -https://github.com/singingwolfboy/flask-sse -Entry file: flask-sse/tests/conftest.py -Scanned: 2016-10-20 11:49:17.573778 -No vulnerabilities found. - - -pankajpant22/flask -https://github.com/pankajpant22/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:49:18.168127 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -underdogio/flask-graylog -https://github.com/underdogio/flask-graylog -Entry file: flask-graylog/example/app.py -Scanned: 2016-10-20 11:49:19.465636 -No vulnerabilities found. - - -adyouri/flask-basics -https://github.com/adyouri/flask-basics -Entry file: flask-basics/hello.py -Scanned: 2016-10-20 11:49:20.011116 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KujiraProject/Flask-PAM -https://github.com/KujiraProject/Flask-PAM -Entry file: Flask-PAM/example/www.py -Scanned: 2016-10-20 11:49:21.549470 -No vulnerabilities found. - - -gucxufangling/flask-- -https://github.com/gucxufangling/flask-- -Entry file: flask--/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-20 11:49:37.592631 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TwilioDevEd/automated-survey-flask -https://github.com/TwilioDevEd/automated-survey-flask -Entry file: automated-survey-flask/automated_survey_flask/__init__.py -Scanned: 2016-10-20 11:49:42.810311 -No vulnerabilities found. - - -pragmaticcoders/flask-react-seed -https://github.com/pragmaticcoders/flask-react-seed -Entry file: None -Scanned: 2016-10-20 11:49:44.355024 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pragmaticcoders/flask-react-seed. - -jinxiaoyuan/flaskr -https://github.com/jinxiaoyuan/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:49:44.865187 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fkirwin/flaskhelloworld -https://github.com/fkirwin/flaskhelloworld -Entry file: flaskhelloworld/hello_world.py -Scanned: 2016-10-20 11:49:51.600904 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wang7lu6qiang5/flasky -https://github.com/wang7lu6qiang5/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:49:52.106237 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ak042/flasktaskr -https://github.com/ak042/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:49:52.619167 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ailtoncsf/flasklearn -https://github.com/ailtoncsf/flasklearn -Entry file: flasklearn/flask-basics/app.py -Scanned: 2016-10-20 11:50:02.026335 -No vulnerabilities found. - - -VimDong/flaskme -https://github.com/VimDong/flaskme -Entry file: flaskme/app/__init__.py -Scanned: 2016-10-20 11:50:03.794710 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -annoys-parrot/flaskbook -https://github.com/annoys-parrot/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-20 11:50:04.342924 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -axavio/flasky -https://github.com/axavio/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:50:04.869110 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -danil3d/flaskblog -https://github.com/danil3d/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 11:50:05.632994 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -wanghaa/flasky -https://github.com/wanghaa/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:50:06.144498 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -omshankar1/flaskapp -https://github.com/omshankar1/flaskapp -Entry file: None -Scanned: 2016-10-20 11:50:06.648732 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/omshankar1/flaskapp. - -maxwang051/flasktaskr -https://github.com/maxwang051/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:50:07.147439 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -NapoleonYoung/FlaskWeb -https://github.com/NapoleonYoung/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-20 11:50:07.720508 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -joanna-solomiewicz/FlaskWorkshop -https://github.com/joanna-solomiewicz/FlaskWorkshop -Entry file: FlaskWorkshop/app.py -Scanned: 2016-10-20 11:50:14.481640 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWorkshop/venv/lib/python3.5/struct.py - -rmGuarachi/flaskTutorial -https://github.com/rmGuarachi/flaskTutorial -Entry file: flaskTutorial/flaskr.py -Scanned: 2016-10-20 11:50:15.102868 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskTutorial/venv/lib/python2.7/genericpath.py - -mion00/flaskSQLAlchemy -https://github.com/mion00/flaskSQLAlchemy -Entry file: flaskSQLAlchemy/app.py -Scanned: 2016-10-20 11:50:16.875812 -Vulnerability 1: -File: flaskSQLAlchemy/app.py - > User input at line 32, trigger word "get(": - service = request.args.get('service') -File: flaskSQLAlchemy/app.py - > reaches line 34, trigger word "filter(": - users = User.query.filter(User.json.has_key(service)).all() - - - -GriMel/FlaskFirst -https://github.com/GriMel/FlaskFirst -Entry file: FlaskFirst/app/__init__.py -Scanned: 2016-10-20 11:50:18.198775 -No vulnerabilities found. - - -Pazoles/Geocoder -https://github.com/Pazoles/Geocoder -Entry file: Geocoder/app.py -Scanned: 2016-10-20 11:50:25.371265 -No vulnerabilities found. - - -NixonInnes/Flask-Blueprints -https://github.com/NixonInnes/Flask-Blueprints -Entry file: Flask-Blueprints/app/__init__.py -Scanned: 2016-10-20 11:50:27.986451 -No vulnerabilities found. - - -isichkodmitry/flask-caesar -https://github.com/isichkodmitry/flask-caesar -Entry file: flask-caesar/app/__init__.py -Scanned: 2016-10-20 11:50:29.582582 -No vulnerabilities found. - - -zhang-zhang/learning-flask -https://github.com/zhang-zhang/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 11:50:30.174261 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tyrelsouza/flask_vagrant -https://github.com/tyrelsouza/flask_vagrant -Entry file: flask_vagrant/code/src/app.py -Scanned: 2016-10-20 11:50:31.750130 -No vulnerabilities found. - - -SShayashi/flask-test -https://github.com/SShayashi/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:50:32.335556 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -ak042/flask-blog -https://github.com/ak042/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:50:32.886171 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -and3rson/flask-testsite -https://github.com/and3rson/flask-testsite -Entry file: flask-testsite/app.py -Scanned: 2016-10-20 11:50:34.171562 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spring3th/flask-blogdemo -https://github.com/spring3th/flask-blogdemo -Entry file: flask-blogdemo/app/__init__.py -Scanned: 2016-10-20 11:50:36.544923 -Vulnerability 1: -File: flask-blogdemo/app/main/views.py - > User input at line 27, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 35: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['SIKA_POSTS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 38: posts = pagination.items - File: flask-blogdemo/app/main/views.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blogdemo/app/main/views.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flask-blogdemo/app/main/views.py - > User input at line 30, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 28: show_followed = False - File: flask-blogdemo/app/main/views.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blogdemo/app/main/views.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flask-blogdemo/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 45: pagination = User.query.order_by(User.member_since.desc()).paginate(page,per_page=current_app.config['SIKA_USERS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 46: alluser = pagination.items -File: flask-blogdemo/app/main/views.py - > reaches line 47, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('alluser.html',alluser=alluser, pagination=pagination, page=page) - -Vulnerability 4: -File: flask-blogdemo/app/main/views.py - > User input at line 106, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 108: page = post.comments.count() - 1 // current_app.config['SIKA_COMMENTS_PER_PAGE'] + 1 - File: flask-blogdemo/app/main/views.py - > Line 110: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['SIKA_COMMENTS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 111: comments = pagination.items - File: flask-blogdemo/app/main/views.py - > Line 105: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask-blogdemo/app/main/views.py - > reaches line 112, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flask-blogdemo/app/main/views.py - > User input at line 184, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 185: pagination = user.followers.paginate(page,per_page=current_app.config['SIKA_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 188: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask-blogdemo/app/main/views.py - > Line 183: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blogdemo/app/main/views.py - > reaches line 190, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flask-blogdemo/app/main/views.py - > User input at line 201, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 202: pagination = user.followed.paginate(page,per_page=current_app.config['SIKA_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 205: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask-blogdemo/app/main/views.py - > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blogdemo/app/main/views.py - > reaches line 207, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flask-blogdemo/app/main/views.py - > User input at line 230, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 231: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['SIKA_COMMENTS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 232: comments = pagination.items -File: flask-blogdemo/app/main/views.py - > reaches line 233, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -syniuhin/storyteller-flask -https://github.com/syniuhin/storyteller-flask -Entry file: storyteller-flask/app/__init__.py -Scanned: 2016-10-20 11:50:38.700123 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arushijain/flask_tutorial -https://github.com/arushijain/flask_tutorial -Entry file: None -Scanned: 2016-10-20 11:50:39.276000 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -iooop/flask-blog -https://github.com/iooop/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:50:43.827708 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -AndreyBalandin/flask-test -https://github.com/AndreyBalandin/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:50:45.357784 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -mastershao/lening-flask -https://github.com/mastershao/lening-flask -Entry file: None -Scanned: 2016-10-20 11:50:53.274447 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mastershao/lening-flask. - -markchodges/mastering-flask -https://github.com/markchodges/mastering-flask -Entry file: mastering-flask/webapp/__init__.py -Scanned: 2016-10-20 11:51:00.407518 -Vulnerability 1: -File: mastering-flask/webapp/controllers/blog.py - > User input at line 71, trigger word ".data": - filename = secure_filename(form.photo.data.filename) -Reassigned in: - File: mastering-flask/webapp/controllers/blog.py - > Line 74: filename = None -File: mastering-flask/webapp/controllers/blog.py - > reaches line 75, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('upload.html',form=form, filename=filename) - - - -keeleys/flask_RESTful -https://github.com/keeleys/flask_RESTful -Entry file: flask_RESTful/api/__init__.py -Scanned: 2016-10-20 11:51:01.740495 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AmI-2016/python-Flask -https://github.com/AmI-2016/python-Flask -Entry file: python-Flask/PYTHON_FLASK/friends/server.py -Scanned: 2016-10-20 11:51:04.794935 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-Flask/PYTHON_FLASK/friends/venv/lib/python2.7/genericpath.py - -SorenPeterson/flask-intro -https://github.com/SorenPeterson/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:51:05.341200 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -an5rag/flask-tutorial -https://github.com/an5rag/flask-tutorial -Entry file: None -Scanned: 2016-10-20 11:51:05.845480 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sugarguo/Flask_Blog -https://github.com/sugarguo/Flask_Blog -Entry file: Flask_Blog/Blog/blog.py -Scanned: 2016-10-20 11:51:08.011946 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andresgariglio/poc-flask -https://github.com/andresgariglio/poc-flask -Entry file: poc-flask/poc-flask/flask_rest_service/__init__.py -Scanned: 2016-10-20 11:51:09.317331 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Datamine/PokerTexter -https://github.com/Datamine/PokerTexter -Entry file: PokerTexter/run-pokertexter.py -Scanned: 2016-10-20 11:51:11.588921 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stuncyilmaz/flask_init -https://github.com/stuncyilmaz/flask_init -Entry file: None -Scanned: 2016-10-20 11:51:12.093597 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/stuncyilmaz/flask_init. - -mrpatiwi/flask-starter -https://github.com/mrpatiwi/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-20 11:51:15.601579 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jmccutchan/raspi_flask -https://github.com/jmccutchan/raspi_flask -Entry file: raspi_flask/app.py -Scanned: 2016-10-20 11:51:23.503423 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -priyankt68/flask_example -https://github.com/priyankt68/flask_example -Entry file: None -Scanned: 2016-10-20 11:51:23.995704 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zeratullich/flask_maizi -https://github.com/zeratullich/flask_maizi -Entry file: flask_maizi/app/__init__.py -Scanned: 2016-10-20 11:51:29.742515 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mtimebombm/python-flask -https://github.com/mtimebombm/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 11:51:30.258566 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Lobster1991/learn_flask -https://github.com/Lobster1991/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 11:51:30.767375 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JessyHurbain/Flask_test -https://github.com/JessyHurbain/Flask_test -Entry file: Flask_test/coucou.py -Scanned: 2016-10-20 11:51:32.104940 -No vulnerabilities found. - - -achinnac/microblog-flask -https://github.com/achinnac/microblog-flask -Entry file: None -Scanned: 2016-10-20 11:51:32.639952 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jpirih/Flask-Blog -https://github.com/jpirih/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-20 11:51:33.178510 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhaokefei/web_flask -https://github.com/zhaokefei/web_flask -Entry file: web_flask/app/__init__.py -Scanned: 2016-10-20 11:51:35.543871 -Vulnerability 1: -File: web_flask/app/main/views.py - > User input at line 24, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: web_flask/app/main/views.py - > Line 25: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: web_flask/app/main/views.py - > Line 28: posts = pagination.items - File: web_flask/app/main/views.py - > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: web_flask/app/main/views.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - - - -BaichuanWu/Blog_flask -https://github.com/BaichuanWu/Blog_flask -Entry file: Blog_flask/flaskpractise.py -Scanned: 2016-10-20 11:51:36.843515 -No vulnerabilities found. - - -sreyemnayr/jss-flask -https://github.com/sreyemnayr/jss-flask -Entry file: jss-flask/jss-flask.py -Scanned: 2016-10-20 11:51:38.146292 -No vulnerabilities found. - - -hectorip/TinyFlaskExperiment -https://github.com/hectorip/TinyFlaskExperiment -Entry file: TinyFlaskExperiment/hello.py -Scanned: 2016-10-20 11:51:39.420072 -No vulnerabilities found. - - -WhiteShirts/windowsflask -https://github.com/WhiteShirts/windowsflask -Entry file: windowsflask/flasky/app/__init__.py -Scanned: 2016-10-20 11:51:42.313259 -Vulnerability 1: -File: windowsflask/flasky/app/main/views.py - > User input at line 27, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 37: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 40: posts = pagination.items - File: windowsflask/flasky/app/main/views.py - > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: windowsflask/flasky/app/main/views.py - > reaches line 42, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: windowsflask/flasky/app/main/views.py - > User input at line 32, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 30: show_followed = False - File: windowsflask/flasky/app/main/views.py - > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: windowsflask/flasky/app/main/views.py - > reaches line 42, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: windowsflask/flasky/app/main/views.py - > User input at line 67, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 68: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 71: posts = pagination.items -File: windowsflask/flasky/app/main/views.py - > reaches line 72, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: windowsflask/flasky/app/main/views.py - > User input at line 135, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 137: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: windowsflask/flasky/app/main/views.py - > Line 139: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 142: comments = pagination.items - File: windowsflask/flasky/app/main/views.py - > Line 134: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: windowsflask/flasky/app/main/views.py - > reaches line 143, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: windowsflask/flasky/app/main/views.py - > User input at line 201, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 202: pagination = user.followers.paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 205: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: windowsflask/flasky/app/main/views.py - > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: windowsflask/flasky/app/main/views.py - > reaches line 207, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of ', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: windowsflask/flasky/app/main/views.py - > User input at line 217, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 218: pagination = user.followed.paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 221: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: windowsflask/flasky/app/main/views.py - > Line 216: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: windowsflask/flasky/app/main/views.py - > reaches line 223, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: windowsflask/flasky/app/main/views.py - > User input at line 231, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 232: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 235: comments = pagination.items -File: windowsflask/flasky/app/main/views.py - > reaches line 236, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 20: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 23: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 20: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 23: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 20: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 23: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 42: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 45: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 42: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 45: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 42: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 45: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: windowsflask/flasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 16: prev = None - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 19: next = None -File: windowsflask/flasky/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: windowsflask/flasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 16: prev = None - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 19: next = None -File: windowsflask/flasky/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: windowsflask/flasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 16: prev = None - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 19: next = None -File: windowsflask/flasky/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 15: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 18: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 15: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 18: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 15: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 18: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 43: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 46: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 43: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 46: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 43: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 46: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -ptomelle/appflask -https://github.com/ptomelle/appflask -Entry file: appflask/wsgi/myflaskapp.py -Scanned: 2016-10-20 11:51:44.270870 -No vulnerabilities found. - - -globocom/gbix -https://github.com/globocom/gbix -Entry file: gbix/src/server_jsonrpc.py -Scanned: 2016-10-20 11:51:45.691916 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -martinpeck/bedlam-slack -https://github.com/martinpeck/bedlam-slack -Entry file: bedlam-slack/bedlam_slack/__init__.py -Scanned: 2016-10-20 11:51:47.202666 -Vulnerability 1: -File: bedlam-slack/bedlam_slack/ud.py - > User input at line 11, trigger word "get(": - phrase = parse.quote_plus(request.values.get('text').strip()) -Reassigned in: - File: bedlam-slack/bedlam_slack/ud.py - > Line 13: response = 'response_type''text''unfurl_links''in_channel''http://www.urbandictionary.com/define.php?term=' + phrase'true' -File: bedlam-slack/bedlam_slack/ud.py - > reaches line 19, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(response) - - - -kud-i/FlaskRestAPI -https://github.com/kud-i/FlaskRestAPI -Entry file: FlaskRestAPI/REST_API.py -Scanned: 2016-10-20 11:51:48.502881 -Vulnerability 1: -File: FlaskRestAPI/REST_API.py - > User input at line 75, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: FlaskRestAPI/REST_API.py - > reaches line 82, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -kriesbeck/flask_heroku_practice -https://github.com/kriesbeck/flask_heroku_practice -Entry file: flask_heroku_practice/app/__init__.py -Scanned: 2016-10-20 11:51:55.879031 -No vulnerabilities found. - - -opendatakosovo/flask-app-framework -https://github.com/opendatakosovo/flask-app-framework -Entry file: flask-app-framework/app/__init__.py -Scanned: 2016-10-20 11:52:02.316292 -No vulnerabilities found. - - -ZAGJAB/Flask_OAuth2 -https://github.com/ZAGJAB/Flask_OAuth2 -Entry file: Flask_OAuth2/app.py -Scanned: 2016-10-20 11:52:04.656150 -Vulnerability 1: -File: Flask_OAuth2/app.py - > User input at line 75, trigger word "get(": - code = request.args.get('code') -Reassigned in: - File: Flask_OAuth2/app.py - > Line 76: uri = 'http://localhost:5000/oauth?response_type=%s&client_id=%s&redirect_uri=%s' % (code, client_id, redirect_uri) -File: Flask_OAuth2/app.py - > reaches line 77, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(uri) - - - -k-funk/flask-bower-bootstrap-compass -https://github.com/k-funk/flask-bower-bootstrap-compass -Entry file: flask-bower-bootstrap-compass/app_name/__init__.py -Scanned: 2016-10-20 11:52:05.939330 -No vulnerabilities found. - - -cbeasley92/Flask-REST-API-Testing -https://github.com/cbeasley92/Flask-REST-API-Testing -Entry file: Flask-REST-API-Testing/rest_api.py -Scanned: 2016-10-20 11:52:07.371735 -Vulnerability 1: -File: Flask-REST-API-Testing/rest_api.py - > User input at line 88, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: Flask-REST-API-Testing/rest_api.py - > reaches line 95, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -cruor99/heartbeat-flask-app -https://github.com/cruor99/heartbeat-flask-app -Entry file: heartbeat-flask-app/flaskheartbeat/__init__.py -Scanned: 2016-10-20 11:52:09.812045 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sakib3/flask_cartridge_Heroku -https://github.com/sakib3/flask_cartridge_Heroku -Entry file: flask_cartridge_Heroku/app.py -Scanned: 2016-10-20 11:52:11.073371 -No vulnerabilities found. - - -SamirKanaan/PlantillaFlaskREST3 -https://github.com/SamirKanaan/PlantillaFlaskREST3 -Entry file: PlantillaFlaskREST3/inicia.py -Scanned: 2016-10-20 11:52:12.472564 -No vulnerabilities found. - - -zelinlee0303/python-flask-mysql -https://github.com/zelinlee0303/python-flask-mysql -Entry file: python-flask-mysql/app/__init__.py -Scanned: 2016-10-20 11:52:14.279039 -Vulnerability 1: -File: python-flask-mysql/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: python-flask-mysql/app/main/views.py - > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: python-flask-mysql/app/main/views.py - > Line 26: posts = pagination.items - File: python-flask-mysql/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: python-flask-mysql/app/main/views.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: python-flask-mysql/app/main/views.py - > User input at line 41, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: python-flask-mysql/app/main/views.py - > Line 42: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: python-flask-mysql/app/main/views.py - > Line 45: posts = pagination.items - File: python-flask-mysql/app/main/views.py - > Line 40: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace')) -File: python-flask-mysql/app/main/views.py - > reaches line 46, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('mindtrace.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 3: -File: python-flask-mysql/app/main/views.py - > User input at line 118, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: python-flask-mysql/app/main/views.py - > Line 119: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: python-flask-mysql/app/main/views.py - > Line 122: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: python-flask-mysql/app/main/views.py - > Line 117: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace')) -File: python-flask-mysql/app/main/views.py - > reaches line 124, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='被', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 4: -File: python-flask-mysql/app/main/views.py - > User input at line 135, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: python-flask-mysql/app/main/views.py - > Line 136: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: python-flask-mysql/app/main/views.py - > Line 139: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: python-flask-mysql/app/main/views.py - > Line 134: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace')) -File: python-flask-mysql/app/main/views.py - > reaches line 141, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 5: -File: python-flask-mysql/app/main/views.py - > User input at line 154, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: python-flask-mysql/app/main/views.py - > Line 155: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: python-flask-mysql/app/main/views.py - > Line 158: posts = pagination.items -File: python-flask-mysql/app/main/views.py - > reaches line 159, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - - - -mapingfan/Flask-Web-Dev -https://github.com/mapingfan/Flask-Web-Dev -Entry file: Flask-Web-Dev/app.py -Scanned: 2016-10-20 11:52:20.515317 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gclabon/Twilio-Flask-CSV -https://github.com/gclabon/Twilio-Flask-CSV -Entry file: Twilio-Flask-CSV/twilioFlaskBasic/twilioFlaskBasic.py -Scanned: 2016-10-20 11:52:22.078796 -No vulnerabilities found. - - -ak042/flask-hello-world -https://github.com/ak042/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 11:52:22.643328 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -king100/Flask-Hello-World- -https://github.com/king100/Flask-Hello-World- -Entry file: Flask-Hello-World-/app.py -Scanned: 2016-10-20 11:52:30.382493 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Hello-World-/flask/lib/python2.7/genericpath.py - -MMohan1/Flask_with_celery -https://github.com/MMohan1/Flask_with_celery -Entry file: Flask_with_celery/flask_app/edge/__init__.py -Scanned: 2016-10-20 11:52:31.912291 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jhelgren/flask_movie_reviews -https://github.com/jhelgren/flask_movie_reviews -Entry file: flask_movie_reviews/server.py -Scanned: 2016-10-20 11:52:33.220884 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NixonInnes/Flask-Blueprints-Logins -https://github.com/NixonInnes/Flask-Blueprints-Logins -Entry file: Flask-Blueprints-Logins/app/__init__.py -Scanned: 2016-10-20 11:52:35.936361 -No vulnerabilities found. - - -nejohnson2/flask-template-app -https://github.com/nejohnson2/flask-template-app -Entry file: flask-template-app/app.py -Scanned: 2016-10-20 11:52:37.277181 -No vulnerabilities found. - - -xlmn/DiplomFlaskAngular -https://github.com/xlmn/DiplomFlaskAngular -Entry file: DiplomFlaskAngular/app/__init__.py -Scanned: 2016-10-20 11:52:40.654728 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AMontalva/flask-thinkful-api -https://github.com/AMontalva/flask-thinkful-api -Entry file: flask-thinkful-api/posts/__init__.py -Scanned: 2016-10-20 11:52:42.019591 -Vulnerability 1: -File: flask-thinkful-api/posts/api.py - > User input at line 16, trigger word "get(": - title_like = request.args.get('title_like') -Reassigned in: - File: flask-thinkful-api/posts/api.py - > Line 22: posts = posts.order_by(models.Post.id) - File: flask-thinkful-api/posts/api.py - > Line 25: data = json.dumps([post.as_dictionary() for post in posts]) - File: flask-thinkful-api/posts/api.py - > Line 26: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: flask-thinkful-api/posts/api.py - > Line 19: posts = session.query(models.Post) -File: flask-thinkful-api/posts/api.py - > reaches line 21, trigger word "filter(": - posts = posts.filter(models.Post.title.contains(title_like)) - - - -davidnuon/flask-falcon-example -https://github.com/davidnuon/flask-falcon-example -Entry file: flask-falcon-example/flask-demo.py -Scanned: 2016-10-20 11:52:43.440970 -No vulnerabilities found. - - -genedex/flask-neo4j -https://github.com/genedex/flask-neo4j -Entry file: flask-neo4j/blog/views.py -Scanned: 2016-10-20 11:52:44.757242 -No vulnerabilities found. - - -yazquez/example-rest-flask.python -https://github.com/yazquez/example-rest-flask.python -Entry file: None -Scanned: 2016-10-20 11:52:46.677229 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yazquez/example-rest-flask.python. - -sceene/test-flask-app -https://github.com/sceene/test-flask-app -Entry file: None -Scanned: 2016-10-20 11:52:48.108165 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sceene/test-flask-app. - -mtnriver/docker-flask-app -https://github.com/mtnriver/docker-flask-app -Entry file: docker-flask-app/app.py -Scanned: 2016-10-20 11:52:49.395505 -No vulnerabilities found. - - -josephmuli/Flask -https://github.com/josephmuli/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:52:51.321361 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -janukobytsch/flask-autofixture -https://github.com/janukobytsch/flask-autofixture -Entry file: flask-autofixture/tests/conftest.py -Scanned: 2016-10-20 11:52:53.462001 -No vulnerabilities found. - - -paceko/shopping-site -https://github.com/paceko/shopping-site -Entry file: shopping-site/shoppingsite.py -Scanned: 2016-10-20 11:52:57.541038 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pragmaticcoders/flask-react-seed -https://github.com/pragmaticcoders/flask-react-seed -Entry file: None -Scanned: 2016-10-20 11:53:02.060839 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pragmaticcoders/flask-react-seed. - -fkirwin/flaskhelloworld -https://github.com/fkirwin/flaskhelloworld -Entry file: flaskhelloworld/hello_world.py -Scanned: 2016-10-20 11:53:04.758311 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thedrew82/flaskr -https://github.com/thedrew82/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:53:05.264088 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulballal/flasktemplate -https://github.com/rahulballal/flasktemplate -Entry file: flasktemplate/app.py -Scanned: 2016-10-20 11:53:07.687364 -No vulnerabilities found. - - -dimdal/flasktutorial -https://github.com/dimdal/flasktutorial -Entry file: None -Scanned: 2016-10-20 11:53:08.198692 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -axavio/flasky -https://github.com/axavio/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:53:10.698115 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bspaans/flaskal -https://github.com/bspaans/flaskal -Entry file: flaskal/flaskal/imports.py -Scanned: 2016-10-20 11:53:13.137742 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stoodsteal/flasky -https://github.com/stoodsteal/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:53:13.645121 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -allergier/flaskr -https://github.com/allergier/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:53:15.155249 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shenmj053/flaskr -https://github.com/shenmj053/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:53:21.673437 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zverxw13/flaskr -https://github.com/zverxw13/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:53:23.211160 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liuhuai0217/flasky -https://github.com/liuhuai0217/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:53:23.740769 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -erk52/FlaskDynamics -https://github.com/erk52/FlaskDynamics -Entry file: FlaskDynamics/view.py -Scanned: 2016-10-20 11:53:32.346688 -Vulnerability 1: -File: FlaskDynamics/view.py - > User input at line 18, trigger word ".data": - result = phasePlot(form.XPrime.data, form.YPrime.data) -Reassigned in: - File: FlaskDynamics/view.py - > Line 20: result = None -File: FlaskDynamics/view.py - > reaches line 22, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('new_view.html',form=form, result=result) - - - -KentaYamada/flaskr2 -https://github.com/KentaYamada/flaskr2 -Entry file: flaskr2/__init__.py -Scanned: 2016-10-20 11:53:33.651387 -No vulnerabilities found. - - -HaarisKhan/FlaskDemos -https://github.com/HaarisKhan/FlaskDemos -Entry file: None -Scanned: 2016-10-20 11:53:41.027686 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gnu4cn/flaskLearnings -https://github.com/gnu4cn/flaskLearnings -Entry file: flaskLearnings/demos/sessions.py -Scanned: 2016-10-20 11:53:50.525062 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pepemontana7/flaskFinal -https://github.com/pepemontana7/flaskFinal -Entry file: flaskFinal/firstapp/hello.py -Scanned: 2016-10-20 11:53:51.839875 -No vulnerabilities found. - - -marvelaz/Flask_python -https://github.com/marvelaz/Flask_python -Entry file: Flask_python/app.py -Scanned: 2016-10-20 11:53:53.126402 -Vulnerability 1: -File: Flask_python/app.py - > User input at line 30, trigger word ".data": - url = form.url.data -File: Flask_python/app.py - > reaches line 33, trigger word "flash(": - flash('Stored bookmark '{}''.format(url)) - - - -rishilification/Flask_Sql -https://github.com/rishilification/Flask_Sql -Entry file: Flask_Sql/app.py -Scanned: 2016-10-20 11:53:55.178060 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -filiplasak/flask-skeleton -https://github.com/filiplasak/flask-skeleton -Entry file: None -Scanned: 2016-10-20 11:53:55.688105 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/filiplasak/flask-skeleton. - -groovycol/flask-intro -https://github.com/groovycol/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:53:56.196640 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lyoness1/flask-intro -https://github.com/lyoness1/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:53:56.722655 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kelseyoo14/flask-intro -https://github.com/kelseyoo14/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:53:57.232371 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Topytops/nice-flask -https://github.com/Topytops/nice-flask -Entry file: nice-flask/nice.py -Scanned: 2016-10-20 11:53:58.529319 -No vulnerabilities found. - - -Bluepig/flask-blog -https://github.com/Bluepig/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:53:59.087646 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -HBKO/flask-test -https://github.com/HBKO/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:53:59.631835 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -tyrelsouza/flask_vagrant -https://github.com/tyrelsouza/flask_vagrant -Entry file: flask_vagrant/code/src/app.py -Scanned: 2016-10-20 11:54:01.033836 -No vulnerabilities found. - - -wolfram74/flask_exploration -https://github.com/wolfram74/flask_exploration -Entry file: flask_exploration/app2.py -Scanned: 2016-10-20 11:54:07.780864 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -HDking/flask-blog -https://github.com/HDking/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:54:08.354250 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -CrustyBarnacle/flask_app -https://github.com/CrustyBarnacle/flask_app -Entry file: None -Scanned: 2016-10-20 11:54:08.850914 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/CrustyBarnacle/flask_app. - -Weilor/learn_flask -https://github.com/Weilor/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 11:54:09.350729 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cristinamclarkin/flask-intro -https://github.com/cristinamclarkin/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:54:09.865259 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -emilydowgialo/flask-intro -https://github.com/emilydowgialo/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:54:10.366562 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -roboticmonkey/flask-intro -https://github.com/roboticmonkey/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:54:10.884904 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sarahcstringer/flask-intro -https://github.com/sarahcstringer/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:54:11.392442 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -askiefer/flask-intro -https://github.com/askiefer/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:54:11.898287 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lachilles/flask-intro -https://github.com/lachilles/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:54:12.408645 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dencynluv/Flask--Intro -https://github.com/dencynluv/Flask--Intro -Entry file: Flask--Intro/nice.py -Scanned: 2016-10-20 11:54:14.745432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -holmandw/flask-pi -https://github.com/holmandw/flask-pi -Entry file: flask-pi/app/__init__.py -Scanned: 2016-10-20 11:54:16.722628 -No vulnerabilities found. - - -amiceli/flask-blog -https://github.com/amiceli/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:54:22.295979 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -kellyhiggins/flask-intro -https://github.com/kellyhiggins/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:54:23.819990 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hollywoodno/flask-intro -https://github.com/hollywoodno/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:54:24.322521 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -k-hub/flask-intro -https://github.com/k-hub/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:54:31.848169 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sunshine-water/Flask_Exercise -https://github.com/sunshine-water/Flask_Exercise -Entry file: Flask_Exercise/nice.py -Scanned: 2016-10-20 11:54:34.175064 -No vulnerabilities found. - - -loopDelicious/flask-intro -https://github.com/loopDelicious/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:54:34.689666 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mastershao/lening-flask -https://github.com/mastershao/lening-flask -Entry file: None -Scanned: 2016-10-20 11:54:42.275952 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mastershao/lening-flask. - -bulain/flask-demo -https://github.com/bulain/flask-demo -Entry file: None -Scanned: 2016-10-20 11:54:51.793848 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bulain/flask-demo. - -diannaowa/flask-blog -https://github.com/diannaowa/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:54:53.359084 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -hyhlinux/stu_flask -https://github.com/hyhlinux/stu_flask -Entry file: None -Scanned: 2016-10-20 11:55:02.605172 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wOstensen/flask-first -https://github.com/wOstensen/flask-first -Entry file: flask-first/flask-first-notes.py -Scanned: 2016-10-20 11:55:03.148816 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tacolizard/flask-kott -https://github.com/Tacolizard/flask-kott -Entry file: flask-kott/kott.py -Scanned: 2016-10-20 11:55:04.452257 -No vulnerabilities found. - - -yaoice/flask-micblog -https://github.com/yaoice/flask-micblog -Entry file: flask-micblog/micblog/app/__init__.py -Scanned: 2016-10-20 11:55:05.898586 -Vulnerability 1: -File: flask-micblog/micblog/app/views.py - > User input at line 92, trigger word "get(": - user_name = request.form.get('user_name') -Reassigned in: - File: flask-micblog/micblog/app/views.py - > Line 102: user.nickname = user_name -File: flask-micblog/micblog/app/views.py - > reaches line 95, trigger word "filter(": - register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first() - -Vulnerability 2: -File: flask-micblog/micblog/app/views.py - > User input at line 93, trigger word "get(": - user_email = request.form.get('user_email') -Reassigned in: - File: flask-micblog/micblog/app/views.py - > Line 103: user.email = user_email -File: flask-micblog/micblog/app/views.py - > reaches line 95, trigger word "filter(": - register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first() - - - -an5rag/flask-tutorial -https://github.com/an5rag/flask-tutorial -Entry file: None -Scanned: 2016-10-20 11:55:06.415041 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sugarguo/Flask_Blog -https://github.com/sugarguo/Flask_Blog -Entry file: Flask_Blog/Blog/blog.py -Scanned: 2016-10-20 11:55:08.027738 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glasses4days/flask-intro -https://github.com/glasses4days/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:55:08.586887 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kjlundsgaard/flask-intro -https://github.com/kjlundsgaard/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:55:09.087810 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laurensila/flask-intro -https://github.com/laurensila/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:55:09.598540 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tlwlmy/flask_base -https://github.com/tlwlmy/flask_base -Entry file: flask_base/app/__init__.py -Scanned: 2016-10-20 11:55:11.163021 -No vulnerabilities found. - - -maheskett/flask-intro -https://github.com/maheskett/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:55:11.672527 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kelly4strength/flask-lab -https://github.com/kelly4strength/flask-lab -Entry file: flask-lab/nice.py -Scanned: 2016-10-20 11:55:12.954382 -No vulnerabilities found. - - -themuppet2/flask-blog -https://github.com/themuppet2/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:55:13.558905 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Aaver69/Python-Flask -https://github.com/Aaver69/Python-Flask -Entry file: None -Scanned: 2016-10-20 11:55:16.356358 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Aaver69/Python-Flask. - -ak042/flask-bdd -https://github.com/ak042/flask-bdd -Entry file: flask-bdd/flaskr.py -Scanned: 2016-10-20 11:55:17.691327 -No vulnerabilities found. - - -nanoha25/flask_local -https://github.com/nanoha25/flask_local -Entry file: flask_local/setup.py -Scanned: 2016-10-20 11:55:24.759385 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dflee/flask-intro -https://github.com/dflee/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:55:25.276727 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wattanar/flask-sample -https://github.com/wattanar/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-20 11:55:25.785882 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Aperyon/flask-base -https://github.com/Aperyon/flask-base -Entry file: None -Scanned: 2016-10-20 11:55:26.296879 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Aperyon/flask-base. - -rpalo/flask-headlines -https://github.com/rpalo/flask-headlines -Entry file: flask-headlines/headlines.py -Scanned: 2016-10-20 11:55:28.588873 -No vulnerabilities found. - - -stanliski/flask_dev -https://github.com/stanliski/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-20 11:55:29.163698 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -k-wiz/flask-intro -https://github.com/k-wiz/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:55:29.704774 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Munnu/flask-intro -https://github.com/Munnu/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:55:32.215544 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Wynndow/flask_skeleton -https://github.com/Wynndow/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-20 11:55:33.729072 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -chiubaca/flask-app -https://github.com/chiubaca/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 11:55:35.272966 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -afarges/flask-intro -https://github.com/afarges/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:55:42.816218 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paceko/flask-intro -https://github.com/paceko/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:55:52.334540 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ucgyyf/yaoke-flask -https://github.com/ucgyyf/yaoke-flask -Entry file: yaoke-flask/app/__init__.py -Scanned: 2016-10-20 11:55:54.763108 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SethHWeidman/flask-test -https://github.com/SethHWeidman/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:56:03.775237 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -rpalo/flask-firstapp -https://github.com/rpalo/flask-firstapp -Entry file: flask-firstapp/hello.py -Scanned: 2016-10-20 11:56:05.101450 -No vulnerabilities found. - - -Jar-win/Flask-Pratice -https://github.com/Jar-win/Flask-Pratice -Entry file: Flask-Pratice/4c-flashing/hello.py -Scanned: 2016-10-20 11:56:06.684818 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stuncyilmaz/flask_init -https://github.com/stuncyilmaz/flask_init -Entry file: None -Scanned: 2016-10-20 11:56:07.181075 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/stuncyilmaz/flask_init. - -tageee/test_Flask -https://github.com/tageee/test_Flask -Entry file: test_Flask/hello.py -Scanned: 2016-10-20 11:56:10.037077 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Aisling-Dempsey/flask-intro -https://github.com/Aisling-Dempsey/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:56:10.554281 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tkahnhau/flask-intro -https://github.com/tkahnhau/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:56:11.064192 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ubermelon/Flask_exercise -https://github.com/ubermelon/Flask_exercise -Entry file: Flask_exercise/nice.py -Scanned: 2016-10-20 11:56:12.355346 -No vulnerabilities found. - - -lsylk/flask-intro -https://github.com/lsylk/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:56:12.902508 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -minyisme/flask-intro -https://github.com/minyisme/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 11:56:13.406776 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -allisonscofield/flask-lab -https://github.com/allisonscofield/flask-lab -Entry file: flask-lab/nice.py -Scanned: 2016-10-20 11:56:14.694918 -No vulnerabilities found. - - -TiyaBelay/Flask-intro -https://github.com/TiyaBelay/Flask-intro -Entry file: Flask-intro/nice.py -Scanned: 2016-10-20 11:56:15.215687 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chck/flask-sandbox -https://github.com/chck/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-20 11:56:15.738405 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NixonInnes/Flask-Calendar -https://github.com/NixonInnes/Flask-Calendar -Entry file: Flask-Calendar/app/__init__.py -Scanned: 2016-10-20 11:56:19.607683 -Vulnerability 1: -File: Flask-Calendar/app/blueprints/calendar/views.py - > User input at line 30, trigger word ".data": - calendar = Calendar(author_id=current_user.id, name=form.name.data) -Reassigned in: - File: Flask-Calendar/app/blueprints/calendar/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = render_template('calendar/calendar_form.html',form=form) -File: Flask-Calendar/app/blueprints/calendar/views.py - > reaches line 37, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('calendar.get',id=calendar.id)) - -Vulnerability 2: -File: Flask-Calendar/app/blueprints/calendar/views.py - > User input at line 30, trigger word ".data": - calendar = Calendar(author_id=current_user.id, name=form.name.data) -Reassigned in: - File: Flask-Calendar/app/blueprints/calendar/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = render_template('calendar/calendar_form.html',form=form) -File: Flask-Calendar/app/blueprints/calendar/views.py - > reaches line 37, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('calendar.get',id=calendar.id)) - - - -aurigadl/flask-base -https://github.com/aurigadl/flask-base -Entry file: None -Scanned: 2016-10-20 11:56:20.122739 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/aurigadl/flask-base. - -tageee/Blog -https://github.com/tageee/Blog -Entry file: Blog/app/__init__.py -Scanned: 2016-10-20 11:56:28.236811 -Vulnerability 1: -File: Blog/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 33: posts = pagination.items - File: Blog/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Blog/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Blog/app/main/views.py - > Line 23: show_followed = False - File: Blog/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Blog/app/main/views.py - > User input at line 59, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 60: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 63: posts = pagination.items -File: Blog/app/main/views.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Blog/app/main/views.py - > User input at line 122, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 124: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Blog/app/main/views.py - > Line 126: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 129: comments = pagination.items - File: Blog/app/main/views.py - > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Blog/app/main/views.py - > reaches line 130, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Blog/app/main/views.py - > User input at line 189, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 190: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 193: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Blog/app/main/views.py - > Line 188: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Blog/app/main/views.py - > User input at line 206, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 207: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 210: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Blog/app/main/views.py - > Line 205: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 212, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Blog/app/main/views.py - > User input at line 221, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 222: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 225: comments = pagination.items -File: Blog/app/main/views.py - > reaches line 226, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -od210291jpv/flask -https://github.com/od210291jpv/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:56:30.412997 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Goomah/flask -https://github.com/Goomah/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:56:31.008192 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -ultramarine7/flask -https://github.com/ultramarine7/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:56:31.561569 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -amateurPotato/flask -https://github.com/amateurPotato/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:56:32.173894 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -ahdrage/flask -https://github.com/ahdrage/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:56:32.774281 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -MonPower/Flask -https://github.com/MonPower/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 11:56:33.325861 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wenzi0595/flask -https://github.com/wenzi0595/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 11:56:33.909400 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -singingwolfboy/build-a-flask-api -https://github.com/singingwolfboy/build-a-flask-api -Entry file: build-a-flask-api/step11/puppy.py -Scanned: 2016-10-20 11:56:38.599669 -No vulnerabilities found. - - -sunary/flask-optimize -https://github.com/sunary/flask-optimize -Entry file: flask-optimize/tests/flask_app.py -Scanned: 2016-10-20 11:56:40.013781 -No vulnerabilities found. - - -kashyap32/flask-REST -https://github.com/kashyap32/flask-REST -Entry file: None -Scanned: 2016-10-20 11:56:53.863961 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kashyap32/flask-REST. - -baloo98/flasky -https://github.com/baloo98/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:56:55.863027 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sanketg10/flaskapp -https://github.com/sanketg10/flaskapp -Entry file: None -Scanned: 2016-10-20 11:57:04.414192 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanketg10/flaskapp. - -Julzmbugua/flasky -https://github.com/Julzmbugua/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:57:04.942840 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rsk7/flaskapp -https://github.com/rsk7/flaskapp -Entry file: None -Scanned: 2016-10-20 11:57:06.461916 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rsk7/flaskapp. - -Sarmacid/flaskr -https://github.com/Sarmacid/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 11:57:07.970764 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -skhe/flasky -https://github.com/skhe/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 11:57:08.473197 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neotrinity/flaskavro -https://github.com/neotrinity/flaskavro -Entry file: flaskavro/main.py -Scanned: 2016-10-20 11:57:11.899427 -No vulnerabilities found. - - -zeroisme/flaskblog -https://github.com/zeroisme/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 11:57:12.427267 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -Mendurim/flasktut -https://github.com/Mendurim/flasktut -Entry file: flasktut/hello.py -Scanned: 2016-10-20 11:57:13.758196 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -HDking/flasktaskr -https://github.com/HDking/flasktaskr -Entry file: None -Scanned: 2016-10-20 11:57:14.305902 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gjcooper/flaskprac -https://github.com/gjcooper/flaskprac -Entry file: flaskprac/app/__init__.py -Scanned: 2016-10-20 11:57:15.716479 -No vulnerabilities found. - - -deliveryyyyguy/flaskapp -https://github.com/deliveryyyyguy/flaskapp -Entry file: None -Scanned: 2016-10-20 11:57:16.229830 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/deliveryyyyguy/flaskapp. - -aaron077/flaskblog -https://github.com/aaron077/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 11:57:16.803453 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -DaBaiLi/FlaskBlog -https://github.com/DaBaiLi/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 11:57:17.430582 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cs207-project/FlaskAPI -https://github.com/cs207-project/FlaskAPI -Entry file: None -Scanned: 2016-10-20 11:57:17.935850 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cs207-project/FlaskAPI. - -Thetides/FlaskyTut -https://github.com/Thetides/FlaskyTut -Entry file: FlaskyTut/app.py -Scanned: 2016-10-20 11:57:21.289929 -No vulnerabilities found. - - -prrateekk/FlaskTesting -https://github.com/prrateekk/FlaskTesting -Entry file: FlaskTesting/hello.py -Scanned: 2016-10-20 11:57:31.888189 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTesting/venv/lib/python2.7/genericpath.py - -kolapapa/flasky2 -https://github.com/kolapapa/flasky2 -Entry file: flasky2/app/__init__.py -Scanned: 2016-10-20 11:57:33.363567 -No vulnerabilities found. - - -argenis2021/FlaskTutorial -https://github.com/argenis2021/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 11:57:33.891295 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -konglx90/flask_study -https://github.com/konglx90/flask_study -Entry file: flask_study/views.py -Scanned: 2016-10-20 11:57:34.410582 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -datademofun/congress-flask -https://github.com/datademofun/congress-flask -Entry file: congress-flask/app.py -Scanned: 2016-10-20 11:57:37.427969 -No vulnerabilities found. - - -ifwenvlook/flask-celery -https://github.com/ifwenvlook/flask-celery -Entry file: flask-celery/app.py -Scanned: 2016-10-20 11:57:38.835558 -Vulnerability 1: -File: flask-celery/app.py - > User input at line 66, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: flask-celery/app.py - > Line 67: session['email'] = email -File: flask-celery/app.py - > reaches line 76, trigger word "flash(": - flash('Sending email to {0}'.format(email)) - -Vulnerability 2: -File: flask-celery/app.py - > User input at line 66, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: flask-celery/app.py - > Line 67: session['email'] = email -File: flask-celery/app.py - > reaches line 80, trigger word "flash(": - flash('An email will be sent to {0} in one minute'.format(email)) - -Vulnerability 3: -File: flask-celery/app.py - > User input at line 103, trigger word "get(": - response = 'state''current''total''status'task.statetask.info.get('current', 0)task.info.get('total', 1)task.info.get('status', '') -Reassigned in: - File: flask-celery/app.py - > Line 96: response = 'state''current''total''status'task.state01'Pending...' - File: flask-celery/app.py - > Line 113: response = 'state''current''total''status'task.state11str(task.info) -File: flask-celery/app.py - > reaches line 119, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(response) - - - -jonalligood/flask-diary -https://github.com/jonalligood/flask-diary -Entry file: flask-diary/flask/lib/python3.5/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 11:57:56.328018 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -HDking/flask-blog -https://github.com/HDking/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:57:56.938577 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -sugarguo/flask-login -https://github.com/sugarguo/flask-login -Entry file: flask-login/yan.py -Scanned: 2016-10-20 11:58:05.922335 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Afghary/bloggingFlask -https://github.com/Afghary/bloggingFlask -Entry file: bloggingFlask/src/app.py -Scanned: 2016-10-20 11:58:07.259621 -No vulnerabilities found. - - -abaratif/flask_sms -https://github.com/abaratif/flask_sms -Entry file: flask_sms/app.py -Scanned: 2016-10-20 11:58:08.555222 -No vulnerabilities found. - - -full-stakk/flask-rest -https://github.com/full-stakk/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-20 11:58:09.075670 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ikolito/flask-yahoomarket -https://github.com/ikolito/flask-yahoomarket -Entry file: None -Scanned: 2016-10-20 11:58:10.351797 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ikolito/flask-yahoomarket. - -kunalj101/flask-blog -https://github.com/kunalj101/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 11:58:10.915548 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -RiverAge/flask-mongodb -https://github.com/RiverAge/flask-mongodb -Entry file: flask-mongodb/app/__init__.py -Scanned: 2016-10-20 11:58:12.231064 -No vulnerabilities found. - - -natedoyle/flask-cyoa -https://github.com/natedoyle/flask-cyoa -Entry file: flask-cyoa/src/app.py -Scanned: 2016-10-20 11:58:13.524233 -No vulnerabilities found. - - -ShakedFadi/flask_blog -https://github.com/ShakedFadi/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:58:14.041854 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -makensy/flask_alchemy -https://github.com/makensy/flask_alchemy -Entry file: flask_alchemy/app/__init__.py -Scanned: 2016-10-20 11:58:15.433916 -No vulnerabilities found. - - -28sui/dao-flask -https://github.com/28sui/dao-flask -Entry file: dao-flask/app.py -Scanned: 2016-10-20 11:58:16.777536 -No vulnerabilities found. - - -quvide/docker-flask -https://github.com/quvide/docker-flask -Entry file: docker-flask/flask/app/main.py -Scanned: 2016-10-20 11:58:18.213408 -No vulnerabilities found. - - -carlsagan21/flask-crawler -https://github.com/carlsagan21/flask-crawler -Entry file: flask-crawler/flask-crawler.py -Scanned: 2016-10-20 11:58:19.531198 -No vulnerabilities found. - - -Ouro130Ros/LearningFlask -https://github.com/Ouro130Ros/LearningFlask -Entry file: LearningFlask/1-HelloWorld/helloWorld.py -Scanned: 2016-10-20 11:58:20.843855 -No vulnerabilities found. - - -mandshaw/flask_microbrewery -https://github.com/mandshaw/flask_microbrewery -Entry file: flask_microbrewery/flask_microbrewery/run.py -Scanned: 2016-10-20 11:58:22.353389 -No vulnerabilities found. - - -kindoprec/flask-boot -https://github.com/kindoprec/flask-boot -Entry file: flask-boot/app.py -Scanned: 2016-10-20 11:58:23.672093 -Vulnerability 1: -File: flask-boot/app.py - > User input at line 15, trigger word "get(": - out = 'Hello ' + request.args.get('name', '') -File: flask-boot/app.py - > reaches line 16, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(output=out) - - - -liuyun90/learn_flask -https://github.com/liuyun90/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 11:58:24.187768 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -richardqlin/flask_app -https://github.com/richardqlin/flask_app -Entry file: None -Scanned: 2016-10-20 11:58:24.700789 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flask_app. - -blarneyosullivan/flask_blog -https://github.com/blarneyosullivan/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 11:58:25.231281 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MUICProgrammingClub/flask-tutorial -https://github.com/MUICProgrammingClub/flask-tutorial -Entry file: None -Scanned: 2016-10-20 11:58:25.759264 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AuthentiqID/examples-flask -https://github.com/AuthentiqID/examples-flask -Entry file: examples-flask/example_basic.py -Scanned: 2016-10-20 11:58:27.231327 -Vulnerability 1: -File: examples-flask/example_basic.py - > User input at line 135, trigger word "get(": - userinfo = authentiq.get(USERINFO_URL).json() -File: examples-flask/example_basic.py - > reaches line 149, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(userinfo) - -Vulnerability 2: -File: examples-flask/test_example_basic.py - > User input at line 71, trigger word "get(": - res = test_app.get(url_for('index')) -Reassigned in: - File: examples-flask/test_example_basic.py - > Line 76: res = requests.get(url,allow_redirects=1) -File: examples-flask/test_example_basic.py - > reaches line 71, trigger word "url_for(": - res = test_app.get(url_for('index')) - -Vulnerability 3: -File: examples-flask/test_example_basic.py - > User input at line 75, trigger word "get(": - url = res.headers.get('Location') -Reassigned in: - File: examples-flask/test_example_basic.py - > Line 76: res = requests.get(url,allow_redirects=1) -File: examples-flask/test_example_basic.py - > reaches line 71, trigger word "url_for(": - res = test_app.get(url_for('index')) - -Vulnerability 4: -File: examples-flask/test_example_basic.py - > User input at line 76, trigger word "get(": - res = requests.get(url,allow_redirects=1) -File: examples-flask/test_example_basic.py - > reaches line 71, trigger word "url_for(": - res = test_app.get(url_for('index')) - -Vulnerability 5: -File: examples-flask/example_2fa.py - > User input at line 159, trigger word "get(": - userinfo = authentiq.get(USERINFO_URL).json() -File: examples-flask/example_2fa.py - > reaches line 173, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(userinfo) - - - -rpalo/flask-headlines -https://github.com/rpalo/flask-headlines -Entry file: flask-headlines/headlines.py -Scanned: 2016-10-20 11:58:33.906966 -No vulnerabilities found. - - -stanliski/flask_dev -https://github.com/stanliski/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-20 11:58:34.472465 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -s4ayub/FirstFlask -https://github.com/s4ayub/FirstFlask -Entry file: FirstFlask/app.py -Scanned: 2016-10-20 11:58:35.070614 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py - -emilydowgialo/skills-flask -https://github.com/emilydowgialo/skills-flask -Entry file: skills-flask/application.py -Scanned: 2016-10-20 11:58:42.209792 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: skills-flask/env/lib/python2.7/genericpath.py - -condemnedbachelor/flask-skills -https://github.com/condemnedbachelor/flask-skills -Entry file: flask-skills/application.py -Scanned: 2016-10-20 11:58:49.666012 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'ingoing' - -jimlambrt-roadscholar/udemy-flask -https://github.com/jimlambrt-roadscholar/udemy-flask -Entry file: udemy-flask/hello.py -Scanned: 2016-10-20 11:58:51.063123 -No vulnerabilities found. - - -CharAct3/flask_test -https://github.com/CharAct3/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 11:58:51.764728 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jlberzal/Flask-User -https://github.com/jlberzal/Flask-User -Entry file: Flask-User/example_apps/multi_email_app.py -Scanned: 2016-10-20 11:58:56.715481 -Vulnerability 1: -File: Flask-User/example_apps/user_profile_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/user_profile_app.py - > Line 90: db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile) - File: Flask-User/example_apps/user_profile_app.py - > Line 91: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_profile_app.py - > reaches line 94, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 2: -File: Flask-User/example_apps/user_profile_app.py - > User input at line 90, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile) -Reassigned in: - File: Flask-User/example_apps/user_profile_app.py - > Line 91: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_profile_app.py - > reaches line 94, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 3: -File: Flask-User/example_apps/roles_required_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/roles_required_app.py - > Line 83: db_adapter = SQLAlchemyAdapter(db, User) - File: Flask-User/example_apps/roles_required_app.py - > Line 84: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/roles_required_app.py - > reaches line 87, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 4: -File: Flask-User/example_apps/roles_required_app.py - > User input at line 83, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User) -Reassigned in: - File: Flask-User/example_apps/roles_required_app.py - > Line 84: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/roles_required_app.py - > reaches line 87, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 5: -File: Flask-User/example_apps/user_auth_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/user_auth_app.py - > Line 92: db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth) - File: Flask-User/example_apps/user_auth_app.py - > Line 93: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_auth_app.py - > reaches line 96, trigger word "filter(": - if not UserAuth.query.filter(UserAuth.username == 'user007').first(): - -Vulnerability 6: -File: Flask-User/example_apps/user_auth_app.py - > User input at line 92, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth) -Reassigned in: - File: Flask-User/example_apps/user_auth_app.py - > Line 93: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_auth_app.py - > reaches line 96, trigger word "filter(": - if not UserAuth.query.filter(UserAuth.username == 'user007').first(): - - - -kstripp/flask-crud -https://github.com/kstripp/flask-crud -Entry file: flask-crud/app/__init__.py -Scanned: 2016-10-20 11:58:58.213275 -Vulnerability 1: -File: flask-crud/app/views.py - > User input at line 25, trigger word "get(": - post = models.Post.query.get(id) -File: flask-crud/app/views.py - > reaches line 28, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show.html',post=post) - - - -iceihehe/flask-test -https://github.com/iceihehe/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 11:58:58.765617 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -gonza-peralta/flask-celery -https://github.com/gonza-peralta/flask-celery -Entry file: flask-celery/app/factory.py -Scanned: 2016-10-20 11:59:08.355608 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -girishramnani/flask-facebookbot -https://github.com/girishramnani/flask-facebookbot -Entry file: flask-facebookbot/app.py -Scanned: 2016-10-20 11:59:09.661372 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Master-Yan/flask_template -https://github.com/Master-Yan/flask_template -Entry file: None -Scanned: 2016-10-20 11:59:10.190348 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Master-Yan/flask_template. - -zjqzero/flask_migrate -https://github.com/zjqzero/flask_migrate -Entry file: flask_migrate/add_index/test.py -Scanned: 2016-10-20 11:59:11.614088 -No vulnerabilities found. - - -nanoha25/flask_local -https://github.com/nanoha25/flask_local -Entry file: flask_local/setup.py -Scanned: 2016-10-20 11:59:12.802674 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Wynndow/flask_skeleton -https://github.com/Wynndow/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-20 11:59:13.300202 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -chiubaca/flask-app -https://github.com/chiubaca/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 11:59:14.819305 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bdhammel/asteroid-flask -https://github.com/bdhammel/asteroid-flask -Entry file: asteroid-flask/game.py -Scanned: 2016-10-20 11:59:25.026957 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -FizLBQ/Flask_fiz -https://github.com/FizLBQ/Flask_fiz -Entry file: Flask_fiz/demo.py -Scanned: 2016-10-20 11:59:26.362718 -No vulnerabilities found. - - -rpalo/flask-firstapp -https://github.com/rpalo/flask-firstapp -Entry file: flask-firstapp/hello.py -Scanned: 2016-10-20 11:59:27.664931 -No vulnerabilities found. - - -rpalo/flask-crimemap -https://github.com/rpalo/flask-crimemap -Entry file: flask-crimemap/crimemap.py -Scanned: 2016-10-20 11:59:28.973062 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -singleyoungtao/myblog-flask -https://github.com/singleyoungtao/myblog-flask -Entry file: myblog-flask/app/__init__.py -Scanned: 2016-10-20 11:59:31.015218 -Vulnerability 1: -File: myblog-flask/app/main/views.py - > User input at line 47, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 55: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 58: posts = pagination.items - File: myblog-flask/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: myblog-flask/app/main/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: myblog-flask/app/main/views.py - > User input at line 50, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 48: show_followed = False - File: myblog-flask/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: myblog-flask/app/main/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: myblog-flask/app/main/views.py - > User input at line 66, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 67: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 70: posts = pagination.items -File: myblog-flask/app/main/views.py - > reaches line 71, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: myblog-flask/app/main/views.py - > User input at line 133, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 135: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: myblog-flask/app/main/views.py - > Line 137: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 140: comments = pagination.items - File: myblog-flask/app/main/views.py - > Line 132: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: myblog-flask/app/main/views.py - > reaches line 141, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: myblog-flask/app/main/views.py - > User input at line 201, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 202: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 205: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: myblog-flask/app/main/views.py - > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: myblog-flask/app/main/views.py - > reaches line 207, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: myblog-flask/app/main/views.py - > User input at line 218, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 219: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 222: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: myblog-flask/app/main/views.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: myblog-flask/app/main/views.py - > reaches line 224, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: myblog-flask/app/main/views.py - > User input at line 249, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 250: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 253: comments = pagination.items -File: myblog-flask/app/main/views.py - > reaches line 254, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: myblog-flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 20: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 23: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: myblog-flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 20: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 23: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: myblog-flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 20: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 23: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: myblog-flask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 42: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 45: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: myblog-flask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 42: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 45: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: myblog-flask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 42: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 45: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: myblog-flask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: myblog-flask/app/api_1_0/posts.py - > Line 16: prev = None - File: myblog-flask/app/api_1_0/posts.py - > Line 19: next = None -File: myblog-flask/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: myblog-flask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: myblog-flask/app/api_1_0/posts.py - > Line 16: prev = None - File: myblog-flask/app/api_1_0/posts.py - > Line 19: next = None -File: myblog-flask/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: myblog-flask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: myblog-flask/app/api_1_0/posts.py - > Line 16: prev = None - File: myblog-flask/app/api_1_0/posts.py - > Line 19: next = None -File: myblog-flask/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 15: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 18: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 15: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 18: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 15: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 18: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 43: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 46: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 43: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 46: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 43: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 46: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -rpalo/flask-waitercaller -https://github.com/rpalo/flask-waitercaller -Entry file: flask-waitercaller/waitercaller.py -Scanned: 2016-10-20 11:59:32.315556 -No vulnerabilities found. - - -NJUPole/Flask_tickets -https://github.com/NJUPole/Flask_tickets -Entry file: Flask_tickets/tickets.py -Scanned: 2016-10-20 11:59:34.288158 -Vulnerability 1: -File: Flask_tickets/tickets.py - > User input at line 62, trigger word "get(": - movieDate = request.args.get('date') -Reassigned in: - File: Flask_tickets/tickets.py - > Line 74: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 75: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 78: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 79: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 81: resultNum = len(results) - File: Flask_tickets/tickets.py - > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1 - File: Flask_tickets/tickets.py - > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price) - File: Flask_tickets/tickets.py - > Line 65: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 66: dateList = list(set(map(x.date, results))) - File: Flask_tickets/tickets.py - > Line 71: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 72: dateList = list(set(map(x.date, results))) -File: Flask_tickets/tickets.py - > reaches line 70, trigger word "filter(": - queryRes = queryRes.filter(data.cinemaName.like('%{}%'.format(searchWords))) - -Vulnerability 2: -File: Flask_tickets/tickets.py - > User input at line 63, trigger word "get(": - searchWords = request.args.get('search') -Reassigned in: - File: Flask_tickets/tickets.py - > Line 71: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 72: dateList = list(set(map(x.date, results))) - File: Flask_tickets/tickets.py - > Line 74: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 75: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 78: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 79: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 81: resultNum = len(results) - File: Flask_tickets/tickets.py - > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1 - File: Flask_tickets/tickets.py - > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price) - File: Flask_tickets/tickets.py - > Line 65: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 66: dateList = list(set(map(x.date, results))) -File: Flask_tickets/tickets.py - > reaches line 70, trigger word "filter(": - queryRes = queryRes.filter(data.cinemaName.like('%{}%'.format(searchWords))) - -Vulnerability 3: -File: Flask_tickets/tickets.py - > User input at line 61, trigger word "get(": - page = request.args.get('page') -Reassigned in: - File: Flask_tickets/tickets.py - > Line 68: page = pageint(page) - 10 -File: Flask_tickets/tickets.py - > reaches line 83, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords) - -Vulnerability 4: -File: Flask_tickets/tickets.py - > User input at line 62, trigger word "get(": - movieDate = request.args.get('date') -Reassigned in: - File: Flask_tickets/tickets.py - > Line 74: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 75: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 78: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 79: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 81: resultNum = len(results) - File: Flask_tickets/tickets.py - > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1 - File: Flask_tickets/tickets.py - > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price) - File: Flask_tickets/tickets.py - > Line 65: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 66: dateList = list(set(map(x.date, results))) - File: Flask_tickets/tickets.py - > Line 71: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 72: dateList = list(set(map(x.date, results))) -File: Flask_tickets/tickets.py - > reaches line 83, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords) - -Vulnerability 5: -File: Flask_tickets/tickets.py - > User input at line 63, trigger word "get(": - searchWords = request.args.get('search') -Reassigned in: - File: Flask_tickets/tickets.py - > Line 71: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 72: dateList = list(set(map(x.date, results))) - File: Flask_tickets/tickets.py - > Line 74: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 75: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 78: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 79: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 81: resultNum = len(results) - File: Flask_tickets/tickets.py - > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1 - File: Flask_tickets/tickets.py - > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price) - File: Flask_tickets/tickets.py - > Line 65: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 66: dateList = list(set(map(x.date, results))) -File: Flask_tickets/tickets.py - > reaches line 83, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords) - - - -Mingz2013/demo.flasky -https://github.com/Mingz2013/demo.flasky -Entry file: None -Scanned: 2016-10-20 11:59:35.703073 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Mingz2013/demo.flasky. - -LaundryOrder/Backend -https://github.com/LaundryOrder/Backend -Entry file: Backend/app.py -Scanned: 2016-10-20 11:59:37.148953 -No vulnerabilities found. - - -tageee/Blog -https://github.com/tageee/Blog -Entry file: Blog/app/__init__.py -Scanned: 2016-10-20 11:59:40.279256 -Vulnerability 1: -File: Blog/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 33: posts = pagination.items - File: Blog/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Blog/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Blog/app/main/views.py - > Line 23: show_followed = False - File: Blog/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Blog/app/main/views.py - > User input at line 59, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 60: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 63: posts = pagination.items -File: Blog/app/main/views.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Blog/app/main/views.py - > User input at line 122, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 124: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Blog/app/main/views.py - > Line 126: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 129: comments = pagination.items - File: Blog/app/main/views.py - > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Blog/app/main/views.py - > reaches line 130, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Blog/app/main/views.py - > User input at line 189, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 190: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 193: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Blog/app/main/views.py - > Line 188: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Blog/app/main/views.py - > User input at line 206, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 207: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 210: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Blog/app/main/views.py - > Line 205: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 212, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Blog/app/main/views.py - > User input at line 221, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 222: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 225: comments = pagination.items -File: Blog/app/main/views.py - > reaches line 226, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -ahumeijun/RestfulTest -https://github.com/ahumeijun/RestfulTest -Entry file: RestfulTest/app/__init__.py -Scanned: 2016-10-20 11:59:42.102646 -No vulnerabilities found. - - -jlberzal/my_app -https://github.com/jlberzal/my_app -Entry file: my_app/app/__init__.py -Scanned: 2016-10-20 11:59:44.075823 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zzq2015/myFirstWeb -https://github.com/zzq2015/myFirstWeb -Entry file: myFirstWeb/hello/app/__init__.py -Scanned: 2016-10-20 11:59:52.443776 -Vulnerability 1: -File: myFirstWeb/hello/app/views.py - > User input at line 16, trigger word ".data": - name = form.name.data -Reassigned in: - File: myFirstWeb/hello/app/views.py - > Line 13: name = None -File: myFirstWeb/hello/app/views.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name) - -Vulnerability 2: -File: myFirstWeb/hello/app/main/views.py - > User input at line 17, trigger word ".data": - name = form.name.data -Reassigned in: - File: myFirstWeb/hello/app/main/views.py - > Line 14: name = None -File: myFirstWeb/hello/app/main/views.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name) - - - -thomasroulin/SpreadPoll -https://github.com/thomasroulin/SpreadPoll -Entry file: SpreadPoll/SpreadPoll.py -Scanned: 2016-10-20 11:59:53.868311 -No vulnerabilities found. - - -vincentdnl/flask-facebook-messenger-bot-boilerplate -https://github.com/vincentdnl/flask-facebook-messenger-bot-boilerplate -Entry file: flask-facebook-messenger-bot-boilerplate/app.py -Scanned: 2016-10-20 11:59:55.181699 -No vulnerabilities found. - - -GrantJamesPowell/FlaskRaffleApp -https://github.com/GrantJamesPowell/FlaskRaffleApp -Entry file: FlaskRaffleApp/raffleapp.py -Scanned: 2016-10-20 11:59:57.036838 -No vulnerabilities found. - - -vishwanath79/FlaskRestAPI -https://github.com/vishwanath79/FlaskRestAPI -Entry file: FlaskRestAPI/rest.py -Scanned: 2016-10-20 11:59:58.673827 -Vulnerability 1: -File: FlaskRestAPI/rest.py - > User input at line 41, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: FlaskRestAPI/rest.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -catmin/flask49erStore -https://github.com/catmin/flask49erStore -Entry file: flask49erStore/flask49erStore.py -Scanned: 2016-10-20 12:00:00.460479 -Vulnerability 1: -File: flask49erStore/flask49erStore.py - > User input at line 253, trigger word "get(": - offer = Offer.query.get(id) -Reassigned in: - File: flask49erStore/flask49erStore.py - > Line 254: hulls = Hull.query.filter_by(offer_id=offer.id) - File: flask49erStore/flask49erStore.py - > Line 255: masts = Mast.query.filter_by(offer_id=offer.id) - File: flask49erStore/flask49erStore.py - > Line 256: sails = Sail.query.filter_by(offer_id=offer.id) -File: flask49erStore/flask49erStore.py - > reaches line 261, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('offer_details.html',offer=offer, sails=sails, hulls=hulls, masts=masts) - - - -leavyli/flaskWebDevelopment -https://github.com/leavyli/flaskWebDevelopment -Entry file: flaskWebDevelopment/hello/hello.py -Scanned: 2016-10-20 12:00:01.774262 -No vulnerabilities found. - - -thedod/boilerplate-peewee-flask -https://github.com/thedod/boilerplate-peewee-flask -Entry file: None -Scanned: 2016-10-20 12:00:08.776745 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/thedod/boilerplate-peewee-flask. - -shn7798/FlaskZhihu -https://github.com/shn7798/FlaskZhihu -Entry file: FlaskZhihu/tests/test_orm.py -Scanned: 2016-10-20 12:00:12.374637 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -syntaxSizer/flask -https://github.com/syntaxSizer/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:00:12.969227 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -gabrielecker/Flask -https://github.com/gabrielecker/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:00:13.475302 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Dianalim209/flask -https://github.com/Dianalim209/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:00:14.092387 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -luojiyin1987/flask -https://github.com/luojiyin1987/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:00:14.664824 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -chrislinan/flask -https://github.com/chrislinan/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:00:15.252739 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -lagougou/flask -https://github.com/lagougou/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:00:15.828838 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -tkirkland/Flask -https://github.com/tkirkland/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:00:26.373327 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ooohiroyukiooo/flask -https://github.com/ooohiroyukiooo/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:00:26.959200 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -RoseOu/Flask-learning -https://github.com/RoseOu/Flask-learning -Entry file: Flask-learning/flaskblog/app/__init__.py -Scanned: 2016-10-20 12:00:35.813224 -No vulnerabilities found. - - -yassipo/webservice -https://github.com/yassipo/webservice -Entry file: webservice/app.py -Scanned: 2016-10-20 12:00:37.752278 -No vulnerabilities found. - - -amey-sam/Flask-MailGun -https://github.com/amey-sam/Flask-MailGun -Entry file: None -Scanned: 2016-10-20 12:00:39.513578 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/amey-sam/Flask-MailGun. - -yoophi/flaskygram -https://github.com/yoophi/flaskygram -Entry file: None -Scanned: 2016-10-20 12:00:41.634321 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yoophi/flaskygram. - -Ifresher/Flaskr -https://github.com/Ifresher/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 12:00:42.163031 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -efrainmunoz/flasktaskr -https://github.com/efrainmunoz/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:00:42.663534 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -HansKramer/flaskr -https://github.com/HansKramer/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:00:43.176514 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shorian/flaskr -https://github.com/shorian/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:00:43.702517 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mmoran0032/flaskwork -https://github.com/mmoran0032/flaskwork -Entry file: flaskwork/hello.py -Scanned: 2016-10-20 12:00:45.028750 -No vulnerabilities found. - - -Maxwell-Ying/flaskbook -https://github.com/Maxwell-Ying/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-20 12:00:45.624949 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -ansel333/flaskr -https://github.com/ansel333/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:00:55.149388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ojgoyal/flaskr -https://github.com/ojgoyal/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:00:56.677774 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hoorn91/flaskproject -https://github.com/hoorn91/flaskproject -Entry file: None -Scanned: 2016-10-20 12:00:58.219688 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hongmaoxiao/flasky -https://github.com/hongmaoxiao/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:00:59.719314 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jiuhuandao/Flaskr -https://github.com/jiuhuandao/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 12:01:00.231676 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -richardqlin/flaskralchemy -https://github.com/richardqlin/flaskralchemy -Entry file: None -Scanned: 2016-10-20 12:01:09.095662 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flaskralchemy. - -thunn/Flaskr1 -https://github.com/thunn/Flaskr1 -Entry file: Flaskr1/flaskr.py -Scanned: 2016-10-20 12:01:10.499500 -No vulnerabilities found. - - -thejojo87/FlaskBlog -https://github.com/thejojo87/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 12:01:11.112541 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shen5630/FlaskProject -https://github.com/shen5630/FlaskProject -Entry file: FlaskProject/views.py -Scanned: 2016-10-20 12:01:13.752323 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -viprs/FlaskyBlog -https://github.com/viprs/FlaskyBlog -Entry file: FlaskyBlog/app/__init__.py -Scanned: 2016-10-20 12:01:17.119655 -Vulnerability 1: -File: FlaskyBlog/app/main/views.py - > User input at line 26, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/main/views.py - > Line 27: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/main/views.py - > Line 31: posts = pagination.items - File: FlaskyBlog/app/main/views.py - > Line 24: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskyBlog/app/main/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: FlaskyBlog/app/main/views.py - > User input at line 47, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/main/views.py - > Line 50: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: FlaskyBlog/app/main/views.py - > Line 52: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/main/views.py - > Line 55: comments = pagination.items - File: FlaskyBlog/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: FlaskyBlog/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 3: -File: FlaskyBlog/app/main/views.py - > User input at line 170, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/main/views.py - > Line 171: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/main/views.py - > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: FlaskyBlog/app/main/views.py - > Line 169: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskyBlog/app/main/views.py - > reaches line 177, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 4: -File: FlaskyBlog/app/main/views.py - > User input at line 187, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/main/views.py - > Line 188: pagination = user.follower.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/main/views.py - > Line 192: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: FlaskyBlog/app/main/views.py - > Line 186: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskyBlog/app/main/views.py - > reaches line 194, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: FlaskyBlog/app/main/views.py - > User input at line 203, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/main/views.py - > Line 204: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/main/views.py - > Line 207: comments = pagination.items -File: FlaskyBlog/app/main/views.py - > reaches line 208, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 6: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 15: users = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 22: user_list = [user.to_json() for user in users] - File: FlaskyBlog/app/api_1_0/users.py - > Line 16: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 19: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 18, trigger word "url_for(": - prev_page = url_for('api.get_users',page=page - 1, _external=True) - -Vulnerability 7: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 15: users = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 22: user_list = [user.to_json() for user in users] - File: FlaskyBlog/app/api_1_0/users.py - > Line 16: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 19: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 21, trigger word "url_for(": - next_page = url_for('api.get_users',page=page + 1, _external=True) - -Vulnerability 8: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 15: users = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 22: user_list = [user.to_json() for user in users] - File: FlaskyBlog/app/api_1_0/users.py - > Line 16: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 19: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users''prev_page''next_page''total_count''page_count'user_listprev_pagenext_pagepagination.totaluser_list.__len__()) - -Vulnerability 9: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 41, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 46: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 49: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - prev_page = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 10: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 41, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 46: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 49: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 51, trigger word "url_for(": - next_page = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 11: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 41, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 46: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 49: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 52, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev_page''next_page''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 12: -File: FlaskyBlog/app/api_1_0/posts.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/posts.py - > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/posts.py - > Line 18: posts = pagination.items - File: FlaskyBlog/app/api_1_0/posts.py - > Line 25: post_list = [post.to_json() for post in posts] - File: FlaskyBlog/app/api_1_0/posts.py - > Line 19: prev_page = None - File: FlaskyBlog/app/api_1_0/posts.py - > Line 22: next_page = None -File: FlaskyBlog/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - prev_page = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 13: -File: FlaskyBlog/app/api_1_0/posts.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/posts.py - > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/posts.py - > Line 18: posts = pagination.items - File: FlaskyBlog/app/api_1_0/posts.py - > Line 25: post_list = [post.to_json() for post in posts] - File: FlaskyBlog/app/api_1_0/posts.py - > Line 19: prev_page = None - File: FlaskyBlog/app/api_1_0/posts.py - > Line 22: next_page = None -File: FlaskyBlog/app/api_1_0/posts.py - > reaches line 24, trigger word "url_for(": - next_page = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 14: -File: FlaskyBlog/app/api_1_0/posts.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/posts.py - > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/posts.py - > Line 18: posts = pagination.items - File: FlaskyBlog/app/api_1_0/posts.py - > Line 25: post_list = [post.to_json() for post in posts] - File: FlaskyBlog/app/api_1_0/posts.py - > Line 19: prev_page = None - File: FlaskyBlog/app/api_1_0/posts.py - > Line 22: next_page = None -File: FlaskyBlog/app/api_1_0/posts.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev_page''next_page''total_count''page_count'post_listprev_pagenext_pagepagination.totalpost_list.__len__()) - - - -PaperAndColours/flaskImage -https://github.com/PaperAndColours/flaskImage -Entry file: flaskImage/app.py -Scanned: 2016-10-20 12:01:23.398524 -No vulnerabilities found. - - -er3456qi/FlaskTutorial -https://github.com/er3456qi/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 12:01:23.905888 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hamartia0/FlaskWeb -https://github.com/hamartia0/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-20 12:01:24.561977 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -rmGuarachi/flask2 -https://github.com/rmGuarachi/flask2 -Entry file: flask2/app.py -Scanned: 2016-10-20 12:01:25.069943 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maheskett/flask-testing -https://github.com/maheskett/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-20 12:01:29.516065 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kellyhiggins/Flask-testing -https://github.com/kellyhiggins/Flask-testing -Entry file: Flask-testing/party.py -Scanned: 2016-10-20 12:01:33.296992 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laurensila/flask-testing -https://github.com/laurensila/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-20 12:01:33.833773 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sugarguo/flask-login -https://github.com/sugarguo/flask-login -Entry file: flask-login/yan.py -Scanned: 2016-10-20 12:01:37.455418 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Afghary/bloggingFlask -https://github.com/Afghary/bloggingFlask -Entry file: bloggingFlask/src/app.py -Scanned: 2016-10-20 12:01:38.845584 -No vulnerabilities found. - - -DANWINS-LLC/flask-starter -https://github.com/DANWINS-LLC/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-20 12:01:39.361087 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coffee-world/flask_wd -https://github.com/coffee-world/flask_wd -Entry file: flask_wd/hello.py -Scanned: 2016-10-20 12:01:42.137485 -No vulnerabilities found. - - -jiang2/flask-rest -https://github.com/jiang2/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-20 12:01:43.133731 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -progBill/flask_blueprint -https://github.com/progBill/flask_blueprint -Entry file: flask_blueprint/__init__.py -Scanned: 2016-10-20 12:01:44.425707 -No vulnerabilities found. - - -carlsagan21/flask-crawler -https://github.com/carlsagan21/flask-crawler -Entry file: flask-crawler/flask-crawler.py -Scanned: 2016-10-20 12:01:45.689604 -No vulnerabilities found. - - -jdesilvio/flask-deploy -https://github.com/jdesilvio/flask-deploy -Entry file: flask-deploy/template.py -Scanned: 2016-10-20 12:01:46.231346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stanliski/flask-dev -https://github.com/stanliski/flask-dev -Entry file: flask-dev/app/__init__.py -Scanned: 2016-10-20 12:01:53.224216 -No vulnerabilities found. - - -paceko/testing-flask -https://github.com/paceko/testing-flask -Entry file: None -Scanned: 2016-10-20 12:01:53.763718 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -minyisme/flask-testing -https://github.com/minyisme/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-20 12:01:54.272378 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cristinamclarkin/Flask-testing -https://github.com/cristinamclarkin/Flask-testing -Entry file: Flask-testing/party.py -Scanned: 2016-10-20 12:01:55.818234 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kindoprec/flask-boot -https://github.com/kindoprec/flask-boot -Entry file: flask-boot/app.py -Scanned: 2016-10-20 12:01:58.143751 -Vulnerability 1: -File: flask-boot/app.py - > User input at line 15, trigger word "get(": - out = 'Hello ' + request.args.get('name', '') -File: flask-boot/app.py - > reaches line 16, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(output=out) - - - -enlacee/appFlask -https://github.com/enlacee/appFlask -Entry file: appFlask/web/hello.py -Scanned: 2016-10-20 12:01:59.539362 -No vulnerabilities found. - - -shuangfu/learnFlask -https://github.com/shuangfu/learnFlask -Entry file: None -Scanned: 2016-10-20 12:02:00.521739 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shuangfu/learnFlask. - -tnygren/flask-testing -https://github.com/tnygren/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-20 12:02:08.527693 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eduardoferrandezr/flask-bokeh -https://github.com/eduardoferrandezr/flask-bokeh -Entry file: flask-bokeh/app.py -Scanned: 2016-10-20 12:02:10.875689 -No vulnerabilities found. - - -rd82/flask-tute -https://github.com/rd82/flask-tute -Entry file: flask-tute/app/__init__.py -Scanned: 2016-10-20 12:02:12.333470 -No vulnerabilities found. - - -jlberzal/Flask-User -https://github.com/jlberzal/Flask-User -Entry file: Flask-User/example_apps/multi_email_app.py -Scanned: 2016-10-20 12:02:18.293987 -Vulnerability 1: -File: Flask-User/example_apps/user_profile_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/user_profile_app.py - > Line 90: db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile) - File: Flask-User/example_apps/user_profile_app.py - > Line 91: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_profile_app.py - > reaches line 94, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 2: -File: Flask-User/example_apps/user_profile_app.py - > User input at line 90, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserProfileClass=UserProfile) -Reassigned in: - File: Flask-User/example_apps/user_profile_app.py - > Line 91: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_profile_app.py - > reaches line 94, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 3: -File: Flask-User/example_apps/roles_required_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/roles_required_app.py - > Line 83: db_adapter = SQLAlchemyAdapter(db, User) - File: Flask-User/example_apps/roles_required_app.py - > Line 84: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/roles_required_app.py - > reaches line 87, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 4: -File: Flask-User/example_apps/roles_required_app.py - > User input at line 83, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User) -Reassigned in: - File: Flask-User/example_apps/roles_required_app.py - > Line 84: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/roles_required_app.py - > reaches line 87, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 5: -File: Flask-User/example_apps/user_auth_app.py - > User input at line 44, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-User/example_apps/user_auth_app.py - > Line 92: db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth) - File: Flask-User/example_apps/user_auth_app.py - > Line 93: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_auth_app.py - > reaches line 96, trigger word "filter(": - if not UserAuth.query.filter(UserAuth.username == 'user007').first(): - -Vulnerability 6: -File: Flask-User/example_apps/user_auth_app.py - > User input at line 92, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserAuthClass=UserAuth) -Reassigned in: - File: Flask-User/example_apps/user_auth_app.py - > Line 93: user_manager = UserManager(db_adapter, app) -File: Flask-User/example_apps/user_auth_app.py - > reaches line 96, trigger word "filter(": - if not UserAuth.query.filter(UserAuth.username == 'user007').first(): - - - -saampandit/flask-intro -https://github.com/saampandit/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:02:18.820881 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Danielyao0312/flask-intro -https://github.com/Danielyao0312/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:02:19.335347 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zachwooddoughty/flask-tester -https://github.com/zachwooddoughty/flask-tester -Entry file: flask-tester/hello.py -Scanned: 2016-10-20 12:02:25.679930 -No vulnerabilities found. - - -licsh/flask_app -https://github.com/licsh/flask_app -Entry file: None -Scanned: 2016-10-20 12:02:26.214355 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/licsh/flask_app. - -andresmguk/flask-blog -https://github.com/andresmguk/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:02:26.809504 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -dencynluv/testing-flask -https://github.com/dencynluv/testing-flask -Entry file: None -Scanned: 2016-10-20 12:02:27.314576 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -efrainmunoz/flask-blog -https://github.com/efrainmunoz/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:02:30.883217 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -bdhammel/asteroid-flask -https://github.com/bdhammel/asteroid-flask -Entry file: asteroid-flask/game.py -Scanned: 2016-10-20 12:02:34.391289 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dflee/testing-flask -https://github.com/dflee/testing-flask -Entry file: None -Scanned: 2016-10-20 12:02:37.899053 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Ihyatt/testing-flask -https://github.com/Ihyatt/testing-flask -Entry file: None -Scanned: 2016-10-20 12:02:38.411728 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gyermolenko/flask-modelhistory -https://github.com/gyermolenko/flask-modelhistory -Entry file: flask-modelhistory/example/app/__init__.py -Scanned: 2016-10-20 12:02:40.777652 -No vulnerabilities found. - - -hiro93n/sample_flask -https://github.com/hiro93n/sample_flask -Entry file: sample_flask/sample_flask.py -Scanned: 2016-10-20 12:02:41.348560 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DraZoro/flask_learning -https://github.com/DraZoro/flask_learning -Entry file: flask_learning/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-20 12:02:43.034090 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -skols/flask_blog -https://github.com/skols/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:02:43.541618 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Mingz2013/demo.flasky -https://github.com/Mingz2013/demo.flasky -Entry file: None -Scanned: 2016-10-20 12:02:45.568389 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ahumeijun/RestfulTest -https://github.com/ahumeijun/RestfulTest -Entry file: RestfulTest/app/__init__.py -Scanned: 2016-10-20 12:02:47.885895 -No vulnerabilities found. - - -jlberzal/my_app -https://github.com/jlberzal/my_app -Entry file: my_app/app/__init__.py -Scanned: 2016-10-20 12:02:48.749830 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Kathure/microblg -https://github.com/Kathure/microblg -Entry file: None -Scanned: 2016-10-20 12:03:04.522923 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hufan-Akari/BookLibrary -https://github.com/hufan-Akari/BookLibrary -Entry file: BookLibrary/app/__init__.py -Scanned: 2016-10-20 12:03:09.320044 -Vulnerability 1: -File: BookLibrary/app/main/auth/views.py - > User input at line 14, trigger word ".data": - the_user = User.query.filter(User.email.ilike(login_form.email.data)).first() -File: BookLibrary/app/main/auth/views.py - > reaches line 14, trigger word "filter(": - the_user = User.query.filter(User.email.ilike(login_form.email.data)).first() - -Vulnerability 2: -File: BookLibrary/app/main/auth/views.py - > User input at line 14, trigger word ".data": - the_user = User.query.filter(User.email.ilike(login_form.email.data)).first() -File: BookLibrary/app/main/auth/views.py - > reaches line 17, trigger word "flash(": - flash('登录成功! 欢迎您 %s!' % the_user.name, 'success') - -Vulnerability 3: -File: BookLibrary/app/main/book/views.py - > User input at line 14, trigger word "get(": - search_word = request.args.get('search', None) -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 23: search_word = search_word.strip() - File: BookLibrary/app/main/book/views.py - > Line 28: search_form.search.data = search_word -File: BookLibrary/app/main/book/views.py - > reaches line 24, trigger word "filter(": - the_books = the_books.filter(db.or_(Book.title.ilike('%%%s%%' % search_word), Book.author.ilike('%%%s%%' % search_word), Book.isbn.ilike('%%%s%%' % search_word), Book.tags.any(Tag.name.ilike('%%%s%%' % search_word)), Book.subtitle.ilike('%%%s%%' % search_word))).outerjoin(Log).group_by(Book.id).order_by(db.func.count(Log.id).desc()) - -Vulnerability 4: -File: BookLibrary/app/main/book/views.py - > User input at line 16, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 32: pagination = the_books.paginate(page,per_page=8) - File: BookLibrary/app/main/book/views.py - > Line 33: result_books = pagination.items -File: BookLibrary/app/main/book/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book.html',books=result_books, pagination=pagination, search_form=search_form, title='书籍清单') - -Vulnerability 5: -File: BookLibrary/app/main/book/views.py - > User input at line 46, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 50: pagination = the_book.logs.filter_by(returned=show - 1).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=5) - File: BookLibrary/app/main/book/views.py - > Line 53: pagination = the_book.comments.filter_by(deleted=0).order_by(Comment.edit_timestamp.desc()).paginate(page,per_page=5) - File: BookLibrary/app/main/book/views.py - > Line 56: data = pagination.items -File: BookLibrary/app/main/book/views.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book_detail.html',book=the_book, data=data, pagination=pagination, form=form, title=the_book.title) - -Vulnerability 6: -File: BookLibrary/app/main/book/views.py - > User input at line 112, trigger word ".data": - new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '') -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书') -File: BookLibrary/app/main/book/views.py - > reaches line 131, trigger word "flash(": - flash('书籍 %s 已添加至图书馆!' % new_book.title, 'success') - -Vulnerability 7: -File: BookLibrary/app/main/book/views.py - > User input at line 112, trigger word ".data": - new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '') -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书') -File: BookLibrary/app/main/book/views.py - > reaches line 132, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book.detail',book_id=new_book.id)) - -Vulnerability 8: -File: BookLibrary/app/main/book/views.py - > User input at line 112, trigger word ".data": - new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '') -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书') -File: BookLibrary/app/main/book/views.py - > reaches line 132, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book.detail',book_id=new_book.id)) - -Vulnerability 9: -File: BookLibrary/app/main/book/views.py - > User input at line 161, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 179: pagination = the_books.paginate(page,per_page=8) - File: BookLibrary/app/main/book/views.py - > Line 180: data = pagination.items - File: BookLibrary/app/main/book/views.py - > Line 167: data = None - File: BookLibrary/app/main/book/views.py - > Line 168: pagination = None -File: BookLibrary/app/main/book/views.py - > reaches line 182, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book_tag.html',tags=the_tags, title='Tags', search_form=search_form, books=data, pagination=pagination) - -Vulnerability 10: -File: BookLibrary/app/main/user/views.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/user/views.py - > Line 15: pagination = User.query.order_by(User.id.desc()).paginate(page,per_page=10) - File: BookLibrary/app/main/user/views.py - > Line 16: users = pagination.items -File: BookLibrary/app/main/user/views.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',users=users, pagination=pagination, title='已注册用户') - -Vulnerability 11: -File: BookLibrary/app/main/user/views.py - > User input at line 28, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/user/views.py - > Line 29: pagination = the_user.logs.filter_by(returned=show).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=5) - File: BookLibrary/app/main/user/views.py - > Line 31: logs = pagination.items -File: BookLibrary/app/main/user/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user_detail.html',user=the_user, logs=logs, pagination=pagination, title='用户: ' + the_user.name) - -Vulnerability 12: -File: BookLibrary/app/main/log/views.py - > User input at line 14, trigger word "get(": - book_id = request.args.get('book_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 15: the_book = Book.query.get_or_404(book_id) - File: BookLibrary/app/main/log/views.py - > Line 19: result = current_user.borrow_book(the_book) - File: BookLibrary/app/main/log/views.py - > Line 19: message = current_user.borrow_book(the_book) -File: BookLibrary/app/main/log/views.py - > reaches line 20, trigger word "flash(": - flash(message, result'success''danger') - -Vulnerability 13: -File: BookLibrary/app/main/log/views.py - > User input at line 14, trigger word "get(": - book_id = request.args.get('book_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 15: the_book = Book.query.get_or_404(book_id) - File: BookLibrary/app/main/log/views.py - > Line 19: result = current_user.borrow_book(the_book) - File: BookLibrary/app/main/log/views.py - > Line 19: message = current_user.borrow_book(the_book) -File: BookLibrary/app/main/log/views.py - > reaches line 22, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=book_id)) - -Vulnerability 14: -File: BookLibrary/app/main/log/views.py - > User input at line 14, trigger word "get(": - book_id = request.args.get('book_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 15: the_book = Book.query.get_or_404(book_id) - File: BookLibrary/app/main/log/views.py - > Line 19: result = current_user.borrow_book(the_book) - File: BookLibrary/app/main/log/views.py - > Line 19: message = current_user.borrow_book(the_book) -File: BookLibrary/app/main/log/views.py - > reaches line 22, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=book_id)) - -Vulnerability 15: -File: BookLibrary/app/main/log/views.py - > User input at line 29, trigger word "get(": - log_id = request.args.get('log_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 33: the_log = Log.query.get(log_id) - File: BookLibrary/app/main/log/views.py - > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first() - File: BookLibrary/app/main/log/views.py - > Line 39: result = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 39: message = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 31: the_log = None -File: BookLibrary/app/main/log/views.py - > reaches line 40, trigger word "flash(": - flash(message, result'success''danger') - -Vulnerability 16: -File: BookLibrary/app/main/log/views.py - > User input at line 33, trigger word "get(": - the_log = Log.query.get(log_id) -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 31: the_log = None - File: BookLibrary/app/main/log/views.py - > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first() - File: BookLibrary/app/main/log/views.py - > Line 39: result = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 39: message = current_user.return_book(the_log) -File: BookLibrary/app/main/log/views.py - > reaches line 40, trigger word "flash(": - flash(message, result'success''danger') - -Vulnerability 17: -File: BookLibrary/app/main/log/views.py - > User input at line 29, trigger word "get(": - log_id = request.args.get('log_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 33: the_log = Log.query.get(log_id) - File: BookLibrary/app/main/log/views.py - > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first() - File: BookLibrary/app/main/log/views.py - > Line 39: result = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 39: message = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 31: the_log = None -File: BookLibrary/app/main/log/views.py - > reaches line 42, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=log_id)) - -Vulnerability 18: -File: BookLibrary/app/main/log/views.py - > User input at line 29, trigger word "get(": - log_id = request.args.get('log_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 33: the_log = Log.query.get(log_id) - File: BookLibrary/app/main/log/views.py - > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first() - File: BookLibrary/app/main/log/views.py - > Line 39: result = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 39: message = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 31: the_log = None -File: BookLibrary/app/main/log/views.py - > reaches line 42, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=log_id)) - -Vulnerability 19: -File: BookLibrary/app/main/log/views.py - > User input at line 52, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 53: pagination = Log.query.filter_by(returned=show).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=10) - File: BookLibrary/app/main/log/views.py - > Line 54: logs = pagination.items -File: BookLibrary/app/main/log/views.py - > reaches line 55, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('logs_info.html',logs=logs, pagination=pagination, title='借阅信息') - - - -katietarng/hb-testing-flask -https://github.com/katietarng/hb-testing-flask -Entry file: hb-testing-flask/party.py -Scanned: 2016-10-20 12:03:12.825549 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lkpanganiban/flask-restful-example -https://github.com/lkpanganiban/flask-restful-example -Entry file: flask-restful-example/api.py -Scanned: 2016-10-20 12:03:13.370675 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qefir/Black-Jack-Flask-game -https://github.com/qefir/Black-Jack-Flask-game -Entry file: Black-Jack-Flask-game/BJenv/lib/python3.4/site-packages/flask_openid.py -Scanned: 2016-10-20 12:03:23.134826 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -p00gz/OLD-flask-imdbratings-app -https://github.com/p00gz/OLD-flask-imdbratings-app -Entry file: OLD-flask-imdbratings-app/imdbRatings/__init__.py -Scanned: 2016-10-20 12:03:30.419891 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lysdexia/flask-svg-barcode -https://github.com/lysdexia/flask-svg-barcode -Entry file: None -Scanned: 2016-10-20 12:03:32.286626 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lysdexia/flask-svg-barcode. - -Tiago-Lira/cookiecutter-flask-websocket -https://github.com/Tiago-Lira/cookiecutter-flask-websocket -Entry file: None -Scanned: 2016-10-20 12:03:33.738923 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Tiago-Lira/cookiecutter-flask-websocket. - -davejonesbkk/flask_by_example -https://github.com/davejonesbkk/flask_by_example -Entry file: flask_by_example/app.py -Scanned: 2016-10-20 12:03:43.690560 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_by_example/venv/lib/python3.5/struct.py - -efrainmunoz/flask-hello-world -https://github.com/efrainmunoz/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 12:03:44.235227 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -beckman16/flask-video-stream -https://github.com/beckman16/flask-video-stream -Entry file: flask-video-stream/app.py -Scanned: 2016-10-20 12:03:46.960118 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -askiefer/flask-testing-2 -https://github.com/askiefer/flask-testing-2 -Entry file: flask-testing-2/party.py -Scanned: 2016-10-20 12:03:49.886969 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apaoing/apaoing-one-flask -https://github.com/apaoing/apaoing-one-flask -Entry file: apaoing-one-flask/hello.py -Scanned: 2016-10-20 12:03:51.296538 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -njurgens/cookbook-api-flask -https://github.com/njurgens/cookbook-api-flask -Entry file: cookbook-api-flask/cookbook_api/app.py -Scanned: 2016-10-20 12:03:53.200912 -No vulnerabilities found. - - -jestoc01/flask-hello-world -https://github.com/jestoc01/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 12:03:53.757917 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -responsible/Flask-Restful-Role-Auth -https://github.com/responsible/Flask-Restful-Role-Auth -Entry file: Flask-Restful-Role-Auth/App/__init__.py -Scanned: 2016-10-20 12:03:55.088770 -Vulnerability 1: -File: Flask-Restful-Role-Auth/App/__init__.py - > User input at line 9, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-Restful-Role-Auth/App/__init__.py - > Line 15: user_datastore = SQLAlchemyUserDatastore(db, User, Role) - File: Flask-Restful-Role-Auth/App/__init__.py - > Line 16: security = Security().init_app(app, user_datastore,register_blueprint=False) -File: Flask-Restful-Role-Auth/App/__init__.py - > reaches line 25, trigger word "execute(": - db.engine.execute(roles_users.insert(),user_id=1, role_id=1) - - - -dyllanwli/MyFlaskProject -https://github.com/dyllanwli/MyFlaskProject -Entry file: MyFlaskProject/hello.py -Scanned: 2016-10-20 12:03:56.388375 -No vulnerabilities found. - - -rcuevass/Simple_Flask_App -https://github.com/rcuevass/Simple_Flask_App -Entry file: None -Scanned: 2016-10-20 12:03:57.781227 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rcuevass/Simple_Flask_App. - -susantshrestha/flask-by-example -https://github.com/susantshrestha/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 12:03:58.469798 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -johnwheeler/flask-ask -https://github.com/johnwheeler/flask-ask -Entry file: flask-ask/server.py -Scanned: 2016-10-20 12:04:00.338916 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxweiber/flask -https://github.com/maxweiber/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:04:00.919409 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -syntaxSizer/flask -https://github.com/syntaxSizer/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:04:01.525716 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -gabrielecker/Flask -https://github.com/gabrielecker/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:04:02.013581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ryanmthompson/flask -https://github.com/ryanmthompson/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:04:02.598186 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -parampara/flask -https://github.com/parampara/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:04:03.188165 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -miguelgrinberg/flack -https://github.com/miguelgrinberg/flack -Entry file: flack/flack/__init__.py -Scanned: 2016-10-20 12:04:05.018054 -Vulnerability 1: -File: flack/flack/api/users.py - > User input at line 38, trigger word "get(": - users = users.filter_by(online=request.args.get('online') != '0') -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) -File: flack/flack/api/users.py - > reaches line 40, trigger word "filter(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) - -Vulnerability 2: -File: flack/flack/api/users.py - > User input at line 40, trigger word "get(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) - File: flack/flack/api/users.py - > Line 38: users = users.filter_by(online=request.args.get('online') != '0') -File: flack/flack/api/users.py - > reaches line 40, trigger word "filter(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) - -Vulnerability 3: -File: flack/flack/api/users.py - > User input at line 38, trigger word "get(": - users = users.filter_by(online=request.args.get('online') != '0') -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) -File: flack/flack/api/users.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()]) - -Vulnerability 4: -File: flack/flack/api/users.py - > User input at line 40, trigger word "get(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) - File: flack/flack/api/users.py - > Line 38: users = users.filter_by(online=request.args.get('online') != '0') -File: flack/flack/api/users.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()]) - -Vulnerability 5: -File: flack/flack/api/messages.py - > User input at line 36, trigger word "get(": - since = int(request.args.get('updated_since', '0')) -Reassigned in: - File: flack/flack/api/messages.py - > Line 40: since = day_ago -File: flack/flack/api/messages.py - > reaches line 41, trigger word "filter(": - msgs = Message.query.filter(Message.updated_at > since).order_by(Message.updated_at) - - - -TwilioDevEd/sms2fa-flask -https://github.com/TwilioDevEd/sms2fa-flask -Entry file: sms2fa-flask/sms2fa_flask/__init__.py -Scanned: 2016-10-20 12:04:10.196637 -Vulnerability 1: -File: sms2fa-flask/sms2fa_flask/views.py - > User input at line 51, trigger word "get(": - user = User.query.get(session.get('user_email', '')) or abort(401) -Reassigned in: - File: sms2fa-flask/sms2fa_flask/views.py - > Line 56: ret_MAYBE_FUNCTION_NAME = redirect(url_for('secret_page')) -File: sms2fa-flask/sms2fa_flask/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('confirmation.html',user=user) - - - -RoseOu/Flask-learning -https://github.com/RoseOu/Flask-learning -Entry file: Flask-learning/flaskblog/app/__init__.py -Scanned: 2016-10-20 12:04:17.730323 -No vulnerabilities found. - - -YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg -https://github.com/YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg -Entry file: uwsgi-nginx-flask-docker-for-sinaimg/flask/app/main.py -Scanned: 2016-10-20 12:04:21.347401 -No vulnerabilities found. - - -datademofun/heroku-basic-flask -https://github.com/datademofun/heroku-basic-flask -Entry file: heroku-basic-flask/app.py -Scanned: 2016-10-20 12:04:26.090256 -No vulnerabilities found. - - -amey-sam/Flask-MailGun -https://github.com/amey-sam/Flask-MailGun -Entry file: None -Scanned: 2016-10-20 12:04:26.601531 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/amey-sam/Flask-MailGun. - -DullSmile/flasky -https://github.com/DullSmile/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:04:27.106496 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andresmguk/flasktaskr -https://github.com/andresmguk/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:04:27.629372 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -minc-yang/flaskdemo -https://github.com/minc-yang/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 12:04:28.155493 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -efrainmunoz/flasktaskr -https://github.com/efrainmunoz/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:04:31.696897 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zjl1110/flaskdemo -https://github.com/zjl1110/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 12:04:34.764946 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -yvonnendutaw/flaskbook -https://github.com/yvonnendutaw/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-20 12:04:44.317966 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -chestnutme/flaskie -https://github.com/chestnutme/flaskie -Entry file: flaskie/app/__init__.py -Scanned: 2016-10-20 12:04:46.061338 -Vulnerability 1: -File: flaskie/app/main/views.py - > User input at line 18, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 26: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 29: posts = pagination.items - File: flaskie/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskie/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskie/app/main/views.py - > User input at line 21, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskie/app/main/views.py - > Line 19: show_followed = False - File: flaskie/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskie/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskie/app/main/views.py - > User input at line 36, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 37: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 39: posts = pagination.items -File: flaskie/app/main/views.py - > reaches line 40, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flaskie/app/main/views.py - > User input at line 95, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 97: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskie/app/main/views.py - > Line 99: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 102: comments = pagination.items - File: flaskie/app/main/views.py - > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskie/app/main/views.py - > reaches line 103, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flaskie/app/main/views.py - > User input at line 158, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 159: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 162: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskie/app/main/views.py - > Line 157: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flaskie/app/main/views.py - > reaches line 164, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flaskie/app/main/views.py - > User input at line 174, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 175: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE']) - File: flaskie/app/main/views.py - > Line 177: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskie/app/main/views.py - > Line 173: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flaskie/app/main/views.py - > reaches line 179, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - - - -fengyu225/flaskr -https://github.com/fengyu225/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:04:47.579404 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jbussdieker/flaskr -https://github.com/jbussdieker/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:04:51.093993 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -richardqlin/flaskralchemy -https://github.com/richardqlin/flaskralchemy -Entry file: None -Scanned: 2016-10-20 12:04:52.589103 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flaskralchemy. - -garaud/flask-restplus-meetup -https://github.com/garaud/flask-restplus-meetup -Entry file: flask-restplus-meetup/simple_app.py -Scanned: 2016-10-20 12:04:54.031913 -No vulnerabilities found. - - -ibrahimirdem/flask-numaradan-isim -https://github.com/ibrahimirdem/flask-numaradan-isim -Entry file: flask-numaradan-isim/app.py -Scanned: 2016-10-20 12:04:55.356058 -Vulnerability 1: -File: flask-numaradan-isim/app.py - > User input at line 18, trigger word "form[": - gelen = request.form['numara'] -Reassigned in: - File: flask-numaradan-isim/app.py - > Line 22: sonuc = fonksiyonlar.numara_denetim(gelen) - File: flask-numaradan-isim/app.py - > Line 29: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home')) - File: flask-numaradan-isim/app.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home')) -File: flask-numaradan-isim/app.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sonuc.html',dogruluk=sonuc[0], isim=sonuc[1], id=sonuc[2]) - - - -belljustin/FlaskDeploy -https://github.com/belljustin/FlaskDeploy -Entry file: FlaskDeploy/deploy.py -Scanned: 2016-10-20 12:04:56.668272 -No vulnerabilities found. - - -ArvidQuarshie/FlaskAuthentication -https://github.com/ArvidQuarshie/FlaskAuthentication -Entry file: None -Scanned: 2016-10-20 12:05:02.060528 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ArvidQuarshie/FlaskAuthentication. - -andresmguk/flasktaskr1 -https://github.com/andresmguk/flasktaskr1 -Entry file: flasktaskr1/views.py -Scanned: 2016-10-20 12:05:09.412152 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andresmguk/flasktaskr2 -https://github.com/andresmguk/flasktaskr2 -Entry file: flasktaskr2/views.py -Scanned: 2016-10-20 12:05:16.653239 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zjyExcelsior/FlaskSkeleton -https://github.com/zjyExcelsior/FlaskSkeleton -Entry file: FlaskSkeleton/myapp/__init__.py -Scanned: 2016-10-20 12:05:18.042523 -No vulnerabilities found. - - -er3456qi/FlaskTutorial -https://github.com/er3456qi/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 12:05:18.551981 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kelvinmuchui/flaskApp -https://github.com/kelvinmuchui/flaskApp -Entry file: flaskApp/apiApp_new.py -Scanned: 2016-10-20 12:05:19.075342 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ptomelle/flaskNew -https://github.com/ptomelle/flaskNew -Entry file: flaskNew/wsgi/myflaskapp.py -Scanned: 2016-10-20 12:05:22.510251 -No vulnerabilities found. - - -sr77/Restaurant-Web-Application -https://github.com/sr77/Restaurant-Web-Application -Entry file: Restaurant-Web-Application/project.py -Scanned: 2016-10-20 12:05:23.939181 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Almazi/Flask_Project_RealPython -https://github.com/Almazi/Flask_Project_RealPython -Entry file: Flask_Project_RealPython/app.py -Scanned: 2016-10-20 12:05:27.401463 -No vulnerabilities found. - - -hamidfzm/Rest-in-Flask -https://github.com/hamidfzm/Rest-in-Flask -Entry file: Rest-in-Flask/application/__init__.py -Scanned: 2016-10-20 12:05:28.842748 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhujinliang/flask-based-web-framework -https://github.com/zhujinliang/flask-based-web-framework -Entry file: flask-based-web-framework/core/__init__.py -Scanned: 2016-10-20 12:05:30.477628 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lipemorais/todo-flask -https://github.com/lipemorais/todo-flask -Entry file: None -Scanned: 2016-10-20 12:05:30.987138 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lipemorais/todo-flask. - -tonuidavies/Blog-flask -https://github.com/tonuidavies/Blog-flask -Entry file: None -Scanned: 2016-10-20 12:05:40.815107 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -LpanatoPlanzi/flask-app -https://github.com/LpanatoPlanzi/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 12:05:41.332465 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ksripathi/flask-app -https://github.com/ksripathi/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 12:05:41.836831 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maheskett/flask-testing -https://github.com/maheskett/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-20 12:05:42.340584 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kellyhiggins/Flask-testing -https://github.com/kellyhiggins/Flask-testing -Entry file: Flask-testing/party.py -Scanned: 2016-10-20 12:05:42.840343 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laurensila/flask-testing -https://github.com/laurensila/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-20 12:05:43.336760 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaronoff97/Flask-Boilerplate -https://github.com/jaronoff97/Flask-Boilerplate -Entry file: Flask-Boilerplate/flaskapp.py -Scanned: 2016-10-20 12:05:44.854528 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zjl1110/flask-demo -https://github.com/zjl1110/flask-demo -Entry file: None -Scanned: 2016-10-20 12:05:45.446661 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zjl1110/flask-demo. - -hadesong/Flask_Issues -https://github.com/hadesong/Flask_Issues -Entry file: None -Scanned: 2016-10-20 12:05:46.841576 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hadesong/Flask_Issues. - -jayanth2810/Heroku_Flask -https://github.com/jayanth2810/Heroku_Flask -Entry file: Heroku_Flask/app/app.py -Scanned: 2016-10-20 12:05:48.137369 -No vulnerabilities found. - - -ArvidQuarshie/DiscoverFlask -https://github.com/ArvidQuarshie/DiscoverFlask -Entry file: None -Scanned: 2016-10-20 12:05:56.186746 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kosma24/labrat-flask -https://github.com/kosma24/labrat-flask -Entry file: labrat-flask/lab.py -Scanned: 2016-10-20 12:05:59.061520 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paceko/testing-flask -https://github.com/paceko/testing-flask -Entry file: None -Scanned: 2016-10-20 12:05:59.567572 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -minyisme/flask-testing -https://github.com/minyisme/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-20 12:06:00.060830 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cristinamclarkin/Flask-testing -https://github.com/cristinamclarkin/Flask-testing -Entry file: Flask-testing/party.py -Scanned: 2016-10-20 12:06:00.549945 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sangqt/learn-flask -https://github.com/sangqt/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 12:06:01.228232 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nathanism/flask-app -https://github.com/nathanism/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 12:06:02.212490 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iuhsihsow/hello_flask -https://github.com/iuhsihsow/hello_flask -Entry file: hello_flask/Flask.py -Scanned: 2016-10-20 12:06:02.721366 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amsuny/flask-site -https://github.com/amsuny/flask-site -Entry file: None -Scanned: 2016-10-20 12:06:10.258822 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bigzhao/Flask-Tasks -https://github.com/bigzhao/Flask-Tasks -Entry file: Flask-Tasks/flasktask/app/__init__.py -Scanned: 2016-10-20 12:06:22.893656 -Vulnerability 1: -File: Flask-Tasks/flasktask/app/auth/views.py - > User input at line 124, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Flask-Tasks/flasktask/app/auth/views.py - > Line 129: filename = secure_filename(file.filename) -File: Flask-Tasks/flasktask/app/auth/views.py - > reaches line 131, trigger word "url_for(": - current_user.image_url = url_for('auth.static',filename='%s/%s' % ('avatar', filename)) - -Vulnerability 2: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 26, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/main/views.py - > Line 28: pagination = current_user.circles[-1].tasks.order_by(Task.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/main/views.py - > Line 31: tasks = pagination.items - File: Flask-Tasks/flasktask/app/main/views.py - > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages)) - -Vulnerability 3: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 33, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -Reassigned in: - File: Flask-Tasks/flasktask/app/main/views.py - > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages)) - -Vulnerability 4: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 53, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/main/views.py - > Line 57: pagination = c.tasks.order_by(Task.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/main/views.py - > Line 60: tasks = pagination.items - File: Flask-Tasks/flasktask/app/main/views.py - > Line 52: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=c.id)) -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 63, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=c.name, new_messages=int(new_messages)) - -Vulnerability 5: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 62, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -Reassigned in: - File: Flask-Tasks/flasktask/app/main/views.py - > Line 52: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=c.id)) -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 63, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=c.name, new_messages=int(new_messages)) - -Vulnerability 6: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 167, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 168, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('circle.html',new_messages=int(new_messages)) - -Vulnerability 7: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 189, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message') -Reassigned in: - File: Flask-Tasks/flasktask/app/main/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.circle')) -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 190, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('create_circle.html',new_messages=int(new_messages), form=form) - -Vulnerability 8: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 196, trigger word "get(": - message = request.form.get('message') -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 200, trigger word "filter(": - c = db.session.query(Circle).filter(Circle.name.like('%' + message + '%')).all() - -Vulnerability 9: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 202, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 203, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_circle.html',new_messages=int(new_messages), circles=c) - -Vulnerability 10: -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 23: next = None -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 11: -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 23: next = None -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 12: -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 23: next = None -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 13: -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 14: -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 15: -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 16: -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 17: -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 18: -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 19: -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 13: tasks = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 14: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 17: next = None -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > reaches line 16, trigger word "url_for(": - prev = url_for('api.get_tasks',page=page - 1, _external=True) - -Vulnerability 20: -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 13: tasks = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 14: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 17: next = None -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > reaches line 19, trigger word "url_for(": - next = url_for('api.get_tasks',page=page + 1, _external=True) - -Vulnerability 21: -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 13: tasks = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 14: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 17: next = None -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > reaches line 20, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('tasks''prev''next''count'[task.to_json() for task in tasks]prevnextpagination.total) - -Vulnerability 22: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 23: pagination = current_user.circles[-1].posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 26: posts = pagination.items - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages)) - -Vulnerability 23: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 28, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -Reassigned in: - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages)) - -Vulnerability 24: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 45, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 46: pagination = c.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 49: posts = pagination.items - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=circle_id)) -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 52, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=c.name, new_messages=int(new_messages)) - -Vulnerability 25: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 51, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -Reassigned in: - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=circle_id)) -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 52, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=c.name, new_messages=int(new_messages)) - -Vulnerability 26: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 94, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 95: pagination = user.posts.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 98: posts = pagination.items - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 100: posts = [] - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 101: posts = pagination.items -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 104, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/user_blogs.html',user=user, posts=posts, pagination=pagination, new_messages=int(new_messages)) - -Vulnerability 27: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 103, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 104, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/user_blogs.html',user=user, posts=posts, pagination=pagination, new_messages=int(new_messages)) - - - -gpgomes/pyFlask -https://github.com/gpgomes/pyFlask -Entry file: pyFlask/server.py -Scanned: 2016-10-20 12:06:24.208604 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -M4riacg/api-flask -https://github.com/M4riacg/api-flask -Entry file: api-flask/api_flask.py -Scanned: 2016-10-20 12:06:25.506418 -No vulnerabilities found. - - -9217392354A/flask-stuff -https://github.com/9217392354A/flask-stuff -Entry file: flask-stuff/__init__.py -Scanned: 2016-10-20 12:06:32.464751 -No vulnerabilities found. - - -mprather1/flask_hello -https://github.com/mprather1/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-20 12:06:33.138299 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Nana2mini/Flask-Blog -https://github.com/Nana2mini/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-20 12:06:34.252758 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dencynluv/testing-flask -https://github.com/dencynluv/testing-flask -Entry file: None -Scanned: 2016-10-20 12:06:34.749149 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -efrainmunoz/flask-blog -https://github.com/efrainmunoz/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:06:35.288492 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -linked0/first-flask -https://github.com/linked0/first-flask -Entry file: None -Scanned: 2016-10-20 12:06:35.820144 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nlesc-sherlock/spark-flask -https://github.com/nlesc-sherlock/spark-flask -Entry file: spark-flask/app.py -Scanned: 2016-10-20 12:06:42.151450 -No vulnerabilities found. - - -BethMwangi/flask-intro -https://github.com/BethMwangi/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:06:42.681570 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zjl1110/flask-blogmy -https://github.com/zjl1110/flask-blogmy -Entry file: None -Scanned: 2016-10-20 12:06:50.782738 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -skrillex581/flask-insight -https://github.com/skrillex581/flask-insight -Entry file: flask-insight/app/__init__.py -Scanned: 2016-10-20 12:06:52.339666 -No vulnerabilities found. - - -balalay12/flask-cachlka -https://github.com/balalay12/flask-cachlka -Entry file: flask-cachlka/app/__init__.py -Scanned: 2016-10-20 12:06:54.137843 -Vulnerability 1: -File: flask-cachlka/app/views.py - > User input at line 230, trigger word "get(": - repeat = Repeats.query.get(int(id)) -Reassigned in: - File: flask-cachlka/app/views.py - > Line 231: s = Sets.query.get(repeat.set_id) - File: flask-cachlka/app/views.py - > Line 233: ret_MAYBE_FUNCTION_NAME = return_response(404, jsonify(error='Отказано в доступе')) - File: flask-cachlka/app/views.py - > Line 235: ret_MAYBE_FUNCTION_NAME = return_response(500, jsonify(error='Произошлка ошибка во время запроса.')) -File: flask-cachlka/app/views.py - > reaches line 236, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(repeat=repeat.serialize) - -Vulnerability 2: -File: flask-cachlka/app/views.py - > User input at line 293, trigger word "get(": - category = Categories.query.get(int(id)) -File: flask-cachlka/app/views.py - > reaches line 294, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(exercises=[exercise.serialize for exercise in category.exercises.all()]) - -Vulnerability 3: -File: flask-cachlka/app/views.py - > User input at line 312, trigger word "get(": - body_size = BodySize.query.get(int(id)) -Reassigned in: - File: flask-cachlka/app/views.py - > Line 314: ret_MAYBE_FUNCTION_NAME = return_response(404, jsonify(error='Отказано в доступе')) - File: flask-cachlka/app/views.py - > Line 316: ret_MAYBE_FUNCTION_NAME = return_response(500, jsonify(error='Произошлка ошибка во время запроса.')) -File: flask-cachlka/app/views.py - > reaches line 317, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(body_size=body_size.serialize) - - - -mythreyaraj/python-flask -https://github.com/mythreyaraj/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 12:06:54.668071 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Lypzero/flask_studing -https://github.com/Lypzero/flask_studing -Entry file: flask_studing/app/__init__.py -Scanned: 2016-10-20 12:06:56.334647 -Vulnerability 1: -File: flask_studing/app/main/views.py - > User input at line 20, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_studing/app/main/views.py - > Line 28: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_studing/app/main/views.py - > Line 29: posts = pagination.items - File: flask_studing/app/main/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_studing/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed) - -Vulnerability 2: -File: flask_studing/app/main/views.py - > User input at line 23, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask_studing/app/main/views.py - > Line 21: show_followed = False - File: flask_studing/app/main/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_studing/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed) - -Vulnerability 3: -File: flask_studing/app/main/views.py - > User input at line 42, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_studing/app/main/views.py - > Line 43: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_studing/app/main/views.py - > Line 46: posts = pagination.items -File: flask_studing/app/main/views.py - > reaches line 47, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flask_studing/app/main/views.py - > User input at line 108, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_studing/app/main/views.py - > Line 109: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_studing/app/main/views.py - > Line 110: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_studing/app/main/views.py - > Line 107: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_studing/app/main/views.py - > reaches line 111, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: flask_studing/app/main/views.py - > User input at line 119, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_studing/app/main/views.py - > Line 120: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_studing/app/main/views.py - > Line 123: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask_studing/app/main/views.py - > Line 118: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_studing/app/main/views.py - > reaches line 125, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - - - -dflee/testing-flask -https://github.com/dflee/testing-flask -Entry file: None -Scanned: 2016-10-20 12:06:56.841357 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Ihyatt/testing-flask -https://github.com/Ihyatt/testing-flask -Entry file: None -Scanned: 2016-10-20 12:06:57.341782 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -stefanbro/flask-circle -https://github.com/stefanbro/flask-circle -Entry file: flask-circle/app/__init__.py -Scanned: 2016-10-20 12:07:00.462356 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Clemenshemmerling/flask-docker -https://github.com/Clemenshemmerling/flask-docker -Entry file: flask-docker/compose/app.py -Scanned: 2016-10-20 12:07:01.752755 -No vulnerabilities found. - - -rajatgermany/Rajat5 -https://github.com/rajatgermany/Rajat5 -Entry file: Rajat5/forms.py -Scanned: 2016-10-20 12:07:03.088040 -No vulnerabilities found. - - -amirthn/irpycoderzz -https://github.com/amirthn/irpycoderzz -Entry file: irpycoderzz/app.py -Scanned: 2016-10-20 12:07:04.378554 -No vulnerabilities found. - - -chxy325/studyflask -https://github.com/chxy325/studyflask -Entry file: studyflask/hello.py -Scanned: 2016-10-20 12:07:05.675973 -No vulnerabilities found. - - -moling3650/microblog -https://github.com/moling3650/microblog -Entry file: None -Scanned: 2016-10-20 12:07:06.224044 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gekorob/liebraryrest -https://github.com/gekorob/liebraryrest -Entry file: liebraryrest/liebraryrest/app.py -Scanned: 2016-10-20 12:07:07.901499 -Vulnerability 1: -File: liebraryrest/liebraryrest/api/authors.py - > User input at line 14, trigger word "get(": - qry = qry.filter(Author.name.contains(request.args.get('name'))) -Reassigned in: - File: liebraryrest/liebraryrest/api/authors.py - > Line 11: qry = Author.query -File: liebraryrest/liebraryrest/api/authors.py - > reaches line 14, trigger word "filter(": - qry = qry.filter(Author.name.contains(request.args.get('name'))) - - - -jlanio/Flask-RestlessLoginToken -https://github.com/jlanio/Flask-RestlessLoginToken -Entry file: Flask-RestlessLoginToken/models.py -Scanned: 2016-10-20 12:07:10.260163 -No vulnerabilities found. - - -vibhor1510/COMS-6156-Flask-App -https://github.com/vibhor1510/COMS-6156-Flask-App -Entry file: None -Scanned: 2016-10-20 12:07:17.191490 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vibhor1510/COMS-6156-Flask-App. - -azedlee/flask_hello_world -https://github.com/azedlee/flask_hello_world -Entry file: None -Scanned: 2016-10-20 12:07:18.741953 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/azedlee/flask_hello_world. - -BeenzSyed/flask-random-quote -https://github.com/BeenzSyed/flask-random-quote -Entry file: flask-random-quote/app.py -Scanned: 2016-10-20 12:07:25.097804 -No vulnerabilities found. - - -Firdaus1/Hello_world_Flask -https://github.com/Firdaus1/Hello_world_Flask -Entry file: Hello_world_Flask/FirdausCS3320.py -Scanned: 2016-10-20 12:07:26.413512 -No vulnerabilities found. - - -JesseE/flask-demo-viewer -https://github.com/JesseE/flask-demo-viewer -Entry file: flask-demo-viewer/app.py -Scanned: 2016-10-20 12:07:34.479407 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-demo-viewer/venv/lib/python2.7/genericpath.py - -katietarng/hb-testing-flask -https://github.com/katietarng/hb-testing-flask -Entry file: hb-testing-flask/party.py -Scanned: 2016-10-20 12:07:34.986814 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stack-templates/cde-flask-init-project -https://github.com/stack-templates/cde-flask-init-project -Entry file: cde-flask-init-project/main.py -Scanned: 2016-10-20 12:07:36.335152 -No vulnerabilities found. - - -HenryZivers/Flask-Microblog-App -https://github.com/HenryZivers/Flask-Microblog-App -Entry file: Flask-Microblog-App/app/__init__.py -Scanned: 2016-10-20 12:07:37.787537 -No vulnerabilities found. - - -Skycker/lsa-flask-preview -https://github.com/Skycker/lsa-flask-preview -Entry file: lsa-flask-preview/lsa-flask-preview.py -Scanned: 2016-10-20 12:07:39.355640 -Vulnerability 1: -File: lsa-flask-preview/lsa-flask-preview.py - > User input at line 88, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: lsa-flask-preview/lsa-flask-preview.py - > Line 92: semantic_results = search_by_lsa(query) - File: lsa-flask-preview/lsa-flask-preview.py - > Line 93: sphinx_results = search_by_sphinx(query) - File: lsa-flask-preview/lsa-flask-preview.py - > Line 89: semantic_results = list() - File: lsa-flask-preview/lsa-flask-preview.py - > Line 90: sphinx_results = list() -File: lsa-flask-preview/lsa-flask-preview.py - > reaches line 94, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('news.html',semantic_results=semantic_results, compare_results=sphinx_results, query=query) - - - -aurora71/flask-Smart-seat-realtime -https://github.com/aurora71/flask-Smart-seat-realtime -Entry file: None -Scanned: 2016-10-20 12:07:40.768256 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/aurora71/flask-Smart-seat-realtime. - -s4swadhin/flask-hello-world -https://github.com/s4swadhin/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 12:07:41.349328 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -matthewR1993/flask-gant-fun -https://github.com/matthewR1993/flask-gant-fun -Entry file: flask-gant-fun/run.py -Scanned: 2016-10-20 12:07:42.879710 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glrh111/flask -https://github.com/glrh111/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:07:51.402510 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -parampara/flask -https://github.com/parampara/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:07:52.990603 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -zhangsen1992/flask -https://github.com/zhangsen1992/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:07:55.551175 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Mufflerman/Flask -https://github.com/Mufflerman/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:07:56.050588 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rakeshkirola/Flask -https://github.com/rakeshkirola/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:07:57.557605 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -caibitim/Flask -https://github.com/caibitim/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:07:58.068274 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rockaja/flask -https://github.com/rockaja/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:07:58.640251 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -bhops/flask -https://github.com/bhops/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:08:01.227405 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -enginebai/PyMessager -https://github.com/enginebai/PyMessager -Entry file: PyMessager/api.py -Scanned: 2016-10-20 12:08:03.681430 -No vulnerabilities found. - - -YUX-IO/gossl -https://github.com/YUX-IO/gossl -Entry file: gossl/app.py -Scanned: 2016-10-20 12:08:12.321941 -No vulnerabilities found. - - -yetship/the-way-to-flask -https://github.com/yetship/the-way-to-flask -Entry file: the-way-to-flask/code/application/__init__.py -Scanned: 2016-10-20 12:08:16.307118 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JoshData/parsey-mcparseface-server -https://github.com/JoshData/parsey-mcparseface-server -Entry file: parsey-mcparseface-server/server.py -Scanned: 2016-10-20 12:08:17.693961 -No vulnerabilities found. - - -geochilmaru/flaskr -https://github.com/geochilmaru/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:08:18.691232 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hejiangping/flaskr -https://github.com/hejiangping/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:08:19.198920 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zmrow/flasktaskr -https://github.com/zmrow/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:08:19.704258 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Jpatcourtney/flasktasker -https://github.com/Jpatcourtney/flasktasker -Entry file: flasktasker/views.py -Scanned: 2016-10-20 12:08:21.275496 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liyocee/flaskr -https://github.com/liyocee/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:08:21.784321 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yanni-zhang/flaskweb -https://github.com/yanni-zhang/flaskweb -Entry file: None -Scanned: 2016-10-20 12:08:25.780610 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -googoos/flasktaskr -https://github.com/googoos/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:08:27.289609 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Jpatcourtney/flasktaskr -https://github.com/Jpatcourtney/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:08:35.840710 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -janejin8829/flaskangular- -https://github.com/janejin8829/flaskangular- -Entry file: None -Scanned: 2016-10-20 12:08:37.173772 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/janejin8829/flaskangular-. - -ljxxcaijing/flaskblog -https://github.com/ljxxcaijing/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 12:08:37.731763 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -ordenador/flaskrestful -https://github.com/ordenador/flaskrestful -Entry file: flaskrestful/flaskrestful.py -Scanned: 2016-10-20 12:08:43.575688 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhangjiewang/flasky -https://github.com/zhangjiewang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:08:44.102545 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Kathure/flasky -https://github.com/Kathure/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:08:44.603257 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -maxweiber/flaskr -https://github.com/maxweiber/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:08:45.123896 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrdrms/flaskr -https://github.com/mrdrms/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:08:45.637763 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fburkitt/flasktaskr -https://github.com/fburkitt/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:08:46.141693 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -asimonia/flasktaskr -https://github.com/asimonia/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:08:51.650721 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sisyphus1993/flaskreview -https://github.com/sisyphus1993/flaskreview -Entry file: flaskreview/app/__init__.py -Scanned: 2016-10-20 12:08:54.742423 -Vulnerability 1: -File: flaskreview/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 31: posts = pagination.items - File: flaskreview/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskreview/app/main/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskreview/app/main/views.py - > User input at line 24, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 22: show_followed = False - File: flaskreview/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskreview/app/main/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskreview/app/main/views.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 40: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 42: posts = pagination.items -File: flaskreview/app/main/views.py - > reaches line 43, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flaskreview/app/main/views.py - > User input at line 102, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 104: page = post.comments.count() - 1 // 20 + 1 - File: flaskreview/app/main/views.py - > Line 105: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 107: comments = pagination.items - File: flaskreview/app/main/views.py - > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskreview/app/main/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flaskreview/app/main/views.py - > User input at line 167, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 168: pagination = user.followers.paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 170: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskreview/app/main/views.py - > Line 166: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskreview/app/main/views.py - > reaches line 172, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flaskreview/app/main/views.py - > User input at line 183, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 184: pagination = user.followed.paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 186: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskreview/app/main/views.py - > Line 182: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskreview/app/main/views.py - > reaches line 188, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flaskreview/app/main/views.py - > User input at line 213, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 214: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 217: comments = pagination.items -File: flaskreview/app/main/views.py - > reaches line 218, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flaskreview/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 20: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 23: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flaskreview/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 20: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 23: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flaskreview/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 20: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 23: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flaskreview/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 42: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 45: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flaskreview/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 42: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 45: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flaskreview/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 42: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 45: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flaskreview/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskreview/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskreview/app/api_1_0/posts.py - > Line 19: next = None -File: flaskreview/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flaskreview/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskreview/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskreview/app/api_1_0/posts.py - > Line 19: next = None -File: flaskreview/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flaskreview/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskreview/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskreview/app/api_1_0/posts.py - > Line 19: next = None -File: flaskreview/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flaskreview/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 18: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flaskreview/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 18: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flaskreview/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 18: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flaskreview/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 46: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flaskreview/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 46: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flaskreview/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 46: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -rakeshkirola/FlaskTaskr -https://github.com/rakeshkirola/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-20 12:08:56.899542 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -demoleas21/FlaskHW -https://github.com/demoleas21/FlaskHW -Entry file: FlaskHW/app.py -Scanned: 2016-10-20 12:08:59.240645 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andresmguk/FlaskApp -https://github.com/andresmguk/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 12:09:00.370777 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tonuidavies/flask1 -https://github.com/tonuidavies/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-20 12:09:01.064884 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -andresmguk/flasktaskr4 -https://github.com/andresmguk/flasktaskr4 -Entry file: flasktaskr4/views.py -Scanned: 2016-10-20 12:09:08.344806 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mzfenng/flaskBlog -https://github.com/mzfenng/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-20 12:09:08.951807 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py - -coding-happily/FlaskTest -https://github.com/coding-happily/FlaskTest -Entry file: None -Scanned: 2016-10-20 12:09:09.481087 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/coding-happily/FlaskTest. - -sajjadAI/FlaskSocial -https://github.com/sajjadAI/FlaskSocial -Entry file: FlaskSocial/app.py -Scanned: 2016-10-20 12:09:14.280189 -Vulnerability 1: -File: FlaskSocial/app.py - > User input at line 92, trigger word "get(": - user = models.User.select().where(models.User.username ** username).get() -Reassigned in: - File: FlaskSocial/app.py - > Line 99: user = current_user -File: FlaskSocial/app.py - > reaches line 102, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user) - -Vulnerability 2: -File: FlaskSocial/app.py - > User input at line 197, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: FlaskSocial/app.py - > reaches line 209, trigger word "flash(": - flash('You're now following {}!'.format(to_user.username), 'success') - -Vulnerability 3: -File: FlaskSocial/app.py - > User input at line 197, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: FlaskSocial/app.py - > reaches line 210, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 4: -File: FlaskSocial/app.py - > User input at line 197, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: FlaskSocial/app.py - > reaches line 210, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 5: -File: FlaskSocial/app.py - > User input at line 217, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: FlaskSocial/app.py - > reaches line 229, trigger word "flash(": - flash('You're now unfollowed {}!'.format(to_user.username), 'success') - -Vulnerability 6: -File: FlaskSocial/app.py - > User input at line 217, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: FlaskSocial/app.py - > reaches line 230, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 7: -File: FlaskSocial/app.py - > User input at line 217, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: FlaskSocial/app.py - > reaches line 230, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - - - -sr77/Restaurant-Web-Application -https://github.com/sr77/Restaurant-Web-Application -Entry file: Restaurant-Web-Application/project.py -Scanned: 2016-10-20 12:09:17.793985 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GalaIO/template-for-flask -https://github.com/GalaIO/template-for-flask -Entry file: template-for-flask/app/__init__.py -Scanned: 2016-10-20 12:09:19.245267 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kua-hosi-GRUp/Flask-Bones -https://github.com/kua-hosi-GRUp/Flask-Bones -Entry file: Flask-Bones/app/__init__.py -Scanned: 2016-10-20 12:09:25.883251 -Vulnerability 1: -File: Flask-Bones/app/auth/views.py - > User input at line 46, trigger word ".data": - group = Group.create(nazev=form.data['nazev']) -File: Flask-Bones/app/auth/views.py - > reaches line 48, trigger word "flash(": - flash(gettext('Group {name} created').format(name=group.nazev), 'success') - -Vulnerability 2: -File: Flask-Bones/app/auth/views.py - > User input at line 58, trigger word ".data": - firma = Firma.create(nazev=form.data['nazev'], state=form.data['state'], address=form.data['address'], phone_number=form.data['phone_number'], contact_person=form.data['contact_person'], website=form.data['website']) -File: Flask-Bones/app/auth/views.py - > reaches line 65, trigger word "flash(": - flash(gettext('Organization {name} created').format(name=firma.nazev), 'success') - -Vulnerability 3: -File: Flask-Bones/app/public/views.py - > User input at line 37, trigger word ".data": - user = User.create(username=form.data['username'], email=form.data['email'], password=form.data['password'], remote_addr=request.remote_addr, jmeno=form.data['jmeno'], prijmeni=form.data['prijmeni']) -Reassigned in: - File: Flask-Bones/app/public/views.py - > Line 47: token = s.dumps(user.id) -File: Flask-Bones/app/public/views.py - > reaches line 51, trigger word "flash(": - flash(gettext('Sent verification email to {email}').format(email=user.email), 'success') - - - -orizohar/flask-app -https://github.com/orizohar/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 12:09:26.412919 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gwong89/flask-ci -https://github.com/gwong89/flask-ci -Entry file: flask-ci/app.py -Scanned: 2016-10-20 12:09:35.531109 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zmrow/flask-blog -https://github.com/zmrow/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:09:36.087807 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -joelcolucci/scaffold-flask -https://github.com/joelcolucci/scaffold-flask -Entry file: None -Scanned: 2016-10-20 12:09:37.439776 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/joelcolucci/scaffold-flask. - -apighi/NewFlask -https://github.com/apighi/NewFlask -Entry file: NewFlask/wsgi/myflaskapp.py -Scanned: 2016-10-20 12:09:40.882795 -No vulnerabilities found. - - -PaperAndColours/flask_base -https://github.com/PaperAndColours/flask_base -Entry file: flask_base/app.py -Scanned: 2016-10-20 12:09:43.518398 -No vulnerabilities found. - - -richardqlin/flask_class -https://github.com/richardqlin/flask_class -Entry file: flask_class/url_for.py -Scanned: 2016-10-20 12:09:47.534538 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rakeshkirola/Flask-Blog -https://github.com/rakeshkirola/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-20 12:09:48.053752 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ripitrust/flask_react -https://github.com/ripitrust/flask_react -Entry file: flask_react/flask_react/worker.py -Scanned: 2016-10-20 12:09:49.557434 -No vulnerabilities found. - - -db521/sendmail_flask -https://github.com/db521/sendmail_flask -Entry file: sendmail_flask/study/view.py -Scanned: 2016-10-20 12:09:56.718985 -No vulnerabilities found. - - -joelcolucci/flask-responseext -https://github.com/joelcolucci/flask-responseext -Entry file: flask-responseext/tests/mock_app.py -Scanned: 2016-10-20 12:09:58.192223 -No vulnerabilities found. - - -hadesong/Flask_Issues -https://github.com/hadesong/Flask_Issues -Entry file: None -Scanned: 2016-10-20 12:09:58.695138 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hadesong/Flask_Issues. - -jayanth2810/Heroku_Flask -https://github.com/jayanth2810/Heroku_Flask -Entry file: Heroku_Flask/app/app.py -Scanned: 2016-10-20 12:10:00.021903 -No vulnerabilities found. - - -hubert-lee/study_flask -https://github.com/hubert-lee/study_flask -Entry file: None -Scanned: 2016-10-20 12:10:09.724936 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -liyocee/flask_biggy -https://github.com/liyocee/flask_biggy -Entry file: flask_biggy/app/__init__.py -Scanned: 2016-10-20 12:10:11.053363 -Vulnerability 1: -File: flask_biggy/app/auth/controllers.py - > User input at line 33, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask_biggy/app/auth/controllers.py - > Line 37: session['user_id'] = user.id -File: flask_biggy/app/auth/controllers.py - > reaches line 39, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -mjdough/learning-flask -https://github.com/mjdough/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 12:10:11.705157 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -branweb1/flask_todo -https://github.com/branweb1/flask_todo -Entry file: None -Scanned: 2016-10-20 12:10:12.230972 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Aelmgren/flask-app -https://github.com/Aelmgren/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 12:10:12.760205 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sjb9774/empty-flask -https://github.com/sjb9774/empty-flask -Entry file: empty-flask/app/app.py -Scanned: 2016-10-20 12:10:13.298389 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Tartarus7/microblogFlask -https://github.com/Tartarus7/microblogFlask -Entry file: None -Scanned: 2016-10-20 12:10:23.020525 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mrparvinsmith/flask-tutorial -https://github.com/mrparvinsmith/flask-tutorial -Entry file: None -Scanned: 2016-10-20 12:10:23.565287 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Tizeen/flask-microblog -https://github.com/Tizeen/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:10:24.071800 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Chary0917/Flask-app -https://github.com/Chary0917/Flask-app -Entry file: Flask-app/app.py -Scanned: 2016-10-20 12:10:25.377912 -No vulnerabilities found. - - -nimeshkverma/Flask-Params -https://github.com/nimeshkverma/Flask-Params -Entry file: Flask-Params/tests/test.py -Scanned: 2016-10-20 12:10:28.597640 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alexurquhart/flask-webapp -https://github.com/alexurquhart/flask-webapp -Entry file: flask-webapp/app/__init__.py -Scanned: 2016-10-20 12:10:30.119728 -No vulnerabilities found. - - -mirrorsysu/aboutFlask -https://github.com/mirrorsysu/aboutFlask -Entry file: aboutFlask/flaskr.py -Scanned: 2016-10-20 12:10:31.892367 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rug3y/flask_example -https://github.com/rug3y/flask_example -Entry file: None -Scanned: 2016-10-20 12:10:32.417449 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rug3y/flask_todo -https://github.com/rug3y/flask_todo -Entry file: None -Scanned: 2016-10-20 12:10:32.935863 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SiQLuxe/flask_session -https://github.com/SiQLuxe/flask_session -Entry file: flask_session/flask_session/__init__.py -Scanned: 2016-10-20 12:10:34.386620 -No vulnerabilities found. - - -devtronics/flask_tut -https://github.com/devtronics/flask_tut -Entry file: flask_tut/microblog/app/__init__.py -Scanned: 2016-10-20 12:10:40.657556 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NatuMyers/Flask-Blog -https://github.com/NatuMyers/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-20 12:10:41.177591 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -9217392354A/flask-stuff -https://github.com/9217392354A/flask-stuff -Entry file: flask-stuff/__init__.py -Scanned: 2016-10-20 12:10:48.288064 -No vulnerabilities found. - - -szamani20/flask_test -https://github.com/szamani20/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 12:10:48.866394 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yshen47/flask-blog -https://github.com/yshen47/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:10:49.904697 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -tonestrike/flask-practice -https://github.com/tonestrike/flask-practice -Entry file: None -Scanned: 2016-10-20 12:10:50.456414 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tonestrike/flask-practice. - -sarasunsh/CP-flask -https://github.com/sarasunsh/CP-flask -Entry file: CP-flask/app.py -Scanned: 2016-10-20 12:10:52.673150 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ibaf001/learning-flask -https://github.com/ibaf001/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 12:10:58.236876 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Moxikai/my_flask -https://github.com/Moxikai/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-20 12:10:58.886862 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -LiangXunfly/microblog_flask -https://github.com/LiangXunfly/microblog_flask -Entry file: microblog_flask/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 12:10:59.594946 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Jolly23/PythonFlask -https://github.com/Jolly23/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 12:11:07.500702 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -obi23lipnik/roli-flask -https://github.com/obi23lipnik/roli-flask -Entry file: None -Scanned: 2016-10-20 12:11:18.246843 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jcadruvi/DockerFlask -https://github.com/jcadruvi/DockerFlask -Entry file: DockerFlask/app.py -Scanned: 2016-10-20 12:11:19.691892 -No vulnerabilities found. - - -schulzsebastian/flask_firststeps -https://github.com/schulzsebastian/flask_firststeps -Entry file: flask_firststeps/main.py -Scanned: 2016-10-20 12:11:21.226137 -No vulnerabilities found. - - -cholpona/flask_tutorial -https://github.com/cholpona/flask_tutorial -Entry file: None -Scanned: 2016-10-20 12:11:21.754247 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -garedrag/flask_opencv -https://github.com/garedrag/flask_opencv -Entry file: flask_opencv/app.py -Scanned: 2016-10-20 12:11:23.083804 -No vulnerabilities found. - - -aparecidoSilvano/estudando-flask -https://github.com/aparecidoSilvano/estudando-flask -Entry file: None -Scanned: 2016-10-20 12:11:31.868473 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Klimatomas/GifTV -https://github.com/Klimatomas/GifTV -Entry file: GifTV/GTVapi.py -Scanned: 2016-10-20 12:11:33.304403 -No vulnerabilities found. - - -jeffchanjunwei/FlaskWebDemo -https://github.com/jeffchanjunwei/FlaskWebDemo -Entry file: FlaskWebDemo/app.py -Scanned: 2016-10-20 12:11:43.332244 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -daniloBlera/FlaskWebServer -https://github.com/daniloBlera/FlaskWebServer -Entry file: FlaskWebServer/FlaskWebServer/src/cloftstill/frontend/serverfront.py -Scanned: 2016-10-20 12:11:45.742256 -No vulnerabilities found. - - -AnkleLiu/FlaskWorkShop -https://github.com/AnkleLiu/FlaskWorkShop -Entry file: FlaskWorkShop/app.py -Scanned: 2016-10-20 12:11:47.173778 -No vulnerabilities found. - - -mrffrm1234/flask -https://github.com/mrffrm1234/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:11:49.129078 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -ekusy/flask -https://github.com/ekusy/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:11:49.720021 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -moonoroman/flask -https://github.com/moonoroman/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:11:50.306420 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -bhops/flask -https://github.com/bhops/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:11:50.876615 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -tweddielin/flask-imsearch -https://github.com/tweddielin/flask-imsearch -Entry file: None -Scanned: 2016-10-20 12:14:05.828540 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tweddielin/flask-imsearch. - -simonbilskyrollins/Flask-Workshop -https://github.com/simonbilskyrollins/Flask-Workshop -Entry file: Flask-Workshop/step3.py -Scanned: 2016-10-20 12:14:07.209829 -No vulnerabilities found. - - -hadesong/flask_weather -https://github.com/hadesong/flask_weather -Entry file: flask_weather/app_package/__init__.py -Scanned: 2016-10-20 12:14:10.292465 -No vulnerabilities found. - - -ealesid/flaskbook -https://github.com/ealesid/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-20 12:14:10.849154 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -jake-bladt/flasksandbox -https://github.com/jake-bladt/flasksandbox -Entry file: flasksandbox/app/app.py -Scanned: 2016-10-20 12:14:12.502205 -Vulnerability 1: -File: flasksandbox/app/helpers.py - > User input at line 4, trigger word "get(": - page = request.args.get('page') -Reassigned in: - File: flasksandbox/app/helpers.py - > Line 6: page = int(page) - File: flasksandbox/app/helpers.py - > Line 8: page = 1 - File: flasksandbox/app/helpers.py - > Line 9: object_list = query.paginate(page, paginate_by) -File: flasksandbox/app/helpers.py - > reaches line 10, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template_name,object_list=object_list, context) - - - -AliceLanniste/Flasky -https://github.com/AliceLanniste/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-20 12:14:13.036459 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lg31415/flaskr -https://github.com/lg31415/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:14:13.541169 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bewithgaurav/flaskmap -https://github.com/bewithgaurav/flaskmap -Entry file: flaskmap/__init__.py -Scanned: 2016-10-20 12:14:24.454064 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ljxxcaijing/flaskblog -https://github.com/ljxxcaijing/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 12:14:24.987282 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -fromzeroedu/flaskbook -https://github.com/fromzeroedu/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-20 12:14:25.534673 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -nrugas/flasky -https://github.com/nrugas/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:14:26.045538 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pcpianobar/flaskr -https://github.com/pcpianobar/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:14:26.554022 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mikomwang/flaskr -https://github.com/mikomwang/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:14:27.050102 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xdoyfforai/flaskblog -https://github.com/xdoyfforai/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 12:14:27.579123 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -anngle/flaskweb -https://github.com/anngle/flaskweb -Entry file: None -Scanned: 2016-10-20 12:14:28.095511 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Aprimus1/flasktaskr -https://github.com/Aprimus1/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:14:28.614498 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -s4swadhin/flasktaskr -https://github.com/s4swadhin/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:14:29.163267 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AnkleLiu/flasky -https://github.com/AnkleLiu/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:14:29.672002 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -demoleas21/FlaskHW -https://github.com/demoleas21/FlaskHW -Entry file: FlaskHW/app.py -Scanned: 2016-10-20 12:14:30.190673 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paulvisen/FlaskServer -https://github.com/paulvisen/FlaskServer -Entry file: FlaskServer/untitled.py -Scanned: 2016-10-20 12:14:30.742929 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PicAlert/FlaskApi -https://github.com/PicAlert/FlaskApi -Entry file: FlaskApi/server.py -Scanned: 2016-10-20 12:14:32.115803 -No vulnerabilities found. - - -alexwidener/flaskStuff -https://github.com/alexwidener/flaskStuff -Entry file: flaskStuff/headlines/headlines.py -Scanned: 2016-10-20 12:14:33.441910 -No vulnerabilities found. - - -andresmguk/FlaskApp -https://github.com/andresmguk/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 12:14:34.049885 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaychia/flasktut1 -https://github.com/jaychia/flasktut1 -Entry file: None -Scanned: 2016-10-20 12:14:40.702413 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -stitch001/flaskerMysql -https://github.com/stitch001/flaskerMysql -Entry file: flaskerMysql/mysqlFlask/__init__.py -Scanned: 2016-10-20 12:14:43.740031 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -er3456qi/FlaskPolls -https://github.com/er3456qi/FlaskPolls -Entry file: FlaskPolls/polls/__init__.py -Scanned: 2016-10-20 12:14:45.139686 -Vulnerability 1: -File: FlaskPolls/polls/views.py - > User input at line 16, trigger word "get(": - question = Question.query.get(question_id) -File: FlaskPolls/polls/views.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',question=question) - -Vulnerability 2: -File: FlaskPolls/polls/views.py - > User input at line 24, trigger word "get(": - question = Question.query.get(question_id) -File: FlaskPolls/polls/views.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',question=question) - -Vulnerability 3: -File: FlaskPolls/polls/views.py - > User input at line 32, trigger word "get(": - question = Question.query.get(question_id) -Reassigned in: - File: FlaskPolls/polls/views.py - > Line 35: selected_choice = [c for c in question.choice_set][0] -File: FlaskPolls/polls/views.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',question=question, error_message='you didn't select a choice.') - -Vulnerability 4: -File: FlaskPolls/polls/views.py - > User input at line 32, trigger word "get(": - question = Question.query.get(question_id) -Reassigned in: - File: FlaskPolls/polls/views.py - > Line 35: selected_choice = [c for c in question.choice_set][0] -File: FlaskPolls/polls/views.py - > reaches line 45, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('results',question_id=question.id)) - -Vulnerability 5: -File: FlaskPolls/polls/views.py - > User input at line 32, trigger word "get(": - question = Question.query.get(question_id) -Reassigned in: - File: FlaskPolls/polls/views.py - > Line 35: selected_choice = [c for c in question.choice_set][0] -File: FlaskPolls/polls/views.py - > reaches line 45, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('results',question_id=question.id)) - - - -GalaIO/template-for-flask -https://github.com/GalaIO/template-for-flask -Entry file: template-for-flask/app/__init__.py -Scanned: 2016-10-20 12:14:45.648383 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nad2000/Flask-Timesheets -https://github.com/nad2000/Flask-Timesheets -Entry file: Flask-Timesheets/__init__.py -Scanned: 2016-10-20 12:14:49.474093 -Vulnerability 1: -File: Flask-Timesheets/views.py - > User input at line 157, trigger word "get(": - selected_user = usernameUser.get(User.username == username)None -Reassigned in: - File: Flask-Timesheets/views.py - > Line 160: timesheet = TimeSheet(user=selected_user, week_ending_date=week_ending_date) - File: Flask-Timesheets/views.py - > Line 148: ret_MAYBE_FUNCTION_NAME = redirect(url_for('approve',username=username, week_ending_date=week_ending_date)) -File: Flask-Timesheets/views.py - > reaches line 168, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('approve.html',timesheet=timesheet, form=form, breaks=breaks, selected_user=selected_user, users=users, week_ending_date=week_ending_date, week_ending_dates=week_ending_dates()) - -Vulnerability 2: -File: Flask-Timesheets/views.py - > User input at line 185, trigger word "get(": - include_unapproved = request.args.get('include_unapproved') is not None -File: Flask-Timesheets/views.py - > reaches line 209, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('report.html',include_unapproved=include_unapproved, entries=entries, from_date=from_date, to_date=to_date, selected_company=selected_company, companies=companies, week_ending_dates=week_ending_dates(), week_start_dates=week_start_dates) - -Vulnerability 3: -File: Flask-Timesheets/views.py - > User input at line 187, trigger word "get(": - selected_company = company_codeCompany.get(code=company_code)None -File: Flask-Timesheets/views.py - > reaches line 209, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('report.html',include_unapproved=include_unapproved, entries=entries, from_date=from_date, to_date=to_date, selected_company=selected_company, companies=companies, week_ending_dates=week_ending_dates(), week_start_dates=week_start_dates) - - - -mturnshek/flask-demo -https://github.com/mturnshek/flask-demo -Entry file: None -Scanned: 2016-10-20 12:14:49.979451 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mturnshek/flask-demo. - -ripitrust/flask_react -https://github.com/ripitrust/flask_react -Entry file: flask_react/flask_react/worker.py -Scanned: 2016-10-20 12:14:51.495994 -No vulnerabilities found. - - -zykNet/myFlask -https://github.com/zykNet/myFlask -Entry file: myFlask/project.py -Scanned: 2016-10-20 12:14:52.031658 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bstadt/learningFlask -https://github.com/bstadt/learningFlask -Entry file: learningFlask/hello.py -Scanned: 2016-10-20 12:15:06.777903 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py - -hansenrl/learning_flask -https://github.com/hansenrl/learning_flask -Entry file: learning_flask/app/__init__.py -Scanned: 2016-10-20 12:15:09.105674 -No vulnerabilities found. - - -garyhurtz/Flask-Locales -https://github.com/garyhurtz/Flask-Locales -Entry file: None -Scanned: 2016-10-20 12:15:12.694261 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/garyhurtz/Flask-Locales. - -mpatrone/flask-demo -https://github.com/mpatrone/flask-demo -Entry file: None -Scanned: 2016-10-20 12:15:13.203610 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mpatrone/flask-demo. - -s4swadhin/flask-blog -https://github.com/s4swadhin/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:15:13.775427 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Ceejimus/flask-auth -https://github.com/Ceejimus/flask-auth -Entry file: flask-auth/example.py -Scanned: 2016-10-20 12:15:14.328149 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -db521/sendmail_flask -https://github.com/db521/sendmail_flask -Entry file: sendmail_flask/study/view.py -Scanned: 2016-10-20 12:15:21.377935 -No vulnerabilities found. - - -gwong89/flask-ci -https://github.com/gwong89/flask-ci -Entry file: flask-ci/app.py -Scanned: 2016-10-20 12:15:26.019393 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yitingfan/flask-adminlte -https://github.com/yitingfan/flask-adminlte -Entry file: flask-adminlte/app/__init__.py -Scanned: 2016-10-20 12:15:33.698263 -Vulnerability 1: -File: flask-adminlte/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 55: posts = pagination.items - File: flask-adminlte/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-adminlte/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flask-adminlte/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 45: show_followed = False - File: flask-adminlte/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-adminlte/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flask-adminlte/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 67: posts = pagination.items -File: flask-adminlte/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flask-adminlte/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask-adminlte/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 134: comments = pagination.items - File: flask-adminlte/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask-adminlte/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flask-adminlte/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask-adminlte/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-adminlte/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flask-adminlte/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask-adminlte/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-adminlte/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flask-adminlte/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 246: comments = pagination.items -File: flask-adminlte/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 20: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 23: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 20: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 23: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 20: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 23: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 42: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 45: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 42: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 45: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 42: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 45: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flask-adminlte/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask-adminlte/app/api_1_0/posts.py - > Line 16: prev = None - File: flask-adminlte/app/api_1_0/posts.py - > Line 19: next = None -File: flask-adminlte/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flask-adminlte/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask-adminlte/app/api_1_0/posts.py - > Line 16: prev = None - File: flask-adminlte/app/api_1_0/posts.py - > Line 19: next = None -File: flask-adminlte/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flask-adminlte/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask-adminlte/app/api_1_0/posts.py - > Line 16: prev = None - File: flask-adminlte/app/api_1_0/posts.py - > Line 19: next = None -File: flask-adminlte/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 15: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 18: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 15: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 18: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 15: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 18: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 43: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 46: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 43: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 46: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 43: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 46: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -smailk/flask-workshop -https://github.com/smailk/flask-workshop -Entry file: flask-workshop/hello_world/hello.py -Scanned: 2016-10-20 12:15:34.240201 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -comdotlinux/first-flask -https://github.com/comdotlinux/first-flask -Entry file: None -Scanned: 2016-10-20 12:15:34.752855 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ByakuyaKuchiki/firstFlask -https://github.com/ByakuyaKuchiki/firstFlask -Entry file: firstFlask/app/__init__.py -Scanned: 2016-10-20 12:15:36.835666 -Vulnerability 1: -File: firstFlask/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/main/views.py - > Line 55: posts = pagination.items - File: firstFlask/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: firstFlask/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: firstFlask/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: firstFlask/app/main/views.py - > Line 45: show_followed = False - File: firstFlask/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: firstFlask/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: firstFlask/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/main/views.py - > Line 67: posts = pagination.items -File: firstFlask/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: firstFlask/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: firstFlask/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: firstFlask/app/main/views.py - > Line 134: comments = pagination.items - File: firstFlask/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: firstFlask/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: firstFlask/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: firstFlask/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: firstFlask/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: firstFlask/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: firstFlask/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: firstFlask/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: firstFlask/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: firstFlask/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: firstFlask/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: firstFlask/app/main/views.py - > Line 246: comments = pagination.items -File: firstFlask/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: firstFlask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: firstFlask/app/api_1_0/users.py - > Line 20: prev = None - File: firstFlask/app/api_1_0/users.py - > Line 23: next = None -File: firstFlask/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: firstFlask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: firstFlask/app/api_1_0/users.py - > Line 20: prev = None - File: firstFlask/app/api_1_0/users.py - > Line 23: next = None -File: firstFlask/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: firstFlask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: firstFlask/app/api_1_0/users.py - > Line 20: prev = None - File: firstFlask/app/api_1_0/users.py - > Line 23: next = None -File: firstFlask/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: firstFlask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: firstFlask/app/api_1_0/users.py - > Line 42: prev = None - File: firstFlask/app/api_1_0/users.py - > Line 45: next = None -File: firstFlask/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: firstFlask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: firstFlask/app/api_1_0/users.py - > Line 42: prev = None - File: firstFlask/app/api_1_0/users.py - > Line 45: next = None -File: firstFlask/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: firstFlask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: firstFlask/app/api_1_0/users.py - > Line 42: prev = None - File: firstFlask/app/api_1_0/users.py - > Line 45: next = None -File: firstFlask/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: firstFlask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: firstFlask/app/api_1_0/posts.py - > Line 16: prev = None - File: firstFlask/app/api_1_0/posts.py - > Line 19: next = None -File: firstFlask/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: firstFlask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: firstFlask/app/api_1_0/posts.py - > Line 16: prev = None - File: firstFlask/app/api_1_0/posts.py - > Line 19: next = None -File: firstFlask/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: firstFlask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: firstFlask/app/api_1_0/posts.py - > Line 16: prev = None - File: firstFlask/app/api_1_0/posts.py - > Line 19: next = None -File: firstFlask/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: firstFlask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: firstFlask/app/api_1_0/comments.py - > Line 15: prev = None - File: firstFlask/app/api_1_0/comments.py - > Line 18: next = None -File: firstFlask/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: firstFlask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: firstFlask/app/api_1_0/comments.py - > Line 15: prev = None - File: firstFlask/app/api_1_0/comments.py - > Line 18: next = None -File: firstFlask/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: firstFlask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: firstFlask/app/api_1_0/comments.py - > Line 15: prev = None - File: firstFlask/app/api_1_0/comments.py - > Line 18: next = None -File: firstFlask/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: firstFlask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: firstFlask/app/api_1_0/comments.py - > Line 43: prev = None - File: firstFlask/app/api_1_0/comments.py - > Line 46: next = None -File: firstFlask/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: firstFlask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: firstFlask/app/api_1_0/comments.py - > Line 43: prev = None - File: firstFlask/app/api_1_0/comments.py - > Line 46: next = None -File: firstFlask/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: firstFlask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: firstFlask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: firstFlask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: firstFlask/app/api_1_0/comments.py - > Line 43: prev = None - File: firstFlask/app/api_1_0/comments.py - > Line 46: next = None -File: firstFlask/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -sarosicami/ReviewerFlask -https://github.com/sarosicami/ReviewerFlask -Entry file: ReviewerFlask/rest_server.py -Scanned: 2016-10-20 12:15:39.930939 -Vulnerability 1: -File: ReviewerFlask/rest_server.py - > User input at line 26, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: ReviewerFlask/rest_server.py - > Line 34: user = models.User(username=username, email=email, country=country) - File: ReviewerFlask/rest_server.py - > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists') -File: ReviewerFlask/rest_server.py - > reaches line 38, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 2: -File: ReviewerFlask/rest_server.py - > User input at line 29, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: ReviewerFlask/rest_server.py - > Line 34: user = models.User(username=username, email=email, country=country) - File: ReviewerFlask/rest_server.py - > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists') -File: ReviewerFlask/rest_server.py - > reaches line 38, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: ReviewerFlask/rest_server.py - > User input at line 30, trigger word "get(": - country = request.json.get('country') -Reassigned in: - File: ReviewerFlask/rest_server.py - > Line 34: user = models.User(username=username, email=email, country=country) - File: ReviewerFlask/rest_server.py - > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists') -File: ReviewerFlask/rest_server.py - > reaches line 38, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 4: -File: ReviewerFlask/rest_server.py - > User input at line 26, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: ReviewerFlask/rest_server.py - > Line 34: user = models.User(username=username, email=email, country=country) - File: ReviewerFlask/rest_server.py - > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists') -File: ReviewerFlask/rest_server.py - > reaches line 38, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 5: -File: ReviewerFlask/rest_server.py - > User input at line 29, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: ReviewerFlask/rest_server.py - > Line 34: user = models.User(username=username, email=email, country=country) - File: ReviewerFlask/rest_server.py - > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists') -File: ReviewerFlask/rest_server.py - > reaches line 38, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 6: -File: ReviewerFlask/rest_server.py - > User input at line 30, trigger word "get(": - country = request.json.get('country') -Reassigned in: - File: ReviewerFlask/rest_server.py - > Line 34: user = models.User(username=username, email=email, country=country) - File: ReviewerFlask/rest_server.py - > Line 32: ret_MAYBE_FUNCTION_NAME = jsonify('error''The username already exists') -File: ReviewerFlask/rest_server.py - > reaches line 38, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('error''username''email''country'''user.usernameuser.emailuser.country), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 7: -File: ReviewerFlask/rest_server.py - > User input at line 53, trigger word "get(": - user = models.User.query.get(id) -File: ReviewerFlask/rest_server.py - > reaches line 56, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('username''email''country'user.usernameuser.emailuser.country) - -Vulnerability 8: -File: ReviewerFlask/app/views.py - > User input at line 53, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: ReviewerFlask/app/views.py - > reaches line 60, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201) - - - -xinganng/hello-flask -https://github.com/xinganng/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 12:15:40.549573 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -pettek/flask_app -https://github.com/pettek/flask_app -Entry file: None -Scanned: 2016-10-20 12:15:41.073644 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pettek/flask_app. - -SeoDongMyeong/Simple-Flask -https://github.com/SeoDongMyeong/Simple-Flask -Entry file: Simple-Flask/application.py -Scanned: 2016-10-20 12:15:42.382609 -No vulnerabilities found. - - -sebastiken/flask-miot -https://github.com/sebastiken/flask-miot -Entry file: flask-miot/app/__init__.py -Scanned: 2016-10-20 12:15:43.659594 -No vulnerabilities found. - - -dreamvx7/Flask-todo -https://github.com/dreamvx7/Flask-todo -Entry file: Flask-todo/app/__init__.py -Scanned: 2016-10-20 12:15:45.008470 -No vulnerabilities found. - - -masaki-y/hello-flask -https://github.com/masaki-y/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 12:15:45.597967 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -eelkevdbos/microservices-flask -https://github.com/eelkevdbos/microservices-flask -Entry file: microservices-flask/hello/hello.py -Scanned: 2016-10-20 12:15:51.091392 -No vulnerabilities found. - - -daivq/Flask_Basic -https://github.com/daivq/Flask_Basic -Entry file: Flask_Basic/flaskr.py -Scanned: 2016-10-20 12:15:52.514910 -No vulnerabilities found. - - -bbein/flask-demo -https://github.com/bbein/flask-demo -Entry file: None -Scanned: 2016-10-20 12:15:53.076949 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bbein/flask-demo. - -flyhigher139/flask_example -https://github.com/flyhigher139/flask_example -Entry file: None -Scanned: 2016-10-20 12:15:53.581330 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -flaviomicheletti/flask-collection -https://github.com/flaviomicheletti/flask-collection -Entry file: flask-collection/blueprintexample/blueprintexample.py -Scanned: 2016-10-20 12:15:57.972509 -No vulnerabilities found. - - -dhamaresh1/docker-flask -https://github.com/dhamaresh1/docker-flask -Entry file: None -Scanned: 2016-10-20 12:15:59.523592 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dhamaresh1/docker-flask. - -bmw9t/flask_test -https://github.com/bmw9t/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 12:16:00.078109 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ansrivas/flask-alpine -https://github.com/ansrivas/flask-alpine -Entry file: flask-alpine/main.py -Scanned: 2016-10-20 12:16:02.361232 -No vulnerabilities found. - - -hgodinez/flask-demo -https://github.com/hgodinez/flask-demo -Entry file: None -Scanned: 2016-10-20 12:16:02.870652 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hgodinez/flask-demo. - -ThinkerQAQ/flask-learn -https://github.com/ThinkerQAQ/flask-learn -Entry file: flask-learn/app.py -Scanned: 2016-10-20 12:16:08.237993 -No vulnerabilities found. - - -weyoni2/flask_mongo -https://github.com/weyoni2/flask_mongo -Entry file: flask_mongo/app.py -Scanned: 2016-10-20 12:16:09.642041 -No vulnerabilities found. - - -Mr-Bruno/flask-service -https://github.com/Mr-Bruno/flask-service -Entry file: flask-service/service.py -Scanned: 2016-10-20 12:16:12.987627 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Theviajerock/mvaFlask -https://github.com/Theviajerock/mvaFlask -Entry file: mvaFlask/app.py -Scanned: 2016-10-20 12:16:14.292841 -Vulnerability 1: -File: mvaFlask/route.py - > User input at line 28, trigger word "form[": - question = request.form['question'] -Reassigned in: - File: mvaFlask/route.py - > Line 33: ret_MAYBE_FUNCTION_NAME = '

Invalid Request

' - File: mvaFlask/route.py - > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('CreateQuestion.html') -File: mvaFlask/route.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('CreatedQuestion.html',question=question) - -Vulnerability 2: -File: mvaFlask/route.py - > User input at line 43, trigger word "form[": - submittedAnswer = request.form['submittedAnswer'] -Reassigned in: - File: mvaFlask/route.py - > Line 52: ret_MAYBE_FUNCTION_NAME = '

Invalid Request

' - File: mvaFlask/route.py - > Line 41: ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question) - File: mvaFlask/route.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html') -File: mvaFlask/route.py - > reaches line 50, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('Incorrect',submittedAnswer=submittedAnswer, answer=answer) - - - -Us3l3ss/flask-test -https://github.com/Us3l3ss/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 12:16:14.826085 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -shakusi2009/1flask -https://github.com/shakusi2009/1flask -Entry file: 1flask/flaskr.py -Scanned: 2016-10-20 12:16:16.108443 -No vulnerabilities found. - - -renejahn/flask-fastbill -https://github.com/renejahn/flask-fastbill -Entry file: flask-fastbill/test_basics.py -Scanned: 2016-10-20 12:16:17.522608 -Vulnerability 1: -File: flask-fastbill/example/app.py - > User input at line 30, trigger word "get(": - customers_response = fb.customer.get() -Reassigned in: - File: flask-fastbill/example/app.py - > Line 31: customers = customers_response.response.customers -File: flask-fastbill/example/app.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('object_list.html',customers=customers) - -Vulnerability 2: -File: flask-fastbill/example/app.py - > User input at line 38, trigger word "get(": - articles_response = fb.article.get() -Reassigned in: - File: flask-fastbill/example/app.py - > Line 39: articles = articles_response.response.articles -File: flask-fastbill/example/app.py - > reaches line 40, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('object_list.html',articles=articles) - -Vulnerability 3: -File: flask-fastbill/example/app.py - > User input at line 46, trigger word "get(": - invoices_response = fb.invoice.get() -Reassigned in: - File: flask-fastbill/example/app.py - > Line 47: invoices = invoices_response.response.invoices -File: flask-fastbill/example/app.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('object_list.html',invoices=invoices) - - - -thanhan312/test_flask -https://github.com/thanhan312/test_flask -Entry file: test_flask/app.py -Scanned: 2016-10-20 12:16:26.975381 -No vulnerabilities found. - - -charup/Python_Flask -https://github.com/charup/Python_Flask -Entry file: Python_Flask/hello_dynamicVar.py -Scanned: 2016-10-20 12:16:31.892640 -Vulnerability 1: -File: Python_Flask/uploadFileToFolder_DisplayFile.py - > User input at line 23, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 30: filename = secure_filename(file.filename) - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 34: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(request.url) - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: Python_Flask/uploadFileToFolder_DisplayFile.py - > reaches line 32, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: Python_Flask/uploadFileToFolder_DisplayFile.py - > User input at line 23, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 30: filename = secure_filename(file.filename) - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 34: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(request.url) - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: Python_Flask/uploadFileToFolder_DisplayFile.py - > reaches line 32, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -blabaj/Flask_microblog -https://github.com/blabaj/Flask_microblog -Entry file: Flask_microblog/app/__init__.py -Scanned: 2016-10-20 12:16:35.319781 -No vulnerabilities found. - - -aparecidoSilvano/estudando-flask -https://github.com/aparecidoSilvano/estudando-flask -Entry file: None -Scanned: 2016-10-20 12:16:35.853317 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -danfujita/flask-tutorial -https://github.com/danfujita/flask-tutorial -Entry file: None -Scanned: 2016-10-20 12:16:36.375242 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -linzeming/flask_project -https://github.com/linzeming/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-20 12:16:39.335975 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sethbergman/flask-social -https://github.com/sethbergman/flask-social -Entry file: flask-social/app.py -Scanned: 2016-10-20 12:16:40.864259 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cnds/FlaskWithMongo -https://github.com/cnds/FlaskWithMongo -Entry file: FlaskWithMongo/tumblelog/__init__.py -Scanned: 2016-10-20 12:16:42.822787 -No vulnerabilities found. - - -gaomingnudt/gm-flask2.0 -https://github.com/gaomingnudt/gm-flask2.0 -Entry file: None -Scanned: 2016-10-20 12:16:48.820024 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/gaomingnudt/gm-flask2.0. - -Amertz08/FlaskWebBook -https://github.com/Amertz08/FlaskWebBook -Entry file: FlaskWebBook/app/__init__.py -Scanned: 2016-10-20 12:16:50.256634 -No vulnerabilities found. - - -ChaitanyaChannella/FlaskHelloWorld -https://github.com/ChaitanyaChannella/FlaskHelloWorld -Entry file: FlaskHelloWorld/hello.py -Scanned: 2016-10-20 12:16:51.554896 -No vulnerabilities found. - - -nmaas87/resin-openwrt-flask-app -https://github.com/nmaas87/resin-openwrt-flask-app -Entry file: resin-openwrt-flask-app/app.py -Scanned: 2016-10-20 12:16:52.878590 -No vulnerabilities found. - - -pazzo83/restaurant_reservation_flask -https://github.com/pazzo83/restaurant_reservation_flask -Entry file: restaurant_reservation_flask/app/__init__.py -Scanned: 2016-10-20 12:16:54.412631 -Vulnerability 1: -File: restaurant_reservation_flask/app/views.py - > User input at line 59, trigger word ".data": - res_date = datetime.datetime.strftime(form.reservation_date.data, '%Y-%m-%d') -Reassigned in: - File: restaurant_reservation_flask/app/views.py - > Line 61: res_date = datetime.datetime.strptime(reservation_date, '%Y-%m-%d') - File: restaurant_reservation_flask/app/views.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('show_reservations.html',title='Reservations', reservations=reservations, form=form, total_slots=total_slots, utilization=util) -File: restaurant_reservation_flask/app/views.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect('/show_reservations/' + res_date) - -Vulnerability 2: -File: restaurant_reservation_flask/app/views.py - > User input at line 59, trigger word ".data": - res_date = datetime.datetime.strftime(form.reservation_date.data, '%Y-%m-%d') -Reassigned in: - File: restaurant_reservation_flask/app/views.py - > Line 61: res_date = datetime.datetime.strptime(reservation_date, '%Y-%m-%d') - File: restaurant_reservation_flask/app/views.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('show_reservations.html',title='Reservations', reservations=reservations, form=form, total_slots=total_slots, utilization=util) -File: restaurant_reservation_flask/app/views.py - > reaches line 62, trigger word "filter(": - reservations = Reservation.query.filter(Reservation.reservation_time >= res_date, Reservation.reservation_time < res_date + datetime.timedelta(days=1)).all() - -Vulnerability 3: -File: restaurant_reservation_flask/app/controller.py - > User input at line 14, trigger word ".data": - capacity = int(form_data.num_guests.data) -Reassigned in: - File: restaurant_reservation_flask/app/controller.py - > Line 37: reservation = Reservation(guest=guest, table=Table.query.get(int(table_id)), num_guests=capacity, reservation_time=form_data.reservation_datetime.data) - File: restaurant_reservation_flask/app/controller.py - > Line 41: reservation = Reservation(guest=guest, table=Table.query.get(int(t_ids[0])), num_guests=capacity, reservation_time=form_data.reservation_datetime.data) - File: restaurant_reservation_flask/app/controller.py - > Line 45: ret_MAYBE_FUNCTION_NAME = reservation - File: restaurant_reservation_flask/app/controller.py - > Line 19: ret_MAYBE_FUNCTION_NAME = False - File: restaurant_reservation_flask/app/controller.py - > Line 33: ret_MAYBE_FUNCTION_NAME = False -File: restaurant_reservation_flask/app/controller.py - > reaches line 15, trigger word "filter(": - tables = Table.query.filter(Table.capacity >= capacity).order_by(Table.capacity.desc()).all() - -Vulnerability 4: -File: restaurant_reservation_flask/app/controller.py - > User input at line 22, trigger word ".data": - begin_range = form_data.reservation_datetime.data - datetime.timedelta(hours=DEFAULT_RESERVATION_LENGTH) -File: restaurant_reservation_flask/app/controller.py - > reaches line 26, trigger word "filter(": - reservations = Reservation.query.join(Reservation.table).filter(Table.id.in_(t_ids), Reservation.reservation_time >= begin_range, Reservation.reservation_time <= end_range).order_by(Table.capacity.desc()).all() - -Vulnerability 5: -File: restaurant_reservation_flask/app/controller.py - > User input at line 23, trigger word ".data": - end_range = form_data.reservation_datetime.data + datetime.timedelta(hours=DEFAULT_RESERVATION_LENGTH) -File: restaurant_reservation_flask/app/controller.py - > reaches line 26, trigger word "filter(": - reservations = Reservation.query.join(Reservation.table).filter(Table.id.in_(t_ids), Reservation.reservation_time >= begin_range, Reservation.reservation_time <= end_range).order_by(Table.capacity.desc()).all() - - - -Ogma-Dev/Simple-Flask-Webhook -https://github.com/Ogma-Dev/Simple-Flask-Webhook -Entry file: Simple-Flask-Webhook/simple-webhook.py -Scanned: 2016-10-20 12:16:55.715992 -No vulnerabilities found. - - -MoxmiNu/flask-mongo-docker -https://github.com/MoxmiNu/flask-mongo-docker -Entry file: flask-mongo-docker/flask/dr-app.py -Scanned: 2016-10-20 12:16:57.005424 -No vulnerabilities found. - - -andela-mnzomo/flask-bucketlist-api -https://github.com/andela-mnzomo/flask-bucketlist-api -Entry file: flask-bucketlist-api/app/__init__.py -Scanned: 2016-10-20 12:17:01.796135 -No vulnerabilities found. - - -NatuMyers/flask-sql-practice -https://github.com/NatuMyers/flask-sql-practice -Entry file: flask-sql-practice/finalproject.py -Scanned: 2016-10-20 12:17:10.331834 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pjt3591oo/python-flask_test -https://github.com/pjt3591oo/python-flask_test -Entry file: python-flask_test/model.py -Scanned: 2016-10-20 12:17:18.093164 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yuta-hono/flask-cloudfoundry-sample -https://github.com/yuta-hono/flask-cloudfoundry-sample -Entry file: flask-cloudfoundry-sample/hello.py -Scanned: 2016-10-20 12:17:21.405397 -No vulnerabilities found. - - -zjyExcelsior/Flask-Login-examples -https://github.com/zjyExcelsior/Flask-Login-examples -Entry file: Flask-Login-examples/myapp/__init__.py -Scanned: 2016-10-20 12:17:23.084973 -Vulnerability 1: -File: Flask-Login-examples/myapp/views/auth.py - > User input at line 16, trigger word ".data": - user = User.query.filter(User.email == form.email.data).first() -File: Flask-Login-examples/myapp/views/auth.py - > reaches line 16, trigger word "filter(": - user = User.query.filter(User.email == form.email.data).first() - -Vulnerability 2: -File: Flask-Login-examples/myapp/views/auth.py - > User input at line 22, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: Flask-Login-examples/myapp/views/auth.py - > Line 25: ret_MAYBE_FUNCTION_NAME = render_template('auth/login.html',form=form) -File: Flask-Login-examples/myapp/views/auth.py - > reaches line 23, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('main.index')) - -Vulnerability 3: -File: Flask-Login-examples/myapp/views/auth.py - > User input at line 22, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: Flask-Login-examples/myapp/views/auth.py - > Line 25: ret_MAYBE_FUNCTION_NAME = render_template('auth/login.html',form=form) -File: Flask-Login-examples/myapp/views/auth.py - > reaches line 23, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('main.index')) - - - -robertkohl125/MathQuizerFlask -https://github.com/robertkohl125/MathQuizerFlask -Entry file: MathQuizerFlask/MathQuizer/__init__.py -Scanned: 2016-10-20 12:17:25.282042 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MickaelAmorim/flask-server-netacad -https://github.com/MickaelAmorim/flask-server-netacad -Entry file: flask-server-netacad/netacad.py -Scanned: 2016-10-20 12:17:26.642205 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tharinda221/simple-flask-web-application -https://github.com/tharinda221/simple-flask-web-application -Entry file: simple-flask-web-application/simple-flask-web-application.py -Scanned: 2016-10-20 12:17:28.037593 -No vulnerabilities found. - - -jiyeonseo/study_python_flask -https://github.com/jiyeonseo/study_python_flask -Entry file: study_python_flask/cheesetest.py -Scanned: 2016-10-20 12:17:29.378832 -No vulnerabilities found. - - -Blockshare/blockshare-flask-template -https://github.com/Blockshare/blockshare-flask-template -Entry file: blockshare-flask-template/app/__init__.py -Scanned: 2016-10-20 12:17:36.174929 -Vulnerability 1: -File: blockshare-flask-template/app/forms/user.py - > User input at line 25, trigger word ".data": - check = self.model.query.filter(self.field == field.data).first() -File: blockshare-flask-template/app/forms/user.py - > reaches line 25, trigger word "filter(": - check = self.model.query.filter(self.field == field.data).first() - -Vulnerability 2: -File: blockshare-flask-template/app/views/main.py - > User input at line 67, trigger word ".data": - tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password) -Reassigned in: - File: blockshare-flask-template/app/views/main.py - > Line 71: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: blockshare-flask-template/app/views/main.py - > reaches line 72, trigger word "flash(": - flash(message, 'positive') - -Vulnerability 3: -File: blockshare-flask-template/app/views/main.py - > User input at line 71, trigger word ".data": - message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: blockshare-flask-template/app/views/main.py - > reaches line 72, trigger word "flash(": - flash(message, 'positive') - -Vulnerability 4: -File: blockshare-flask-template/app/views/main.py - > User input at line 67, trigger word ".data": - tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password) -Reassigned in: - File: blockshare-flask-template/app/views/main.py - > Line 71: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: blockshare-flask-template/app/views/main.py - > reaches line 76, trigger word "flash(": - flash(tx['message'], 'negative') - -Vulnerability 5: -File: blockshare-flask-template/app/views/main.py - > User input at line 108, trigger word ".data": - message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: blockshare-flask-template/app/views/main.py - > reaches line 109, trigger word "flash(": - flash(message, 'positive') - -Vulnerability 6: -File: blockshare-flask-template/app/views/main.py - > User input at line 120, trigger word "form(": - points = [(random.uniform(48.84341, 48.86341), random.uniform(2.3388, 2.3588)) for _ in range(random.randint(2, 9))] -File: blockshare-flask-template/app/views/main.py - > reaches line 123, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('points'points) - -Vulnerability 7: -File: blockshare-flask-template/app/views/user.py - > User input at line 24, trigger word ".data": - user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data) -Reassigned in: - File: blockshare-flask-template/app/views/user.py - > Line 39: token = ts.dumps(user.email,salt='email-confirm-key') -File: blockshare-flask-template/app/views/user.py - > reaches line 41, trigger word "url_for(": - confirmUrl = url_for('userbp.confirm',token=token, _external=True) - -Vulnerability 8: -File: blockshare-flask-template/app/views/user.py - > User input at line 24, trigger word ".data": - user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data) -Reassigned in: - File: blockshare-flask-template/app/views/user.py - > Line 39: token = ts.dumps(user.email,salt='email-confirm-key') -File: blockshare-flask-template/app/views/user.py - > reaches line 43, trigger word "render_template(": - html = render_template('email/confirm.html',confirm_url=confirmUrl) - -Vulnerability 9: -File: blockshare-flask-template/app/views/user.py - > User input at line 118, trigger word ".data": - user = models.User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: blockshare-flask-template/app/views/user.py - > Line 124: token = ts.dumps(user.email,salt='password-reset-key') -File: blockshare-flask-template/app/views/user.py - > reaches line 126, trigger word "url_for(": - resetUrl = url_for('userbp.reset',token=token, _external=True) - -Vulnerability 10: -File: blockshare-flask-template/app/views/user.py - > User input at line 118, trigger word ".data": - user = models.User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: blockshare-flask-template/app/views/user.py - > Line 124: token = ts.dumps(user.email,salt='password-reset-key') -File: blockshare-flask-template/app/views/user.py - > reaches line 128, trigger word "render_template(": - html = render_template('email/reset.html',reset_url=resetUrl) - - - -cuttlesoft/flask-bitmapist -https://github.com/cuttlesoft/flask-bitmapist -Entry file: flask-bitmapist/tests/conftest.py -Scanned: 2016-10-20 12:17:42.262349 -No vulnerabilities found. - - -dhaval38/Flask -https://github.com/dhaval38/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:17:42.797739 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrffrm1234/flask -https://github.com/mrffrm1234/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:17:43.376563 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -gaurikatyagi/Flask -https://github.com/gaurikatyagi/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:17:43.902757 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TeamDroneFireman/Flask -https://github.com/TeamDroneFireman/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:17:44.416775 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sloria/flask-konch -https://github.com/sloria/flask-konch -Entry file: flask-konch/example_app/hello.py -Scanned: 2016-10-20 12:17:45.841828 -No vulnerabilities found. - - -patternexon/hello -https://github.com/patternexon/hello -Entry file: hello/hello.py -Scanned: 2016-10-20 12:17:53.199421 -No vulnerabilities found. - - -YUX-IO/flask-python351 -https://github.com/YUX-IO/flask-python351 -Entry file: flask-python351/sample-app/app.py -Scanned: 2016-10-20 12:17:55.117246 -No vulnerabilities found. - - -saga92/flaskr -https://github.com/saga92/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:17:55.631255 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AliceLanniste/Flasky -https://github.com/AliceLanniste/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-20 12:17:56.132438 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -powerlanguage/flasktaskr -https://github.com/powerlanguage/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:17:56.635120 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bwghughes/flaskdev -https://github.com/bwghughes/flaskdev -Entry file: flaskdev/hello.py -Scanned: 2016-10-20 12:17:57.931729 -Vulnerability 1: -File: flaskdev/tests.py - > User input at line 10, trigger word "get(": - res = client.get(url_for('hello_world')) -File: flaskdev/tests.py - > reaches line 10, trigger word "url_for(": - res = client.get(url_for('hello_world')) - - - -fromzeroedu/flaskbook -https://github.com/fromzeroedu/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-20 12:17:58.490173 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -wrzto/flasky -https://github.com/wrzto/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:17:59.036567 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bhsantos11/flaskwebapp -https://github.com/bhsantos11/flaskwebapp -Entry file: flaskwebapp/flaskwebsite/__init__.py -Scanned: 2016-10-20 12:18:00.341516 -No vulnerabilities found. - - -EricGarza/flaskbyexample -https://github.com/EricGarza/flaskbyexample -Entry file: flaskbyexample/app.py -Scanned: 2016-10-20 12:18:09.759868 -No vulnerabilities found. - - -yanni-zh/flaskweb -https://github.com/yanni-zh/flaskweb -Entry file: None -Scanned: 2016-10-20 12:18:10.286803 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nrugas/flasky -https://github.com/nrugas/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:18:10.807097 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -William0423/flaskylearn -https://github.com/William0423/flaskylearn -Entry file: flaskylearn/app/__init__.py -Scanned: 2016-10-20 12:18:12.267514 -No vulnerabilities found. - - -anngle/flaskweb -https://github.com/anngle/flaskweb -Entry file: None -Scanned: 2016-10-20 12:18:12.783061 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Aprimus1/flasktaskr -https://github.com/Aprimus1/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:18:19.302735 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -koool71/flaskr -https://github.com/koool71/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:18:22.830493 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mayreeh/Flasky -https://github.com/mayreeh/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-20 12:18:24.394485 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -supor/flaskr -https://github.com/supor/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:18:25.902015 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ridnarong/flasky -https://github.com/ridnarong/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:18:27.425675 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -CharlieCheng2014/Flask-micro-flask -https://github.com/CharlieCheng2014/Flask-micro-flask -Entry file: Flask-micro-flask/app/__init__.py -Scanned: 2016-10-20 12:18:29.905933 -No vulnerabilities found. - - -Himenon/FlaskTutorial -https://github.com/Himenon/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 12:18:30.428137 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -stitch001/flaskerMysql -https://github.com/stitch001/flaskerMysql -Entry file: flaskerMysql/mysqlFlask/__init__.py -Scanned: 2016-10-20 12:18:37.431108 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wxkNeter/FlaskBlog -https://github.com/wxkNeter/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 12:18:39.062125 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -halilkaya/pymock -https://github.com/halilkaya/pymock -Entry file: pymock/app.py -Scanned: 2016-10-20 12:18:44.510204 -Vulnerability 1: -File: pymock/app.py - > User input at line 165, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: pymock/app.py - > Line 168: data = 'id''username''name''email'user.iduser.usernameuser.nameuser.email -File: pymock/app.py - > reaches line 174, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(data) - -Vulnerability 2: -File: pymock/app.py - > User input at line 183, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: pymock/app.py - > Line 191: user = User(username=username) -File: pymock/app.py - > reaches line 197, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: pymock/app.py - > User input at line 183, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: pymock/app.py - > Line 191: user = User(username=username) -File: pymock/app.py - > reaches line 197, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - - - -Jeimmi/HelloFlask -https://github.com/Jeimmi/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-20 12:18:45.031642 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chris-ritsen/flask-site -https://github.com/chris-ritsen/flask-site -Entry file: None -Scanned: 2016-10-20 12:18:45.535047 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mturnshek/flask-demo -https://github.com/mturnshek/flask-demo -Entry file: None -Scanned: 2016-10-20 12:18:46.035913 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mturnshek/flask-demo. - -kevinludwig/flask-template -https://github.com/kevinludwig/flask-template -Entry file: None -Scanned: 2016-10-20 12:18:54.585598 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kevinludwig/flask-template. - -LucasChenZQ/flask_learn -https://github.com/LucasChenZQ/flask_learn -Entry file: flask_learn/hello.py -Scanned: 2016-10-20 12:18:55.094509 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -julienchurch/flask_austin -https://github.com/julienchurch/flask_austin -Entry file: None -Scanned: 2016-10-20 12:18:57.519916 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/julienchurch/flask_austin. - -CTiPKA/scikit-flask -https://github.com/CTiPKA/scikit-flask -Entry file: scikit-flask/app.py -Scanned: 2016-10-20 12:18:58.926971 -No vulnerabilities found. - - -Kecksdose/Flask_Tutorial -https://github.com/Kecksdose/Flask_Tutorial -Entry file: Flask_Tutorial/flaskr.py -Scanned: 2016-10-20 12:18:59.632631 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Tutorial/venv/lib/python2.7/genericpath.py - -kentaro0919/blog_flask -https://github.com/kentaro0919/blog_flask -Entry file: blog_flask/app/app.py -Scanned: 2016-10-20 12:19:00.888133 -No vulnerabilities found. - - -yitingfan/flask-adminlte -https://github.com/yitingfan/flask-adminlte -Entry file: flask-adminlte/app/__init__.py -Scanned: 2016-10-20 12:19:08.905763 -Vulnerability 1: -File: flask-adminlte/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 55: posts = pagination.items - File: flask-adminlte/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-adminlte/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flask-adminlte/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 45: show_followed = False - File: flask-adminlte/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-adminlte/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flask-adminlte/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 67: posts = pagination.items -File: flask-adminlte/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flask-adminlte/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask-adminlte/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 134: comments = pagination.items - File: flask-adminlte/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask-adminlte/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flask-adminlte/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask-adminlte/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-adminlte/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flask-adminlte/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask-adminlte/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-adminlte/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flask-adminlte/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/main/views.py - > Line 246: comments = pagination.items -File: flask-adminlte/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 20: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 23: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 20: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 23: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 20: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 23: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 42: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 45: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 42: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 45: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flask-adminlte/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask-adminlte/app/api_1_0/users.py - > Line 42: prev = None - File: flask-adminlte/app/api_1_0/users.py - > Line 45: next = None -File: flask-adminlte/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flask-adminlte/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask-adminlte/app/api_1_0/posts.py - > Line 16: prev = None - File: flask-adminlte/app/api_1_0/posts.py - > Line 19: next = None -File: flask-adminlte/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flask-adminlte/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask-adminlte/app/api_1_0/posts.py - > Line 16: prev = None - File: flask-adminlte/app/api_1_0/posts.py - > Line 19: next = None -File: flask-adminlte/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flask-adminlte/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask-adminlte/app/api_1_0/posts.py - > Line 16: prev = None - File: flask-adminlte/app/api_1_0/posts.py - > Line 19: next = None -File: flask-adminlte/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 15: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 18: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 15: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 18: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 15: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 18: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 43: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 46: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 43: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 46: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flask-adminlte/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-adminlte/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-adminlte/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask-adminlte/app/api_1_0/comments.py - > Line 43: prev = None - File: flask-adminlte/app/api_1_0/comments.py - > Line 46: next = None -File: flask-adminlte/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -daivq/Flask_Blog -https://github.com/daivq/Flask_Blog -Entry file: Flask_Blog/Blog/blog.py -Scanned: 2016-10-20 12:19:09.845799 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spjoshi/Flask_ml -https://github.com/spjoshi/Flask_ml -Entry file: Flask_ml/api/__init__.py -Scanned: 2016-10-20 12:19:12.080698 -No vulnerabilities found. - - -SeoDongMyeong/Simple-Flask -https://github.com/SeoDongMyeong/Simple-Flask -Entry file: Simple-Flask/application.py -Scanned: 2016-10-20 12:19:13.443724 -No vulnerabilities found. - - -sebastiken/flask-miot -https://github.com/sebastiken/flask-miot -Entry file: flask-miot/app/__init__.py -Scanned: 2016-10-20 12:19:14.740986 -No vulnerabilities found. - - -Yichuans/flask-project -https://github.com/Yichuans/flask-project -Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py -Scanned: 2016-10-20 12:19:23.272346 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ugorbolsky/flask-demo -https://github.com/ugorbolsky/flask-demo -Entry file: None -Scanned: 2016-10-20 12:19:23.836766 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ugorbolsky/flask-demo. - -tjcim/flask_skeleton -https://github.com/tjcim/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-20 12:19:24.344875 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -Jeimmi/UserFlask -https://github.com/Jeimmi/UserFlask -Entry file: UserFlask/User.py -Scanned: 2016-10-20 12:19:25.639951 -No vulnerabilities found. - - -chandureddys/Microblog-flask -https://github.com/chandureddys/Microblog-flask -Entry file: Microblog-flask/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-20 12:19:36.076815 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -daivq/Flask_Basic -https://github.com/daivq/Flask_Basic -Entry file: Flask_Basic/flaskr.py -Scanned: 2016-10-20 12:19:37.508190 -No vulnerabilities found. - - -vikingspy/flask-taskr -https://github.com/vikingspy/flask-taskr -Entry file: flask-taskr/views.py -Scanned: 2016-10-20 12:19:38.326814 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-taskr/env/lib/python2.7/genericpath.py - -lessons-of-k4zzk/lessons-flask -https://github.com/lessons-of-k4zzk/lessons-flask -Entry file: lessons-flask/app.py -Scanned: 2016-10-20 12:19:39.640229 -No vulnerabilities found. - - -smirnov-am/flask-ablog -https://github.com/smirnov-am/flask-ablog -Entry file: flask-ablog/app/__init__.py -Scanned: 2016-10-20 12:19:41.319942 -Vulnerability 1: -File: flask-ablog/app/main/views.py - > User input at line 113, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-ablog/app/main/views.py - > Line 115: offset = page - 1 * per_page - File: flask-ablog/app/main/views.py - > Line 127: pagination = 'has_prev''prev_num''page''has_next''pages'page > 1TrueFalsepage - 1pagepost_count > offset + len(posts)TrueFalse[i for i in range(1, 1 + post_count + per_page - 1 // per_page)] -File: flask-ablog/app/main/views.py - > reaches line 138, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination, tags=tags, tag_cloud=tag_cloud) - -Vulnerability 2: -File: flask-ablog/app/main/views.py - > User input at line 266, trigger word "get(": - slug = request.args.get('post') -Reassigned in: - File: flask-ablog/app/main/views.py - > Line 268: post = Post.objects.get_or_404(slug=slug) -File: flask-ablog/app/main/views.py - > reaches line 277, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',slug=post.slug)) - -Vulnerability 3: -File: flask-ablog/app/main/views.py - > User input at line 266, trigger word "get(": - slug = request.args.get('post') -Reassigned in: - File: flask-ablog/app/main/views.py - > Line 268: post = Post.objects.get_or_404(slug=slug) -File: flask-ablog/app/main/views.py - > reaches line 277, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',slug=post.slug)) - - - -Himenon/SampleFlask -https://github.com/Himenon/SampleFlask -Entry file: SampleFlask/SampleFlask.py -Scanned: 2016-10-20 12:19:42.601510 -No vulnerabilities found. - - -timrichardson/growthpath_flask -https://github.com/timrichardson/growthpath_flask -Entry file: growthpath_flask/app/__init__.py -Scanned: 2016-10-20 12:19:44.579824 -No vulnerabilities found. - - -frombegin/flask-first -https://github.com/frombegin/flask-first -Entry file: flask-first/flask-first-notes.py -Scanned: 2016-10-20 12:19:45.105068 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bmw9t/flask_test -https://github.com/bmw9t/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 12:19:45.707464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vikingspy/flask-blog -https://github.com/vikingspy/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:19:46.328490 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -searene/flask-chat -https://github.com/searene/flask-chat -Entry file: flask-chat/chat.py -Scanned: 2016-10-20 12:19:46.838981 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -virtowlee/flask-work -https://github.com/virtowlee/flask-work -Entry file: flask-work/work/env/lib/python2.7/site-packages/Flask-0.10.1-py2.7.egg/flask/sessions.py -Scanned: 2016-10-20 12:19:54.870106 -No vulnerabilities found. - - -DmytroKaminskiy/flask_skeleton -https://github.com/DmytroKaminskiy/flask_skeleton -Entry file: flask_skeleton/flask_skeleton/config.py -Scanned: 2016-10-20 12:19:55.418378 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -jwh5566/flask_blog -https://github.com/jwh5566/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:19:55.938956 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thanhan312/test_flask -https://github.com/thanhan312/test_flask -Entry file: test_flask/app.py -Scanned: 2016-10-20 12:19:57.368703 -No vulnerabilities found. - - -charup/Python_Flask -https://github.com/charup/Python_Flask -Entry file: Python_Flask/hello_dynamicVar.py -Scanned: 2016-10-20 12:20:02.370134 -Vulnerability 1: -File: Python_Flask/uploadFileToFolder_DisplayFile.py - > User input at line 23, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 30: filename = secure_filename(file.filename) - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 34: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(request.url) - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: Python_Flask/uploadFileToFolder_DisplayFile.py - > reaches line 32, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: Python_Flask/uploadFileToFolder_DisplayFile.py - > User input at line 23, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 30: filename = secure_filename(file.filename) - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 34: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(request.url) - File: Python_Flask/uploadFileToFolder_DisplayFile.py - > Line 28: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: Python_Flask/uploadFileToFolder_DisplayFile.py - > reaches line 32, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -vishalggrc/flask-demo -https://github.com/vishalggrc/flask-demo -Entry file: None -Scanned: 2016-10-20 12:20:02.887239 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vishalggrc/flask-demo. - -jiyeonseo/start_flask -https://github.com/jiyeonseo/start_flask -Entry file: start_flask/start_flask.py -Scanned: 2016-10-20 12:20:04.207102 -No vulnerabilities found. - - -emrahayanoglu/Flask-Skeleton -https://github.com/emrahayanoglu/Flask-Skeleton -Entry file: None -Scanned: 2016-10-20 12:20:04.737915 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/emrahayanoglu/Flask-Skeleton. - -vanstinger/Flask-Projects -https://github.com/vanstinger/Flask-Projects -Entry file: Flask-Projects/hello.py -Scanned: 2016-10-20 12:20:06.058743 -No vulnerabilities found. - - -chenminhua/flask-boilerplate -https://github.com/chenminhua/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 12:20:06.612796 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chenminhua/flask-boilerplate. - -easydaniel/flask-base -https://github.com/easydaniel/flask-base -Entry file: None -Scanned: 2016-10-20 12:20:07.139907 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/easydaniel/flask-base. - -piyush121/Python-Flask -https://github.com/piyush121/Python-Flask -Entry file: None -Scanned: 2016-10-20 12:20:09.650721 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/piyush121/Python-Flask. - -tianmaxingkonggrant/tianmaflaskblog -https://github.com/tianmaxingkonggrant/tianmaflaskblog -Entry file: tianmaflaskblog/app/__init__.py -Scanned: 2016-10-20 12:20:13.315969 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -DeeeFOX/Flaxample -https://github.com/DeeeFOX/Flaxample -Entry file: Flaxample/gocon_monitor/__init__.py -Scanned: 2016-10-20 12:20:21.133700 -No vulnerabilities found. - - -HenryZivers/flablo -https://github.com/HenryZivers/flablo -Entry file: flablo/flablo/__init__.py -Scanned: 2016-10-20 12:20:24.262515 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -devyul/Python-Flask-WeChat-BAE -https://github.com/devyul/Python-Flask-WeChat-BAE -Entry file: Python-Flask-WeChat-BAE/index.py -Scanned: 2016-10-20 12:20:25.582032 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Panguins/FlaskByExample -https://github.com/Panguins/FlaskByExample -Entry file: FlaskByExample/app.py -Scanned: 2016-10-20 12:20:27.022163 -No vulnerabilities found. - - -yongli82/FlaskBookRead -https://github.com/yongli82/FlaskBookRead -Entry file: FlaskBookRead/application/__init__.py -Scanned: 2016-10-20 12:20:34.260323 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -oxa/flask_celery_redis -https://github.com/oxa/flask_celery_redis -Entry file: flask_celery_redis/redis_demo.py -Scanned: 2016-10-20 12:20:38.257890 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -skols/flask-by-example -https://github.com/skols/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 12:20:39.942531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -slushkovsky/flask_email_auth -https://github.com/slushkovsky/flask_email_auth -Entry file: flask_email_auth/example/simple_app/run.py -Scanned: 2016-10-20 12:20:41.508402 -No vulnerabilities found. - - -xdanielsb/PersonalTrainer-Flask -https://github.com/xdanielsb/PersonalTrainer-Flask -Entry file: None -Scanned: 2016-10-20 12:20:49.423429 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -altipeak/safewalk-flask-integration -https://github.com/altipeak/safewalk-flask-integration -Entry file: safewalk-flask-integration/authentication_gateway.py -Scanned: 2016-10-20 12:20:50.778746 -No vulnerabilities found. - - -felipemfp/flask-by-example -https://github.com/felipemfp/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 12:20:51.455183 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Blockshare/blockshare-flask-template -https://github.com/Blockshare/blockshare-flask-template -Entry file: blockshare-flask-template/app/__init__.py -Scanned: 2016-10-20 12:20:57.423291 -Vulnerability 1: -File: blockshare-flask-template/app/forms/user.py - > User input at line 25, trigger word ".data": - check = self.model.query.filter(self.field == field.data).first() -File: blockshare-flask-template/app/forms/user.py - > reaches line 25, trigger word "filter(": - check = self.model.query.filter(self.field == field.data).first() - -Vulnerability 2: -File: blockshare-flask-template/app/views/main.py - > User input at line 67, trigger word ".data": - tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password) -Reassigned in: - File: blockshare-flask-template/app/views/main.py - > Line 71: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: blockshare-flask-template/app/views/main.py - > reaches line 72, trigger word "flash(": - flash(message, 'positive') - -Vulnerability 3: -File: blockshare-flask-template/app/views/main.py - > User input at line 71, trigger word ".data": - message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: blockshare-flask-template/app/views/main.py - > reaches line 72, trigger word "flash(": - flash(message, 'positive') - -Vulnerability 4: -File: blockshare-flask-template/app/views/main.py - > User input at line 67, trigger word ".data": - tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password) -Reassigned in: - File: blockshare-flask-template/app/views/main.py - > Line 71: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: blockshare-flask-template/app/views/main.py - > reaches line 76, trigger word "flash(": - flash(tx['message'], 'negative') - -Vulnerability 5: -File: blockshare-flask-template/app/views/main.py - > User input at line 108, trigger word ".data": - message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: blockshare-flask-template/app/views/main.py - > reaches line 109, trigger word "flash(": - flash(message, 'positive') - -Vulnerability 6: -File: blockshare-flask-template/app/views/main.py - > User input at line 120, trigger word "form(": - points = [(random.uniform(48.84341, 48.86341), random.uniform(2.3388, 2.3588)) for _ in range(random.randint(2, 9))] -File: blockshare-flask-template/app/views/main.py - > reaches line 123, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('points'points) - -Vulnerability 7: -File: blockshare-flask-template/app/views/user.py - > User input at line 24, trigger word ".data": - user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data) -Reassigned in: - File: blockshare-flask-template/app/views/user.py - > Line 39: token = ts.dumps(user.email,salt='email-confirm-key') -File: blockshare-flask-template/app/views/user.py - > reaches line 41, trigger word "url_for(": - confirmUrl = url_for('userbp.confirm',token=token, _external=True) - -Vulnerability 8: -File: blockshare-flask-template/app/views/user.py - > User input at line 24, trigger word ".data": - user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data) -Reassigned in: - File: blockshare-flask-template/app/views/user.py - > Line 39: token = ts.dumps(user.email,salt='email-confirm-key') -File: blockshare-flask-template/app/views/user.py - > reaches line 43, trigger word "render_template(": - html = render_template('email/confirm.html',confirm_url=confirmUrl) - -Vulnerability 9: -File: blockshare-flask-template/app/views/user.py - > User input at line 118, trigger word ".data": - user = models.User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: blockshare-flask-template/app/views/user.py - > Line 124: token = ts.dumps(user.email,salt='password-reset-key') -File: blockshare-flask-template/app/views/user.py - > reaches line 126, trigger word "url_for(": - resetUrl = url_for('userbp.reset',token=token, _external=True) - -Vulnerability 10: -File: blockshare-flask-template/app/views/user.py - > User input at line 118, trigger word ".data": - user = models.User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: blockshare-flask-template/app/views/user.py - > Line 124: token = ts.dumps(user.email,salt='password-reset-key') -File: blockshare-flask-template/app/views/user.py - > reaches line 128, trigger word "render_template(": - html = render_template('email/reset.html',reset_url=resetUrl) - - - -lpty/a-web-use-flask -https://github.com/lpty/a-web-use-flask -Entry file: a-web-use-flask/app/__init__.py -Scanned: 2016-10-20 12:21:05.661417 -Vulnerability 1: -File: a-web-use-flask/app/main/views.py - > User input at line 18, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: a-web-use-flask/app/main/views.py - > Line 23: pagination = current_user.followed_posts.order_by(Post.timestamp).paginate(page,per_page=10, error_out=False) - File: a-web-use-flask/app/main/views.py - > Line 27: pagination = Post.query.order_by(Post.timestamp).paginate(page,per_page=10, error_out=False) - File: a-web-use-flask/app/main/views.py - > Line 30: posts = pagination.items - File: a-web-use-flask/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: a-web-use-flask/app/main/views.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed) - -Vulnerability 2: -File: a-web-use-flask/app/main/views.py - > User input at line 21, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', ' ')) -Reassigned in: - File: a-web-use-flask/app/main/views.py - > Line 19: show_followed = False - File: a-web-use-flask/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: a-web-use-flask/app/main/views.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed) - -Vulnerability 3: -File: a-web-use-flask/app/main/views.py - > User input at line 95, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: a-web-use-flask/app/main/views.py - > Line 96: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: a-web-use-flask/app/main/views.py - > Line 98: comments = pagination.items - File: a-web-use-flask/app/main/views.py - > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.post',id=post.id)) -File: a-web-use-flask/app/main/views.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: a-web-use-flask/app/main/views.py - > User input at line 151, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: a-web-use-flask/app/main/views.py - > Line 152: pagination = user.follower.paginate(page,per_page=10, error_out=False) - File: a-web-use-flask/app/main/views.py - > Line 153: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: a-web-use-flask/app/main/views.py - > Line 150: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: a-web-use-flask/app/main/views.py - > reaches line 154, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('follower.html',user=user, title='Followers of', pagination=pagination, follows=follows) - - - -sean-lynch/flask-cli-issue -https://github.com/sean-lynch/flask-cli-issue -Entry file: flask-cli-issue/server/__init__.py -Scanned: 2016-10-20 12:21:07.036796 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cambers/ReallyRealFlask -https://github.com/cambers/ReallyRealFlask -Entry file: ReallyRealFlask/Hello_world/app.py -Scanned: 2016-10-20 12:21:15.414192 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lwalter/flask-react-musicshare -https://github.com/lwalter/flask-react-musicshare -Entry file: flask-react-musicshare/app/factory.py -Scanned: 2016-10-20 12:21:17.023814 -No vulnerabilities found. - - -yoophi/flask-sample-app -https://github.com/yoophi/flask-sample-app -Entry file: None -Scanned: 2016-10-20 12:21:18.991302 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yoophi/flask-sample-app. - -lixutang/Python_Web_Flask -https://github.com/lixutang/Python_Web_Flask -Entry file: Python_Web_Flask/app/__init__.py -Scanned: 2016-10-20 12:21:21.778946 -Vulnerability 1: -File: Python_Web_Flask/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Python_Web_Flask/app/main/views.py - > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Python_Web_Flask/app/main/views.py - > Line 32: posts = pagination.items - File: Python_Web_Flask/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Python_Web_Flask/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Python_Web_Flask/app/main/views.py - > User input at line 24, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Python_Web_Flask/app/main/views.py - > Line 22: show_followed = False - File: Python_Web_Flask/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Python_Web_Flask/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Python_Web_Flask/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Python_Web_Flask/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Python_Web_Flask/app/main/views.py - > Line 44: posts = pagination.items -File: Python_Web_Flask/app/main/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Python_Web_Flask/app/main/views.py - > User input at line 104, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Python_Web_Flask/app/main/views.py - > Line 106: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Python_Web_Flask/app/main/views.py - > Line 108: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Python_Web_Flask/app/main/views.py - > Line 111: comments = pagination.items - File: Python_Web_Flask/app/main/views.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Python_Web_Flask/app/main/views.py - > reaches line 112, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Python_Web_Flask/app/main/views.py - > User input at line 171, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Python_Web_Flask/app/main/views.py - > Line 172: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Python_Web_Flask/app/main/views.py - > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Python_Web_Flask/app/main/views.py - > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Python_Web_Flask/app/main/views.py - > reaches line 177, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Python_Web_Flask/app/main/views.py - > User input at line 188, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Python_Web_Flask/app/main/views.py - > Line 189: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Python_Web_Flask/app/main/views.py - > Line 192: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Python_Web_Flask/app/main/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Python_Web_Flask/app/main/views.py - > reaches line 194, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Python_Web_Flask/app/main/views.py - > User input at line 219, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Python_Web_Flask/app/main/views.py - > Line 220: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Python_Web_Flask/app/main/views.py - > Line 223: comments = pagination.items -File: Python_Web_Flask/app/main/views.py - > reaches line 224, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -paulgoblin/flask -https://github.com/paulgoblin/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:21:24.243042 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -tayan-serna/flask -https://github.com/tayan-serna/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:21:24.821358 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -virtue1990/flask -https://github.com/virtue1990/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:21:25.396106 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -sushmit86/Flask -https://github.com/sushmit86/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:21:25.916603 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vorkos/flask -https://github.com/vorkos/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:21:26.500475 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -mussaimo/auth-flask -https://github.com/mussaimo/auth-flask -Entry file: auth-flask/app.py -Scanned: 2016-10-20 12:21:31.461172 -No vulnerabilities found. - - -matinde/flasktaskr -https://github.com/matinde/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:21:32.003263 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -William0423/flaskybooklearn -https://github.com/William0423/flaskybooklearn -Entry file: flaskybooklearn/app/__init__.py -Scanned: 2016-10-20 12:21:33.999781 -Vulnerability 1: -File: flaskybooklearn/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 32: posts = pagination.items - File: flaskybooklearn/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskybooklearn/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskybooklearn/app/main/views.py - > User input at line 24, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 22: show_followed = False - File: flaskybooklearn/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskybooklearn/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskybooklearn/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 44: posts = pagination.items -File: flaskybooklearn/app/main/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flaskybooklearn/app/main/views.py - > User input at line 104, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 106: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskybooklearn/app/main/views.py - > Line 108: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 111: comments = pagination.items - File: flaskybooklearn/app/main/views.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskybooklearn/app/main/views.py - > reaches line 112, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flaskybooklearn/app/main/views.py - > User input at line 171, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 172: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskybooklearn/app/main/views.py - > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskybooklearn/app/main/views.py - > reaches line 177, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flaskybooklearn/app/main/views.py - > User input at line 188, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 189: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 192: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskybooklearn/app/main/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskybooklearn/app/main/views.py - > reaches line 194, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flaskybooklearn/app/main/views.py - > User input at line 219, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 220: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 223: comments = pagination.items -File: flaskybooklearn/app/main/views.py - > reaches line 224, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 20: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 23: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 20: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 23: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 20: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 23: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 42: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 42: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 42: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flaskybooklearn/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskybooklearn/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskybooklearn/app/api_1_0/posts.py - > Line 19: next = None -File: flaskybooklearn/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flaskybooklearn/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskybooklearn/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskybooklearn/app/api_1_0/posts.py - > Line 19: next = None -File: flaskybooklearn/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flaskybooklearn/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskybooklearn/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskybooklearn/app/api_1_0/posts.py - > Line 19: next = None -File: flaskybooklearn/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 18: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 18: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 18: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -powerlanguage/flasktaskr -https://github.com/powerlanguage/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:21:34.507669 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cmacro/flaskblog -https://github.com/cmacro/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 12:21:35.038686 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -vrofze/flasky -https://github.com/vrofze/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:21:35.544198 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tuppa/flaskapp -https://github.com/tuppa/flaskapp -Entry file: None -Scanned: 2016-10-20 12:21:36.047725 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tuppa/flaskapp. - -quyip8818/flaskrestful -https://github.com/quyip8818/flaskrestful -Entry file: flaskrestful/flaskrestful.py -Scanned: 2016-10-20 12:21:36.587826 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gandhk/flasklearn -https://github.com/gandhk/flasklearn -Entry file: flasklearn/main.py -Scanned: 2016-10-20 12:21:37.871383 -No vulnerabilities found. - - -Apophus/flaskdb -https://github.com/Apophus/flaskdb -Entry file: flaskdb/fdb.py -Scanned: 2016-10-20 12:21:39.203906 -No vulnerabilities found. - - -William0423/flaskylearn -https://github.com/William0423/flaskylearn -Entry file: flaskylearn/app/__init__.py -Scanned: 2016-10-20 12:21:41.658935 -No vulnerabilities found. - - -jerodestapa/flasktodo -https://github.com/jerodestapa/flasktodo -Entry file: flasktodo/application.py -Scanned: 2016-10-20 12:21:42.389987 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -uptownjimmy/flasktaskr -https://github.com/uptownjimmy/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:21:42.896385 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -getser/flaskapiblog -https://github.com/getser/flaskapiblog -Entry file: flaskapiblog/__init__.py -Scanned: 2016-10-20 12:21:51.376913 -Vulnerability 1: -File: flaskapiblog/views.py - > User input at line 112, trigger word "get(": - post = Post.query.get(post_id) -File: flaskapiblog/views.py - > reaches line 115, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('post'post._asdict()) - -Vulnerability 2: -File: flaskapiblog/views.py - > User input at line 187, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: flaskapiblog/views.py - > Line 193: visitor = Visitor(email=email) -File: flaskapiblog/views.py - > reaches line 197, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True)) - -Vulnerability 3: -File: flaskapiblog/views.py - > User input at line 187, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: flaskapiblog/views.py - > Line 193: visitor = Visitor(email=email) -File: flaskapiblog/views.py - > reaches line 197, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True)) - - - -kirazz/flaskywebblog -https://github.com/kirazz/flaskywebblog -Entry file: flaskywebblog/PycharmProjects/webblog/app/__init__.py -Scanned: 2016-10-20 12:21:55.316832 -Vulnerability 1: -File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > User input at line 19, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > Line 20: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=5, error_out=False) - File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > Line 22: posts = pagination.items - File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > User input at line 91, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > Line 93: page = post.comments.count() - 1 // 5 + 1 - File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > Line 95: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=5, error_out=False) - File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > Line 97: comments = pagination.items - File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > Line 90: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskywebblog/PycharmProjects/webblog/app/main/views.py - > reaches line 98, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - - - -caspii/flaskr -https://github.com/caspii/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:21:55.855365 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ejakait/flaskpro -https://github.com/ejakait/flaskpro -Entry file: None -Scanned: 2016-10-20 12:22:07.519709 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tj621/flaskr -https://github.com/tj621/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:22:08.060394 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -LinMingjie/flaskr -https://github.com/LinMingjie/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:22:08.575388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -supor/flaskr -https://github.com/supor/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:22:16.125351 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ridnarong/flasky -https://github.com/ridnarong/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:22:17.643507 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seangilleran/flasko -https://github.com/seangilleran/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-20 12:22:20.288071 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py - -weisongchen/flaskexercise -https://github.com/weisongchen/flaskexercise -Entry file: flaskexercise/hello.py -Scanned: 2016-10-20 12:22:28.187102 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskexercise/venv/lib/python2.7/genericpath.py - -weisongchen/flaskapp -https://github.com/weisongchen/flaskapp -Entry file: None -Scanned: 2016-10-20 12:22:28.771169 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/weisongchen/flaskapp. - -vmotto/FlaskBlog -https://github.com/vmotto/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 12:22:29.395432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xiangzhuyuan/flaskdemo1 -https://github.com/xiangzhuyuan/flaskdemo1 -Entry file: flaskdemo1/flaskdemo1/flaskr.py -Scanned: 2016-10-20 12:22:31.166830 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -whimian/flaskyKrig -https://github.com/whimian/flaskyKrig -Entry file: flaskyKrig/test.py -Scanned: 2016-10-20 12:22:36.878617 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -keer2345/flaskMega -https://github.com/keer2345/flaskMega -Entry file: flaskMega/app/__init__.py -Scanned: 2016-10-20 12:22:38.196758 -No vulnerabilities found. - - -josh14668/flaskApp -https://github.com/josh14668/flaskApp -Entry file: flaskApp/apiApp_new.py -Scanned: 2016-10-20 12:22:38.742734 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -er3456qi/FlaskBlog -https://github.com/er3456qi/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 12:22:39.357466 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vishwanath79/FlaskURLAPI -https://github.com/vishwanath79/FlaskURLAPI -Entry file: FlaskURLAPI/app.py -Scanned: 2016-10-20 12:22:46.806831 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskURLAPI/hadoopify/lib/python2.7/genericpath.py - -krizo/flaskTutorial -https://github.com/krizo/flaskTutorial -Entry file: flaskTutorial/flaskr.py -Scanned: 2016-10-20 12:22:47.418409 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskTutorial/venv/lib/python2.7/genericpath.py - -vishalggrc/flask-blog -https://github.com/vishalggrc/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:22:47.952566 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -nmartinez23/CRUD_flask -https://github.com/nmartinez23/CRUD_flask -Entry file: CRUD_flask/app.py -Scanned: 2016-10-20 12:22:49.297974 -No vulnerabilities found. - - -spot-test/flask_app -https://github.com/spot-test/flask_app -Entry file: None -Scanned: 2016-10-20 12:22:49.806465 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/spot-test/flask_app. - -brokenhd/flask-blog -https://github.com/brokenhd/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:22:50.839920 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -qingchn/flask-copy -https://github.com/qingchn/flask-copy -Entry file: flask-copy/app/__init__.py -Scanned: 2016-10-20 12:22:52.280511 -No vulnerabilities found. - - -pbabik/flask-lipsum -https://github.com/pbabik/flask-lipsum -Entry file: flask-lipsum/app.py -Scanned: 2016-10-20 12:22:53.594506 -Vulnerability 1: -File: flask-lipsum/app.py - > User input at line 51, trigger word "get(": - n_paragraphs = int(request.args.get('paragraphs', 5)) -Reassigned in: - File: flask-lipsum/app.py - > Line 52: content = get_paragraphs(n_paragraphs) -File: flask-lipsum/app.py - > reaches line 53, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'content) - - - -daivq/Flask_Blog -https://github.com/daivq/Flask_Blog -Entry file: Flask_Blog/Blog/blog.py -Scanned: 2016-10-20 12:22:54.443084 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jnarayanam/flask-demo -https://github.com/jnarayanam/flask-demo -Entry file: None -Scanned: 2016-10-20 12:22:54.945946 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jnarayanam/flask-demo. - -kaymation/flask_plural -https://github.com/kaymation/flask_plural -Entry file: None -Scanned: 2016-10-20 12:23:02.311969 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -encima/flask-task -https://github.com/encima/flask-task -Entry file: flask-task/app/__init__.py -Scanned: 2016-10-20 12:23:04.951027 -Vulnerability 1: -File: flask-task/app/views.py - > User input at line 87, trigger word "form[": - task = twl.w.get_task(id=request.form['id']) -Reassigned in: - File: flask-task/app/views.py - > Line 90: project = task[1]['project'] - File: flask-task/app/views.py - > Line 84: project = 'unassigned' -File: flask-task/app/views.py - > reaches line 95, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('error''table''project'Falsemsgproject) - - - -nitin42/Flask-App -https://github.com/nitin42/Flask-App -Entry file: Flask-App/Flask-SQLAlchemy/app.py -Scanned: 2016-10-20 12:23:06.237821 -No vulnerabilities found. - - -DivisionMax/mover-flask -https://github.com/DivisionMax/mover-flask -Entry file: mover-flask/index.py -Scanned: 2016-10-20 12:23:07.777314 -Vulnerability 1: -File: mover-flask/index.py - > User input at line 41, trigger word "form[": - _email = request.form['email'] -File: mover-flask/index.py - > reaches line 48, trigger word "execute(": - cursor.execute('SELECT * FROM mobile_app_users WHERE emailAddress = %s', (_email)) - -Vulnerability 2: -File: mover-flask/index.py - > User input at line 90, trigger word "form[": - _email = request.form['email'] -File: mover-flask/index.py - > reaches line 96, trigger word "execute(": - cursor.execute('SELECT * FROM mobile_app_users WHERE emailAddress = %s', (_email)) - -Vulnerability 3: -File: mover-flask/index.py - > User input at line 90, trigger word "form[": - _email = request.form['email'] -File: mover-flask/index.py - > reaches line 104, trigger word "execute(": - cursor.execute('INSERT INTO mobile_app_users (emailAddress,password,username) values (%s,%s,%s)', (_email, password_hash, username)) - -Vulnerability 4: -File: mover-flask/index.py - > User input at line 92, trigger word "form[": - _password = request.form['password'] -Reassigned in: - File: mover-flask/index.py - > Line 103: password_hash = hash_password(_password) -File: mover-flask/index.py - > reaches line 104, trigger word "execute(": - cursor.execute('INSERT INTO mobile_app_users (emailAddress,password,username) values (%s,%s,%s)', (_email, password_hash, username)) - -Vulnerability 5: -File: mover-flask/index.py - > User input at line 129, trigger word "get(": - _userId = request.args.get('userId') -File: mover-flask/index.py - > reaches line 138, trigger word "execute(": - cursor.execute('SELECT accidentId as id, accidentTime as time,X(location) as x, Y(location) as y FROM simplerunningaccidents WHERE mobileAppUserId = %s', (_userId)) - -Vulnerability 6: -File: mover-flask/index.py - > User input at line 191, trigger word "form[": - _longitude = request.form['longitude'] -File: mover-flask/index.py - > reaches line 205, trigger word "execute(": - cursor.execute('INSERT INTO simpleRunningAccidents (accidentTime,location,mobileAppUserId) values (from_unixtime(%s),point(%s,%s),%s)', (_timeOfAccidentTimestamp, _longitude, _latitude, _userId)) - -Vulnerability 7: -File: mover-flask/index.py - > User input at line 192, trigger word "form[": - _latitude = request.form['latitude'] -File: mover-flask/index.py - > reaches line 205, trigger word "execute(": - cursor.execute('INSERT INTO simpleRunningAccidents (accidentTime,location,mobileAppUserId) values (from_unixtime(%s),point(%s,%s),%s)', (_timeOfAccidentTimestamp, _longitude, _latitude, _userId)) - -Vulnerability 8: -File: mover-flask/index.py - > User input at line 193, trigger word "form[": - _timeOfAccidentTimestamp = request.form['time-of-accident'] -File: mover-flask/index.py - > reaches line 205, trigger word "execute(": - cursor.execute('INSERT INTO simpleRunningAccidents (accidentTime,location,mobileAppUserId) values (from_unixtime(%s),point(%s,%s),%s)', (_timeOfAccidentTimestamp, _longitude, _latitude, _userId)) - -Vulnerability 9: -File: mover-flask/index.py - > User input at line 194, trigger word "form[": - _userId = request.form['userId'] -File: mover-flask/index.py - > reaches line 205, trigger word "execute(": - cursor.execute('INSERT INTO simpleRunningAccidents (accidentTime,location,mobileAppUserId) values (from_unixtime(%s),point(%s,%s),%s)', (_timeOfAccidentTimestamp, _longitude, _latitude, _userId)) - -Vulnerability 10: -File: mover-flask/index.py - > User input at line 191, trigger word "form[": - _longitude = request.form['longitude'] -File: mover-flask/index.py - > reaches line 217, trigger word "execute(": - cursor.execute('INSERT INTO car_accidents (accidentTime,latitude, longitude, acceleration,mobile_app_users_userId) values (from_unixtime(%s),%s,%s,%s,%s)', (_timeOfAccidentTimestamp, _latitude, _longitude, _acceleration, _userId)) - -Vulnerability 11: -File: mover-flask/index.py - > User input at line 192, trigger word "form[": - _latitude = request.form['latitude'] -File: mover-flask/index.py - > reaches line 217, trigger word "execute(": - cursor.execute('INSERT INTO car_accidents (accidentTime,latitude, longitude, acceleration,mobile_app_users_userId) values (from_unixtime(%s),%s,%s,%s,%s)', (_timeOfAccidentTimestamp, _latitude, _longitude, _acceleration, _userId)) - -Vulnerability 12: -File: mover-flask/index.py - > User input at line 193, trigger word "form[": - _timeOfAccidentTimestamp = request.form['time-of-accident'] -File: mover-flask/index.py - > reaches line 217, trigger word "execute(": - cursor.execute('INSERT INTO car_accidents (accidentTime,latitude, longitude, acceleration,mobile_app_users_userId) values (from_unixtime(%s),%s,%s,%s,%s)', (_timeOfAccidentTimestamp, _latitude, _longitude, _acceleration, _userId)) - -Vulnerability 13: -File: mover-flask/index.py - > User input at line 194, trigger word "form[": - _userId = request.form['userId'] -File: mover-flask/index.py - > reaches line 217, trigger word "execute(": - cursor.execute('INSERT INTO car_accidents (accidentTime,latitude, longitude, acceleration,mobile_app_users_userId) values (from_unixtime(%s),%s,%s,%s,%s)', (_timeOfAccidentTimestamp, _latitude, _longitude, _acceleration, _userId)) - -Vulnerability 14: -File: mover-flask/index.py - > User input at line 212, trigger word "form[": - _acceleration = request.form['acceleration'] -File: mover-flask/index.py - > reaches line 217, trigger word "execute(": - cursor.execute('INSERT INTO car_accidents (accidentTime,latitude, longitude, acceleration,mobile_app_users_userId) values (from_unixtime(%s),%s,%s,%s,%s)', (_timeOfAccidentTimestamp, _latitude, _longitude, _acceleration, _userId)) - - - -wyattkroemer/yFlask -https://github.com/wyattkroemer/yFlask -Entry file: yFlask/app/__init__.py -Scanned: 2016-10-20 12:23:09.061390 -No vulnerabilities found. - - -BethMwangi/Flask-social -https://github.com/BethMwangi/Flask-social -Entry file: None -Scanned: 2016-10-20 12:23:18.047864 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mistermocha/flask-lesson -https://github.com/mistermocha/flask-lesson -Entry file: flask-lesson/webapp.py -Scanned: 2016-10-20 12:23:18.594097 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Sustainabilist/Flask-tutorial -https://github.com/Sustainabilist/Flask-tutorial -Entry file: Flask-tutorial/flask_app.py -Scanned: 2016-10-20 12:23:19.102950 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sanchitgupta001/Basic_Flask -https://github.com/sanchitgupta001/Basic_Flask -Entry file: None -Scanned: 2016-10-20 12:23:26.189066 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanchitgupta001/Basic_Flask. - -teeracy/Flask-Workshop -https://github.com/teeracy/Flask-Workshop -Entry file: Flask-Workshop/step3.py -Scanned: 2016-10-20 12:23:28.058413 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Stuj79/flask-test -https://github.com/Stuj79/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 12:23:28.585394 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -AdamWawrow/flask-blog -https://github.com/AdamWawrow/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:23:29.146157 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -xlliu/flask_celery -https://github.com/xlliu/flask_celery -Entry file: flask_celery/mongo2mysql.py -Scanned: 2016-10-20 12:23:31.165396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vero4karu/flask-examples -https://github.com/vero4karu/flask-examples -Entry file: flask-examples/Guestbook/app.py -Scanned: 2016-10-20 12:23:32.203362 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marikgoran/hello-flask -https://github.com/marikgoran/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 12:23:37.807607 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -JetPac33/simple_flask -https://github.com/JetPac33/simple_flask -Entry file: simple_flask/hello.py -Scanned: 2016-10-20 12:23:46.808856 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iamliamc/court_flask -https://github.com/iamliamc/court_flask -Entry file: court_flask/app/__init__.py -Scanned: 2016-10-20 12:23:56.047403 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -mikolajtr/flask_sample -https://github.com/mikolajtr/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-20 12:23:56.568716 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spotts-moz/flask_app -https://github.com/spotts-moz/flask_app -Entry file: None -Scanned: 2016-10-20 12:23:57.066173 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/spotts-moz/flask_app. - -gmtprime/flask-microservices -https://github.com/gmtprime/flask-microservices -Entry file: flask-microservices/app.py -Scanned: 2016-10-20 12:23:58.394473 -No vulnerabilities found. - - -devops-life/flask-todo -https://github.com/devops-life/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-20 12:23:58.933164 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chedom/restaurants-flask -https://github.com/chedom/restaurants-flask -Entry file: restaurants-flask/app.py -Scanned: 2016-10-20 12:24:02.343601 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -newivan/flask_select -https://github.com/newivan/flask_select -Entry file: flask_select/app.py -Scanned: 2016-10-20 12:24:03.669332 -No vulnerabilities found. - - -vtrubets/flask-tutorial -https://github.com/vtrubets/flask-tutorial -Entry file: None -Scanned: 2016-10-20 12:24:04.182857 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nikolzp/Flask_mongo -https://github.com/nikolzp/Flask_mongo -Entry file: None -Scanned: 2016-10-20 12:24:11.018378 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kyokley/flask-scratch -https://github.com/kyokley/flask-scratch -Entry file: flask-scratch/app/__init__.py -Scanned: 2016-10-20 12:24:12.939428 -No vulnerabilities found. - - -wing3s/flask-chatterbot -https://github.com/wing3s/flask-chatterbot -Entry file: flask-chatterbot/flaskchatterbot/flaskchatterbot.py -Scanned: 2016-10-20 12:24:14.321918 -No vulnerabilities found. - - -stryjko/CV_Flask -https://github.com/stryjko/CV_Flask -Entry file: CV_Flask/app.py -Scanned: 2016-10-20 12:24:23.333135 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: CV_Flask/CV_Flask_Virtual/lib/python2.7/genericpath.py - -samuelcg/flask_stormpath -https://github.com/samuelcg/flask_stormpath -Entry file: flask_stormpath/flaskr.py -Scanned: 2016-10-20 12:24:24.713718 -No vulnerabilities found. - - -krishnaxv/flask-battlefield -https://github.com/krishnaxv/flask-battlefield -Entry file: None -Scanned: 2016-10-20 12:24:26.000474 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/krishnaxv/flask-battlefield. - -thechutrain/flask-microblog -https://github.com/thechutrain/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:24:26.537251 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sunyton/flask_ecard -https://github.com/sunyton/flask_ecard -Entry file: flask_ecard/app2.py -Scanned: 2016-10-20 12:24:27.831494 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ccsexyz/blog -https://github.com/ccsexyz/blog -Entry file: blog/flaskr.py -Scanned: 2016-10-20 12:24:28.362002 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -HenryZivers/flablo -https://github.com/HenryZivers/flablo -Entry file: flablo/flablo/__init__.py -Scanned: 2016-10-20 12:24:28.867727 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alannguyen90/FlaskCamServer -https://github.com/alannguyen90/FlaskCamServer -Entry file: FlaskCamServer/angular_flask/__init__.py -Scanned: 2016-10-20 12:24:32.221843 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shivam-maharshi/FlaskPythonTutorial -https://github.com/shivam-maharshi/FlaskPythonTutorial -Entry file: FlaskPythonTutorial/src/__init__.py -Scanned: 2016-10-20 12:24:33.674605 -No vulnerabilities found. - - -chengruilin/FlaskMobileApi -https://github.com/chengruilin/FlaskMobileApi -Entry file: FlaskMobileApi/main.py -Scanned: 2016-10-20 12:24:35.025122 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -deathanchor/flask_mongoengine_tutorial -https://github.com/deathanchor/flask_mongoengine_tutorial -Entry file: flask_mongoengine_tutorial/src/app/__init__.py -Scanned: 2016-10-20 12:24:36.339996 -No vulnerabilities found. - - -dzakok/Pemrograman-Web-Python-Flask -https://github.com/dzakok/Pemrograman-Web-Python-Flask -Entry file: Pemrograman-Web-Python-Flask/app.py -Scanned: 2016-10-20 12:24:44.538523 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -RichardJTorres/flask-angular-wordcount -https://github.com/RichardJTorres/flask-angular-wordcount -Entry file: flask-angular-wordcount/app.py -Scanned: 2016-10-20 12:24:47.754522 -No vulnerabilities found. - - -MikeHannon/flask_quick_start -https://github.com/MikeHannon/flask_quick_start -Entry file: flask_quick_start/server.py -Scanned: 2016-10-20 12:24:49.563205 -No vulnerabilities found. - - -davidjb90/Introduction-to-Flask -https://github.com/davidjb90/Introduction-to-Flask -Entry file: Introduction-to-Flask/hello_world.py -Scanned: 2016-10-20 12:24:50.859557 -No vulnerabilities found. - - -g4b1s/RestfulAPI-with-flask -https://github.com/g4b1s/RestfulAPI-with-flask -Entry file: RestfulAPI-with-flask/app.py -Scanned: 2016-10-20 12:24:52.157684 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xdanielsb/PersonalTrainer-Flask -https://github.com/xdanielsb/PersonalTrainer-Flask -Entry file: None -Scanned: 2016-10-20 12:24:52.671813 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -TunedMystic/docker-flask-base -https://github.com/TunedMystic/docker-flask-base -Entry file: docker-flask-base/app/app.py -Scanned: 2016-10-20 12:24:54.052523 -Vulnerability 1: -File: docker-flask-base/app/app.py - > User input at line 54, trigger word "get(": - search_text = request.args.get('q', '').strip() -File: docker-flask-base/app/app.py - > reaches line 55, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = make_response(jsonify(message=search_text), 200, headers) - - - -cambers/ReallyRealFlask -https://github.com/cambers/ReallyRealFlask -Entry file: ReallyRealFlask/Hello_world/app.py -Scanned: 2016-10-20 12:24:56.698086 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Paopand1/flask-hello-world -https://github.com/Paopand1/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 12:24:57.252187 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -spot-test/flask_test_app -https://github.com/spot-test/flask_test_app -Entry file: flask_test_app/app.py -Scanned: 2016-10-20 12:24:58.576619 -No vulnerabilities found. - - -ghyoun/dojo_survey_flask -https://github.com/ghyoun/dojo_survey_flask -Entry file: dojo_survey_flask/survey.py -Scanned: 2016-10-20 12:25:06.358433 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marvinmarnold/flask-meet-instructors -https://github.com/marvinmarnold/flask-meet-instructors -Entry file: flask-meet-instructors/hello.py -Scanned: 2016-10-20 12:25:07.766340 -No vulnerabilities found. - - -meloalright/flask -https://github.com/meloalright/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:25:09.731229 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -paulgoblin/flask -https://github.com/paulgoblin/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:25:10.311030 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -tayan-serna/flask -https://github.com/tayan-serna/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:25:11.897393 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -gisumwa/Flask -https://github.com/gisumwa/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:25:12.421528 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhouleian/flask -https://github.com/zhouleian/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:25:14.020038 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -timmyreilly/intro-to-flask -https://github.com/timmyreilly/intro-to-flask -Entry file: intro-to-flask/hello.py -Scanned: 2016-10-20 12:25:18.796882 -No vulnerabilities found. - - -Revolution1/Flask-WhooshAlchemyPlus -https://github.com/Revolution1/Flask-WhooshAlchemyPlus -Entry file: Flask-WhooshAlchemyPlus/test/test_all.py -Scanned: 2016-10-20 12:25:25.840491 -No vulnerabilities found. - - -vrofze/flasky -https://github.com/vrofze/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:25:28.797669 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ccsaber/flasker -https://github.com/ccsaber/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-20 12:25:29.320967 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Gre4tWhite/Flasknightmare -https://github.com/Gre4tWhite/Flasknightmare -Entry file: Flasknightmare/app/__init__.py -Scanned: 2016-10-20 12:25:35.899304 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gzeinieh/flaskr -https://github.com/gzeinieh/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:25:36.428242 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rhildreth/flaskbook -https://github.com/rhildreth/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-20 12:25:36.978412 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -TacticalGoat/flasktest -https://github.com/TacticalGoat/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 12:25:37.494323 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -getser/flaskapiblog -https://github.com/getser/flaskapiblog -Entry file: flaskapiblog/__init__.py -Scanned: 2016-10-20 12:25:46.338706 -Vulnerability 1: -File: flaskapiblog/views.py - > User input at line 112, trigger word "get(": - post = Post.query.get(post_id) -File: flaskapiblog/views.py - > reaches line 115, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('post'post._asdict()) - -Vulnerability 2: -File: flaskapiblog/views.py - > User input at line 187, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: flaskapiblog/views.py - > Line 193: visitor = Visitor(email=email) -File: flaskapiblog/views.py - > reaches line 197, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True)) - -Vulnerability 3: -File: flaskapiblog/views.py - > User input at line 187, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: flaskapiblog/views.py - > Line 193: visitor = Visitor(email=email) -File: flaskapiblog/views.py - > reaches line 197, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True)) - - - -Paopand1/flasktaskr -https://github.com/Paopand1/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:25:48.853210 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vnxichow/flaskapp -https://github.com/vnxichow/flaskapp -Entry file: None -Scanned: 2016-10-20 12:25:49.405359 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vnxichow/flaskapp. - -gabrielssilva/flasktasks -https://github.com/gabrielssilva/flasktasks -Entry file: flasktasks/flasktasks/__init__.py -Scanned: 2016-10-20 12:25:53.461541 -Vulnerability 1: -File: flasktasks/flasktasks/views.py - > User input at line 35, trigger word "get(": - mission = Mission.query.get_or_404(request.args.get('mission_id')) -Reassigned in: - File: flasktasks/flasktasks/views.py - > Line 33: mission = None -File: flasktasks/flasktasks/views.py - > reaches line 44, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('task/index.html',tasks=tasks_by_status, mission=mission) - -Vulnerability 2: -File: flasktasks/flasktasks/views.py - > User input at line 96, trigger word "get(": - color = Color(int(request.form.get('color_id'))) -Reassigned in: - File: flasktasks/flasktasks/views.py - > Line 99: tag = Tag(request.form.get('name'), color) - File: flasktasks/flasktasks/views.py - > Line 104: colors = {color.name : color.value for color in Color} - File: flasktasks/flasktasks/views.py - > Line 102: ret_MAYBE_FUNCTION_NAME = redirect(url_for('missions')) -File: flasktasks/flasktasks/views.py - > reaches line 105, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tags/new.html',colors=colors) - - - -cjfoster10/flasktaskr -https://github.com/cjfoster10/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:25:53.985796 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -weisongchen/flaskexercise -https://github.com/weisongchen/flaskexercise -Entry file: flaskexercise/hello.py -Scanned: 2016-10-20 12:25:54.590459 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskexercise/venv/lib/python2.7/genericpath.py - -weisongchen/flaskapp -https://github.com/weisongchen/flaskapp -Entry file: None -Scanned: 2016-10-20 12:25:55.118173 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/weisongchen/flaskapp. - -Apophus/flaskR -https://github.com/Apophus/flaskR -Entry file: flaskR/flaskr/flaskr.py -Scanned: 2016-10-20 12:25:57.433707 -No vulnerabilities found. - - -mplessard/FlaskBoilerplate -https://github.com/mplessard/FlaskBoilerplate -Entry file: None -Scanned: 2016-10-20 12:25:57.987250 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mplessard/FlaskBoilerplate. - -microxuzh/FlaskTutorial -https://github.com/microxuzh/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 12:25:58.494809 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gitskim/FlaskAPI -https://github.com/gitskim/FlaskAPI -Entry file: None -Scanned: 2016-10-20 12:26:00.007375 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/gitskim/FlaskAPI. - -er3456qi/FlaskBlog -https://github.com/er3456qi/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 12:26:07.609396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ivorivetta/FlaskTest -https://github.com/ivorivetta/FlaskTest -Entry file: None -Scanned: 2016-10-20 12:26:09.117380 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ivorivetta/FlaskTest. - -pkml/flaskHello -https://github.com/pkml/flaskHello -Entry file: flaskHello/app.py -Scanned: 2016-10-20 12:26:18.540592 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskHello/myEnv/lib/python2.7/genericpath.py - -xiechengsheng/FlaskApp -https://github.com/xiechengsheng/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 12:26:19.163760 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paulhendricks/flasky2 -https://github.com/paulhendricks/flasky2 -Entry file: flasky2/app/__init__.py -Scanned: 2016-10-20 12:26:20.651738 -No vulnerabilities found. - - -nitin42/Flask-App -https://github.com/nitin42/Flask-App -Entry file: Flask-App/Flask-SQLAlchemy/app.py -Scanned: 2016-10-20 12:26:22.060817 -No vulnerabilities found. - - -milanoid/flask-playground -https://github.com/milanoid/flask-playground -Entry file: flask-playground/app/__init__.py -Scanned: 2016-10-20 12:26:22.563764 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kossman/flask_project -https://github.com/kossman/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-20 12:26:23.353973 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -woosungchu/flask-mongo -https://github.com/woosungchu/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-20 12:26:24.934234 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -holynova/flask_book -https://github.com/holynova/flask_book -Entry file: None -Scanned: 2016-10-20 12:26:33.613381 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -debuggermalhotra/Flask-projects -https://github.com/debuggermalhotra/Flask-projects -Entry file: Flask-projects/mr-echobot/mr-echobot.py -Scanned: 2016-10-20 12:26:34.903382 -No vulnerabilities found. - - -andrefaranha/flask-blog -https://github.com/andrefaranha/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:26:35.456709 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -CurataEng/flask-api -https://github.com/CurataEng/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-20 12:26:35.977148 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ankurdh/Hello-Flask -https://github.com/ankurdh/Hello-Flask -Entry file: Hello-Flask/wamt/wamt.py -Scanned: 2016-10-20 12:26:37.305113 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Isor/flask-view -https://github.com/Isor/flask-view -Entry file: flask-view/view.py -Scanned: 2016-10-20 12:26:38.654181 -No vulnerabilities found. - - -250lth/myFlask -https://github.com/250lth/myFlask -Entry file: myFlask/project.py -Scanned: 2016-10-20 12:26:39.212412 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bernardoVale/flask-cloneme -https://github.com/bernardoVale/flask-cloneme -Entry file: flask-cloneme/app/__init__.py -Scanned: 2016-10-20 12:26:40.518903 -No vulnerabilities found. - - -yxzoro/Flask-SQLAlchemy -https://github.com/yxzoro/Flask-SQLAlchemy -Entry file: Flask-SQLAlchemy/app.py -Scanned: 2016-10-20 12:26:41.041647 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kamillacrozara/flask-base -https://github.com/kamillacrozara/flask-base -Entry file: None -Scanned: 2016-10-20 12:26:45.562754 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kamillacrozara/flask-base. - -songxiaowei112/flask-demo -https://github.com/songxiaowei112/flask-demo -Entry file: None -Scanned: 2016-10-20 12:26:49.117090 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/songxiaowei112/flask-demo. - -HyperJ/Flask-Demo -https://github.com/HyperJ/Flask-Demo -Entry file: None -Scanned: 2016-10-20 12:26:49.639484 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/HyperJ/Flask-Demo. - -Sustainabilist/Flask-tutorial -https://github.com/Sustainabilist/Flask-tutorial -Entry file: Flask-tutorial/flask_app.py -Scanned: 2016-10-20 12:26:51.145295 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joshphiggins/flask-blog -https://github.com/joshphiggins/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:26:54.687107 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -lnanhkhoa/WebFlask -https://github.com/lnanhkhoa/WebFlask -Entry file: WebFlask/server.py -Scanned: 2016-10-20 12:26:56.130771 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sun3shines/ufs_flask -https://github.com/sun3shines/ufs_flask -Entry file: ufs_flask/flask_sqlalchemy.py -Scanned: 2016-10-20 12:26:59.940135 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ItEngine/flask-boilerplate -https://github.com/ItEngine/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 12:27:00.448104 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ItEngine/flask-boilerplate. - -kennly/flask-backend -https://github.com/kennly/flask-backend -Entry file: flask-backend/blog.py -Scanned: 2016-10-20 12:27:01.859043 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cebartling/flask-spikes -https://github.com/cebartling/flask-spikes -Entry file: flask-spikes/hello-world/app.py -Scanned: 2016-10-20 12:27:03.155771 -No vulnerabilities found. - - -igneel64/flask-web -https://github.com/igneel64/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 12:27:03.729045 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lecamerone/flask_app -https://github.com/lecamerone/flask_app -Entry file: None -Scanned: 2016-10-20 12:27:08.245687 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lecamerone/flask_app. - -caelia/flask-gallery -https://github.com/caelia/flask-gallery -Entry file: flask-gallery/flask_gallery/gallery.py -Scanned: 2016-10-20 12:27:10.562736 -No vulnerabilities found. - - -dodoru/flask_bbs -https://github.com/dodoru/flask_bbs -Entry file: flask_bbs/src/app.py -Scanned: 2016-10-20 12:27:12.459300 -Vulnerability 1: -File: flask_bbs/src/views/channel.py - > User input at line 28, trigger word "get(": - channel = Channel.query.get(channel_id) -File: flask_bbs/src/views/channel.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('channel.html',channel=channel, topics=topics) - -Vulnerability 2: -File: flask_bbs/src/views/channel.py - > User input at line 41, trigger word "get(": - topic = Topic.query.get(topic_id) -File: flask_bbs/src/views/channel.py - > reaches line 43, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('topic.html',topic=topic, replies=replies) - -Vulnerability 3: -File: flask_bbs/src/views/channel.py - > User input at line 50, trigger word "get(": - channel_id = topic_dict.get('channel_id') -File: flask_bbs/src/views/channel.py - > reaches line 52, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.channel',channel_id=channel_id)) - -Vulnerability 4: -File: flask_bbs/src/views/channel.py - > User input at line 50, trigger word "get(": - channel_id = topic_dict.get('channel_id') -File: flask_bbs/src/views/channel.py - > reaches line 52, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.channel',channel_id=channel_id)) - -Vulnerability 5: -File: flask_bbs/src/views/channel.py - > User input at line 58, trigger word "get(": - topic_id = reply_dict.get('topic_id') -File: flask_bbs/src/views/channel.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.topic',topic_id=topic_id)) - -Vulnerability 6: -File: flask_bbs/src/views/channel.py - > User input at line 58, trigger word "get(": - topic_id = reply_dict.get('topic_id') -File: flask_bbs/src/views/channel.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.topic',topic_id=topic_id)) - - - -Omega0/dnd-flask -https://github.com/Omega0/dnd-flask -Entry file: dnd-flask/run.py -Scanned: 2016-10-20 12:27:28.333126 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -Thorntan/flask_study -https://github.com/Thorntan/flask_study -Entry file: flask_study/views.py -Scanned: 2016-10-20 12:27:28.858428 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -baor/flask_test -https://github.com/baor/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 12:27:29.447448 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BethMwangi/flask-app -https://github.com/BethMwangi/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 12:27:29.976839 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vero4karu/flask-examples -https://github.com/vero4karu/flask-examples -Entry file: flask-examples/Guestbook/app.py -Scanned: 2016-10-20 12:27:30.529179 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -marikgoran/hello-flask -https://github.com/marikgoran/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 12:27:31.133322 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -mkulinski/flask-blog -https://github.com/mkulinski/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:27:31.680539 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -shubhalasingh/flask-uploader -https://github.com/shubhalasingh/flask-uploader -Entry file: flask-uploader/flaskr.py -Scanned: 2016-10-20 12:27:32.967272 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ohadcn/learnFlask -https://github.com/ohadcn/learnFlask -Entry file: None -Scanned: 2016-10-20 12:27:35.964239 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ohadcn/learnFlask. - -laozhizi/flask-test -https://github.com/laozhizi/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 12:27:36.494894 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -dogezhou/my_flask -https://github.com/dogezhou/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-20 12:27:37.147375 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -thechutrain/flask-microblog -https://github.com/thechutrain/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:27:38.649896 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sunyton/flask_ecard -https://github.com/sunyton/flask_ecard -Entry file: flask_ecard/app2.py -Scanned: 2016-10-20 12:27:40.149696 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mohapsat/flask-microblog -https://github.com/mohapsat/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:27:40.676838 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -BethMwangi/flask-blog -https://github.com/BethMwangi/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:27:41.241042 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -RachelQ1103/flask-pattern -https://github.com/RachelQ1103/flask-pattern -Entry file: flask-pattern/problem.py -Scanned: 2016-10-20 12:27:46.679808 -No vulnerabilities found. - - -pkml/flask-blog -https://github.com/pkml/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:27:49.254433 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -polomlin/flask_demo -https://github.com/polomlin/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 12:27:49.811761 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -LennyLeng/flask-base -https://github.com/LennyLeng/flask-base -Entry file: None -Scanned: 2016-10-20 12:27:51.330316 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/LennyLeng/flask-base. - -Junctionzc/flask-blog -https://github.com/Junctionzc/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:27:54.875522 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -RachelQ1103/flask-problem -https://github.com/RachelQ1103/flask-problem -Entry file: flask-problem/problem.py -Scanned: 2016-10-20 12:27:56.207891 -No vulnerabilities found. - - -bryancalupitan/flask_social -https://github.com/bryancalupitan/flask_social -Entry file: flask_social/app.py -Scanned: 2016-10-20 12:27:56.736732 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Han-Jiang/learn-flask -https://github.com/Han-Jiang/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 12:28:01.426588 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iam24/flask-blog -https://github.com/iam24/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:28:01.977037 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -zhupr/myFlask -https://github.com/zhupr/myFlask -Entry file: myFlask/project.py -Scanned: 2016-10-20 12:28:02.481324 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hanmaslah/flask-tuts -https://github.com/hanmaslah/flask-tuts -Entry file: flask-tuts/creating-first-flask-app/flasktest/blog.py -Scanned: 2016-10-20 12:28:11.839571 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -nodroglegin/flask_udemy -https://github.com/nodroglegin/flask_udemy -Entry file: flask_udemy/hello.py -Scanned: 2016-10-20 12:28:13.138787 -No vulnerabilities found. - - -nicolaigj/flask-site -https://github.com/nicolaigj/flask-site -Entry file: None -Scanned: 2016-10-20 12:28:13.639464 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -loongfeng/firstapp -https://github.com/loongfeng/firstapp -Entry file: None -Scanned: 2016-10-20 12:28:14.909384 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/loongfeng/firstapp. - -silvia2013/firstapp -https://github.com/silvia2013/firstapp -Entry file: None -Scanned: 2016-10-20 12:28:20.445905 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/silvia2013/firstapp. - -lbatalha/imagething -https://github.com/lbatalha/imagething -Entry file: imagething/main.py -Scanned: 2016-10-20 12:28:35.051679 -Vulnerability 1: -File: imagething/main.py - > User input at line 28, trigger word "files[": - file = request.files['fileupload'] -Reassigned in: - File: imagething/main.py - > Line 29: file = request.files['fileupload'] - File: imagething/main.py - > Line 34: filename = secure_filename(file.filename) - File: imagething/main.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('newfile.html') - File: imagething/main.py - > Line 41: ret_MAYBE_FUNCTION_NAME = 'invalid method' - File: imagething/main.py - > Line 26: ret_MAYBE_FUNCTION_NAME = 'ya goofed -' - File: imagething/main.py - > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: imagething/main.py - > reaches line 36, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: imagething/main.py - > User input at line 29, trigger word "files[": - file = request.files['fileupload'] -Reassigned in: - File: imagething/main.py - > Line 28: file = request.files['fileupload'] - File: imagething/main.py - > Line 34: filename = secure_filename(file.filename) - File: imagething/main.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('newfile.html') - File: imagething/main.py - > Line 41: ret_MAYBE_FUNCTION_NAME = 'invalid method' - File: imagething/main.py - > Line 26: ret_MAYBE_FUNCTION_NAME = 'ya goofed -' - File: imagething/main.py - > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: imagething/main.py - > reaches line 36, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 3: -File: imagething/main.py - > User input at line 28, trigger word "files[": - file = request.files['fileupload'] -Reassigned in: - File: imagething/main.py - > Line 29: file = request.files['fileupload'] - File: imagething/main.py - > Line 34: filename = secure_filename(file.filename) - File: imagething/main.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('newfile.html') - File: imagething/main.py - > Line 41: ret_MAYBE_FUNCTION_NAME = 'invalid method' - File: imagething/main.py - > Line 26: ret_MAYBE_FUNCTION_NAME = 'ya goofed -' - File: imagething/main.py - > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: imagething/main.py - > reaches line 36, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 4: -File: imagething/main.py - > User input at line 29, trigger word "files[": - file = request.files['fileupload'] -Reassigned in: - File: imagething/main.py - > Line 28: file = request.files['fileupload'] - File: imagething/main.py - > Line 34: filename = secure_filename(file.filename) - File: imagething/main.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('newfile.html') - File: imagething/main.py - > Line 41: ret_MAYBE_FUNCTION_NAME = 'invalid method' - File: imagething/main.py - > Line 26: ret_MAYBE_FUNCTION_NAME = 'ya goofed -' - File: imagething/main.py - > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: imagething/main.py - > reaches line 36, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -n0x5/shitty_flask_website -https://github.com/n0x5/shitty_flask_website -Entry file: shitty_flask_website/app.py -Scanned: 2016-10-20 12:28:36.510345 -No vulnerabilities found. - - -kimjonathan1123/friendsgroup -https://github.com/kimjonathan1123/friendsgroup -Entry file: friendsgroup/server.py -Scanned: 2016-10-20 12:28:37.952594 -No vulnerabilities found. - - -joshphiggins/FlaskTaskr_py3 -https://github.com/joshphiggins/FlaskTaskr_py3 -Entry file: FlaskTaskr_py3/views.py -Scanned: 2016-10-20 12:28:39.401133 -No vulnerabilities found. - - -claudemuller/firstapp -https://github.com/claudemuller/firstapp -Entry file: None -Scanned: 2016-10-20 12:28:39.927236 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/claudemuller/firstapp. - -ArtemKran/site_on_flask -https://github.com/ArtemKran/site_on_flask -Entry file: site_on_flask/app/__init__.py -Scanned: 2016-10-20 12:28:41.663628 -Vulnerability 1: -File: site_on_flask/app/main/views.py - > User input at line 51, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/main/views.py - > Line 67: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False) - File: site_on_flask/app/main/views.py - > Line 70: posts = pagination.items - File: site_on_flask/app/main/views.py - > Line 50: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: site_on_flask/app/main/views.py - > reaches line 71, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: site_on_flask/app/main/views.py - > User input at line 59, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: site_on_flask/app/main/views.py - > Line 57: show_followed = False - File: site_on_flask/app/main/views.py - > Line 50: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: site_on_flask/app/main/views.py - > reaches line 71, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: site_on_flask/app/main/views.py - > User input at line 79, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/main/views.py - > Line 83: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False) - File: site_on_flask/app/main/views.py - > Line 86: posts = pagination.items -File: site_on_flask/app/main/views.py - > reaches line 87, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: site_on_flask/app/main/views.py - > User input at line 151, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/main/views.py - > Line 155: page = post.comments.count() - 1 // 21 - File: site_on_flask/app/main/views.py - > Line 159: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=20, error_out=False) - File: site_on_flask/app/main/views.py - > Line 162: comments = pagination.items - File: site_on_flask/app/main/views.py - > Line 150: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: site_on_flask/app/main/views.py - > reaches line 163, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: site_on_flask/app/main/views.py - > User input at line 232, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/main/views.py - > Line 236: pagination = user.followers.paginate(page,per_page=20, error_out=False) - File: site_on_flask/app/main/views.py - > Line 239: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: site_on_flask/app/main/views.py - > Line 231: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: site_on_flask/app/main/views.py - > reaches line 242, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: site_on_flask/app/main/views.py - > User input at line 258, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/main/views.py - > Line 262: pagination = user.followed.paginate(page,per_page=20, error_out=False) - File: site_on_flask/app/main/views.py - > Line 265: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: site_on_flask/app/main/views.py - > Line 257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: site_on_flask/app/main/views.py - > reaches line 268, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: site_on_flask/app/main/views.py - > User input at line 297, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/main/views.py - > Line 298: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/main/views.py - > Line 301: comments = pagination.items -File: site_on_flask/app/main/views.py - > reaches line 302, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: site_on_flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: site_on_flask/app/api_1_0/users.py - > Line 20: prev = None - File: site_on_flask/app/api_1_0/users.py - > Line 23: next = None -File: site_on_flask/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: site_on_flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: site_on_flask/app/api_1_0/users.py - > Line 20: prev = None - File: site_on_flask/app/api_1_0/users.py - > Line 23: next = None -File: site_on_flask/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: site_on_flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: site_on_flask/app/api_1_0/users.py - > Line 20: prev = None - File: site_on_flask/app/api_1_0/users.py - > Line 23: next = None -File: site_on_flask/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: site_on_flask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: site_on_flask/app/api_1_0/users.py - > Line 42: prev = None - File: site_on_flask/app/api_1_0/users.py - > Line 45: next = None -File: site_on_flask/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: site_on_flask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: site_on_flask/app/api_1_0/users.py - > Line 42: prev = None - File: site_on_flask/app/api_1_0/users.py - > Line 45: next = None -File: site_on_flask/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: site_on_flask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: site_on_flask/app/api_1_0/users.py - > Line 42: prev = None - File: site_on_flask/app/api_1_0/users.py - > Line 45: next = None -File: site_on_flask/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: site_on_flask/app/api_1_0/posts.py - > User input at line 17, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/posts.py - > Line 18: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/posts.py - > Line 21: posts = pagination.items - File: site_on_flask/app/api_1_0/posts.py - > Line 22: prev = None - File: site_on_flask/app/api_1_0/posts.py - > Line 25: next = None -File: site_on_flask/app/api_1_0/posts.py - > reaches line 24, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: site_on_flask/app/api_1_0/posts.py - > User input at line 17, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/posts.py - > Line 18: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/posts.py - > Line 21: posts = pagination.items - File: site_on_flask/app/api_1_0/posts.py - > Line 22: prev = None - File: site_on_flask/app/api_1_0/posts.py - > Line 25: next = None -File: site_on_flask/app/api_1_0/posts.py - > reaches line 27, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: site_on_flask/app/api_1_0/posts.py - > User input at line 17, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/posts.py - > Line 18: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/posts.py - > Line 21: posts = pagination.items - File: site_on_flask/app/api_1_0/posts.py - > Line 22: prev = None - File: site_on_flask/app/api_1_0/posts.py - > Line 25: next = None -File: site_on_flask/app/api_1_0/posts.py - > reaches line 28, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: site_on_flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: site_on_flask/app/api_1_0/comments.py - > Line 15: prev = None - File: site_on_flask/app/api_1_0/comments.py - > Line 18: next = None -File: site_on_flask/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: site_on_flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: site_on_flask/app/api_1_0/comments.py - > Line 15: prev = None - File: site_on_flask/app/api_1_0/comments.py - > Line 18: next = None -File: site_on_flask/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: site_on_flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: site_on_flask/app/api_1_0/comments.py - > Line 15: prev = None - File: site_on_flask/app/api_1_0/comments.py - > Line 18: next = None -File: site_on_flask/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: site_on_flask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: site_on_flask/app/api_1_0/comments.py - > Line 43: prev = None - File: site_on_flask/app/api_1_0/comments.py - > Line 46: next = None -File: site_on_flask/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: site_on_flask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: site_on_flask/app/api_1_0/comments.py - > Line 43: prev = None - File: site_on_flask/app/api_1_0/comments.py - > Line 46: next = None -File: site_on_flask/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: site_on_flask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: site_on_flask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: site_on_flask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: site_on_flask/app/api_1_0/comments.py - > Line 43: prev = None - File: site_on_flask/app/api_1_0/comments.py - > Line 46: next = None -File: site_on_flask/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -passhole/flask-hello-world -https://github.com/passhole/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 12:28:42.228284 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -gabeibarra/docker-flask-bigger -https://github.com/gabeibarra/docker-flask-bigger -Entry file: docker-flask-bigger/app/__init__.py -Scanned: 2016-10-20 12:28:43.655933 -No vulnerabilities found. - - -dmitry-moroz/flask -https://github.com/dmitry-moroz/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:28:45.676860 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Aslkayn/flask -https://github.com/Aslkayn/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:28:46.248145 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -gisumwa/Flask -https://github.com/gisumwa/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:28:46.749838 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -timmyreilly/intro-to-flask -https://github.com/timmyreilly/intro-to-flask -Entry file: intro-to-flask/hello.py -Scanned: 2016-10-20 12:28:50.534679 -No vulnerabilities found. - - -postrational/rest_api_demo -https://github.com/postrational/rest_api_demo -Entry file: rest_api_demo/rest_api_demo/app.py -Scanned: 2016-10-20 12:28:51.991700 -Vulnerability 1: -File: rest_api_demo/rest_api_demo/api/blog/business.py - > User input at line 8, trigger word "get(": - category_id = data.get('category_id') -File: rest_api_demo/rest_api_demo/api/blog/business.py - > reaches line 9, trigger word "filter(": - category = Category.query.filter(Category.id == category_id).one() - -Vulnerability 2: -File: rest_api_demo/rest_api_demo/api/blog/business.py - > User input at line 19, trigger word "get(": - category_id = data.get('category_id') -File: rest_api_demo/rest_api_demo/api/blog/business.py - > reaches line 20, trigger word "filter(": - post.category = Category.query.filter(Category.id == category_id).one() - - - -DanceCats/DanceCat -https://github.com/DanceCats/DanceCat -Entry file: DanceCat/DanceCat/__init__.py -Scanned: 2016-10-20 12:28:59.901838 -Vulnerability 1: -File: DanceCat/DanceCat/Socket.py - > User input at line 45, trigger word "get(": - connection_id = received_data.get('connectionId', 0) -Reassigned in: - File: DanceCat/DanceCat/Socket.py - > Line 55: running_connection = Connection.query.get(connection_id) - File: DanceCat/DanceCat/Socket.py - > Line 58: connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60)) - File: DanceCat/DanceCat/Socket.py - > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime) - File: DanceCat/DanceCat/Socket.py - > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)]) - File: DanceCat/DanceCat/Socket.py - > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!') - File: DanceCat/DanceCat/Socket.py - > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!') - File: DanceCat/DanceCat/Socket.py - > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!') -File: DanceCat/DanceCat/Socket.py - > reaches line 68, trigger word "execute(": - connector.execute(query) - -Vulnerability 2: -File: DanceCat/DanceCat/Socket.py - > User input at line 46, trigger word "get(": - query = received_data.get('query', '') -File: DanceCat/DanceCat/Socket.py - > reaches line 68, trigger word "execute(": - connector.execute(query) - -Vulnerability 3: -File: DanceCat/DanceCat/Socket.py - > User input at line 55, trigger word "get(": - running_connection = Connection.query.get(connection_id) -Reassigned in: - File: DanceCat/DanceCat/Socket.py - > Line 58: connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60)) - File: DanceCat/DanceCat/Socket.py - > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime) - File: DanceCat/DanceCat/Socket.py - > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)]) - File: DanceCat/DanceCat/Socket.py - > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!') - File: DanceCat/DanceCat/Socket.py - > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!') - File: DanceCat/DanceCat/Socket.py - > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!') -File: DanceCat/DanceCat/Socket.py - > reaches line 68, trigger word "execute(": - connector.execute(query) - -Vulnerability 4: -File: DanceCat/DanceCat/Socket.py - > User input at line 58, trigger word "get(": - connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60)) -Reassigned in: - File: DanceCat/DanceCat/Socket.py - > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime) - File: DanceCat/DanceCat/Socket.py - > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)]) - File: DanceCat/DanceCat/Socket.py - > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!') - File: DanceCat/DanceCat/Socket.py - > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!') - File: DanceCat/DanceCat/Socket.py - > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!') -File: DanceCat/DanceCat/Socket.py - > reaches line 68, trigger word "execute(": - connector.execute(query) - -Vulnerability 5: -File: DanceCat/DanceCat/JobWorker.py - > User input at line 91, trigger word "get(": - job = QueryDataJob.query.get(job_id) -Reassigned in: - File: DanceCat/DanceCat/JobWorker.py - > Line 99: db_connector = DatabaseConnector(job.Connection.type, job.Connection.db_config_generator(),sql_data_style=False, dict_format=False, timeout=Constants.JOB_FEATURE_QUERY_TIME_OUT in jobjob[Constants.JOB_FEATURE_QUERY_TIME_OUT]config.get('DB_TIMEOUT', 0)) - File: DanceCat/DanceCat/JobWorker.py - > Line 111: results = 'header''rows'db_connector.columns_namedb_connector.fetch_all() - File: DanceCat/DanceCat/JobWorker.py - > Line 135: ret_MAYBE_FUNCTION_NAME = results - File: DanceCat/DanceCat/JobWorker.py - > Line 153: ret_MAYBE_FUNCTION_NAME = None -File: DanceCat/DanceCat/JobWorker.py - > reaches line 110, trigger word "execute(": - db_connector.execute(job.query_string) - -Vulnerability 6: -File: DanceCat/DanceCat/JobWorker.py - > User input at line 99, trigger word "get(": - db_connector = DatabaseConnector(job.Connection.type, job.Connection.db_config_generator(),sql_data_style=False, dict_format=False, timeout=Constants.JOB_FEATURE_QUERY_TIME_OUT in jobjob[Constants.JOB_FEATURE_QUERY_TIME_OUT]config.get('DB_TIMEOUT', 0)) -Reassigned in: - File: DanceCat/DanceCat/JobWorker.py - > Line 111: results = 'header''rows'db_connector.columns_namedb_connector.fetch_all() - File: DanceCat/DanceCat/JobWorker.py - > Line 135: ret_MAYBE_FUNCTION_NAME = results - File: DanceCat/DanceCat/JobWorker.py - > Line 153: ret_MAYBE_FUNCTION_NAME = None -File: DanceCat/DanceCat/JobWorker.py - > reaches line 110, trigger word "execute(": - db_connector.execute(job.query_string) - -Vulnerability 7: -File: DanceCat/DanceCat/Views.py - > User input at line 252, trigger word "form[": - triggered_job = QueryDataJob.query.get_or_404(request.form['id']) -Reassigned in: - File: DanceCat/DanceCat/Views.py - > Line 256: tracker = TrackJobRun(triggered_job.job_id) -File: DanceCat/DanceCat/Views.py - > reaches line 269, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('ack''tracker_id'Truetracker.track_job_run_id) - - - -menghao2015/flask_blog -https://github.com/menghao2015/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:29:00.402311 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AmarKalabic/Football-Stream-Finder--Flask- -https://github.com/AmarKalabic/Football-Stream-Finder--Flask- -Entry file: Football-Stream-Finder--Flask-/main.py -Scanned: 2016-10-20 12:29:01.837762 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -terryllowery/flasktaskr -https://github.com/terryllowery/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:29:02.357362 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -moerekh/flaskyflaskssy -https://github.com/moerekh/flaskyflaskssy -Entry file: flaskyflaskssy/flasky.py -Scanned: 2016-10-20 12:29:08.865864 -No vulnerabilities found. - - -vinay13/Flaskngular -https://github.com/vinay13/Flaskngular -Entry file: Flaskngular/flask_app.py -Scanned: 2016-10-20 12:29:10.314597 -No vulnerabilities found. - - -dribnet/flaskapp -https://github.com/dribnet/flaskapp -Entry file: None -Scanned: 2016-10-20 12:29:10.833180 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dribnet/flaskapp. - -rhildreth/flaskbook -https://github.com/rhildreth/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-20 12:29:11.382484 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -TacticalGoat/flasktest -https://github.com/TacticalGoat/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 12:29:11.900677 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -enricobacis/flaskey -https://github.com/enricobacis/flaskey -Entry file: flaskey/app/__init__.py -Scanned: 2016-10-20 12:29:12.406279 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nehamarne/flaskdemo -https://github.com/nehamarne/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 12:29:12.913375 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -playgrdstar/flaskapp -https://github.com/playgrdstar/flaskapp -Entry file: None -Scanned: 2016-10-20 12:29:14.435978 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/playgrdstar/flaskapp. - -pkml/flasktaskr -https://github.com/pkml/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:29:14.963994 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -davidwangv5/flasky -https://github.com/davidwangv5/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:29:20.490596 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -QMickael/flaskBlog -https://github.com/QMickael/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-20 12:29:29.161763 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py - -CircaVictor/flaskTemplate -https://github.com/CircaVictor/flaskTemplate -Entry file: flaskTemplate/flask-app/app/__init__.py -Scanned: 2016-10-20 12:29:36.624792 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jutreras/flaskTest -https://github.com/jutreras/flaskTest -Entry file: flaskTest/url.py -Scanned: 2016-10-20 12:29:37.187396 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -minwoo-jewon/FlaskStudy -https://github.com/minwoo-jewon/FlaskStudy -Entry file: FlaskStudy/flaskr.py -Scanned: 2016-10-20 12:29:40.197627 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TheCulliganMan/reforestation-flask -https://github.com/TheCulliganMan/reforestation-flask -Entry file: reforestation-flask/lib/flask/sessions.py -Scanned: 2016-10-20 12:29:45.875747 -No vulnerabilities found. - - -vish-s/flask-sampleapp -https://github.com/vish-s/flask-sampleapp -Entry file: flask-sampleapp/main.py -Scanned: 2016-10-20 12:29:48.459612 -No vulnerabilities found. - - -opsolutely/flask-starter -https://github.com/opsolutely/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-20 12:29:49.467524 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mschenk42/flask-resteasy -https://github.com/mschenk42/flask-resteasy -Entry file: flask-resteasy/flask_resteasy.py -Scanned: 2016-10-20 12:29:50.029707 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -frederickOtus/copypaste_flask -https://github.com/frederickOtus/copypaste_flask -Entry file: copypaste_flask/server.py -Scanned: 2016-10-20 12:29:52.061668 -No vulnerabilities found. - - -ankurdh/Hello-Flask -https://github.com/ankurdh/Hello-Flask -Entry file: Hello-Flask/wamt/wamt.py -Scanned: 2016-10-20 12:29:52.564274 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amitkumarj441/Todo-Flask -https://github.com/amitkumarj441/Todo-Flask -Entry file: None -Scanned: 2016-10-20 12:29:57.916396 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/amitkumarj441/Todo-Flask. - -juanferreira/social-flask -https://github.com/juanferreira/social-flask -Entry file: social-flask/app.py -Scanned: 2016-10-20 12:29:59.365686 -Vulnerability 1: -File: social-flask/app.py - > User input at line 113, trigger word "get(": - user = models.User.select().where(models.User.username ** username).get() -Reassigned in: - File: social-flask/app.py - > Line 120: user = current_user -File: social-flask/app.py - > reaches line 125, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user) - -Vulnerability 2: -File: social-flask/app.py - > User input at line 142, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-flask/app.py - > reaches line 154, trigger word "flash(": - flash('You're now following {}!'.format(to_user.username), 'success') - -Vulnerability 3: -File: social-flask/app.py - > User input at line 142, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-flask/app.py - > reaches line 156, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 4: -File: social-flask/app.py - > User input at line 142, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-flask/app.py - > reaches line 156, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 5: -File: social-flask/app.py - > User input at line 163, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-flask/app.py - > reaches line 175, trigger word "flash(": - flash('You've unfollowed {}!'.format(to_user.username), 'success') - -Vulnerability 6: -File: social-flask/app.py - > User input at line 163, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-flask/app.py - > reaches line 177, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 7: -File: social-flask/app.py - > User input at line 163, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-flask/app.py - > reaches line 177, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - - - -kallolymess/discoverFlask -https://github.com/kallolymess/discoverFlask -Entry file: discoverFlask/project/__init__.py -Scanned: 2016-10-20 12:30:00.981942 -No vulnerabilities found. - - -yoophi/flask-dummyimage -https://github.com/yoophi/flask-dummyimage -Entry file: flask-dummyimage/flask_dummyimage/__init__.py -Scanned: 2016-10-20 12:30:02.957763 -No vulnerabilities found. - - -cebartling/flask-spikes -https://github.com/cebartling/flask-spikes -Entry file: flask-spikes/hello-world/app.py -Scanned: 2016-10-20 12:30:04.272785 -No vulnerabilities found. - - -JamesSkane/flask_ml -https://github.com/JamesSkane/flask_ml -Entry file: flask_ml/api/__init__.py -Scanned: 2016-10-20 12:30:07.122098 -No vulnerabilities found. - - -krpeacock/flask_intro -https://github.com/krpeacock/flask_intro -Entry file: flask_intro/first_app.py -Scanned: 2016-10-20 12:30:07.659378 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py - -sergiolucero/flask_psumplot -https://github.com/sergiolucero/flask_psumplot -Entry file: flask_psumplot/flask_app.py -Scanned: 2016-10-20 12:30:10.963125 -No vulnerabilities found. - - -rasmi/flask-toasty -https://github.com/rasmi/flask-toasty -Entry file: flask-toasty/app.py -Scanned: 2016-10-20 12:30:12.264575 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leonlcw92/flask_test -https://github.com/leonlcw92/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 12:30:12.847003 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dodoru/flask_bbs -https://github.com/dodoru/flask_bbs -Entry file: flask_bbs/src/app.py -Scanned: 2016-10-20 12:30:14.734240 -Vulnerability 1: -File: flask_bbs/src/views/channel.py - > User input at line 28, trigger word "get(": - channel = Channel.query.get(channel_id) -File: flask_bbs/src/views/channel.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('channel.html',channel=channel, topics=topics) - -Vulnerability 2: -File: flask_bbs/src/views/channel.py - > User input at line 41, trigger word "get(": - topic = Topic.query.get(topic_id) -File: flask_bbs/src/views/channel.py - > reaches line 43, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('topic.html',topic=topic, replies=replies) - -Vulnerability 3: -File: flask_bbs/src/views/channel.py - > User input at line 50, trigger word "get(": - channel_id = topic_dict.get('channel_id') -File: flask_bbs/src/views/channel.py - > reaches line 52, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.channel',channel_id=channel_id)) - -Vulnerability 4: -File: flask_bbs/src/views/channel.py - > User input at line 50, trigger word "get(": - channel_id = topic_dict.get('channel_id') -File: flask_bbs/src/views/channel.py - > reaches line 52, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.channel',channel_id=channel_id)) - -Vulnerability 5: -File: flask_bbs/src/views/channel.py - > User input at line 58, trigger word "get(": - topic_id = reply_dict.get('topic_id') -File: flask_bbs/src/views/channel.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.topic',topic_id=topic_id)) - -Vulnerability 6: -File: flask_bbs/src/views/channel.py - > User input at line 58, trigger word "get(": - topic_id = reply_dict.get('topic_id') -File: flask_bbs/src/views/channel.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.topic',topic_id=topic_id)) - - - -ibrahimGhailani/TodoFlask -https://github.com/ibrahimGhailani/TodoFlask -Entry file: TodoFlask/app/__init__.py -Scanned: 2016-10-20 12:30:16.013206 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fanne/flask_ansible -https://github.com/fanne/flask_ansible -Entry file: flask_ansible/flask_ansible.py -Scanned: 2016-10-20 12:30:17.294616 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SohyunKate/Flask-Practice -https://github.com/SohyunKate/Flask-Practice -Entry file: Flask-Practice/hello.py -Scanned: 2016-10-20 12:30:18.598531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bruno78/flask-microblog -https://github.com/bruno78/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:30:19.109169 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pliyosenpai/flask-api -https://github.com/pliyosenpai/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-20 12:30:20.623654 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BethMwangi/flask-app -https://github.com/BethMwangi/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 12:30:29.174815 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MalhotraVijay/flask-boilerplate -https://github.com/MalhotraVijay/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 12:30:35.686988 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MalhotraVijay/flask-boilerplate. - -Mehdi-SIO/new_flask -https://github.com/Mehdi-SIO/new_flask -Entry file: new_flask/hello.py -Scanned: 2016-10-20 12:30:38.041693 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -SIJP-ORG/flask-demo -https://github.com/SIJP-ORG/flask-demo -Entry file: None -Scanned: 2016-10-20 12:30:39.567960 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SIJP-ORG/flask-demo. - -danchay/flask-blog -https://github.com/danchay/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:30:41.127290 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -wiki-ai/flask-wikimediaui -https://github.com/wiki-ai/flask-wikimediaui -Entry file: flask-wikimediaui/wsgi.py -Scanned: 2016-10-20 12:30:42.472038 -No vulnerabilities found. - - -luotigerlsx/flask_example -https://github.com/luotigerlsx/flask_example -Entry file: None -Scanned: 2016-10-20 12:30:47.054561 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -luqee/flask-demo -https://github.com/luqee/flask-demo -Entry file: None -Scanned: 2016-10-20 12:30:47.563108 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/luqee/flask-demo. - -PumOzenix/flask-sample -https://github.com/PumOzenix/flask-sample -Entry file: flask-sample/guild/app.py -Scanned: 2016-10-20 12:30:49.074412 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AnandVetcha/Flask_App -https://github.com/AnandVetcha/Flask_App -Entry file: Flask_App/Flask_App/app.py -Scanned: 2016-10-20 12:30:49.592268 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fulfilio/flask-fulfil -https://github.com/fulfilio/flask-fulfil -Entry file: flask-fulfil/flask_fulfil.py -Scanned: 2016-10-20 12:30:51.021328 -No vulnerabilities found. - - -zhupr/myFlask -https://github.com/zhupr/myFlask -Entry file: myFlask/project.py -Scanned: 2016-10-20 12:30:51.570212 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dsk0506/flask_demo -https://github.com/dsk0506/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 12:30:52.085688 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -curtis99877/flask-app -https://github.com/curtis99877/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 12:30:52.592137 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bradkarels/restful-flask -https://github.com/bradkarels/restful-flask -Entry file: restful-flask/hello.py -Scanned: 2016-10-20 12:30:53.893777 -No vulnerabilities found. - - -silvia2013/firstapp -https://github.com/silvia2013/firstapp -Entry file: None -Scanned: 2016-10-20 12:30:59.409144 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/silvia2013/firstapp. - -n0x5/shitty_flask_website -https://github.com/n0x5/shitty_flask_website -Entry file: shitty_flask_website/app.py -Scanned: 2016-10-20 12:31:00.791968 -No vulnerabilities found. - - -decentfox/relask -https://github.com/decentfox/relask -Entry file: relask/example/sqlalchemy/relasksa/__init__.py -Scanned: 2016-10-20 12:31:04.836203 -Vulnerability 1: -File: relask/example/sqlalchemy/relasksa/schema.py - > User input at line 64, trigger word "get(": - user = models.db.session.query(models.User).filter(models.User.login == args.get('login')).first() -File: relask/example/sqlalchemy/relasksa/schema.py - > reaches line 64, trigger word "filter(": - user = models.db.session.query(models.User).filter(models.User.login == args.get('login')).first() - - - -rmed/akamatsu -https://github.com/rmed/akamatsu -Entry file: None -Scanned: 2016-10-20 12:31:11.781963 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rmed/akamatsu. - -herrjemand/flask-fido-u2f -https://github.com/herrjemand/flask-fido-u2f -Entry file: flask-fido-u2f/examples/server.py -Scanned: 2016-10-20 12:31:13.535039 -No vulnerabilities found. - - -janhak/flask-flasky-learning -https://github.com/janhak/flask-flasky-learning -Entry file: flask-flasky-learning/app/__init__.py -Scanned: 2016-10-20 12:31:15.621778 -No vulnerabilities found. - - -mr1holmes/planup-backend -https://github.com/mr1holmes/planup-backend -Entry file: planup-backend/flaskapp/__init__.py -Scanned: 2016-10-20 12:31:16.151598 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BoeingX/flask-restful-api -https://github.com/BoeingX/flask-restful-api -Entry file: flask-restful-api/restful/api.py -Scanned: 2016-10-20 12:31:16.658712 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -spenserhale/social-network-flask -https://github.com/spenserhale/social-network-flask -Entry file: social-network-flask/app.py -Scanned: 2016-10-20 12:31:18.203416 -Vulnerability 1: -File: social-network-flask/app.py - > User input at line 109, trigger word "get(": - user = models.User.select().where(models.User.username ** username).get() -Reassigned in: - File: social-network-flask/app.py - > Line 117: user = current_user -File: social-network-flask/app.py - > reaches line 120, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user) - -Vulnerability 2: -File: social-network-flask/app.py - > User input at line 135, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-network-flask/app.py - > reaches line 147, trigger word "flash(": - flash('You're now following {}!'.format(to_user.username), 'success') - -Vulnerability 3: -File: social-network-flask/app.py - > User input at line 135, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-network-flask/app.py - > reaches line 148, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 4: -File: social-network-flask/app.py - > User input at line 135, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-network-flask/app.py - > reaches line 148, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 5: -File: social-network-flask/app.py - > User input at line 155, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-network-flask/app.py - > reaches line 167, trigger word "flash(": - flash('You've unfollowed {}!'.format(to_user.username), 'success') - -Vulnerability 6: -File: social-network-flask/app.py - > User input at line 155, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-network-flask/app.py - > reaches line 168, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 7: -File: social-network-flask/app.py - > User input at line 155, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: social-network-flask/app.py - > reaches line 168, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - - - -timlichen/pyFlaskLoginRegistration -https://github.com/timlichen/pyFlaskLoginRegistration -Entry file: pyFlaskLoginRegistration/server.py -Scanned: 2016-10-20 12:31:19.994747 -No vulnerabilities found. - - -linzhaolover/myFlaskWeb -https://github.com/linzhaolover/myFlaskWeb -Entry file: myFlaskWeb/myflask.py -Scanned: 2016-10-20 12:31:21.424933 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prakharchoudhary/First_App_in_Flask -https://github.com/prakharchoudhary/First_App_in_Flask -Entry file: First_App_in_Flask/flask_project.py -Scanned: 2016-10-20 12:31:22.779246 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vmuguerzac/flask_by_example -https://github.com/vmuguerzac/flask_by_example -Entry file: flask_by_example/app.py -Scanned: 2016-10-20 12:31:29.502824 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_by_example/venv/lib/python3.5/struct.py - -solcis/flask-weather-app -https://github.com/solcis/flask-weather-app -Entry file: flask-weather-app/flask_weather_app.py -Scanned: 2016-10-20 12:31:42.740830 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arajago6/flask-json-api -https://github.com/arajago6/flask-json-api -Entry file: flask-json-api/app.py -Scanned: 2016-10-20 12:31:44.072076 -Vulnerability 1: -File: flask-json-api/app.py - > User input at line 36, trigger word "get(": - entity = 'id''title''description''installed'entities[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flask-json-api/app.py - > reaches line 43, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('entity'entity), 201) - - - -Edubya77/hellow_world_flask -https://github.com/Edubya77/hellow_world_flask -Entry file: hellow_world_flask/hello_world.py -Scanned: 2016-10-20 12:31:45.339922 -No vulnerabilities found. - - -kmalfatti/library-flask-app -https://github.com/kmalfatti/library-flask-app -Entry file: library-flask-app/app.py -Scanned: 2016-10-20 12:31:46.774757 -Vulnerability 1: -File: library-flask-app/app.py - > User input at line 63, trigger word "get(": - found_author = Author.query.get(id) -File: library-flask-app/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('books/index.html',author=found_author) - -Vulnerability 2: -File: library-flask-app/app.py - > User input at line 68, trigger word "get(": - found_author = Author.query.get(id) -File: library-flask-app/app.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('books/new.html',author=found_author) - - - -luhuisicnu/Flask_codeRepository -https://github.com/luhuisicnu/Flask_codeRepository -Entry file: Flask_codeRepository/code_repository/__init__.py -Scanned: 2016-10-20 12:31:48.323817 -No vulnerabilities found. - - -Myshj/SimpleBlogWithFlask -https://github.com/Myshj/SimpleBlogWithFlask -Entry file: SimpleBlogWithFlask/app/__init__.py -Scanned: 2016-10-20 12:31:49.773266 -No vulnerabilities found. - - -jcue/flask-hello-world -https://github.com/jcue/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 12:31:50.332855 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -spenserhale/treebook-python-flask -https://github.com/spenserhale/treebook-python-flask -Entry file: treebook-python-flask/Flask.py -Scanned: 2016-10-20 12:31:51.601826 -No vulnerabilities found. - - -Sachinmurari/python_flask_proj -https://github.com/Sachinmurari/python_flask_proj -Entry file: python_flask_proj/app.py -Scanned: 2016-10-20 12:31:52.921478 -No vulnerabilities found. - - -ophidianwang/flask_mongokat_exp -https://github.com/ophidianwang/flask_mongokat_exp -Entry file: flask_mongokat_exp/simple_run.py -Scanned: 2016-10-20 12:31:54.309576 -No vulnerabilities found. - - -rajdeepd/heroku-force-oauth-flask -https://github.com/rajdeepd/heroku-force-oauth-flask -Entry file: heroku-force-oauth-flask/app.py -Scanned: 2016-10-20 12:31:55.551349 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -VikramDesai/Rest-Server-Flask -https://github.com/VikramDesai/Rest-Server-Flask -Entry file: None -Scanned: 2016-10-20 12:31:56.920370 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/VikramDesai/Rest-Server-Flask. - -roybayot/my-learning-flask -https://github.com/roybayot/my-learning-flask -Entry file: my-learning-flask/routes.py -Scanned: 2016-10-20 12:32:04.717844 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my-learning-flask/venv/lib/python2.7/genericpath.py - -joselevelsup/FastInventoryFlask -https://github.com/joselevelsup/FastInventoryFlask -Entry file: FastInventoryFlask/venv/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-20 12:32:14.692411 -No vulnerabilities found. - - -ezirmusitua/my-blog-with-flask -https://github.com/ezirmusitua/my-blog-with-flask -Entry file: my-blog-with-flask/my_blog/__init__.py -Scanned: 2016-10-20 12:32:17.834621 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -Millyn/flask_py3_hr -https://github.com/Millyn/flask_py3_hr -Entry file: flask_py3_hr/app/__init__.py -Scanned: 2016-10-20 12:32:19.841177 -Vulnerability 1: -File: flask_py3_hr/app/user/views.py - > User input at line 47, trigger word ".data": - info = Info(realname=form.realname.data, id_care=form.id_care.data, birth=form.birth.data, tel=form.tel.data, work_status=1, group_id=str(form.group.data.id)) -File: flask_py3_hr/app/user/views.py - > reaches line 52, trigger word "filter(": - db.session.query(User).filter(User.id == current_user.id).update(User.info_idinfo.id) - - - -afurth89/python_flask_crudapp_booklist -https://github.com/afurth89/python_flask_crudapp_booklist -Entry file: python_flask_crudapp_booklist/app.py -Scanned: 2016-10-20 12:32:21.233369 -No vulnerabilities found. - - -Riffstation/flaskutilsexample -https://github.com/Riffstation/flaskutilsexample -Entry file: flaskutilsexample/src/app/__init__.py -Scanned: 2016-10-20 12:32:24.105995 -No vulnerabilities found. - - -dolv/Flask -https://github.com/dolv/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:32:25.124429 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Mamun-dueee/flask -https://github.com/Mamun-dueee/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:32:25.705955 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -nppat/Flask -https://github.com/nppat/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:32:26.292969 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KyleSeem/Flask -https://github.com/KyleSeem/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:32:26.852349 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Kirade/Flask -https://github.com/Kirade/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:32:27.364770 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cloverstd/flask-wechatpy -https://github.com/cloverstd/flask-wechatpy -Entry file: flask-wechatpy/demo.py -Scanned: 2016-10-20 12:32:28.803918 -No vulnerabilities found. - - -QuentinMoss/reimagined-computing-machine -https://github.com/QuentinMoss/reimagined-computing-machine -Entry file: reimagined-computing-machine/app/__init__.py -Scanned: 2016-10-20 12:32:31.059426 -No vulnerabilities found. - - -13923858795/Tutorial -https://github.com/13923858795/Tutorial -Entry file: Tutorial/my/app/__init__.py -Scanned: 2016-10-20 12:32:37.967455 -Vulnerability 1: -File: Tutorial/my/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 33: posts = pagination.items - File: Tutorial/my/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Tutorial/my/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 23: show_followed = False - File: Tutorial/my/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Tutorial/my/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 44: posts = pagination.items -File: Tutorial/my/app/main/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Tutorial/my/app/main/views.py - > User input at line 109, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 111: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Tutorial/my/app/main/views.py - > Line 113: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 116: comments = pagination.items - File: Tutorial/my/app/main/views.py - > Line 108: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Tutorial/my/app/main/views.py - > reaches line 117, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Tutorial/my/app/main/views.py - > User input at line 176, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 177: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 180: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Tutorial/my/app/main/views.py - > Line 175: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 182, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Tutorial/my/app/main/views.py - > User input at line 193, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 194: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 197: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Tutorial/my/app/main/views.py - > Line 192: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 199, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Tutorial/my/app/main/views.py - > User input at line 231, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 232: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 235: comments = pagination.items -File: Tutorial/my/app/main/views.py - > reaches line 236, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -szparag3/flask-hello-world -https://github.com/szparag3/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 12:32:38.523052 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -penglee87/flaskweb -https://github.com/penglee87/flaskweb -Entry file: None -Scanned: 2016-10-20 12:32:44.042917 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yuyanqiuqiu/flaskr -https://github.com/yuyanqiuqiu/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:32:45.554220 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -WayneChen1987/flasky -https://github.com/WayneChen1987/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:32:46.051208 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -IronFist16/flasky -https://github.com/IronFist16/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:32:47.556969 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bsdtux/flaskblog -https://github.com/bsdtux/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 12:32:49.070153 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -terryllowery/flasktaskr -https://github.com/terryllowery/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:32:50.597287 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -LongstreetSolutions/flaskr -https://github.com/LongstreetSolutions/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:32:51.128576 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -playgrdstar/flaskapp -https://github.com/playgrdstar/flaskapp -Entry file: None -Scanned: 2016-10-20 12:32:52.657227 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/playgrdstar/flaskapp. - -NathanJ4620/flasker -https://github.com/NathanJ4620/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-20 12:32:54.172647 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulmkumar/flaskapp -https://github.com/rahulmkumar/flaskapp -Entry file: None -Scanned: 2016-10-20 12:32:55.687833 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rahulmkumar/flaskapp. - -chenglinguang/flaskky -https://github.com/chenglinguang/flaskky -Entry file: flaskky/hello1.py -Scanned: 2016-10-20 12:32:57.309981 -No vulnerabilities found. - - -feocco/flaskLab -https://github.com/feocco/flaskLab -Entry file: flaskLab/app.py -Scanned: 2016-10-20 12:33:06.265305 -Vulnerability 1: -File: flaskLab/auth.py - > User input at line 26, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flaskLab/auth.py - > Line 32: user = User(username=username) -File: flaskLab/auth.py - > reaches line 36, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 2: -File: flaskLab/auth.py - > User input at line 26, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flaskLab/auth.py - > Line 32: user = User(username=username) -File: flaskLab/auth.py - > reaches line 36, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: flaskLab/auth.py - > User input at line 42, trigger word "get(": - user = session.query(User).get(id) -File: flaskLab/auth.py - > reaches line 45, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username) - - - -sarahbees/FlaskHeroku -https://github.com/sarahbees/FlaskHeroku -Entry file: FlaskHeroku/hello.py -Scanned: 2016-10-20 12:33:07.547754 -No vulnerabilities found. - - -jutreras/flaskTest -https://github.com/jutreras/flaskTest -Entry file: flaskTest/url.py -Scanned: 2016-10-20 12:33:16.112232 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -954324919/FlaskDemo -https://github.com/954324919/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 12:33:18.659353 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cdagli/flask-restful-example -https://github.com/cdagli/flask-restful-example -Entry file: flask-restful-example/api.py -Scanned: 2016-10-20 12:33:21.158580 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pavelzamyatin/flask-mega-tutorial -https://github.com/pavelzamyatin/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-20 12:33:22.697942 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alexeib2014/Flask-Android -https://github.com/alexeib2014/Flask-Android -Entry file: Flask-Android/flask_sqlalchemy.py -Scanned: 2016-10-20 12:33:23.337689 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jamesward/hello-flask -https://github.com/jamesward/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 12:33:24.903841 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -skinnyal/flask_tutorial -https://github.com/skinnyal/flask_tutorial -Entry file: None -Scanned: 2016-10-20 12:33:25.415139 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Steve-Duncan/Learning-Flask -https://github.com/Steve-Duncan/Learning-Flask -Entry file: Learning-Flask/friends/server.py -Scanned: 2016-10-20 12:33:28.931613 -No vulnerabilities found. - - -damyanbogoev/flask-cooking -https://github.com/damyanbogoev/flask-cooking -Entry file: flask-cooking/check.py -Scanned: 2016-10-20 12:33:30.889404 -No vulnerabilities found. - - -ylto/learningFlask -https://github.com/ylto/learningFlask -Entry file: learningFlask/hello.py -Scanned: 2016-10-20 12:33:31.556580 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/genericpath.py - -yyoowwllgit/flask_pro -https://github.com/yyoowwllgit/flask_pro -Entry file: flask_pro/he.py -Scanned: 2016-10-20 12:33:32.108137 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -egusahiroaki/flask_template -https://github.com/egusahiroaki/flask_template -Entry file: None -Scanned: 2016-10-20 12:33:32.621959 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/egusahiroaki/flask_template. - -frederickOtus/copypaste_flask -https://github.com/frederickOtus/copypaste_flask -Entry file: copypaste_flask/server.py -Scanned: 2016-10-20 12:33:34.158960 -No vulnerabilities found. - - -king100/flask-blog -https://github.com/king100/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:33:34.734221 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -yyoowwllgit/flask_server -https://github.com/yyoowwllgit/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-20 12:33:35.263567 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -m4ra/flask-stripe -https://github.com/m4ra/flask-stripe -Entry file: flask-stripe/app/__init__.py -Scanned: 2016-10-20 12:33:38.791397 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rspears74/flask-intro -https://github.com/rspears74/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:33:44.430581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -richardtbell/flask-tutorial -https://github.com/richardtbell/flask-tutorial -Entry file: None -Scanned: 2016-10-20 12:33:45.982311 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -land-pack/flask-wordcounter -https://github.com/land-pack/flask-wordcounter -Entry file: flask-wordcounter/app.py -Scanned: 2016-10-20 12:33:46.593499 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-wordcounter/env/lib/python2.7/genericpath.py - -ibrahimirdem/flask-calisma -https://github.com/ibrahimirdem/flask-calisma -Entry file: flask-calisma/Hello.py -Scanned: 2016-10-20 12:33:48.107046 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -prodicus/docker-flask -https://github.com/prodicus/docker-flask -Entry file: None -Scanned: 2016-10-20 12:33:49.618109 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/prodicus/docker-flask. - -ItamarLevyOr/Flask_Tutorial -https://github.com/ItamarLevyOr/Flask_Tutorial -Entry file: Flask_Tutorial/flaskr.py -Scanned: 2016-10-20 12:33:51.286690 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Tutorial/venv/lib/python2.7/genericpath.py - -kcamenzind/flask_opentracing -https://github.com/kcamenzind/flask_opentracing -Entry file: flask_opentracing/tests/test_flask_opentracing.py -Scanned: 2016-10-20 12:33:54.257230 -No vulnerabilities found. - - -monburan/learn_flask -https://github.com/monburan/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 12:33:54.774034 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -plasx/flask-rest -https://github.com/plasx/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-20 12:33:55.760463 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChrisXiongWHU/flask_test -https://github.com/ChrisXiongWHU/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 12:33:56.870765 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cdumay/flask-zookeeper -https://github.com/cdumay/flask-zookeeper -Entry file: flask-zookeeper/tests/test_blueprint.py -Scanned: 2016-10-20 12:33:59.305927 -No vulnerabilities found. - - -vaishakp9/flask-ask -https://github.com/vaishakp9/flask-ask -Entry file: flask-ask/server.py -Scanned: 2016-10-20 12:34:05.834266 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kflavin/flask-tutorial -https://github.com/kflavin/flask-tutorial -Entry file: None -Scanned: 2016-10-20 12:34:07.344706 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -umutcoskun/flask-ready -https://github.com/umutcoskun/flask-ready -Entry file: flask-ready/src/app/__init__.py -Scanned: 2016-10-20 12:34:23.430757 -Vulnerability 1: -File: flask-ready/src/app/auth/validators.py - > User input at line 15, trigger word ".data": - entity = self.model.query.filter(self.field == field.data).first() -File: flask-ready/src/app/auth/validators.py - > reaches line 15, trigger word "filter(": - entity = self.model.query.filter(self.field == field.data).first() - -Vulnerability 2: -File: flask-ready/src/app/auth/views.py - > User input at line 50, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -File: flask-ready/src/app/auth/views.py - > reaches line 58, trigger word "flash(": - flash('Welcome {}'.format(user.name), 'info') - - - -Amertz08/flask-docker -https://github.com/Amertz08/flask-docker -Entry file: flask-docker/app/setup.py -Scanned: 2016-10-20 12:34:24.869013 -No vulnerabilities found. - - -viniciusramos91/flask-skeleton -https://github.com/viniciusramos91/flask-skeleton -Entry file: None -Scanned: 2016-10-20 12:34:25.391186 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/viniciusramos91/flask-skeleton. - -pythonadventurer/flask-blog -https://github.com/pythonadventurer/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:34:25.932781 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -novking/Flask_AWS -https://github.com/novking/Flask_AWS -Entry file: Flask_AWS/PlagiarismDefender/home.py -Scanned: 2016-10-20 12:34:27.385934 -Vulnerability 1: -File: Flask_AWS/PlagiarismDefender/home.py - > User input at line 26, trigger word "form[": - text_to_filter = request.form['text_to_check'] -Reassigned in: - File: Flask_AWS/PlagiarismDefender/home.py - > Line 31: sentences = sentence_splitter.tokenize(text_to_filter) - File: Flask_AWS/PlagiarismDefender/home.py - > Line 40: is_it_plagiarized = str(probability_of_plagiarism / len(sentences) * 100) + '%' - File: Flask_AWS/PlagiarismDefender/home.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('plagiarizer-submit.html') -File: Flask_AWS/PlagiarismDefender/home.py - > reaches line 41, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('plagiarizer-results.html',text_to_filter=text_to_filter, is_it_plagiarized=is_it_plagiarized) - - - -smeggingsmegger/flask-cookiecutter -https://github.com/smeggingsmegger/flask-cookiecutter -Entry file: flask-cookiecutter/{{cookiecutter.app_name}}/{{cookiecutter.app_name}}/__init__.py -Scanned: 2016-10-20 12:34:27.913469 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lalvarezguillen/inmobiliaria_flask -https://github.com/lalvarezguillen/inmobiliaria_flask -Entry file: inmobiliaria_flask/web_stuff/web_app.py -Scanned: 2016-10-20 12:34:28.421449 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JW275/flask_study -https://github.com/JW275/flask_study -Entry file: flask_study/views.py -Scanned: 2016-10-20 12:34:28.993184 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -priteshgudge/django-flask -https://github.com/priteshgudge/django-flask -Entry file: django-flask/app.py -Scanned: 2016-10-20 12:34:29.542733 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SIJP-ORG/flask-demo -https://github.com/SIJP-ORG/flask-demo -Entry file: None -Scanned: 2016-10-20 12:34:32.071605 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SIJP-ORG/flask-demo. - -MalhotraVijay/flask-boilerplate -https://github.com/MalhotraVijay/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 12:34:32.579776 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MalhotraVijay/flask-boilerplate. - -KOREAN139/flask-blog -https://github.com/KOREAN139/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:34:33.139681 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -sumni-park/flask_blog -https://github.com/sumni-park/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:34:33.653786 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vesperalwall860/flask_blank -https://github.com/vesperalwall860/flask_blank -Entry file: flask_blank/project/__init__.py -Scanned: 2016-10-20 12:34:36.437859 -No vulnerabilities found. - - -natfoster82/flask-alcohol -https://github.com/natfoster82/flask-alcohol -Entry file: flask-alcohol/example/app.py -Scanned: 2016-10-20 12:34:39.992889 -Vulnerability 1: -File: flask-alcohol/example/app.py - > User input at line 138, trigger word "get(": - email = request.json.get('email') -File: flask-alcohol/example/app.py - > reaches line 139, trigger word "filter(": - user = cls.query.filter(db.func.lower(User.email) == db.func.lower(email)).first() - -Vulnerability 2: -File: flask-alcohol/example/app.py - > User input at line 279, trigger word "get(": - project_id = request.args.get('project_id') -Reassigned in: - File: flask-alcohol/example/app.py - > Line 282: ret_MAYBE_FUNCTION_NAME = query -File: flask-alcohol/example/app.py - > reaches line 278, trigger word "filter(": - query = query.filter(Post.last_published_at != None) - -Vulnerability 3: -File: flask-alcohol/example/app.py - > User input at line 279, trigger word "get(": - project_id = request.args.get('project_id') -Reassigned in: - File: flask-alcohol/example/app.py - > Line 282: ret_MAYBE_FUNCTION_NAME = query -File: flask-alcohol/example/app.py - > reaches line 281, trigger word "filter(": - query = query.filter(Post.project_id == project_id) - - - -liuzhangpei/myFlask -https://github.com/liuzhangpei/myFlask -Entry file: myFlask/project.py -Scanned: 2016-10-20 12:34:44.671916 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stevenzhang18/Indeed-Flask -https://github.com/stevenzhang18/Indeed-Flask -Entry file: Indeed-Flask/main.py -Scanned: 2016-10-20 12:34:46.292342 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -RAIRLab/Talos-Flask -https://github.com/RAIRLab/Talos-Flask -Entry file: None -Scanned: 2016-10-20 12:34:46.810649 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/RAIRLab/Talos-Flask. - -stewill/flask_web -https://github.com/stewill/flask_web -Entry file: flask_web/helloflask.py -Scanned: 2016-10-20 12:34:48.448190 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py - -bradkarels/restful-flask -https://github.com/bradkarels/restful-flask -Entry file: restful-flask/hello.py -Scanned: 2016-10-20 12:34:50.771210 -No vulnerabilities found. - - -linkcheng/flask_notes -https://github.com/linkcheng/flask_notes -Entry file: flask_notes/hello.py -Scanned: 2016-10-20 12:34:52.189905 -No vulnerabilities found. - - -Mamun-dueee/Flask-microblog -https://github.com/Mamun-dueee/Flask-microblog -Entry file: None -Scanned: 2016-10-20 12:34:55.244541 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -andrealmar/flask-microblog -https://github.com/andrealmar/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:34:55.746146 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vdnhnguyen/flask-upload -https://github.com/vdnhnguyen/flask-upload -Entry file: flask-upload/index.py -Scanned: 2016-10-20 12:34:56.271918 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smrati/dockerize_flask -https://github.com/smrati/dockerize_flask -Entry file: dockerize_flask/app/__init__.py -Scanned: 2016-10-20 12:34:57.665508 -No vulnerabilities found. - - -cococohen/Microblog -https://github.com/cococohen/Microblog -Entry file: Microblog/flask/lib/python3.4/site-packages/flask_openid.py -Scanned: 2016-10-20 12:35:07.003013 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BeFunes/App-FlaskExercise -https://github.com/BeFunes/App-FlaskExercise -Entry file: App-FlaskExercise/app.py -Scanned: 2016-10-20 12:35:07.521908 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Nonja/FlaskArticleSearchNYT -https://github.com/Nonja/FlaskArticleSearchNYT -Entry file: FlaskArticleSearchNYT/app/__init__.py -Scanned: 2016-10-20 12:35:17.866694 -Vulnerability 1: -File: FlaskArticleSearchNYT/app/hummus.py - > User input at line 23, trigger word "get(": - begindate = request.args.get('begindate', '').replace('-', '') -Reassigned in: - File: FlaskArticleSearchNYT/app/hummus.py - > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage - File: FlaskArticleSearchNYT/app/hummus.py - > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params) -File: FlaskArticleSearchNYT/app/hummus.py - > reaches line 23, trigger word "replace(": - begindate = request.args.get('begindate', '').replace('-', '') - -Vulnerability 2: -File: FlaskArticleSearchNYT/app/hummus.py - > User input at line 24, trigger word "get(": - enddate = request.args.get('enddate', '').replace('-', '') -Reassigned in: - File: FlaskArticleSearchNYT/app/hummus.py - > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage - File: FlaskArticleSearchNYT/app/hummus.py - > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params) -File: FlaskArticleSearchNYT/app/hummus.py - > reaches line 24, trigger word "replace(": - enddate = request.args.get('enddate', '').replace('-', '') - -Vulnerability 3: -File: FlaskArticleSearchNYT/app/hummus.py - > User input at line 22, trigger word "get(": - searchquery = request.args.get('searchrequest', '') -Reassigned in: - File: FlaskArticleSearchNYT/app/hummus.py - > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage - File: FlaskArticleSearchNYT/app/hummus.py - > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params) -File: FlaskArticleSearchNYT/app/hummus.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(news=news, results=results, totalpages=totalpages, page=page, searchquery=searchquery) - -Vulnerability 4: -File: FlaskArticleSearchNYT/app/hummus.py - > User input at line 25, trigger word "get(": - page = request.args.get('page', '') -Reassigned in: - File: FlaskArticleSearchNYT/app/hummus.py - > Line 31: page = 0 - File: FlaskArticleSearchNYT/app/hummus.py - > Line 33: params = 'api-key''q''begin_date''end_date''page'api_keysearchquerybegindateenddatepage - File: FlaskArticleSearchNYT/app/hummus.py - > Line 36: r = requests.get('https://api.nytimes.com/svc/search/v2/articlesearch.json',params=params) - File: FlaskArticleSearchNYT/app/hummus.py - > Line 41: page = data['response']['meta']['offset'] / 10 + 1 -File: FlaskArticleSearchNYT/app/hummus.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(news=news, results=results, totalpages=totalpages, page=page, searchquery=searchquery) - - - -mr1holmes/planup-backend -https://github.com/mr1holmes/planup-backend -Entry file: planup-backend/flaskapp/__init__.py -Scanned: 2016-10-20 12:35:24.408222 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tonuidavies/Discover -https://github.com/tonuidavies/Discover -Entry file: Discover/app.py -Scanned: 2016-10-20 12:35:26.183411 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Discover/venv/lib/python2.7/genericpath.py - -RydrDojo/Ridr_app -https://github.com/RydrDojo/Ridr_app -Entry file: None -Scanned: 2016-10-20 12:35:26.724376 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -stephenjjones/flask-auth-service -https://github.com/stephenjjones/flask-auth-service -Entry file: flask-auth-service/app/__init__.py -Scanned: 2016-10-20 12:35:28.040181 -Vulnerability 1: -File: flask-auth-service/app/main/views.py - > User input at line 18, trigger word ".data": - email = result.data['email'] -Reassigned in: - File: flask-auth-service/app/main/views.py - > Line 22: user = User(email=email) -File: flask-auth-service/app/main/views.py - > reaches line 26, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 2: -File: flask-auth-service/app/main/views.py - > User input at line 18, trigger word ".data": - email = result.data['email'] -Reassigned in: - File: flask-auth-service/app/main/views.py - > Line 22: user = User(email=email) -File: flask-auth-service/app/main/views.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: flask-auth-service/app/main/views.py - > User input at line 31, trigger word "get(": - user = User.query.get(id) -File: flask-auth-service/app/main/views.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('email'user.email) - - - -thomasobrien99/flask_user_template -https://github.com/thomasobrien99/flask_user_template -Entry file: flask_user_template/app.py -Scanned: 2016-10-20 12:35:29.362892 -No vulnerabilities found. - - -thomasobrien99/flask-movie-crud -https://github.com/thomasobrien99/flask-movie-crud -Entry file: flask-movie-crud/app.py -Scanned: 2016-10-20 12:35:30.924846 -Vulnerability 1: -File: flask-movie-crud/app.py - > User input at line 47, trigger word "get(": - show_dir = Director.query.get(id) -File: flask-movie-crud/app.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/directors/show.html',dir=show_dir) - -Vulnerability 2: -File: flask-movie-crud/app.py - > User input at line 52, trigger word "get(": - edit_dir = Director.query.get(id) -File: flask-movie-crud/app.py - > reaches line 53, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/directors/edit.html',dir=edit_dir) - -Vulnerability 3: -File: flask-movie-crud/app.py - > User input at line 73, trigger word "get(": - director = Director.query.get(id) -File: flask-movie-crud/app.py - > reaches line 74, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('movies/index.html',director=director) - -Vulnerability 4: -File: flask-movie-crud/app.py - > User input at line 86, trigger word "get(": - director = Director.query.get(id) -File: flask-movie-crud/app.py - > reaches line 88, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('movies/new.html',director=director, tags=tags) - -Vulnerability 5: -File: flask-movie-crud/app.py - > User input at line 92, trigger word "get(": - movie = Movie.query.get(movie_id) -File: flask-movie-crud/app.py - > reaches line 94, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('movies/edit.html',movie=movie, tags=tags) - -Vulnerability 6: -File: flask-movie-crud/app.py - > User input at line 98, trigger word "get(": - movie = Movie.query.get(movie_id) -File: flask-movie-crud/app.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('movies/show.html',movie=movie) - -Vulnerability 7: -File: flask-movie-crud/app.py - > User input at line 136, trigger word "get(": - tag = Tag.query.get(id) -File: flask-movie-crud/app.py - > reaches line 137, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tags/show.html',tag=tag) - -Vulnerability 8: -File: flask-movie-crud/app.py - > User input at line 141, trigger word "get(": - tag = Tag.query.get(id) -File: flask-movie-crud/app.py - > reaches line 142, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tags/edit.html',tag=tag) - - - -chavli/heroku-flask-start -https://github.com/chavli/heroku-flask-start -Entry file: heroku-flask-start/app.py -Scanned: 2016-10-20 12:35:32.316844 -No vulnerabilities found. - - -kmalfatti/library-flask-app -https://github.com/kmalfatti/library-flask-app -Entry file: library-flask-app/app.py -Scanned: 2016-10-20 12:35:33.755905 -Vulnerability 1: -File: library-flask-app/app.py - > User input at line 63, trigger word "get(": - found_author = Author.query.get(id) -File: library-flask-app/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('books/index.html',author=found_author) - -Vulnerability 2: -File: library-flask-app/app.py - > User input at line 68, trigger word "get(": - found_author = Author.query.get(id) -File: library-flask-app/app.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('books/new.html',author=found_author) - - - -vmuguerzac/flask_by_example -https://github.com/vmuguerzac/flask_by_example -Entry file: flask_by_example/app.py -Scanned: 2016-10-20 12:35:34.422802 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_by_example/venv/lib/python3.5/struct.py - -xilixjd/flask_project_blog -https://github.com/xilixjd/flask_project_blog -Entry file: flask_project_blog/models.py -Scanned: 2016-10-20 12:35:38.529233 -No vulnerabilities found. - - -thomasobrien99/flask-migrate-and-auth -https://github.com/thomasobrien99/flask-migrate-and-auth -Entry file: flask-migrate-and-auth/app.py -Scanned: 2016-10-20 12:35:39.981926 -No vulnerabilities found. - - -rbudzak/learnFlaskMigrate -https://github.com/rbudzak/learnFlaskMigrate -Entry file: learnFlaskMigrate/app.py -Scanned: 2016-10-20 12:35:41.332838 -No vulnerabilities found. - - -krpeacock/flask_migrate_template -https://github.com/krpeacock/flask_migrate_template -Entry file: flask_migrate_template/app.py -Scanned: 2016-10-20 12:35:42.766453 -No vulnerabilities found. - - -sh4nks/flask-caching -https://github.com/sh4nks/flask-caching -Entry file: flask-caching/setup.py -Scanned: 2016-10-20 12:35:49.464541 -No vulnerabilities found. - - -mani-python/flask -https://github.com/mani-python/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:35:50.053205 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -manikandaraj123ster/flask -https://github.com/manikandaraj123ster/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:35:50.658813 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Kirade/Flask -https://github.com/Kirade/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:35:51.170281 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -salhernandez/Flask -https://github.com/salhernandez/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:35:51.698383 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -murilobsd/zeus -https://github.com/murilobsd/zeus -Entry file: None -Scanned: 2016-10-20 12:35:52.216118 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/murilobsd/zeus. - -xuelangZF/NaHan -https://github.com/xuelangZF/NaHan -Entry file: NaHan/nahan/__init__.py -Scanned: 2016-10-20 12:35:53.232879 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -haklabrador/podatci-s-burza -https://github.com/haklabrador/podatci-s-burza -Entry file: podatci-s-burza/webserver.py -Scanned: 2016-10-20 12:35:55.768806 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -weinbergdavid/python-flask-security -https://github.com/weinbergdavid/python-flask-security -Entry file: python-flask-security/run.py -Scanned: 2016-10-20 12:36:04.870499 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -aaossa/flask-openshift -https://github.com/aaossa/flask-openshift -Entry file: flask-openshift/flask_openshift_template.py -Scanned: 2016-10-20 12:36:06.575562 -Vulnerability 1: -File: flask-openshift/flask_openshift_template.py - > User input at line 14, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: flask-openshift/flask_openshift_template.py - > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask-openshift/flask_openshift_template.py - > reaches line 15, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=username)) - -Vulnerability 2: -File: flask-openshift/flask_openshift_template.py - > User input at line 14, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: flask-openshift/flask_openshift_template.py - > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask-openshift/flask_openshift_template.py - > reaches line 15, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=username)) - - - -nsujan/flaskbot -https://github.com/nsujan/flaskbot -Entry file: flaskbot/wsgi/myflaskapp.py -Scanned: 2016-10-20 12:36:08.024170 -No vulnerabilities found. - - -davbrink/flaskblog -https://github.com/davbrink/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 12:36:09.054562 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -ToDolin/flaskgit -https://github.com/ToDolin/flaskgit -Entry file: flaskgit/flasky/app/__init__.py -Scanned: 2016-10-20 12:36:10.586493 -No vulnerabilities found. - - -yolandaz/flaskcars -https://github.com/yolandaz/flaskcars -Entry file: flaskcars/app.py -Scanned: 2016-10-20 12:36:17.297788 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskcars/venv/lib/python2.7/genericpath.py - -penglee87/flaskweb -https://github.com/penglee87/flaskweb -Entry file: None -Scanned: 2016-10-20 12:36:24.858756 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yuyanqiuqiu/flaskr -https://github.com/yuyanqiuqiu/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:36:26.365959 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stevehaigh/flasktest -https://github.com/stevehaigh/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 12:36:27.384487 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -LongstreetSolutions/flaskr -https://github.com/LongstreetSolutions/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:36:28.926909 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -juniorkrvl/flasky -https://github.com/juniorkrvl/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:36:30.459276 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Halcae/flaskapp -https://github.com/Halcae/flaskapp -Entry file: None -Scanned: 2016-10-20 12:36:31.980431 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Halcae/flaskapp. - -themuppet2/flasktaskr -https://github.com/themuppet2/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:36:33.519508 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -NathanJ4620/flasker -https://github.com/NathanJ4620/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-20 12:36:35.048879 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SuZhiBai/flaskblog -https://github.com/SuZhiBai/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 12:36:35.582729 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -AkshayBhagat/FlaskApp -https://github.com/AkshayBhagat/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 12:36:39.207052 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ncmadhu/FlaskDemo -https://github.com/ncmadhu/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 12:36:42.216280 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Qqlick/flaskRP -https://github.com/Qqlick/flaskRP -Entry file: flaskRP/flaskRP.py -Scanned: 2016-10-20 12:36:44.668632 -Vulnerability 1: -File: flaskRP/flaskRP.py - > User input at line 46, trigger word "form[": - title = request.form['title'] -File: flaskRP/flaskRP.py - > reaches line 53, trigger word "execute(": - g.db.execute('INSERT into posts (title, posts) VALUES (?,?)', [title, post]) - -Vulnerability 2: -File: flaskRP/flaskRP.py - > User input at line 47, trigger word "form[": - post = request.form['post'] -File: flaskRP/flaskRP.py - > reaches line 53, trigger word "execute(": - g.db.execute('INSERT into posts (title, posts) VALUES (?,?)', [title, post]) - - - -YoDaMa/FlaskApp -https://github.com/YoDaMa/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 12:36:45.278583 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stylianos-kampakis/flask-test -https://github.com/stylianos-kampakis/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 12:36:50.815846 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -erose/tictactoe-flask -https://github.com/erose/tictactoe-flask -Entry file: tictactoe-flask/app.py -Scanned: 2016-10-20 12:36:52.619679 -No vulnerabilities found. - - -alexeib2014/Flask-Android -https://github.com/alexeib2014/Flask-Android -Entry file: Flask-Android/flask_sqlalchemy.py -Scanned: 2016-10-20 12:36:53.237587 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -valasek/taekwondo-flask -https://github.com/valasek/taekwondo-flask -Entry file: None -Scanned: 2016-10-20 12:36:53.755427 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/valasek/taekwondo-flask. - -jdgwartney/flask-blueprint -https://github.com/jdgwartney/flask-blueprint -Entry file: flask-blueprint/api/__init__.py -Scanned: 2016-10-20 12:36:54.278949 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rjantos/flask-blog -https://github.com/rjantos/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:36:56.346970 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -leofofeo/flask-stuff -https://github.com/leofofeo/flask-stuff -Entry file: flask-stuff/flask_test.py -Scanned: 2016-10-20 12:36:57.664626 -No vulnerabilities found. - - -greenapplepark/flask_docker -https://github.com/greenapplepark/flask_docker -Entry file: flask_docker/app/flaskEntry.py -Scanned: 2016-10-20 12:37:07.022942 -No vulnerabilities found. - - -karloku/beginners_flask -https://github.com/karloku/beginners_flask -Entry file: beginners_flask/application/__init__.py -Scanned: 2016-10-20 12:37:08.463711 -No vulnerabilities found. - - -s2tephen/flask-network -https://github.com/s2tephen/flask-network -Entry file: flask-network/app.py -Scanned: 2016-10-20 12:37:09.761801 -No vulnerabilities found. - - -julianparismorgan/flask_cellcounter -https://github.com/julianparismorgan/flask_cellcounter -Entry file: flask_cellcounter/cell-app.py -Scanned: 2016-10-20 12:37:17.981185 -No vulnerabilities found. - - -jdgwartney/hello-flask -https://github.com/jdgwartney/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 12:37:18.581307 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -rohanagrawal/flask_social -https://github.com/rohanagrawal/flask_social -Entry file: flask_social/app.py -Scanned: 2016-10-20 12:37:19.090565 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -monburan/learn_flask -https://github.com/monburan/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 12:37:25.657810 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChrisXiongWHU/flask_test -https://github.com/ChrisXiongWHU/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 12:37:27.255153 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jiaominlong/flask-web -https://github.com/jiaominlong/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 12:37:27.765049 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Amertz08/flask-docker -https://github.com/Amertz08/flask-docker -Entry file: flask-docker/app/setup.py -Scanned: 2016-10-20 12:37:29.232357 -No vulnerabilities found. - - -viniciusramos91/flask-skeleton -https://github.com/viniciusramos91/flask-skeleton -Entry file: None -Scanned: 2016-10-20 12:37:29.795101 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/viniciusramos91/flask-skeleton. - -falterfriday/python-flask -https://github.com/falterfriday/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 12:37:31.322107 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jcue/flask-blog -https://github.com/jcue/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:37:32.884274 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -metiago/flask-skeleton -https://github.com/metiago/flask-skeleton -Entry file: None -Scanned: 2016-10-20 12:37:35.894354 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/metiago/flask-skeleton. - -rodolfolottin/flask-sortingservice -https://github.com/rodolfolottin/flask-sortingservice -Entry file: flask-sortingservice/src/app.py -Scanned: 2016-10-20 12:37:43.070752 -No vulnerabilities found. - - -xubiaosunny/flask-blog -https://github.com/xubiaosunny/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:37:43.650282 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -lklacar/flask-api -https://github.com/lklacar/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-20 12:37:44.160139 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coder-zhuyu/flask-framework -https://github.com/coder-zhuyu/flask-framework -Entry file: flask-framework/app/__init__.py -Scanned: 2016-10-20 12:37:45.762777 -Vulnerability 1: -File: flask-framework/app/auth/views.py - > User input at line 71, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-framework/app/auth/views.py - > Line 73: pagination = query.paginate(page,per_page=current_app.config['FLASKY_USERS_PER_PAGE'], error_out=False) - File: flask-framework/app/auth/views.py - > Line 76: users = pagination.items -File: flask-framework/app/auth/views.py - > reaches line 77, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('auth/confirm.html',pagination=pagination, users=users) - - - -cdumay/flask-tat -https://github.com/cdumay/flask-tat -Entry file: flask-tat/examples/simple.py -Scanned: 2016-10-20 12:37:47.290716 -No vulnerabilities found. - - -wizardbeard/demoservice_flask -https://github.com/wizardbeard/demoservice_flask -Entry file: demoservice_flask/env/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-20 12:38:00.763038 -No vulnerabilities found. - - -mvbn6789/flask-blog -https://github.com/mvbn6789/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:38:01.384744 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -andrew-j-price/python-flask -https://github.com/andrew-j-price/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 12:38:01.911391 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -VarmintWorks/VarmintFlask -https://github.com/VarmintWorks/VarmintFlask -Entry file: VarmintFlask/main.py -Scanned: 2016-10-20 12:38:03.650197 -No vulnerabilities found. - - -dqisme/Learn-Flask -https://github.com/dqisme/Learn-Flask -Entry file: Learn-Flask/hello.py -Scanned: 2016-10-20 12:38:04.953069 -No vulnerabilities found. - - -bakslash/flask_social -https://github.com/bakslash/flask_social -Entry file: flask_social/app.py -Scanned: 2016-10-20 12:38:05.474084 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jiri-fiala/flask-hellow -https://github.com/jiri-fiala/flask-hellow -Entry file: flask-hellow/app.py -Scanned: 2016-10-20 12:38:06.788506 -No vulnerabilities found. - - -fmlvn/quiz -https://github.com/fmlvn/quiz -Entry file: quiz/quiz/__init__.py -Scanned: 2016-10-20 12:38:08.582000 -No vulnerabilities found. - - -kawilliams/new-db-Pronto-Flask -https://github.com/kawilliams/new-db-Pronto-Flask -Entry file: new-db-Pronto-Flask/syllabi_manager.py -Scanned: 2016-10-20 12:38:09.114368 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stephenjjones/flask-auth-service -https://github.com/stephenjjones/flask-auth-service -Entry file: flask-auth-service/app/__init__.py -Scanned: 2016-10-20 12:38:10.442032 -Vulnerability 1: -File: flask-auth-service/app/main/views.py - > User input at line 18, trigger word ".data": - email = result.data['email'] -Reassigned in: - File: flask-auth-service/app/main/views.py - > Line 22: user = User(email=email) -File: flask-auth-service/app/main/views.py - > reaches line 26, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 2: -File: flask-auth-service/app/main/views.py - > User input at line 18, trigger word ".data": - email = result.data['email'] -Reassigned in: - File: flask-auth-service/app/main/views.py - > Line 22: user = User(email=email) -File: flask-auth-service/app/main/views.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'user.email), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: flask-auth-service/app/main/views.py - > User input at line 31, trigger word "get(": - user = User.query.get(id) -File: flask-auth-service/app/main/views.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('email'user.email) - - - -maikeulb/flask-by-example -https://github.com/maikeulb/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 12:38:11.110733 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -atelic/flask-react-skeleton -https://github.com/atelic/flask-react-skeleton -Entry file: None -Scanned: 2016-10-20 12:38:11.636940 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/atelic/flask-react-skeleton. - -cdumay/flask-graylog-bundle -https://github.com/cdumay/flask-graylog-bundle -Entry file: flask-graylog-bundle/examples/auth.py -Scanned: 2016-10-20 12:38:20.108628 -No vulnerabilities found. - - -xufuou/flask-by-example -https://github.com/xufuou/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 12:38:26.301270 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Michael728/awesome-flask-todo -https://github.com/Michael728/awesome-flask-todo -Entry file: None -Scanned: 2016-10-20 12:38:27.802777 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Michael728/awesome-flask-todo. - -ayttew/flask-simple-app -https://github.com/ayttew/flask-simple-app -Entry file: flask-simple-app/app/src/app.py -Scanned: 2016-10-20 12:38:29.143316 -No vulnerabilities found. - - -chiefspace/flask_media_streaming_server -https://github.com/chiefspace/flask_media_streaming_server -Entry file: flask_media_streaming_server/run.py -Scanned: 2016-10-20 12:38:29.783857 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_media_streaming_server/flask/lib/python2.7/genericpath.py - -vigevenoj/flask-hue-sensors -https://github.com/vigevenoj/flask-hue-sensors -Entry file: flask-hue-sensors/app/__init__.py -Scanned: 2016-10-20 12:38:31.913126 -No vulnerabilities found. - - -kyouko-taiga/Flask-SocketAPI -https://github.com/kyouko-taiga/Flask-SocketAPI -Entry file: Flask-SocketAPI/test_socketapi.py -Scanned: 2016-10-20 12:38:33.535105 -No vulnerabilities found. - - -learningpython08/flask-file-sharing -https://github.com/learningpython08/flask-file-sharing -Entry file: flask-file-sharing/upload/handlers.py -Scanned: 2016-10-20 12:38:35.086043 -Vulnerability 1: -File: flask-file-sharing/upload/handlers.py - > User input at line 55, trigger word "get(": - file_obj = request.files.get('file') -Reassigned in: - File: flask-file-sharing/upload/handlers.py - > Line 66: fname = secure_filename(file_obj.filename) - File: flask-file-sharing/upload/handlers.py - > Line 68: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 70: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 79: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 80: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 91: ret_MAYBE_FUNCTION_NAME = (resp, 201) -File: flask-file-sharing/upload/handlers.py - > reaches line 86, trigger word "url_for(": - prv_url = url_for('preview',path=url_path, _external=True) - -Vulnerability 2: -File: flask-file-sharing/upload/handlers.py - > User input at line 55, trigger word "get(": - file_obj = request.files.get('file') -Reassigned in: - File: flask-file-sharing/upload/handlers.py - > Line 66: fname = secure_filename(file_obj.filename) - File: flask-file-sharing/upload/handlers.py - > Line 68: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 70: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 79: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 80: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 91: ret_MAYBE_FUNCTION_NAME = (resp, 201) -File: flask-file-sharing/upload/handlers.py - > reaches line 87, trigger word "url_for(": - dl_url = url_for('download',path=url_path, _external=True) - -Vulnerability 3: -File: flask-file-sharing/upload/handlers.py - > User input at line 55, trigger word "get(": - file_obj = request.files.get('file') -Reassigned in: - File: flask-file-sharing/upload/handlers.py - > Line 66: fname = secure_filename(file_obj.filename) - File: flask-file-sharing/upload/handlers.py - > Line 68: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 70: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 79: fname = secure_filename(file_name) - File: flask-file-sharing/upload/handlers.py - > Line 80: url_path = '/'.join([subdir, fname]) - File: flask-file-sharing/upload/handlers.py - > Line 91: ret_MAYBE_FUNCTION_NAME = (resp, 201) -File: flask-file-sharing/upload/handlers.py - > reaches line 89, trigger word "jsonify(": - resp = jsonify(download=dl_url, preview=prv_url) - - - -StephenWeber/rundeck-sensu-flask -https://github.com/StephenWeber/rundeck-sensu-flask -Entry file: rundeck-sensu-flask/rsf/__init__.py -Scanned: 2016-10-20 12:38:36.476019 -No vulnerabilities found. - - -chiefspace/miguelgrinberg_flask_mega -https://github.com/chiefspace/miguelgrinberg_flask_mega -Entry file: None -Scanned: 2016-10-20 12:38:37.035465 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mikefromit/flask-jsonschema-example -https://github.com/mikefromit/flask-jsonschema-example -Entry file: flask-jsonschema-example/app.py -Scanned: 2016-10-20 12:38:44.940790 -No vulnerabilities found. - - -beibeiyang/cf-flask-bokeh-demo -https://github.com/beibeiyang/cf-flask-bokeh-demo -Entry file: cf-flask-bokeh-demo/stocks.py -Scanned: 2016-10-20 12:38:46.351810 -Vulnerability 1: -File: cf-flask-bokeh-demo/stocks.py - > User input at line 47, trigger word "get(": - symbol = request.args.get('symbol') -Reassigned in: - File: cf-flask-bokeh-demo/stocks.py - > Line 52: api_url = 'https://www.quandl.com/api/v1/datasets/WIKI/%s.json' % symbol - File: cf-flask-bokeh-demo/stocks.py - > Line 55: raw_data = session.get(api_url).text - File: cf-flask-bokeh-demo/stocks.py - > Line 56: json_data = json.loads(raw_data) - File: cf-flask-bokeh-demo/stocks.py - > Line 59: df = DataFrame(data=json_data['data'], columns=json_data['column_names']) - File: cf-flask-bokeh-demo/stocks.py - > Line 68: df['left'] = pd.DatetimeIndex(df.Date) - pd.DateOffset(days=0.5) - File: cf-flask-bokeh-demo/stocks.py - > Line 69: df['right'] = pd.DatetimeIndex(df.Date) + pd.DateOffset(days=0.5) - File: cf-flask-bokeh-demo/stocks.py - > Line 114: header = '

%s of %s

Name: %s

Description (from our data provider): %s

Zoom into the chart to see more detail.

' % (json_data['source_name'], json_data['code'], json_data['name'], json_data['description']) -File: cf-flask-bokeh-demo/stocks.py - > reaches line 122, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('graph.html',script=script, div=div, header=header) - -Vulnerability 2: -File: cf-flask-bokeh-demo/stocks.py - > User input at line 55, trigger word "get(": - raw_data = session.get(api_url).text -Reassigned in: - File: cf-flask-bokeh-demo/stocks.py - > Line 56: json_data = json.loads(raw_data) - File: cf-flask-bokeh-demo/stocks.py - > Line 59: df = DataFrame(data=json_data['data'], columns=json_data['column_names']) - File: cf-flask-bokeh-demo/stocks.py - > Line 68: df['left'] = pd.DatetimeIndex(df.Date) - pd.DateOffset(days=0.5) - File: cf-flask-bokeh-demo/stocks.py - > Line 69: df['right'] = pd.DatetimeIndex(df.Date) + pd.DateOffset(days=0.5) - File: cf-flask-bokeh-demo/stocks.py - > Line 114: header = '

%s of %s

Name: %s

Description (from our data provider): %s

Zoom into the chart to see more detail.

' % (json_data['source_name'], json_data['code'], json_data['name'], json_data['description']) -File: cf-flask-bokeh-demo/stocks.py - > reaches line 122, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('graph.html',script=script, div=div, header=header) - - - -Omrigan/flask-github-ci -https://github.com/Omrigan/flask-github-ci -Entry file: flask-github-ci/service.py -Scanned: 2016-10-20 12:38:46.876610 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -krisekenes/productsDashFlask -https://github.com/krisekenes/productsDashFlask -Entry file: productsDashFlask/server.py -Scanned: 2016-10-20 12:38:48.295103 -No vulnerabilities found. - - -bmd/flask-docker-cookiecutter -https://github.com/bmd/flask-docker-cookiecutter -Entry file: flask-docker-cookiecutter/{{ cookiecutter.app_name }}/{{ cookiecutter.app_name }}/{{ cookiecutter.app_name }}/app.py -Scanned: 2016-10-20 12:38:48.811022 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Athsheep/Flask_Web_Development -https://github.com/Athsheep/Flask_Web_Development -Entry file: Flask_Web_Development/app/__init__.py -Scanned: 2016-10-20 12:38:59.865679 -Vulnerability 1: -File: Flask_Web_Development/app/main/views.py - > User input at line 32, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 40: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/main/views.py - > Line 42: posts = pagination.items - File: Flask_Web_Development/app/main/views.py - > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask_Web_Development/app/main/views.py - > reaches line 43, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Flask_Web_Development/app/main/views.py - > User input at line 35, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 33: show_followed = False - File: Flask_Web_Development/app/main/views.py - > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask_Web_Development/app/main/views.py - > reaches line 43, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Flask_Web_Development/app/main/views.py - > User input at line 136, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 138: page = post.comments.count() - 1 / 10 + 1 - File: Flask_Web_Development/app/main/views.py - > Line 139: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/main/views.py - > Line 141: comments = pagination.items - File: Flask_Web_Development/app/main/views.py - > Line 135: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Flask_Web_Development/app/main/views.py - > reaches line 142, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: Flask_Web_Development/app/main/views.py - > User input at line 182, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 183: pagination = user.followers.paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/main/views.py - > Line 185: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Flask_Web_Development/app/main/views.py - > Line 181: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask_Web_Development/app/main/views.py - > reaches line 187, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: Flask_Web_Development/app/main/views.py - > User input at line 196, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 197: pagination = user.followed.paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/main/views.py - > Line 199: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Flask_Web_Development/app/main/views.py - > Line 195: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask_Web_Development/app/main/views.py - > reaches line 201, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Flask_Web_Development/app/main/views.py - > User input at line 223, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/main/views.py - > Line 225: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/main/views.py - > Line 227: comments = pagination.items -File: Flask_Web_Development/app/main/views.py - > reaches line 229, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 7: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 15: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 17: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 18: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 21: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 20, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 15: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 17: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 18: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 21: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 23, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 15: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 17: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 18: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 21: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 24, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 35: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 37: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 40, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 11: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 35: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 37: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 43, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 12: -File: Flask_Web_Development/app/api_1_0/users.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/users.py - > Line 35: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/users.py - > Line 37: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/users.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/users.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/users.py - > reaches line 44, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 13: -File: Flask_Web_Development/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 18: next = None -File: Flask_Web_Development/app/api_1_0/posts.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 14: -File: Flask_Web_Development/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 18: next = None -File: Flask_Web_Development/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 15: -File: Flask_Web_Development/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask_Web_Development/app/api_1_0/posts.py - > Line 18: next = None -File: Flask_Web_Development/app/api_1_0/posts.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 16: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 13: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 16: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 15, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 17: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 13: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 16: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 18, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 18: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 13: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 16: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 19, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 19: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 40, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 20: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 43, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 21: -File: Flask_Web_Development/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 38: prev = None - File: Flask_Web_Development/app/api_1_0/comments.py - > Line 41: next = None -File: Flask_Web_Development/app/api_1_0/comments.py - > reaches line 44, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -kukuhsain/learn-flask-python -https://github.com/kukuhsain/learn-flask-python -Entry file: learn-flask-python/helloworld.py -Scanned: 2016-10-20 12:39:02.807745 -No vulnerabilities found. - - -Artadys/flask-by-example -https://github.com/Artadys/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 12:39:03.515416 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gorogoro13/mFlask-TumbleLog -https://github.com/gorogoro13/mFlask-TumbleLog -Entry file: mFlask-TumbleLog/init.py -Scanned: 2016-10-20 12:39:04.824323 -No vulnerabilities found. - - -saileshpatnala/flask-by-example -https://github.com/saileshpatnala/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 12:39:05.517672 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Kontiomaa/flask-sqlalchemy-demo -https://github.com/Kontiomaa/flask-sqlalchemy-demo -Entry file: flask-sqlalchemy-demo/app.py -Scanned: 2016-10-20 12:39:07.425928 -Vulnerability 1: -File: flask-sqlalchemy-demo/app.py - > User input at line 76, trigger word "get(": - order = Order.query.get(order_id) -Reassigned in: - File: flask-sqlalchemy-demo/app.py - > Line 81: orderData = 'Orderer''status''Items'order.customer.usernameorder.status['Name''Amount'row.itemonrow.productNamerow.count for row in order.orderrow] -File: flask-sqlalchemy-demo/app.py - > reaches line 83, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(orderData) - - - -1131909224/flask -https://github.com/1131909224/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:39:10.802516 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -wangrenlearn/flask -https://github.com/wangrenlearn/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:39:11.871353 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -dongshuiquan/flasky -https://github.com/dongshuiquan/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:39:26.371294 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -caseydunham/flaskr -https://github.com/caseydunham/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:39:27.885463 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -francium/flaskr -https://github.com/francium/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:39:28.406341 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Qqlick/Flasktaskr -https://github.com/Qqlick/Flasktaskr -Entry file: Flasktaskr/flask_api.py -Scanned: 2016-10-20 12:39:29.967842 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yolandaz/flaskcars -https://github.com/yolandaz/flaskcars -Entry file: flaskcars/app.py -Scanned: 2016-10-20 12:39:30.635491 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskcars/venv/lib/python2.7/genericpath.py - -PansFortress/flaskr -https://github.com/PansFortress/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:39:33.164344 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -goodman1209/flaskrestserver -https://github.com/goodman1209/flaskrestserver -Entry file: flaskrestserver/hello.py -Scanned: 2016-10-20 12:39:35.502716 -No vulnerabilities found. - - -Ivicel/flasky -https://github.com/Ivicel/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:39:36.024272 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -k0itsu/flasktaskr -https://github.com/k0itsu/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:39:37.526739 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -atsk1618/flasko -https://github.com/atsk1618/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-20 12:39:38.171906 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py - -penglee87/flaskblog -https://github.com/penglee87/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 12:39:44.718946 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -Halcae/flaskapp -https://github.com/Halcae/flaskapp -Entry file: None -Scanned: 2016-10-20 12:39:46.221858 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Halcae/flaskapp. - -Kermit95/Flaskr -https://github.com/Kermit95/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 12:39:47.732146 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -juniorkrvl/flasky -https://github.com/juniorkrvl/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:39:48.234560 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davbrink/flasktaskr -https://github.com/davbrink/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:39:49.748498 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ptrees/flaskr -https://github.com/ptrees/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:39:52.277398 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -langlangago/Flasky -https://github.com/langlangago/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-20 12:40:00.784933 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jcue/flasktaskr -https://github.com/jcue/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:40:02.324757 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -qhdong/flaskr -https://github.com/qhdong/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:40:03.886849 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aksenovpb/flaskproject -https://github.com/aksenovpb/flaskproject -Entry file: None -Scanned: 2016-10-20 12:40:04.392148 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ncmadhu/FlaskDemo -https://github.com/ncmadhu/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 12:40:05.915488 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -LiKePAIN/FlaskStudy -https://github.com/LiKePAIN/FlaskStudy -Entry file: FlaskStudy/flaskr.py -Scanned: 2016-10-20 12:40:06.426589 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -playscforever/flaskProject -https://github.com/playscforever/flaskProject -Entry file: flaskProject/helloFlask/app.py -Scanned: 2016-10-20 12:40:06.984551 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MarkoArsenovic/FlaskAuth -https://github.com/MarkoArsenovic/FlaskAuth -Entry file: FlaskAuth/testapp/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 12:40:08.680996 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PythonWorkshop/TensorFlowFlask -https://github.com/PythonWorkshop/TensorFlowFlask -Entry file: TensorFlowFlask/main.py -Scanned: 2016-10-20 12:40:13.074949 -Vulnerability 1: -File: TensorFlowFlask/main.py - > User input at line 48, trigger word ".data": - filename = secure_filename(form.training_data.data.filename) -Reassigned in: - File: TensorFlowFlask/main.py - > Line 52: dataframe = pd.read_csv('wine_quality/data/' + filename,sep=',') - File: TensorFlowFlask/main.py - > Line 55: filename = None -File: TensorFlowFlask/main.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('test_data_upload.html',form=form, filename=filename) - - - -bigzhao/flask-wechat -https://github.com/bigzhao/flask-wechat -Entry file: flask-wechat/fenghuang/__init__.py -Scanned: 2016-10-20 12:40:13.596893 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vishukamble/PythonFlask -https://github.com/vishukamble/PythonFlask -Entry file: PythonFlask/flask/Lib/site-packages/flask_bcrypt.py -Scanned: 2016-10-20 12:40:20.512298 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -szparag3/flask-blog -https://github.com/szparag3/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:40:21.048800 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -ketanrk/flask_practice -https://github.com/ketanrk/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-20 12:40:21.638103 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jdgwartney/flask-blueprint -https://github.com/jdgwartney/flask-blueprint -Entry file: flask-blueprint/api/__init__.py -Scanned: 2016-10-20 12:40:27.148521 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cooleo/flask-cassandra -https://github.com/cooleo/flask-cassandra -Entry file: flask-cassandra/app/__init__.py -Scanned: 2016-10-20 12:40:29.949112 -Vulnerability 1: -File: flask-cassandra/app/models/app.py - > User input at line 301, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: flask-cassandra/app/models/app.py - > Line 304: user = User(username=username) - File: flask-cassandra/app/models/app.py - > Line 307: session['id'] = user.id - File: flask-cassandra/app/models/app.py - > Line 309: user = current_user() - File: flask-cassandra/app/models/app.py - > Line 302: user = User.query.filter_by(username=username).first() - File: flask-cassandra/app/models/app.py - > Line 308: ret_MAYBE_FUNCTION_NAME = redirect('/') -File: flask-cassandra/app/models/app.py - > reaches line 310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',user=user) - - - -abhishekg785/flask-gevent -https://github.com/abhishekg785/flask-gevent -Entry file: flask-gevent/chatServer.py -Scanned: 2016-10-20 12:40:31.581114 -No vulnerabilities found. - - -lucilecoutouly/back-flask -https://github.com/lucilecoutouly/back-flask -Entry file: back-flask/back_nsa/app/__init__.py -Scanned: 2016-10-20 12:40:32.230303 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ggrumbley/flask_example -https://github.com/ggrumbley/flask_example -Entry file: None -Scanned: 2016-10-20 12:40:32.743171 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mehemken/generic-flask -https://github.com/mehemken/generic-flask -Entry file: generic-flask/app.py -Scanned: 2016-10-20 12:40:34.066168 -No vulnerabilities found. - - -Keita1/flask-blog -https://github.com/Keita1/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:40:35.659438 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -ja8zyjits/redis-flask -https://github.com/ja8zyjits/redis-flask -Entry file: redis-flask/flask_app.py -Scanned: 2016-10-20 12:40:36.960147 -Vulnerability 1: -File: redis-flask/flask_app.py - > User input at line 13, trigger word "get(": - number = int(request.values.get('number')) -Reassigned in: - File: redis-flask/flask_app.py - > Line 14: value = find_sum(number) -File: redis-flask/flask_app.py - > reaches line 15, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sum_finder.html',sum_value=value) - - - -themikepearce/flask-blog -https://github.com/themikepearce/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:40:38.521944 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Momingcoder/learn-flask -https://github.com/Momingcoder/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 12:40:39.191785 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -greenapplepark/flask_docker -https://github.com/greenapplepark/flask_docker -Entry file: flask_docker/app/flaskEntry.py -Scanned: 2016-10-20 12:40:45.502362 -No vulnerabilities found. - - -karloku/beginners_flask -https://github.com/karloku/beginners_flask -Entry file: beginners_flask/application/__init__.py -Scanned: 2016-10-20 12:40:47.964509 -No vulnerabilities found. - - -s2tephen/flask-network -https://github.com/s2tephen/flask-network -Entry file: flask-network/app.py -Scanned: 2016-10-20 12:40:49.269410 -No vulnerabilities found. - - -julianparismorgan/flask_cellcounter -https://github.com/julianparismorgan/flask_cellcounter -Entry file: flask_cellcounter/cell-app.py -Scanned: 2016-10-20 12:40:57.539620 -No vulnerabilities found. - - -vigneshrajkumar/simple-flask -https://github.com/vigneshrajkumar/simple-flask -Entry file: simple-flask/simple.py -Scanned: 2016-10-20 12:40:58.878222 -No vulnerabilities found. - - -linkinshurik/api_flask -https://github.com/linkinshurik/api_flask -Entry file: api_flask/app/__init__.py -Scanned: 2016-10-20 12:41:00.342849 -No vulnerabilities found. - - -pranavbadami/damson-flask -https://github.com/pranavbadami/damson-flask -Entry file: damson-flask/damson.py -Scanned: 2016-10-20 12:41:00.965343 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coding2000/flask_web -https://github.com/coding2000/flask_web -Entry file: flask_web/helloflask.py -Scanned: 2016-10-20 12:41:02.544849 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py - -shihanng/appengine-flask -https://github.com/shihanng/appengine-flask -Entry file: appengine-flask/src/application/__init__.py -Scanned: 2016-10-20 12:41:04.947795 -No vulnerabilities found. - - -cristopher-rodrigues/phyton-flask -https://github.com/cristopher-rodrigues/phyton-flask -Entry file: None -Scanned: 2016-10-20 12:41:05.523273 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -alodavi/flask_blog -https://github.com/alodavi/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:41:06.029213 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sharan-monikantan/hello-flask -https://github.com/sharan-monikantan/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 12:41:06.629527 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -Mubbly/flask_test -https://github.com/Mubbly/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 12:41:07.201226 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -asherkhb/flask-tutorial -https://github.com/asherkhb/flask-tutorial -Entry file: None -Scanned: 2016-10-20 12:41:08.704733 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -awproksel/docker_flask -https://github.com/awproksel/docker_flask -Entry file: docker_flask/code/app.py -Scanned: 2016-10-20 12:41:11.132480 -No vulnerabilities found. - - -tigerisnotinwood/flask_wx -https://github.com/tigerisnotinwood/flask_wx -Entry file: flask_wx/run.py -Scanned: 2016-10-20 12:41:12.656058 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sdzharkov/bitFlask -https://github.com/sdzharkov/bitFlask -Entry file: None -Scanned: 2016-10-20 12:41:14.193960 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SverreHerland/flask-intro -https://github.com/SverreHerland/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:41:14.712250 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -valexandersaulys/flask-ladder -https://github.com/valexandersaulys/flask-ladder -Entry file: flask-ladder/app/__init__.py -Scanned: 2016-10-20 12:41:22.530051 -No vulnerabilities found. - - -Subh1994/flask_demo -https://github.com/Subh1994/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 12:41:23.050049 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zheins/portalFlask -https://github.com/zheins/portalFlask -Entry file: portalFlask/portalFlask.py -Scanned: 2016-10-20 12:41:27.565466 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yvonnendutaw/flask-template -https://github.com/yvonnendutaw/flask-template -Entry file: None -Scanned: 2016-10-20 12:41:29.102698 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yvonnendutaw/flask-template. - -devtye/learn-flask -https://github.com/devtye/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 12:41:30.820754 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laerciosb/flask_challanges -https://github.com/laerciosb/flask_challanges -Entry file: flask_challanges/v2/app/core.py -Scanned: 2016-10-20 12:41:32.339987 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -python-ning/jira_flask -https://github.com/python-ning/jira_flask -Entry file: jira_flask/jira.py -Scanned: 2016-10-20 12:41:32.855275 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ricleal/TornadoFlask -https://github.com/ricleal/TornadoFlask -Entry file: TornadoFlask/flasky.py -Scanned: 2016-10-20 12:41:34.295977 -No vulnerabilities found. - - -ekozlowski/flask_demo -https://github.com/ekozlowski/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 12:41:35.866200 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lucidfrontier45/flask-rethinkview -https://github.com/lucidfrontier45/flask-rethinkview -Entry file: flask-rethinkview/examples/main.py -Scanned: 2016-10-20 12:41:37.193870 -No vulnerabilities found. - - -chriskoh/intraday-flask -https://github.com/chriskoh/intraday-flask -Entry file: None -Scanned: 2016-10-20 12:41:38.727176 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pouya-abbassi/rashapay-flask -https://github.com/pouya-abbassi/rashapay-flask -Entry file: rashapay-flask/main.py -Scanned: 2016-10-20 12:41:40.257308 -No vulnerabilities found. - - -c03rcion/flask-weather -https://github.com/c03rcion/flask-weather -Entry file: flask-weather/app.py -Scanned: 2016-10-20 12:41:44.793706 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neoden/flask-filecache -https://github.com/neoden/flask-filecache -Entry file: flask-filecache/flask_filecache.py -Scanned: 2016-10-20 12:41:48.238317 -No vulnerabilities found. - - -lstmemery/flask-sqlalchemy -https://github.com/lstmemery/flask-sqlalchemy -Entry file: flask-sqlalchemy/run.py -Scanned: 2016-10-20 12:41:48.765930 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -charoleizer/TDD-Flask -https://github.com/charoleizer/TDD-Flask -Entry file: TDD-Flask/fonts/py/WebService/app.py -Scanned: 2016-10-20 12:41:57.399649 -No vulnerabilities found. - - -botheredbybees/flask-rss -https://github.com/botheredbybees/flask-rss -Entry file: flask-rss/headlines.py -Scanned: 2016-10-20 12:41:59.983068 -Vulnerability 1: -File: flask-rss/headlines.py - > User input at line 21, trigger word "get(": - query = urllib.parse.unquote_plus(request.args.get('publication')) -Reassigned in: - File: flask-rss/headlines.py - > Line 23: query = 'ABC Hobart' - File: flask-rss/headlines.py - > Line 24: feed = feedparser.parse(RSS_FEEDS[query]) - File: flask-rss/headlines.py - > Line 28: ret_MAYBE_FUNCTION_NAME = 'no news is good news' -File: flask-rss/headlines.py - > reaches line 26, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',articles=feed['entries'], header=query, rssFeeds=RSS_FEEDS, weather=weather) - - - -coding2000/flask_base -https://github.com/coding2000/flask_base -Entry file: flask_base/flask_01.py -Scanned: 2016-10-20 12:42:01.254845 -No vulnerabilities found. - - -afrancisboeuf/workshop_flask -https://github.com/afrancisboeuf/workshop_flask -Entry file: workshop_flask/1_get_started/6.py -Scanned: 2016-10-20 12:42:01.944855 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: workshop_flask/1_get_started/venv/lib/python2.7/genericpath.py - -tyfulcrum/Flask_Demo -https://github.com/tyfulcrum/Flask_Demo -Entry file: Flask_Demo/hello.py -Scanned: 2016-10-20 12:42:04.248927 -No vulnerabilities found. - - -chenkaiyu1997/flask-learning -https://github.com/chenkaiyu1997/flask-learning -Entry file: flask-learning/app/__init__.py -Scanned: 2016-10-20 12:42:05.564277 -No vulnerabilities found. - - -tpugh/flask_sample -https://github.com/tpugh/flask_sample -Entry file: flask_sample/app_hello.py -Scanned: 2016-10-20 12:42:06.100156 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -schenkd/flask-core -https://github.com/schenkd/flask-core -Entry file: flask-core/app/__init__.py -Scanned: 2016-10-20 12:42:15.092396 -No vulnerabilities found. - - -sasakalaba/flask_project -https://github.com/sasakalaba/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-20 12:42:15.952186 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jorgezepeda/flask-hello-world -https://github.com/jorgezepeda/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 12:42:16.503828 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -rajarshi98/giftsaver -https://github.com/rajarshi98/giftsaver -Entry file: giftsaver/app.py -Scanned: 2016-10-20 12:42:17.024738 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -newkdukem/flask4e -https://github.com/newkdukem/flask4e -Entry file: flask4e/headlines.py -Scanned: 2016-10-20 12:42:18.846224 -No vulnerabilities found. - - -fmlvn/quiz -https://github.com/fmlvn/quiz -Entry file: quiz/quiz/__init__.py -Scanned: 2016-10-20 12:42:20.598626 -No vulnerabilities found. - - -top2topii/FlaskServiceWin32 -https://github.com/top2topii/FlaskServiceWin32 -Entry file: FlaskServiceWin32/myapp.py -Scanned: 2016-10-20 12:42:21.909786 -No vulnerabilities found. - - -jpvillavicencio/FlaskDemoAPI -https://github.com/jpvillavicencio/FlaskDemoAPI -Entry file: FlaskDemoAPI/app.py -Scanned: 2016-10-20 12:42:23.454295 -No vulnerabilities found. - - -cdumay/flask-graylog-bundle -https://github.com/cdumay/flask-graylog-bundle -Entry file: flask-graylog-bundle/examples/auth.py -Scanned: 2016-10-20 12:42:31.236857 -No vulnerabilities found. - - -ankitkmishra/flask_microblog_tutorial -https://github.com/ankitkmishra/flask_microblog_tutorial -Entry file: None -Scanned: 2016-10-20 12:42:40.700851 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Karthik-Ramvijay/Flask_API-PROJECT -https://github.com/Karthik-Ramvijay/Flask_API-PROJECT -Entry file: None -Scanned: 2016-10-20 12:42:41.694340 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Karthik-Ramvijay/Flask_API-PROJECT. - -themese/flask -https://github.com/themese/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:42:43.763381 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -bTanya/flask -https://github.com/bTanya/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:42:44.338029 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -rafaelhenrique/flask_tutorial -https://github.com/rafaelhenrique/flask_tutorial -Entry file: None -Scanned: 2016-10-20 12:42:45.315602 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sousic/flask_study -https://github.com/sousic/flask_study -Entry file: flask_study/views.py -Scanned: 2016-10-20 12:42:47.324264 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davidgomes/flask-pygood -https://github.com/davidgomes/flask-pygood -Entry file: flask-pygood/flask_pygood/test/demo.py -Scanned: 2016-10-20 12:42:49.740768 -No vulnerabilities found. - - -goodman1209/flaskrestserver -https://github.com/goodman1209/flaskrestserver -Entry file: flaskrestserver/hello.py -Scanned: 2016-10-20 12:42:52.063620 -No vulnerabilities found. - - -marvinmarnold/flasky -https://github.com/marvinmarnold/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:42:59.608684 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bassel-meet/flasky -https://github.com/bassel-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:01.128967 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sima16-meet/flasky -https://github.com/sima16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:02.643651 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tamar16-meet/flasky -https://github.com/tamar16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:04.163227 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alma16-meet/flasky -https://github.com/alma16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:05.696864 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -guy16-meet/flasky -https://github.com/guy16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:06.225371 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aixiamomo/flasky -https://github.com/aixiamomo/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:06.739505 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dina16-meet/flasky -https://github.com/dina16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:16.260212 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -orr16-meet/flasky -https://github.com/orr16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:16.780149 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -roni16-meet/flasky -https://github.com/roni16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:17.283497 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rama16-meet/flasky -https://github.com/rama16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:17.789628 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yuyanqiuqiu/flaskblog -https://github.com/yuyanqiuqiu/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 12:43:18.315558 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -wwpika/flaskww -https://github.com/wwpika/flaskww -Entry file: flaskww/app/__init__.py -Scanned: 2016-10-20 12:43:25.908817 -Vulnerability 1: -File: flaskww/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 32: posts = pagination.items - File: flaskww/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskww/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskww/app/main/views.py - > User input at line 24, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskww/app/main/views.py - > Line 22: show_followed = False - File: flaskww/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskww/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskww/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 45: posts = pagination.items -File: flaskww/app/main/views.py - > reaches line 46, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flaskww/app/main/views.py - > User input at line 103, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 105: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskww/app/main/views.py - > Line 107: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 111: comments = pagination.items - File: flaskww/app/main/views.py - > Line 102: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskww/app/main/views.py - > reaches line 112, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flaskww/app/main/views.py - > User input at line 168, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 169: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 173: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskww/app/main/views.py - > Line 167: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskww/app/main/views.py - > reaches line 175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flaskww/app/main/views.py - > User input at line 185, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 186: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 190: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskww/app/main/views.py - > Line 184: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskww/app/main/views.py - > reaches line 192, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flaskww/app/main/views.py - > User input at line 214, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/main/views.py - > Line 215: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/main/views.py - > Line 219: comments = pagination.items -File: flaskww/app/main/views.py - > reaches line 220, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flaskww/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('get', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/users.py - > Line 18: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 19: prev = None - File: flaskww/app/api_1_0/users.py - > Line 22: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 21, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flaskww/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('get', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/users.py - > Line 18: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 19: prev = None - File: flaskww/app/api_1_0/users.py - > Line 22: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 24, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flaskww/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('get', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/users.py - > Line 18: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 19: prev = None - File: flaskww/app/api_1_0/users.py - > Line 22: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 25, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flaskww/app/api_1_0/users.py - > User input at line 35, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 36: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], errror_out=False) - File: flaskww/app/api_1_0/users.py - > Line 40: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 41: prev = None - File: flaskww/app/api_1_0/users.py - > Line 45: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 43, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flaskww/app/api_1_0/users.py - > User input at line 35, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 36: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], errror_out=False) - File: flaskww/app/api_1_0/users.py - > Line 40: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 41: prev = None - File: flaskww/app/api_1_0/users.py - > Line 45: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flaskww/app/api_1_0/users.py - > User input at line 35, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/users.py - > Line 36: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], errror_out=False) - File: flaskww/app/api_1_0/users.py - > Line 40: posts = pagination.items - File: flaskww/app/api_1_0/users.py - > Line 41: prev = None - File: flaskww/app/api_1_0/users.py - > Line 45: next = None -File: flaskww/app/api_1_0/users.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flaskww/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskww/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskww/app/api_1_0/posts.py - > Line 19: next = None -File: flaskww/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flaskww/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskww/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskww/app/api_1_0/posts.py - > Line 19: next = None -File: flaskww/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flaskww/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskww/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskww/app/api_1_0/posts.py - > Line 19: next = None -File: flaskww/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flaskww/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 18: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flaskww/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 18: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flaskww/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 18: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flaskww/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 46: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flaskww/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 46: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flaskww/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskww/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskww/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskww/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskww/app/api_1_0/comments.py - > Line 46: next = None -File: flaskww/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -yasmeen16-meet/flasky -https://github.com/yasmeen16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:26.450986 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -amjad16-meet/flasky -https://github.com/amjad16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:26.963609 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elias16-meet/flasky -https://github.com/elias16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:27.471562 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bluethon/flasky -https://github.com/bluethon/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:28.984505 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -teodorgarzdin/Flaskr -https://github.com/teodorgarzdin/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 12:43:30.569491 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -langlangago/Flasky -https://github.com/langlangago/Flasky -Entry file: Flasky/app/__init__.py -Scanned: 2016-10-20 12:43:32.077585 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aksenovpb/flaskproject -https://github.com/aksenovpb/flaskproject -Entry file: None -Scanned: 2016-10-20 12:43:41.611862 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pengshiqi/Flaskr -https://github.com/pengshiqi/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 12:43:42.123893 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stylianos-kampakis/flasktaskr -https://github.com/stylianos-kampakis/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:43:42.630146 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yara16-meet/flasky -https://github.com/yara16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:44.140546 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nimala16-meet/Flasky- -https://github.com/nimala16-meet/Flasky- -Entry file: None -Scanned: 2016-10-20 12:43:44.664520 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nimala16-meet/Flasky-. - -shiran16-meet/flasky -https://github.com/shiran16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:45.163682 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fadi16-meet/flasky -https://github.com/fadi16-meet/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:43:45.677391 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chijie/flaskdemo -https://github.com/chijie/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 12:43:46.196597 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -decherd/flasktaskr -https://github.com/decherd/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:43:47.706433 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -arsalanam/flasktasker7 -https://github.com/arsalanam/flasktasker7 -Entry file: flasktasker7/project/__init__.py -Scanned: 2016-10-20 12:43:50.179698 -No vulnerabilities found. - - -LiKePAIN/FlaskStudy -https://github.com/LiKePAIN/FlaskStudy -Entry file: FlaskStudy/flaskr.py -Scanned: 2016-10-20 12:43:51.702394 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Recad/FlaskSO -https://github.com/Recad/FlaskSO -Entry file: FlaskSO/Flask-vbox-so.py -Scanned: 2016-10-20 12:44:01.149960 -No vulnerabilities found. - - -NateLove/FlaskTest -https://github.com/NateLove/FlaskTest -Entry file: None -Scanned: 2016-10-20 12:44:01.654477 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/NateLove/FlaskTest. - -playscforever/flaskProject -https://github.com/playscforever/flaskProject -Entry file: flaskProject/helloFlask/app.py -Scanned: 2016-10-20 12:44:03.174353 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -winray/FlaskNote -https://github.com/winray/FlaskNote -Entry file: FlaskNote/microblog/app/__init__.py -Scanned: 2016-10-20 12:44:05.609045 -No vulnerabilities found. - - -anilkunchalaece/flaskForm -https://github.com/anilkunchalaece/flaskForm -Entry file: flaskForm/flaskApp.py -Scanned: 2016-10-20 12:44:06.135531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bigzhao/flask-wechat -https://github.com/bigzhao/flask-wechat -Entry file: flask-wechat/fenghuang/__init__.py -Scanned: 2016-10-20 12:44:07.127286 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -CaveMike/flask_rest -https://github.com/CaveMike/flask_rest -Entry file: None -Scanned: 2016-10-20 12:44:16.704173 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/CaveMike/flask_rest. - -wlingxiao/HelloFlask -https://github.com/wlingxiao/HelloFlask -Entry file: HelloFlask/src/application.py -Scanned: 2016-10-20 12:44:17.217408 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -juliocesarfort/flask-demos -https://github.com/juliocesarfort/flask-demos -Entry file: flask-demos/json-contentsniffing.py -Scanned: 2016-10-20 12:44:18.534335 -No vulnerabilities found. - - -Keita1/flask-blog -https://github.com/Keita1/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:44:19.083853 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Gherero/analitika-flask -https://github.com/Gherero/analitika-flask -Entry file: analitika-flask/app/main.py -Scanned: 2016-10-20 12:44:26.029344 -No vulnerabilities found. - - -ooldDoctor/Flask-Shell -https://github.com/ooldDoctor/Flask-Shell -Entry file: Flask-Shell/server.py -Scanned: 2016-10-20 12:44:27.463294 -No vulnerabilities found. - - -opentracing-contrib/python-flask -https://github.com/opentracing-contrib/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 12:44:28.480994 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rysev-a/flask-blueprints -https://github.com/rysev-a/flask-blueprints -Entry file: flask-blueprints/ch05/application/__init__.py -Scanned: 2016-10-20 12:44:30.044760 -No vulnerabilities found. - - -jen8/Flask-Intro -https://github.com/jen8/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-20 12:44:30.616522 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -keik/flask-tutorial -https://github.com/keik/flask-tutorial -Entry file: None -Scanned: 2016-10-20 12:44:31.118296 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -evereux/flask_template -https://github.com/evereux/flask_template -Entry file: None -Scanned: 2016-10-20 12:44:42.131065 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/evereux/flask_template. - -Jareechang/flask-basic -https://github.com/Jareechang/flask-basic -Entry file: flask-basic/templates.py -Scanned: 2016-10-20 12:44:43.631358 -No vulnerabilities found. - - -alodavi/flask_blog -https://github.com/alodavi/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:44:44.145167 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sdzharkov/bitFlask -https://github.com/sdzharkov/bitFlask -Entry file: None -Scanned: 2016-10-20 12:44:44.661103 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SverreHerland/flask-intro -https://github.com/SverreHerland/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:44:45.152997 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -doblel/Flask-Hooker -https://github.com/doblel/Flask-Hooker -Entry file: Flask-Hooker/test.py -Scanned: 2016-10-20 12:44:45.668243 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ainjii/20160719_flask -https://github.com/ainjii/20160719_flask -Entry file: 20160719_flask/nice.py -Scanned: 2016-10-20 12:44:47.013837 -No vulnerabilities found. - - -whitneybelba/Flask-Intro -https://github.com/whitneybelba/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-20 12:44:47.525350 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ahmsolo/flask-intro -https://github.com/ahmsolo/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:44:48.020913 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aaron4444/master_flask -https://github.com/aaron4444/master_flask -Entry file: master_flask/main.py -Scanned: 2016-10-20 12:44:50.446640 -No vulnerabilities found. - - -scotteggs/flask_tutor -https://github.com/scotteggs/flask_tutor -Entry file: flask_tutor/tmp/main.py -Scanned: 2016-10-20 12:44:51.972790 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -v2hey/flask-blog -https://github.com/v2hey/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:45:00.519408 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -defhook/flask-blog -https://github.com/defhook/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:45:02.063785 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -boyxiaolong/flask_blog -https://github.com/boyxiaolong/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:45:03.590936 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -n4s/flask-test -https://github.com/n4s/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 12:45:05.131694 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -ricleal/TornadoFlask -https://github.com/ricleal/TornadoFlask -Entry file: TornadoFlask/flasky.py -Scanned: 2016-10-20 12:45:07.478306 -No vulnerabilities found. - - -apastewk/flask-intro -https://github.com/apastewk/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:45:08.028870 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -thepomeranian/flask-intro -https://github.com/thepomeranian/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:45:08.529170 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ibhan88/Flask-Intro -https://github.com/ibhan88/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-20 12:45:17.092609 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eflagg/flask-intro -https://github.com/eflagg/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:45:17.605847 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MariaAngela24/flask-intro -https://github.com/MariaAngela24/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:45:18.114604 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -13923858795/flask-blog -https://github.com/13923858795/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:45:20.155488 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -shankj3/flask_version -https://github.com/shankj3/flask_version -Entry file: flask_version/render_with_jinja/render_with_jinja.py -Scanned: 2016-10-20 12:45:26.708219 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neldevfull/flask_api -https://github.com/neldevfull/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-20 12:45:28.236970 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tarzioo/flask-intro -https://github.com/tarzioo/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:45:28.753585 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lingsitu1290/Flask-Intro -https://github.com/lingsitu1290/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-20 12:45:29.267043 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sarahdwyer/flask-intro -https://github.com/sarahdwyer/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:45:30.823837 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -decherd/flask-blog -https://github.com/decherd/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:45:31.372646 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -thesiti92/flask_example -https://github.com/thesiti92/flask_example -Entry file: None -Scanned: 2016-10-20 12:45:32.895599 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rayramsay/flask-intro -https://github.com/rayramsay/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:45:42.411092 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aig-/flask_google -https://github.com/aig-/flask_google -Entry file: flask_google/app.py -Scanned: 2016-10-20 12:45:43.745443 -Vulnerability 1: -File: flask_google/app.py - > User input at line 93, trigger word "get(": - response = 'state''status'task.statetask.info.get('status', '') -Reassigned in: - File: flask_google/app.py - > Line 88: response = 'state''status'task.state'Pending...' - File: flask_google/app.py - > Line 101: response = 'state''status'task.statestr(task.info) -File: flask_google/app.py - > reaches line 105, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(response) - - - -yfalcon8/Flask_Intro -https://github.com/yfalcon8/Flask_Intro -Entry file: Flask_Intro/nice.py -Scanned: 2016-10-20 12:45:44.366364 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Intro/env/lib/python2.7/genericpath.py - -chriskoh/intraday-flask -https://github.com/chriskoh/intraday-flask -Entry file: None -Scanned: 2016-10-20 12:45:44.889940 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -laylasian/poke-flask -https://github.com/laylasian/poke-flask -Entry file: poke-flask/poke/app.py -Scanned: 2016-10-20 12:45:46.539379 -No vulnerabilities found. - - -YuliYaSokolova/home_flask -https://github.com/YuliYaSokolova/home_flask -Entry file: home_flask/__init__.py -Scanned: 2016-10-20 12:45:47.749711 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: home_flask/.envi/lib/python3.4/struct.py - -alodavi/flask_simple -https://github.com/alodavi/flask_simple -Entry file: flask_simple/hello.py -Scanned: 2016-10-20 12:45:49.061460 -No vulnerabilities found. - - -cdagli/flask-blueprint -https://github.com/cdagli/flask-blueprint -Entry file: flask-blueprint/api/__init__.py -Scanned: 2016-10-20 12:45:49.591509 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -charoleizer/TDD-Flask -https://github.com/charoleizer/TDD-Flask -Entry file: TDD-Flask/fonts/py/WebService/app.py -Scanned: 2016-10-20 12:45:57.223917 -No vulnerabilities found. - - -thechutrain/flask-tutorial -https://github.com/thechutrain/flask-tutorial -Entry file: None -Scanned: 2016-10-20 12:46:01.279919 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -RetardedPigeon/flask_project -https://github.com/RetardedPigeon/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-20 12:46:03.105549 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -radajin/flask -https://github.com/radajin/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:46:07.563774 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -suryadana/Flask -https://github.com/suryadana/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:46:08.074606 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Jzengzhan/Flask -https://github.com/Jzengzhan/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:46:08.606573 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -crazw/flask -https://github.com/crazw/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:46:17.209416 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -mwongeraE/Flask -https://github.com/mwongeraE/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:46:17.747337 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TheNixNinja/flask-boilerplate -https://github.com/TheNixNinja/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 12:46:18.244968 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/TheNixNinja/flask-boilerplate. - -clef/flask-nameko -https://github.com/clef/flask-nameko -Entry file: flask-nameko/tests/test_flask_pooled_cluster_rpc_proxy.py -Scanned: 2016-10-20 12:46:20.799607 -No vulnerabilities found. - - -weihg/flaskr -https://github.com/weihg/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:46:26.795218 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Dasmemes/flasky -https://github.com/Dasmemes/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:46:28.291317 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dhan12/Flaskblog -https://github.com/dhan12/Flaskblog -Entry file: Flaskblog/run.py -Scanned: 2016-10-20 12:46:33.465937 -Vulnerability 1: -File: Flaskblog/flaskblog/routes.py - > User input at line 42, trigger word "form[": - searchText = request.form['search'] -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 54: searchText = request.args.get('search', '') - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - -Vulnerability 2: -File: Flaskblog/flaskblog/routes.py - > User input at line 54, trigger word "get(": - searchText = request.args.get('search', '') -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 42: searchText = request.form['search'] - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - -Vulnerability 3: -File: Flaskblog/flaskblog/routes.py - > User input at line 42, trigger word "form[": - searchText = request.form['search'] -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 54: searchText = request.args.get('search', '') - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - -Vulnerability 4: -File: Flaskblog/flaskblog/routes.py - > User input at line 54, trigger word "get(": - searchText = request.args.get('search', '') -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 42: searchText = request.form['search'] - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - - - -SachinMaharana/flaskblog -https://github.com/SachinMaharana/flaskblog -Entry file: flaskblog/flat.py -Scanned: 2016-10-20 12:46:34.042139 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskblog/env/lib/python2.7/genericpath.py - -linjialongmao/flasky -https://github.com/linjialongmao/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:46:34.546066 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -algalanb/flaskapp -https://github.com/algalanb/flaskapp -Entry file: None -Scanned: 2016-10-20 12:46:35.055101 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/algalanb/flaskapp. - -sinwar/flaskr -https://github.com/sinwar/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:46:35.569506 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -igoroppo6/flasky -https://github.com/igoroppo6/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:46:43.085888 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -evanzd/flasky -https://github.com/evanzd/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:46:43.611296 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Dawson-G/flaskwebapp -https://github.com/Dawson-G/flaskwebapp -Entry file: flaskwebapp/main.py -Scanned: 2016-10-20 12:46:45.945875 -No vulnerabilities found. - - -diazdeentr/flasktest -https://github.com/diazdeentr/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 12:46:46.453466 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mtlevine0/FlaskPhoto -https://github.com/mtlevine0/FlaskPhoto -Entry file: FlaskPhoto/flaskphoto.py -Scanned: 2016-10-20 12:46:50.920639 -No vulnerabilities found. - - -TitledPythonFile/FlaskItems -https://github.com/TitledPythonFile/FlaskItems -Entry file: FlaskItems/app/__init__.py -Scanned: 2016-10-20 12:46:51.436263 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sT00ne/FlaskMega -https://github.com/sT00ne/FlaskMega -Entry file: FlaskMega/app/__init__.py -Scanned: 2016-10-20 12:46:55.254660 -No vulnerabilities found. - - -dedystyawan/flask2 -https://github.com/dedystyawan/flask2 -Entry file: flask2/app.py -Scanned: 2016-10-20 12:46:55.790661 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laketiticaca/FlaskApp -https://github.com/laketiticaca/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 12:46:56.362177 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yipersevere/FlaskTutorial -https://github.com/yipersevere/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 12:46:58.359207 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kerol/flask-utils -https://github.com/kerol/flask-utils -Entry file: flask-utils/logger.py -Scanned: 2016-10-20 12:47:02.843333 -No vulnerabilities found. - - -jk34/Blog_Flask -https://github.com/jk34/Blog_Flask -Entry file: Blog_Flask/app.py -Scanned: 2016-10-20 12:47:03.492811 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Blog_Flask/lib/python2.7/genericpath.py - -Wangbicong/flask-newspaper -https://github.com/Wangbicong/flask-newspaper -Entry file: flask-newspaper/app/__init__.py -Scanned: 2016-10-20 12:47:06.479637 -Vulnerability 1: -File: flask-newspaper/app/main/views.py - > User input at line 29, trigger word "get(": - tab = request.args.get('tab') -Reassigned in: - File: flask-newspaper/app/main/views.py - > Line 75: ret_MAYBE_FUNCTION_NAME = redirect('/login/') - File: flask-newspaper/app/main/views.py - > Line 45: ret_MAYBE_FUNCTION_NAME = render_template('news.html',news_data=news_data) - File: flask-newspaper/app/main/views.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('index.html',news_data=news_data, user_data=user_data, tab_mark='user') - File: flask-newspaper/app/main/views.py - > Line 67: ret_MAYBE_FUNCTION_NAME = render_template('record.html',record_data=record_data) -File: flask-newspaper/app/main/views.py - > reaches line 72, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',news_data=news_data, user_data=user_data, tab_mark=tab) - - - -anupam0601/flask-REST -https://github.com/anupam0601/flask-REST -Entry file: None -Scanned: 2016-10-20 12:47:06.989629 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/anupam0601/flask-REST. - -vanalex/restful-flask -https://github.com/vanalex/restful-flask -Entry file: restful-flask/restful-flask.py -Scanned: 2016-10-20 12:47:09.316497 -No vulnerabilities found. - - -chicaum/flask_blog -https://github.com/chicaum/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:47:09.855455 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hicris/flask-note -https://github.com/hicris/flask-note -Entry file: flask-note/note.py -Scanned: 2016-10-20 12:47:17.894060 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Faoxis/flask-microblog -https://github.com/Faoxis/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:47:18.411395 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -evereux/flask_template -https://github.com/evereux/flask_template -Entry file: None -Scanned: 2016-10-20 12:47:18.909553 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/evereux/flask_template. - -yyoowwllgit/flask_agent -https://github.com/yyoowwllgit/flask_agent -Entry file: flask_agent/flask_agent_server/agent_server.py -Scanned: 2016-10-20 12:47:20.417108 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AndrewSmiley/flask-demo -https://github.com/AndrewSmiley/flask-demo -Entry file: None -Scanned: 2016-10-20 12:47:21.928663 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AndrewSmiley/flask-demo. - -volny/flask-openid -https://github.com/volny/flask-openid -Entry file: flask-openid/app/__init__.py -Scanned: 2016-10-20 12:47:29.906713 -No vulnerabilities found. - - -brianbrittain/flask-blog -https://github.com/brianbrittain/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:47:30.470485 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -broschke/flask_api -https://github.com/broschke/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-20 12:47:35.031682 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -welserjr/Flask_Recaptcha -https://github.com/welserjr/Flask_Recaptcha -Entry file: Flask_Recaptcha/app.py -Scanned: 2016-10-20 12:47:36.471597 -Vulnerability 1: -File: Flask_Recaptcha/app.py - > User input at line 36, trigger word "get(": - comments = session.get('comments', []) -File: Flask_Recaptcha/app.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',comments=comments, form=form) - - - -jearnest88/flask_practice -https://github.com/jearnest88/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-20 12:47:37.222152 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cbenderust/flask_dev -https://github.com/cbenderust/flask_dev -Entry file: flask_dev/flaskr/flaskr_app/__init__.py -Scanned: 2016-10-20 12:47:37.749989 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scagle/Flask-Website -https://github.com/scagle/Flask-Website -Entry file: Flask-Website/hello.py -Scanned: 2016-10-20 12:47:44.070112 -No vulnerabilities found. - - -jfcorsini/testing-flask -https://github.com/jfcorsini/testing-flask -Entry file: None -Scanned: 2016-10-20 12:47:44.614902 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -josenavarro-famoco/flask-pg -https://github.com/josenavarro-famoco/flask-pg -Entry file: flask-pg/pogo/ext_api.py -Scanned: 2016-10-20 12:47:45.231387 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -apjanco/flask_blog -https://github.com/apjanco/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:47:47.234737 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChaosSoong/python_flask -https://github.com/ChaosSoong/python_flask -Entry file: None -Scanned: 2016-10-20 12:47:51.774989 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ChaosSoong/python_flask. - -mwave1239/Flask_Tutorials -https://github.com/mwave1239/Flask_Tutorials -Entry file: Flask_Tutorials/registration_form/server.py -Scanned: 2016-10-20 12:47:52.467370 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Tutorials/registration_form/venv/lib/python2.7/genericpath.py - -yehiaa/flask-play -https://github.com/yehiaa/flask-play -Entry file: flask-play/app.py -Scanned: 2016-10-20 12:47:56.840940 -No vulnerabilities found. - - -tleskin/microblog-flask -https://github.com/tleskin/microblog-flask -Entry file: None -Scanned: 2016-10-20 12:47:57.846530 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ecfairle/flask_site -https://github.com/ecfairle/flask_site -Entry file: flask_site/mysite.py -Scanned: 2016-10-20 12:47:58.361485 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shankj3/flask_version -https://github.com/shankj3/flask_version -Entry file: flask_version/render_with_jinja/render_with_jinja.py -Scanned: 2016-10-20 12:48:02.893459 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neldevfull/flask_api -https://github.com/neldevfull/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-20 12:48:04.900258 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lanyuan27/flask-web -https://github.com/lanyuan27/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 12:48:07.414346 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bjgill/flask-testing -https://github.com/bjgill/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-20 12:48:08.918814 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -guoweikuang/flask-hello -https://github.com/guoweikuang/flask-hello -Entry file: flask-hello/hello.py -Scanned: 2016-10-20 12:48:10.463519 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -aiden0z/Flask-Thriftclient -https://github.com/aiden0z/Flask-Thriftclient -Entry file: Flask-Thriftclient/tests/thriftclient.py -Scanned: 2016-10-20 12:48:12.776192 -No vulnerabilities found. - - -hputiprawan2/flask-aprt -https://github.com/hputiprawan2/flask-aprt -Entry file: flask-aprt/app.py -Scanned: 2016-10-20 12:48:18.394698 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-aprt/venv/lib/python2.7/genericpath.py - -datasciencemonkey/flask_test -https://github.com/datasciencemonkey/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 12:48:18.983365 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KittuJain/explore_Flask -https://github.com/KittuJain/explore_Flask -Entry file: explore_Flask/Hello.py -Scanned: 2016-10-20 12:48:20.307927 -No vulnerabilities found. - - -c75/flask-blueprint -https://github.com/c75/flask-blueprint -Entry file: flask-blueprint/api/__init__.py -Scanned: 2016-10-20 12:48:20.821687 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -darbik/flask_fun -https://github.com/darbik/flask_fun -Entry file: flask_fun/blog/flaskr.py -Scanned: 2016-10-20 12:48:22.370470 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -NujjLTD/nujjWebsiteNew -https://github.com/NujjLTD/nujjWebsiteNew -Entry file: None -Scanned: 2016-10-20 12:48:29.393390 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pengxy8/TimeManager -https://github.com/pengxy8/TimeManager -Entry file: None -Scanned: 2016-10-20 12:48:30.949759 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pengxy8/TimeManager. - -vennyk/flask-hello-world -https://github.com/vennyk/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 12:48:35.545209 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -saifulazad/FlaskLargeApp -https://github.com/saifulazad/FlaskLargeApp -Entry file: FlaskLargeApp/run.py -Scanned: 2016-10-20 12:48:38.616659 -No vulnerabilities found. - - -jpvillavicencio/FlaskSQLAlchemyAPI -https://github.com/jpvillavicencio/FlaskSQLAlchemyAPI -Entry file: FlaskSQLAlchemyAPI/app.py -Scanned: 2016-10-20 12:48:39.942593 -No vulnerabilities found. - - -bradleygolden/cookiecutter-flaskrestful-barebones -https://github.com/bradleygolden/cookiecutter-flaskrestful-barebones -Entry file: cookiecutter-flaskrestful-barebones/{{cookiecutter.project_name}}/app.py -Scanned: 2016-10-20 12:48:40.477231 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -HiiYL/vision-flask-demo -https://github.com/HiiYL/vision-flask-demo -Entry file: None -Scanned: 2016-10-20 12:48:44.021187 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/HiiYL/vision-flask-demo. - -yfalcon8/Project_Tracker_Flask -https://github.com/yfalcon8/Project_Tracker_Flask -Entry file: Project_Tracker_Flask/hackbright-web.py -Scanned: 2016-10-20 12:48:45.548444 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -myhro/flask-gunicorn-example -https://github.com/myhro/flask-gunicorn-example -Entry file: flask-gunicorn-example/web.py -Scanned: 2016-10-20 12:48:46.859582 -No vulnerabilities found. - - -brettlangdon/cookiecutter-flask-app -https://github.com/brettlangdon/cookiecutter-flask-app -Entry file: cookiecutter-flask-app/{{cookiecutter.project_name}}/{{cookiecutter.project_name}}/__init__.py -Scanned: 2016-10-20 12:48:52.408456 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -heratyian/flask-cat-tinder -https://github.com/heratyian/flask-cat-tinder -Entry file: flask-cat-tinder/app.py -Scanned: 2016-10-20 12:48:54.620762 -No vulnerabilities found. - - -brevno/test_pg_flask -https://github.com/brevno/test_pg_flask -Entry file: test_pg_flask/app/__init__.py -Scanned: 2016-10-20 12:48:56.994117 -Vulnerability 1: -File: test_pg_flask/app/views.py - > User input at line 20, trigger word "form[": - user = User.query.get_or_404(request.form['id']) -Reassigned in: - File: test_pg_flask/app/views.py - > Line 25: user = User(request.form.to_dict()) -File: test_pg_flask/app/views.py - > reaches line 28, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify([user.as_dict()]) - - - -yfalcon8/Flask_Intro_Lab -https://github.com/yfalcon8/Flask_Intro_Lab -Entry file: Flask_Intro_Lab/nice.py -Scanned: 2016-10-20 12:48:58.305792 -No vulnerabilities found. - - -yfalcon8/Flask_Job_Application -https://github.com/yfalcon8/Flask_Job_Application -Entry file: Flask_Job_Application/application.py -Scanned: 2016-10-20 12:48:59.600890 -No vulnerabilities found. - - -mwave1239/MySQL-Flask-Examples -https://github.com/mwave1239/MySQL-Flask-Examples -Entry file: MySQL-Flask-Examples/friends/server.py -Scanned: 2016-10-20 12:49:07.148732 -No vulnerabilities found. - - -jksutow/flask_login_reg -https://github.com/jksutow/flask_login_reg -Entry file: flask_login_reg/login.py -Scanned: 2016-10-20 12:49:07.876145 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -FromZeus/python_flask_learning -https://github.com/FromZeus/python_flask_learning -Entry file: python_flask_learning/lesson-02/app/__init__.py -Scanned: 2016-10-20 12:49:08.398591 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -knalavadi/project-tracker-flask-felowship -https://github.com/knalavadi/project-tracker-flask-felowship -Entry file: project-tracker-flask-felowship/hackbright-web.py -Scanned: 2016-10-20 12:49:08.900118 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ssmores/20160726_project_tracker_flask -https://github.com/ssmores/20160726_project_tracker_flask -Entry file: 20160726_project_tracker_flask/hackbright-web.py -Scanned: 2016-10-20 12:49:09.414637 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -polarisc8t/HB---project_tracker_flask -https://github.com/polarisc8t/HB---project_tracker_flask -Entry file: HB---project_tracker_flask/hackbright-web.py -Scanned: 2016-10-20 12:49:09.933775 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jen8/Project-Tracker-Flask -https://github.com/jen8/Project-Tracker-Flask -Entry file: Project-Tracker-Flask/hackbright-web.py -Scanned: 2016-10-20 12:49:10.445686 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ElizabethLane/HB-flask-sequel-exercise -https://github.com/ElizabethLane/HB-flask-sequel-exercise -Entry file: HB-flask-sequel-exercise/hackbright-web.py -Scanned: 2016-10-20 12:49:11.964703 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jeanhl/HB_SQL_Flask -https://github.com/jeanhl/HB_SQL_Flask -Entry file: HB_SQL_Flask/hackbright-web.py -Scanned: 2016-10-20 12:49:18.499255 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -feistiller/LearnPythonFlask -https://github.com/feistiller/LearnPythonFlask -Entry file: LearnPythonFlask/Demo1HelloWorld.py -Scanned: 2016-10-20 12:49:19.847159 -Vulnerability 1: -File: LearnPythonFlask/Demo4WtfHelloWorld.py - > User input at line 18, trigger word ".data": - name = form.name.data -Reassigned in: - File: LearnPythonFlask/Demo4WtfHelloWorld.py - > Line 15: name = None -File: LearnPythonFlask/Demo4WtfHelloWorld.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('wtfIndex.html',form=form, name=name) - - - -eriknguyen/basic-auth-flask -https://github.com/eriknguyen/basic-auth-flask -Entry file: basic-auth-flask/flask_intro/__init__.py -Scanned: 2016-10-20 12:49:21.270327 -No vulnerabilities found. - - -micaiahparker/startkit-flask-heroku -https://github.com/micaiahparker/startkit-flask-heroku -Entry file: startkit-flask-heroku/app.py -Scanned: 2016-10-20 12:49:22.648866 -No vulnerabilities found. - - -thepomeranian/project-tracker-flask -https://github.com/thepomeranian/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-20 12:49:23.190853 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottx611x/AWS-SNS-Flask -https://github.com/scottx611x/AWS-SNS-Flask -Entry file: AWS-SNS-Flask/recieve_SNS.py -Scanned: 2016-10-20 12:49:30.025760 -No vulnerabilities found. - - -sepihere/flask -https://github.com/sepihere/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:49:32.273677 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Coolwater7/flask -https://github.com/Coolwater7/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:49:35.878483 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -SicunStudio/aunet-flask -https://github.com/SicunStudio/aunet-flask -Entry file: None -Scanned: 2016-10-20 12:49:36.389936 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SicunStudio/aunet-flask. - -afropolymath/papers -https://github.com/afropolymath/papers -Entry file: papers/api/__init__.py -Scanned: 2016-10-20 12:49:40.867023 -Vulnerability 1: -File: papers/api/controllers/files.py - > User input at line 149, trigger word "get(": - parent_id = args.get('parent_id', None) -Reassigned in: - File: papers/api/controllers/files.py - > Line 161: update_fields['tag'] = parent_id == '0'g.file['id']'{}#{}'.format(folder_access['tag'], folder['last_index']) - File: papers/api/controllers/files.py - > Line 166: update_fields['parent_id'] = parent_id - File: papers/api/controllers/files.py - > Line 152: update_fields['name'] = name -File: papers/api/controllers/files.py - > reaches line 156, trigger word "filter(": - folder_access = Folder.filter('id''creator'parent_iduser_id) - - - -munendrasn/Flaskr -https://github.com/munendrasn/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 12:49:41.451750 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Eyali1001/flaskcalculator -https://github.com/Eyali1001/flaskcalculator -Entry file: flaskcalculator/calculator.py -Scanned: 2016-10-20 12:49:45.748653 -Vulnerability 1: -File: flaskcalculator/calculator.py - > User input at line 14, trigger word "form[": - result = int(request.form['title']) + int(request.form['text']) -File: flaskcalculator/calculator.py - > reaches line 15, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultpage.html',result=result) - - - -penglee87/flaskr -https://github.com/penglee87/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:49:46.265771 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pecone/flaskr -https://github.com/pecone/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:49:46.783474 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lechain/flaskr -https://github.com/lechain/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:49:48.286521 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fiezwang/flasky -https://github.com/fiezwang/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:49:48.808369 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -swdmike/flasky -https://github.com/swdmike/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:49:53.371896 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChuckiePae/flaskr -https://github.com/ChuckiePae/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:49:53.886851 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -linjialongmao/flasky -https://github.com/linjialongmao/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:49:56.394466 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -algalanb/flaskapp -https://github.com/algalanb/flaskapp -Entry file: None -Scanned: 2016-10-20 12:49:57.907093 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/algalanb/flaskapp. - -Unknown22/Flaskr -https://github.com/Unknown22/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 12:49:59.410787 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sinwar/flaskr -https://github.com/sinwar/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:50:00.919601 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lux600/flasktest -https://github.com/lux600/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 12:50:08.502876 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sagaragarwal94/flask-site-builder -https://github.com/sagaragarwal94/flask-site-builder -Entry file: flask-site-builder/sitebuilder.py -Scanned: 2016-10-20 12:50:09.021314 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Melvie/FlaskLearns -https://github.com/Melvie/FlaskLearns -Entry file: None -Scanned: 2016-10-20 12:50:09.519514 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Leon14451/FlaskMultisite -https://github.com/Leon14451/FlaskMultisite -Entry file: FlaskMultisite/wwwroot/__init__.py -Scanned: 2016-10-20 12:50:10.853255 -No vulnerabilities found. - - -laketiticaca/FlaskApp -https://github.com/laketiticaca/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 12:50:11.433854 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rssenar/FlaskApp -https://github.com/rssenar/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 12:50:12.004134 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nenodias/flask-webservice -https://github.com/nenodias/flask-webservice -Entry file: flask-webservice/app.py -Scanned: 2016-10-20 12:50:19.856167 -Vulnerability 1: -File: flask-webservice/app.py - > User input at line 32, trigger word "get(": - dev = Developer(request.json.name, request.json.get('hireDate', ''), request.json.get('focus', '')) -File: flask-webservice/app.py - > reaches line 35, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('developer'dev), 201) - -Vulnerability 2: -File: flask-webservice/app.py - > User input at line 45, trigger word "get(": - dev = Developer.query.get(id) -Reassigned in: - File: flask-webservice/app.py - > Line 46: dev.name = request.json.get('name', dev.name) - File: flask-webservice/app.py - > Line 47: dev.hireDate = request.json.get('hireDate', dev.name) - File: flask-webservice/app.py - > Line 48: dev.focus = request.json.get('focus', dev.focus) -File: flask-webservice/app.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('dev'dev) - - - -StrGlee/flask-demo -https://github.com/StrGlee/flask-demo -Entry file: None -Scanned: 2016-10-20 12:50:20.397908 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/StrGlee/flask-demo. - -rconnol/PromotionsFlask -https://github.com/rconnol/PromotionsFlask -Entry file: PromotionsFlask/app/__init__.py -Scanned: 2016-10-20 12:50:21.700560 -No vulnerabilities found. - - -dschmaryl/golf-flask -https://github.com/dschmaryl/golf-flask -Entry file: golf-flask/stats.py -Scanned: 2016-10-20 12:50:23.240429 -No vulnerabilities found. - - -Dudeguy409/flask_demo -https://github.com/Dudeguy409/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 12:50:23.784139 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -1572766337/py_flask -https://github.com/1572766337/py_flask -Entry file: py_flask/app/__init__.py -Scanned: 2016-10-20 12:50:30.991749 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -letterli/Flask-blog -https://github.com/letterli/Flask-blog -Entry file: Flask-blog/app/__init__.py -Scanned: 2016-10-20 12:50:32.516031 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -srinivasb07/Flask_Sample -https://github.com/srinivasb07/Flask_Sample -Entry file: Flask_Sample/app.py -Scanned: 2016-10-20 12:50:36.107872 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Jollyhrothgar/flask_template -https://github.com/Jollyhrothgar/flask_template -Entry file: None -Scanned: 2016-10-20 12:50:36.617685 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Jollyhrothgar/flask_template. - -apengok/flask_tutor -https://github.com/apengok/flask_tutor -Entry file: flask_tutor/tmp/main.py -Scanned: 2016-10-20 12:50:40.123658 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ArioShaman/flask-site -https://github.com/ArioShaman/flask-site -Entry file: None -Scanned: 2016-10-20 12:50:41.659651 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ibrewdudes/flask-server -https://github.com/ibrewdudes/flask-server -Entry file: None -Scanned: 2016-10-20 12:50:45.178652 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ibrewdudes/flask-server. - -hackrole/flask_demo -https://github.com/hackrole/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 12:50:46.701840 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -YeongjinOh/flask_pratice -https://github.com/YeongjinOh/flask_pratice -Entry file: flask_pratice/app/__init__.py -Scanned: 2016-10-20 12:50:48.136832 -No vulnerabilities found. - - -DylanVerstraete/ItsyouonlineFlask -https://github.com/DylanVerstraete/ItsyouonlineFlask -Entry file: ItsyouonlineFlask/itsyouonline-flask/ItsYouOnlineServer/app.py -Scanned: 2016-10-20 12:50:55.610944 -No vulnerabilities found. - - -jauschalley/flask_practice -https://github.com/jauschalley/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-20 12:50:56.278646 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jubjub55/flask_test -https://github.com/jubjub55/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 12:50:56.850627 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sourav2406/learnFlask -https://github.com/sourav2406/learnFlask -Entry file: None -Scanned: 2016-10-20 12:50:57.388700 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sourav2406/learnFlask. - -chrisco/flask-demo -https://github.com/chrisco/flask-demo -Entry file: None -Scanned: 2016-10-20 12:50:57.901638 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chrisco/flask-demo. - -aripddev/cms_flask -https://github.com/aripddev/cms_flask -Entry file: cms_flask/app/__init__.py -Scanned: 2016-10-20 12:51:05.371087 -Vulnerability 1: -File: cms_flask/app/core/controllers.py - > User input at line 76, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 83: ret_MAYBE_FUNCTION_NAME = render_template('contact.html',form=form) - File: cms_flask/app/core/controllers.py - > Line 80: ret_MAYBE_FUNCTION_NAME = abort(400) -File: cms_flask/app/core/controllers.py - > reaches line 82, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - -Vulnerability 2: -File: cms_flask/app/core/controllers.py - > User input at line 76, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 83: ret_MAYBE_FUNCTION_NAME = render_template('contact.html',form=form) - File: cms_flask/app/core/controllers.py - > Line 80: ret_MAYBE_FUNCTION_NAME = abort(400) -File: cms_flask/app/core/controllers.py - > reaches line 82, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - -Vulnerability 3: -File: cms_flask/app/core/controllers.py - > User input at line 94, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 96: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 97, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.show.html',post=post) - -Vulnerability 4: -File: cms_flask/app/core/controllers.py - > User input at line 120, trigger word "form[": - post = Post(headline=request.form['headline'], subheadline=request.form['subheadline'], body=request.form['body']) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 114: ret_MAYBE_FUNCTION_NAME = render_template('/admin/post.new.html') - File: cms_flask/app/core/controllers.py - > Line 118: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_new')) -File: cms_flask/app/core/controllers.py - > reaches line 124, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 5: -File: cms_flask/app/core/controllers.py - > User input at line 120, trigger word "form[": - post = Post(headline=request.form['headline'], subheadline=request.form['subheadline'], body=request.form['body']) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 114: ret_MAYBE_FUNCTION_NAME = render_template('/admin/post.new.html') - File: cms_flask/app/core/controllers.py - > Line 118: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_new')) -File: cms_flask/app/core/controllers.py - > reaches line 124, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 6: -File: cms_flask/app/core/controllers.py - > User input at line 129, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 131: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 132, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/admin/post.edit.html',post=post) - -Vulnerability 7: -File: cms_flask/app/core/controllers.py - > User input at line 137, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 143, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 8: -File: cms_flask/app/core/controllers.py - > User input at line 137, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 143, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 9: -File: cms_flask/app/core/controllers.py - > User input at line 137, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 150, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 10: -File: cms_flask/app/core/controllers.py - > User input at line 137, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 139: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 150, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_post_edit',id=post.id)) - -Vulnerability 11: -File: cms_flask/app/core/controllers.py - > User input at line 161, trigger word "get(": - category = Category.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 163: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 165, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.show.html',category=category, posts=posts) - -Vulnerability 12: -File: cms_flask/app/core/controllers.py - > User input at line 172, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 174: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('page.show.html',page=page) - -Vulnerability 13: -File: cms_flask/app/core/controllers.py - > User input at line 193, trigger word "form[": - page = Page(title=request.form['title'], body=request.form['body']) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('/admin/page.new.html') - File: cms_flask/app/core/controllers.py - > Line 191: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_new')) -File: cms_flask/app/core/controllers.py - > reaches line 197, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 14: -File: cms_flask/app/core/controllers.py - > User input at line 193, trigger word "form[": - page = Page(title=request.form['title'], body=request.form['body']) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 187: ret_MAYBE_FUNCTION_NAME = render_template('/admin/page.new.html') - File: cms_flask/app/core/controllers.py - > Line 191: ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_new')) -File: cms_flask/app/core/controllers.py - > reaches line 197, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 15: -File: cms_flask/app/core/controllers.py - > User input at line 202, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 204: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 205, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/admin/page.edit.html',page=page) - -Vulnerability 16: -File: cms_flask/app/core/controllers.py - > User input at line 210, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 216, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 17: -File: cms_flask/app/core/controllers.py - > User input at line 210, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 216, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 18: -File: cms_flask/app/core/controllers.py - > User input at line 210, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 222, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 19: -File: cms_flask/app/core/controllers.py - > User input at line 210, trigger word "get(": - page = Page.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 212: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 222, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_page_edit',id=page.id)) - -Vulnerability 20: -File: cms_flask/app/core/controllers.py - > User input at line 249, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 251: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 252, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/admin/user.edit.html',user=user) - -Vulnerability 21: -File: cms_flask/app/core/controllers.py - > User input at line 257, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 263, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_edit',id=user.id)) - -Vulnerability 22: -File: cms_flask/app/core/controllers.py - > User input at line 257, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 263, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_edit',id=user.id)) - -Vulnerability 23: -File: cms_flask/app/core/controllers.py - > User input at line 257, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 269, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_show',id=user.id)) - -Vulnerability 24: -File: cms_flask/app/core/controllers.py - > User input at line 257, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 259: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 269, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('admin_user_show',id=user.id)) - -Vulnerability 25: -File: cms_flask/app/core/controllers.py - > User input at line 274, trigger word "get(": - user = User.query.get(id) -Reassigned in: - File: cms_flask/app/core/controllers.py - > Line 276: ret_MAYBE_FUNCTION_NAME = abort(404) -File: cms_flask/app/core/controllers.py - > reaches line 277, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/admin/user.show.html',user=user) - - - -northwestyam/flask_hello -https://github.com/northwestyam/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-20 12:51:06.042027 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ibhan88/Flask-Testing -https://github.com/ibhan88/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-20 12:51:06.561442 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -titov-andrei/microblog-flask -https://github.com/titov-andrei/microblog-flask -Entry file: None -Scanned: 2016-10-20 12:51:09.108775 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -glenpadua/flask-blog -https://github.com/glenpadua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:51:09.653987 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -juliuskrah/flask-blog -https://github.com/juliuskrah/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:51:10.206969 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -elthran/flask-game -https://github.com/elthran/flask-game -Entry file: flask-game/flask-intro/app.py -Scanned: 2016-10-20 12:51:17.749720 -No vulnerabilities found. - - -ChaosSoong/python_flask -https://github.com/ChaosSoong/python_flask -Entry file: None -Scanned: 2016-10-20 12:51:18.742016 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ChaosSoong/python_flask. - -TheDeadMays/flask-bootstrap -https://github.com/TheDeadMays/flask-bootstrap -Entry file: flask-bootstrap/app/__init__.py -Scanned: 2016-10-20 12:51:20.584199 -No vulnerabilities found. - - -whitneybelba/Flask-Testing -https://github.com/whitneybelba/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-20 12:51:21.111656 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MadhuriHB/Testing-flask -https://github.com/MadhuriHB/Testing-flask -Entry file: Testing-flask/party.py -Scanned: 2016-10-20 12:51:21.635800 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -langep/flask-template -https://github.com/langep/flask-template -Entry file: None -Scanned: 2016-10-20 12:51:23.984357 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/langep/flask-template. - -tuvttran/flask-learning -https://github.com/tuvttran/flask-learning -Entry file: flask-learning/hello.py -Scanned: 2016-10-20 12:51:25.313158 -No vulnerabilities found. - - -couldtt/flask-foundation -https://github.com/couldtt/flask-foundation -Entry file: flask-foundation/app/__init__.py -Scanned: 2016-10-20 12:51:31.421959 -No vulnerabilities found. - - -haithamslaibi/Flask_Template -https://github.com/haithamslaibi/Flask_Template -Entry file: Flask_Template/web_app.py -Scanned: 2016-10-20 12:51:32.805267 -No vulnerabilities found. - - -XiongZhijun/simple-flask -https://github.com/XiongZhijun/simple-flask -Entry file: simple-flask/app/app.py -Scanned: 2016-10-20 12:51:34.256843 -Vulnerability 1: -File: simple-flask/app/auth/views.py - > User input at line 16, trigger word ".data": - user = User.query.filter(or_(User.username == form.username.data)).first() -File: simple-flask/app/auth/views.py - > reaches line 16, trigger word "filter(": - user = User.query.filter(or_(User.username == form.username.data)).first() - - - -lanyuan27/flask-web -https://github.com/lanyuan27/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 12:51:36.808796 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -italomaia/flask-rev -https://github.com/italomaia/flask-rev -Entry file: flask-rev/tests/runtests.py -Scanned: 2016-10-20 12:51:38.341293 -No vulnerabilities found. - - -ckaren28/python-Flask -https://github.com/ckaren28/python-Flask -Entry file: python-Flask/PYTHON_FLASK/friends/server.py -Scanned: 2016-10-20 12:51:41.057302 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: python-Flask/PYTHON_FLASK/friends/venv/lib/python2.7/genericpath.py - -ssong319/Flask-Testing -https://github.com/ssong319/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-20 12:51:42.578607 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrb101/Flask-Sauce -https://github.com/mrb101/Flask-Sauce -Entry file: Flask-Sauce/app/__init__.py -Scanned: 2016-10-20 12:51:47.158473 -No vulnerabilities found. - - -mattalat/flask-microblog -https://github.com/mattalat/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:51:47.676162 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yehe01/minitwit-mongo -https://github.com/yehe01/minitwit-mongo -Entry file: minitwit-mongo/minitwit/main.py -Scanned: 2016-10-20 12:51:49.099326 -No vulnerabilities found. - - -pythonbean/microblog -https://github.com/pythonbean/microblog -Entry file: None -Scanned: 2016-10-20 12:51:49.637411 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vseeker/app -https://github.com/vseeker/app -Entry file: app/__init__.py -Scanned: 2016-10-20 12:51:56.957861 -No vulnerabilities found. - - -redtreelchao/microblog -https://github.com/redtreelchao/microblog -Entry file: None -Scanned: 2016-10-20 12:51:57.693872 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -katiayx/hblab_0805_Testing-Balloonicorn-After-Party -https://github.com/katiayx/hblab_0805_Testing-Balloonicorn-After-Party -Entry file: hblab_0805_Testing-Balloonicorn-After-Party/party.py -Scanned: 2016-10-20 12:51:58.212570 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iverstraeten/headlines -https://github.com/iverstraeten/headlines -Entry file: headlines/headlines.py -Scanned: 2016-10-20 12:51:58.755434 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Mizzlr/FlaskWebApp -https://github.com/Mizzlr/FlaskWebApp -Entry file: FlaskWebApp/FanGuardFlask/__init__.py -Scanned: 2016-10-20 12:51:59.273440 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MusaTamzid05/FlaskYoutubeTest -https://github.com/MusaTamzid05/FlaskYoutubeTest -Entry file: None -Scanned: 2016-10-20 12:52:06.904526 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MusaTamzid05/FlaskYoutubeTest. - -ApexMuse/FlaskWebDevelopmentPractice -https://github.com/ApexMuse/FlaskWebDevelopmentPractice -Entry file: FlaskWebDevelopmentPractice/extensions.py -Scanned: 2016-10-20 12:52:08.213414 -No vulnerabilities found. - - -brizow/FlaskTriviaApp -https://github.com/brizow/FlaskTriviaApp -Entry file: FlaskTriviaApp/FlaskWebProject1/__init__.py -Scanned: 2016-10-20 12:52:12.684043 -Vulnerability 1: -File: FlaskTriviaApp/FlaskWebProject1/views.py - > User input at line 37, trigger word "form[": - question = request.form['question'] -Reassigned in: - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 48: ret_MAYBE_FUNCTION_NAME = '

Invalid Request

' - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 31: ret_MAYBE_FUNCTION_NAME = render_template('CreateQuestion.html',title='Create a question', year=year) -File: FlaskTriviaApp/FlaskWebProject1/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('CreatedQuestion.html',question=question, title='Thanks!', year=year) - -Vulnerability 2: -File: FlaskTriviaApp/FlaskWebProject1/views.py - > User input at line 56, trigger word "get(": - question = r.get(title + ':question') -Reassigned in: - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html',title='Good job!', year=year) - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('Incorrect.html',submittedAnswer=submittedAnswer, answer=answer, title='Oh noes!', year=year) - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 68: ret_MAYBE_FUNCTION_NAME = '

Invalid Request

' -File: FlaskTriviaApp/FlaskWebProject1/views.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question, title='Answer Question', year=year) - -Vulnerability 3: -File: FlaskTriviaApp/FlaskWebProject1/views.py - > User input at line 60, trigger word "form[": - submittedAnswer = request.form['submittedAnswer'] -Reassigned in: - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 68: ret_MAYBE_FUNCTION_NAME = '

Invalid Request

' - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question, title='Answer Question', year=year) - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html',title='Good job!', year=year) -File: FlaskTriviaApp/FlaskWebProject1/views.py - > reaches line 66, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('Incorrect.html',submittedAnswer=submittedAnswer, answer=answer, title='Oh noes!', year=year) - -Vulnerability 4: -File: FlaskTriviaApp/FlaskWebProject1/views.py - > User input at line 62, trigger word "get(": - answer = r.get(title + ':answer') -Reassigned in: - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 68: ret_MAYBE_FUNCTION_NAME = '

Invalid Request

' - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('AnswerQuestion.html',question=question, title='Answer Question', year=year) - File: FlaskTriviaApp/FlaskWebProject1/views.py - > Line 64: ret_MAYBE_FUNCTION_NAME = render_template('Correct.html',title='Good job!', year=year) -File: FlaskTriviaApp/FlaskWebProject1/views.py - > reaches line 66, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('Incorrect.html',submittedAnswer=submittedAnswer, answer=answer, title='Oh noes!', year=year) - - - -Chi-Qingjun/FlaskWechatDev -https://github.com/Chi-Qingjun/FlaskWechatDev -Entry file: FlaskWechatDev/app/__init__.py -Scanned: 2016-10-20 12:52:14.115808 -Vulnerability 1: -File: FlaskWechatDev/app/main/views.py - > User input at line 30, trigger word ".data": - tree = ET.fromstring(request.data.decode('utf-8')) -File: FlaskWechatDev/app/main/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('text.xml',to_user_name=tree.find('FromUserName').text, from_user_name=tree.find('ToUserName').text, timestamp=datetime.utcnow().timestamp(), content=tree.find('Content').text) - - - -lindsaynchan/hb_flask_testing -https://github.com/lindsaynchan/hb_flask_testing -Entry file: hb_flask_testing/party.py -Scanned: 2016-10-20 12:52:14.649168 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -simsinght/microblog_flask_tutorial -https://github.com/simsinght/microblog_flask_tutorial -Entry file: microblog_flask_tutorial/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 12:52:20.018206 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -measurigtime/flask-by-example -https://github.com/measurigtime/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 12:52:20.694083 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Anthonyhawkins/flask_megatutorial_lab -https://github.com/Anthonyhawkins/flask_megatutorial_lab -Entry file: flask_megatutorial_lab/app/__init__.py -Scanned: 2016-10-20 12:52:22.006738 -No vulnerabilities found. - - -beatricep/hblab_0805_testing-flask -https://github.com/beatricep/hblab_0805_testing-flask -Entry file: hblab_0805_testing-flask/party.py -Scanned: 2016-10-20 12:52:22.531132 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottx611x/AWS-SNS-Flask -https://github.com/scottx611x/AWS-SNS-Flask -Entry file: AWS-SNS-Flask/recieve_SNS.py -Scanned: 2016-10-20 12:52:24.277492 -No vulnerabilities found. - - -daniellawrence/flask-rest-sqla -https://github.com/daniellawrence/flask-rest-sqla -Entry file: flask-rest-sqla/web.py -Scanned: 2016-10-20 12:52:24.802000 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -12DReflections/docker_flask_mdb -https://github.com/12DReflections/docker_flask_mdb -Entry file: docker_flask_mdb/app.py -Scanned: 2016-10-20 12:52:26.105510 -No vulnerabilities found. - - -yucealiosman1/flask-deneme1 -https://github.com/yucealiosman1/flask-deneme1 -Entry file: flask-deneme1/app.py -Scanned: 2016-10-20 12:52:31.679397 -No vulnerabilities found. - - -vecelo/flask_lear_proj -https://github.com/vecelo/flask_lear_proj -Entry file: flask_lear_proj/blogs/Lib/site-packages/flask-0.11.1-py2.7.egg/flask/sessions.py -Scanned: 2016-10-20 12:52:39.088618 -No vulnerabilities found. - - -dinhnv/nginx-flask-stub -https://github.com/dinhnv/nginx-flask-stub -Entry file: nginx-flask-stub/webapp/eanstub_app.py -Scanned: 2016-10-20 12:52:40.604651 -No vulnerabilities found. - - -tinapastelero/HB-flask-test -https://github.com/tinapastelero/HB-flask-test -Entry file: HB-flask-test/party.py -Scanned: 2016-10-20 12:52:41.129819 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -laurelkorwin/hb-flask-testing -https://github.com/laurelkorwin/hb-flask-testing -Entry file: hb-flask-testing/party.py -Scanned: 2016-10-20 12:52:41.697162 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lgorham/flask_testing_0805 -https://github.com/lgorham/flask_testing_0805 -Entry file: flask_testing_0805/party.py -Scanned: 2016-10-20 12:52:42.218986 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eugenepark81/flask-hello-world -https://github.com/eugenepark81/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 12:52:42.785356 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -NexusRJ/react_flask_blog -https://github.com/NexusRJ/react_flask_blog -Entry file: react_flask_blog/app/__init__.py -Scanned: 2016-10-20 12:52:47.713949 -Vulnerability 1: -File: react_flask_blog/app/admin/views.py - > User input at line 102, trigger word "get(": - x = Article.query.filter_by(id=request.args.get('id')).first() -File: react_flask_blog/app/admin/views.py - > reaches line 106, trigger word "flash(": - flash('已删除' + x.title) - - - -stonewm/flask_by_example -https://github.com/stonewm/flask_by_example -Entry file: flask_by_example/app.py -Scanned: 2016-10-20 12:52:48.419540 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_by_example/venv/lib/python3.5/struct.py - -thechutrain/flask-burrito-app -https://github.com/thechutrain/flask-burrito-app -Entry file: flask-burrito-app/tacocat.py -Scanned: 2016-10-20 12:52:48.952554 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jordanagreen/flask-todo-lists -https://github.com/jordanagreen/flask-todo-lists -Entry file: flask-todo-lists/app.py -Scanned: 2016-10-20 12:52:51.390555 -Vulnerability 1: -File: flask-todo-lists/views.py - > User input at line 24, trigger word "get(": - l = TodoList.query.get(id) -File: flask-todo-lists/views.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('list.html',title=l.title, list=l) - -Vulnerability 2: -File: flask-todo-lists/views.py - > User input at line 45, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask-todo-lists/views.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form) - File: flask-todo-lists/views.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form) - File: flask-todo-lists/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = abort(400) -File: flask-todo-lists/views.py - > reaches line 48, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - -Vulnerability 3: -File: flask-todo-lists/views.py - > User input at line 45, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask-todo-lists/views.py - > Line 49: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form) - File: flask-todo-lists/views.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('login.html',title='Sign in', form=form) - File: flask-todo-lists/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = abort(400) -File: flask-todo-lists/views.py - > reaches line 48, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - - - -Coolwater7/flask -https://github.com/Coolwater7/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:52:59.781910 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -KeyJia/Flask -https://github.com/KeyJia/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:53:00.286335 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yangliu2/flask -https://github.com/yangliu2/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:53:00.857822 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -tis86/flask -https://github.com/tis86/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:53:07.474175 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -vipitsoft/flask -https://github.com/vipitsoft/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:53:08.043072 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -reed-chi/flask -https://github.com/reed-chi/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:53:10.614662 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -huhjuang/Flask -https://github.com/huhjuang/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:53:14.129406 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mosquito/flask-example -https://github.com/mosquito/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-20 12:53:16.133390 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -teuton0215/microblog -https://github.com/teuton0215/microblog -Entry file: None -Scanned: 2016-10-20 12:53:18.649989 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -babydeya/flaskr -https://github.com/babydeya/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:53:19.145283 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rouzazari/flaskangular -https://github.com/rouzazari/flaskangular -Entry file: flaskangular/app/__init__.py -Scanned: 2016-10-20 12:53:21.594318 -No vulnerabilities found. - - -nocotan/flaski -https://github.com/nocotan/flaski -Entry file: flaski/app.py -Scanned: 2016-10-20 12:53:23.035238 -No vulnerabilities found. - - -berezovskiydenis/flasktaskr -https://github.com/berezovskiydenis/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:53:23.550929 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -penglee87/flaskr -https://github.com/penglee87/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:53:24.052842 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rouzazari/flaskfirst -https://github.com/rouzazari/flaskfirst -Entry file: flaskfirst/app/__init__.py -Scanned: 2016-10-20 12:53:26.478581 -No vulnerabilities found. - - -smilemlz/flasktest -https://github.com/smilemlz/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 12:53:26.993806 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Runningdogs/flasky -https://github.com/Runningdogs/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:53:31.511208 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -YaleYeah/flasky -https://github.com/YaleYeah/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:53:33.010857 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -seizans/flasko -https://github.com/seizans/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-20 12:53:40.680698 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py - -faridalrafi/flaskopencv -https://github.com/faridalrafi/flaskopencv -Entry file: flaskopencv/app.py -Scanned: 2016-10-20 12:53:41.191767 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -pecone/flaskr -https://github.com/pecone/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:53:41.690047 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bencelder/flaskr -https://github.com/bencelder/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:53:43.202846 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChuckiePae/flaskr -https://github.com/ChuckiePae/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:53:43.718015 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -KamiNoSierhej/flaskkk -https://github.com/KamiNoSierhej/flaskkk -Entry file: flaskkk/flaskkk/Polczan.py -Scanned: 2016-10-20 12:53:47.246251 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sampathweb/ml-cookiecutter-starter-flask-app -https://github.com/sampathweb/ml-cookiecutter-starter-flask-app -Entry file: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/__init__.py -Scanned: 2016-10-20 12:53:50.436305 -Vulnerability 1: -File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > User input at line 32, trigger word ".data": - submitted_data = form.data -Reassigned in: - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 36: sepal_length = float(submitted_data['sepal_length']) - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 37: sepal_width = float(submitted_data['sepal_width']) - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 38: petal_length = float(submitted_data['petal_length']) - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 39: petal_width = float(submitted_data['petal_width']) - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 42: flower_instance = [sepal_length, sepal_width, petal_length, petal_width] - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 47: my_predictions = estimator.predict([flower_instance]) - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 50: my_prediction = my_predictions[0] - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 54: data = [flower_instance] - File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > Line 28: data = [] -File: ml-cookiecutter-starter-flask-app/{{cookiecutter.repo_name}}/app/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, prediction=predicted_iris, data=json.dumps(data)) - - - -roemhildtg/flask-can-crud -https://github.com/roemhildtg/flask-can-crud -Entry file: flask-can-crud/flaskapp.py -Scanned: 2016-10-20 12:53:54.638647 -No vulnerabilities found. - - -thippo/FlaskFrame -https://github.com/thippo/FlaskFrame -Entry file: FlaskFrame/myweb/__init__.py -Scanned: 2016-10-20 12:53:56.309129 -Vulnerability 1: -File: FlaskFrame/myweb/bitcoin/bitcoin.py - > User input at line 12, trigger word ".data": - data = form.q.data.strip() -Reassigned in: - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 18: transfer_dict['pkuc'] = data - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 19: transfer_dict['pkc'] = utils.WIF_to_compressed(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 20: p2a = py3private2address.Private2Address(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 21: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 22: transfer_dict['bac'] = p2a.bitcoinaddress_compressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 24: transfer_dict['type'] = 1 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 25: transfer_dict['pkc'] = data - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 26: transfer_dict['pkuc'] = utils.compressed_to_WIF(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 27: p2a = py3private2address.Private2Address(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 28: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 29: transfer_dict['bac'] = p2a.bitcoinaddress_compressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 34: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 36: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 38: transfer_dict['type'] = 0 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('bitcoin',transfer_dict=transfer_dict, form=form) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 14: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 17: transfer_dict['type'] = 1 -File: FlaskFrame/myweb/bitcoin/bitcoin.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('bitcoinaddress',data=data, form=form) - - - -omokehinde/FlaskExam -https://github.com/omokehinde/FlaskExam -Entry file: FlaskExam/app.py -Scanned: 2016-10-20 12:53:59.801322 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -famesprinter/FlaskDemo -https://github.com/famesprinter/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 12:54:00.315895 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fantingdong/flasky1 -https://github.com/fantingdong/flasky1 -Entry file: flasky1/app/__init__.py -Scanned: 2016-10-20 12:54:01.933597 -Vulnerability 1: -File: flasky1/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 55: posts = pagination.items - File: flasky1/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky1/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flasky1/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flasky1/app/main/views.py - > Line 45: show_followed = False - File: flasky1/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky1/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flasky1/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 67: posts = pagination.items -File: flasky1/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flasky1/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flasky1/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 134: comments = pagination.items - File: flasky1/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flasky1/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flasky1/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flasky1/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky1/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flasky1/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flasky1/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky1/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flasky1/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/main/views.py - > Line 246: comments = pagination.items -File: flasky1/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flasky1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky1/app/api_1_0/users.py - > Line 23: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flasky1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky1/app/api_1_0/users.py - > Line 23: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flasky1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky1/app/api_1_0/users.py - > Line 23: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flasky1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky1/app/api_1_0/users.py - > Line 46: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flasky1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky1/app/api_1_0/users.py - > Line 46: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flasky1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky1/app/api_1_0/users.py - > Line 46: next = None -File: flasky1/app/api_1_0/users.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flasky1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky1/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flasky1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky1/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flasky1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky1/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flasky1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flasky1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flasky1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flasky1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flasky1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flasky1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky1/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -jmelchio/FlaskCF -https://github.com/jmelchio/FlaskCF -Entry file: FlaskCF/FlaskCF.py -Scanned: 2016-10-20 12:54:03.264742 -No vulnerabilities found. - - -lidingke/flaskStudy -https://github.com/lidingke/flaskStudy -Entry file: flaskStudy/user/app/__init__.py -Scanned: 2016-10-20 12:54:04.686064 -No vulnerabilities found. - - -xyq946692052/flaskLearn -https://github.com/xyq946692052/flaskLearn -Entry file: None -Scanned: 2016-10-20 12:54:08.225218 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xyq946692052/flaskLearn. - -wccosby/flaskML -https://github.com/wccosby/flaskML -Entry file: flaskML/app/__init__.py -Scanned: 2016-10-20 12:54:10.180146 -Vulnerability 1: -File: flaskML/app/views.py - > User input at line 32, trigger word ".data": - submitted_data = form.data -Reassigned in: - File: flaskML/app/views.py - > Line 36: sepal_length = float(submitted_data['sepal_length']) - File: flaskML/app/views.py - > Line 37: sepal_width = float(submitted_data['sepal_width']) - File: flaskML/app/views.py - > Line 38: petal_length = float(submitted_data['petal_length']) - File: flaskML/app/views.py - > Line 39: petal_width = float(submitted_data['petal_width']) - File: flaskML/app/views.py - > Line 42: flower_instance = [sepal_length, sepal_width, petal_length, petal_width] - File: flaskML/app/views.py - > Line 47: my_predictions = estimator.predict([flower_instance]) - File: flaskML/app/views.py - > Line 50: my_prediction = my_predictions[0] - File: flaskML/app/views.py - > Line 54: data = [flower_instance] - File: flaskML/app/views.py - > Line 28: data = [] -File: flaskML/app/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, prediction=predicted_iris, data=json.dumps(data)) - - - -nenodias/flask-webservice -https://github.com/nenodias/flask-webservice -Entry file: flask-webservice/app.py -Scanned: 2016-10-20 12:54:11.613711 -Vulnerability 1: -File: flask-webservice/app.py - > User input at line 32, trigger word "get(": - dev = Developer(request.json.name, request.json.get('hireDate', ''), request.json.get('focus', '')) -File: flask-webservice/app.py - > reaches line 35, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('developer'dev), 201) - -Vulnerability 2: -File: flask-webservice/app.py - > User input at line 45, trigger word "get(": - dev = Developer.query.get(id) -Reassigned in: - File: flask-webservice/app.py - > Line 46: dev.name = request.json.get('name', dev.name) - File: flask-webservice/app.py - > Line 47: dev.hireDate = request.json.get('hireDate', dev.name) - File: flask-webservice/app.py - > Line 48: dev.focus = request.json.get('focus', dev.focus) -File: flask-webservice/app.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('dev'dev) - - - -StrGlee/flask-demo -https://github.com/StrGlee/flask-demo -Entry file: None -Scanned: 2016-10-20 12:54:14.134705 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/StrGlee/flask-demo. - -petersowa/flask_blog -https://github.com/petersowa/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:54:14.646062 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SachinMaharana/firstapp-flask -https://github.com/SachinMaharana/firstapp-flask -Entry file: firstapp-flask/hello.py -Scanned: 2016-10-20 12:54:16.975316 -No vulnerabilities found. - - -Maoao530/flask-todo -https://github.com/Maoao530/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-20 12:54:19.528386 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -remarkablemark/flask-template -https://github.com/remarkablemark/flask-template -Entry file: None -Scanned: 2016-10-20 12:54:20.036979 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/remarkablemark/flask-template. - -Nakort/flask_workouts -https://github.com/Nakort/flask_workouts -Entry file: flask_workouts/app/__init__.py -Scanned: 2016-10-20 12:54:22.363844 -No vulnerabilities found. - - -xuqi1987/21.Flask -https://github.com/xuqi1987/21.Flask -Entry file: None -Scanned: 2016-10-20 12:54:22.938107 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DaoQiu/flask_tutorial -https://github.com/DaoQiu/flask_tutorial -Entry file: None -Scanned: 2016-10-20 12:54:24.448793 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -askz/flask-sandbox -https://github.com/askz/flask-sandbox -Entry file: flask-sandbox/quickstart/helloworld.py -Scanned: 2016-10-20 12:54:24.951492 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Coolwater7/Flask_sample -https://github.com/Coolwater7/Flask_sample -Entry file: Flask_sample/app/__init__.py -Scanned: 2016-10-20 12:54:26.506198 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -janreyho/flask-demo -https://github.com/janreyho/flask-demo -Entry file: None -Scanned: 2016-10-20 12:54:27.023556 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/janreyho/flask-demo. - -saeveritt/flask-DHT -https://github.com/saeveritt/flask-DHT -Entry file: flask-DHT/DHT-web.py -Scanned: 2016-10-20 12:54:32.564543 -No vulnerabilities found. - - -rconnol/PromotionsFlask -https://github.com/rconnol/PromotionsFlask -Entry file: PromotionsFlask/app/__init__.py -Scanned: 2016-10-20 12:54:33.868413 -No vulnerabilities found. - - -kwin-wang/flask-learn -https://github.com/kwin-wang/flask-learn -Entry file: flask-learn/hello.py -Scanned: 2016-10-20 12:54:42.507406 -Vulnerability 1: -File: flask-learn/hello.py - > User input at line 52, trigger word "get(": - msg = Message(app.config.get('FLASKY_MAIL_SUBJECT_PREFIX') + subject,sender=app.config.get('FLASKY_MAIL_SENDER'), recipients=[to]) -File: flask-learn/hello.py - > reaches line 54, trigger word "render_template(": - msg.body = render_template(template + '.txt',kwargs) - -Vulnerability 2: -File: flask-learn/hello.py - > User input at line 52, trigger word "get(": - msg = Message(app.config.get('FLASKY_MAIL_SUBJECT_PREFIX') + subject,sender=app.config.get('FLASKY_MAIL_SENDER'), recipients=[to]) -File: flask-learn/hello.py - > reaches line 55, trigger word "render_template(": - msg.html = render_template(template + '.html',kwargs) - - - -shtakai/flask-first -https://github.com/shtakai/flask-first -Entry file: flask-first/flask-first-notes.py -Scanned: 2016-10-20 12:54:43.044596 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PlasmaSheep/flask-bug -https://github.com/PlasmaSheep/flask-bug -Entry file: None -Scanned: 2016-10-20 12:54:43.568666 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/PlasmaSheep/flask-bug. - -Jollyhrothgar/flask_template -https://github.com/Jollyhrothgar/flask_template -Entry file: None -Scanned: 2016-10-20 12:54:44.080168 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Jollyhrothgar/flask_template. - -apengok/flask_tutor -https://github.com/apengok/flask_tutor -Entry file: flask_tutor/tmp/main.py -Scanned: 2016-10-20 12:54:44.573638 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -minodes/flask_boilerplate -https://github.com/minodes/flask_boilerplate -Entry file: flask_boilerplate/application/__init__.py -Scanned: 2016-10-20 12:54:48.125199 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -guoqiao/flask-examples -https://github.com/guoqiao/flask-examples -Entry file: flask-examples/Guestbook/app.py -Scanned: 2016-10-20 12:54:51.132280 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ibhan88/Flask-Testing -https://github.com/ibhan88/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-20 12:54:55.643570 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -titov-andrei/microblog-flask -https://github.com/titov-andrei/microblog-flask -Entry file: None -Scanned: 2016-10-20 12:54:58.176691 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -anthonyheidenreich/flask-vagrant -https://github.com/anthonyheidenreich/flask-vagrant -Entry file: flask-vagrant/app.py -Scanned: 2016-10-20 12:55:01.635870 -No vulnerabilities found. - - -r0oki3/flask-webapp -https://github.com/r0oki3/flask-webapp -Entry file: flask-webapp/app.py -Scanned: 2016-10-20 12:55:02.969956 -No vulnerabilities found. - - -znebby/ubuntu-flask -https://github.com/znebby/ubuntu-flask -Entry file: ubuntu-flask/myproject/myproject.py -Scanned: 2016-10-20 12:55:04.282688 -No vulnerabilities found. - - -Muazzama/flask_app -https://github.com/Muazzama/flask_app -Entry file: None -Scanned: 2016-10-20 12:55:04.837730 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Muazzama/flask_app. - -tjctw/flask_intro -https://github.com/tjctw/flask_intro -Entry file: flask_intro/first_app.py -Scanned: 2016-10-20 12:55:08.353732 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py - -wouzar/flask-microblog -https://github.com/wouzar/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:55:08.872860 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DanielQujun/flask-web -https://github.com/DanielQujun/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 12:55:14.941603 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kzh4ng/flask_server -https://github.com/kzh4ng/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-20 12:55:15.461467 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -uisky/flask-fish -https://github.com/uisky/flask-fish -Entry file: flask-fish/skel/app/app.py -Scanned: 2016-10-20 12:55:16.970250 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -glenpadua/flask-blog -https://github.com/glenpadua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:55:20.528801 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -buzibu/flask-blog -https://github.com/buzibu/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:55:21.079919 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -bgiesa/flask-test -https://github.com/bgiesa/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 12:55:21.604284 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -neoden/flask-nmail -https://github.com/neoden/flask-nmail -Entry file: flask-nmail/flask-nmail.py -Scanned: 2016-10-20 12:55:24.033610 -No vulnerabilities found. - - -vThaian/flask_example -https://github.com/vThaian/flask_example -Entry file: None -Scanned: 2016-10-20 12:55:24.548391 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -whitneybelba/Flask-Testing -https://github.com/whitneybelba/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-20 12:55:25.048793 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MadhuriHB/Testing-flask -https://github.com/MadhuriHB/Testing-flask -Entry file: Testing-flask/party.py -Scanned: 2016-10-20 12:55:26.561981 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -couldtt/flask-foundation -https://github.com/couldtt/flask-foundation -Entry file: flask-foundation/app/__init__.py -Scanned: 2016-10-20 12:55:32.824806 -No vulnerabilities found. - - -TheDeadMays/flask-bootstrap -https://github.com/TheDeadMays/flask-bootstrap -Entry file: flask-bootstrap/app/__init__.py -Scanned: 2016-10-20 12:55:34.142310 -No vulnerabilities found. - - -tuvttran/flask-learning -https://github.com/tuvttran/flask-learning -Entry file: flask-learning/hello.py -Scanned: 2016-10-20 12:55:42.634634 -No vulnerabilities found. - - -schoolofnetcom/flask-python -https://github.com/schoolofnetcom/flask-python -Entry file: flask-python/init.py -Scanned: 2016-10-20 12:55:43.291063 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-python/venv/lib/python2.7/genericpath.py - -KeyJia/Flask-Python -https://github.com/KeyJia/Flask-Python -Entry file: Flask-Python/Flask.py -Scanned: 2016-10-20 12:55:43.829286 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rhymiz/flask-template -https://github.com/rhymiz/flask-template -Entry file: None -Scanned: 2016-10-20 12:55:44.356446 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rhymiz/flask-template. - -xawei/flask_gw -https://github.com/xawei/flask_gw -Entry file: flask_gw/app/__init__.py -Scanned: 2016-10-20 12:55:46.295727 -Vulnerability 1: -File: flask_gw/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 32: posts = pagination.items - File: flask_gw/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_gw/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flask_gw/app/main/views.py - > User input at line 24, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 22: show_followed = False - File: flask_gw/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_gw/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flask_gw/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 44: posts = pagination.items -File: flask_gw/app/main/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flask_gw/app/main/views.py - > User input at line 104, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 106: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask_gw/app/main/views.py - > Line 108: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 111: comments = pagination.items - File: flask_gw/app/main/views.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask_gw/app/main/views.py - > reaches line 112, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flask_gw/app/main/views.py - > User input at line 171, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 172: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_gw/app/main/views.py - > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_gw/app/main/views.py - > reaches line 177, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flask_gw/app/main/views.py - > User input at line 188, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 189: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 192: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask_gw/app/main/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_gw/app/main/views.py - > reaches line 194, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flask_gw/app/main/views.py - > User input at line 219, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_gw/app/main/views.py - > Line 220: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_gw/app/main/views.py - > Line 223: comments = pagination.items -File: flask_gw/app/main/views.py - > reaches line 224, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -stonewm/flask_blog -https://github.com/stonewm/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:55:48.823227 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ewjoachim/bttn_flask -https://github.com/ewjoachim/bttn_flask -Entry file: bttn_flask/bttn_flask.py -Scanned: 2016-10-20 12:55:51.134506 -No vulnerabilities found. - - -curious725/blog_flask -https://github.com/curious725/blog_flask -Entry file: blog_flask/app.py -Scanned: 2016-10-20 12:55:57.200901 -No vulnerabilities found. - - -ssong319/Flask-Testing -https://github.com/ssong319/Flask-Testing -Entry file: Flask-Testing/party.py -Scanned: 2016-10-20 12:55:58.714049 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yantiz/flask-blog -https://github.com/yantiz/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:56:01.280968 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -nanakenashi/flask_hello -https://github.com/nanakenashi/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-20 12:56:02.939476 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -voltagemeeder/FirstFlask -https://github.com/voltagemeeder/FirstFlask -Entry file: FirstFlask/app.py -Scanned: 2016-10-20 12:56:04.534460 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py - -zembrzuski/openshift-flask -https://github.com/zembrzuski/openshift-flask -Entry file: openshift-flask/app.py -Scanned: 2016-10-20 12:56:05.871466 -No vulnerabilities found. - - -wgerald90/tth-Flask -https://github.com/wgerald90/tth-Flask -Entry file: None -Scanned: 2016-10-20 12:56:08.444825 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -NataKuskova/Classwork_flask -https://github.com/NataKuskova/Classwork_flask -Entry file: Classwork_flask/script.py -Scanned: 2016-10-20 12:56:09.773264 -Vulnerability 1: -File: Classwork_flask/script.py - > User input at line 27, trigger word "form[": - text = request.form['text'] -File: Classwork_flask/script.py - > reaches line 31, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('result',text=text)) - -Vulnerability 2: -File: Classwork_flask/script.py - > User input at line 27, trigger word "form[": - text = request.form['text'] -File: Classwork_flask/script.py - > reaches line 31, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('result',text=text)) - - - -BadSol/flask-vendor -https://github.com/BadSol/flask-vendor -Entry file: flask-vendor/vendor/__init__.py -Scanned: 2016-10-20 12:56:14.788536 -Vulnerability 1: -File: flask-vendor/vendor/user/views.py - > User input at line 18, trigger word "form[": - user_obj = User.query.filter(User.email == request.form['email'].lower()).one_or_none() -File: flask-vendor/vendor/user/views.py - > reaches line 18, trigger word "filter(": - user_obj = User.query.filter(User.email == request.form['email'].lower()).one_or_none() - - - -haimapi/flask_pro -https://github.com/haimapi/flask_pro -Entry file: flask_pro/he.py -Scanned: 2016-10-20 12:56:15.305754 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kozyrevsergey89/flask_backend -https://github.com/kozyrevsergey89/flask_backend -Entry file: flask_backend/hello.py -Scanned: 2016-10-20 12:56:16.761956 -No vulnerabilities found. - - -katiayx/hblab_0805_Testing-Balloonicorn-After-Party -https://github.com/katiayx/hblab_0805_Testing-Balloonicorn-After-Party -Entry file: hblab_0805_Testing-Balloonicorn-After-Party/party.py -Scanned: 2016-10-20 12:56:17.275383 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -csyouk/faust-register-py -https://github.com/csyouk/faust-register-py -Entry file: faust-register-py/register_server.py -Scanned: 2016-10-20 12:56:23.621386 -Vulnerability 1: -File: faust-register-py/register_server.py - > User input at line 56, trigger word "form[": - session = game.find_session(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 53: session = [] -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 2: -File: faust-register-py/register_server.py - > User input at line 57, trigger word "form[": - player_list = player.get_all_player(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 52: player_list = [] -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 3: -File: faust-register-py/register_server.py - > User input at line 58, trigger word "form[": - player_count = player.get_count(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 54: player_count = 0 -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 4: -File: faust-register-py/register_server.py - > User input at line 139, trigger word "get(": - error_type = request.args.get('error_type') -File: faust-register-py/register_server.py - > reaches line 142, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('alert.html',error_type=error_type) - - - -deonna/flask -https://github.com/deonna/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:56:25.635926 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -ksbek/flask -https://github.com/ksbek/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:56:26.217665 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -feirendada/Flask -https://github.com/feirendada/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:56:26.754432 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -krandmm/flask -https://github.com/krandmm/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:56:27.344693 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -huhjuang/Flask -https://github.com/huhjuang/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:56:27.856630 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Vaspy/Flask -https://github.com/Vaspy/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:56:28.359088 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sebas095/Flask -https://github.com/sebas095/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 12:56:33.399955 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -codigofacilito/flask_cf -https://github.com/codigofacilito/flask_cf -Entry file: flask_cf/Project/main.py -Scanned: 2016-10-20 12:56:41.962800 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lizTheDeveloper/__g26_flask -https://github.com/lizTheDeveloper/__g26_flask -Entry file: __g26_flask/model.py -Scanned: 2016-10-20 12:56:44.397472 -Vulnerability 1: -File: __g26_flask/app.py - > User input at line 27, trigger word "get(": - user = load_user(session.get('user_id')) -File: __g26_flask/app.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',title='Pokestraveganzamon', pokemon=pokelist, user=user) - - - -ZakStrassberg/flask_products_group_project -https://github.com/ZakStrassberg/flask_products_group_project -Entry file: flask_products_group_project/server.py -Scanned: 2016-10-20 12:56:45.917207 -No vulnerabilities found. - - -iamrajhans/FlaskBackend -https://github.com/iamrajhans/FlaskBackend -Entry file: FlaskBackend/drone/main.py -Scanned: 2016-10-20 12:56:48.190107 -No vulnerabilities found. - - -yantiz/flasktaskr -https://github.com/yantiz/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:56:49.722676 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nocotan/flaski -https://github.com/nocotan/flaski -Entry file: flaski/app.py -Scanned: 2016-10-20 12:56:52.173642 -No vulnerabilities found. - - -asimonia/Flaskbook -https://github.com/asimonia/Flaskbook -Entry file: Flaskbook/maps.py -Scanned: 2016-10-20 12:56:52.703511 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Markmwaura/Flaskblog -https://github.com/Markmwaura/Flaskblog -Entry file: Flaskblog/app/__init__.py -Scanned: 2016-10-20 12:56:57.016718 -No vulnerabilities found. - - -seizans/flasko -https://github.com/seizans/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-20 12:56:59.650069 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/struct.py - -vennyk/flasktaskr -https://github.com/vennyk/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:57:02.185209 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -akjanik/flasktutorial -https://github.com/akjanik/flasktutorial -Entry file: None -Scanned: 2016-10-20 12:57:03.709500 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hyteer/flaskdemo -https://github.com/hyteer/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 12:57:05.286912 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhang555/flasky -https://github.com/zhang555/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 12:57:05.963591 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wuqingwuqingwu/flaskk -https://github.com/wuqingwuqingwu/flaskk -Entry file: flaskk/hello.py -Scanned: 2016-10-20 12:57:10.055655 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskk/venv/lib/python2.7/genericpath.py - -HJeongWon/flaskr -https://github.com/HJeongWon/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 12:57:12.596755 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -oscarnyl/flaskpost -https://github.com/oscarnyl/flaskpost -Entry file: flaskpost/flaskpost/__init__.py -Scanned: 2016-10-20 12:57:17.142001 -No vulnerabilities found. - - -AdamWawrow/flasktaskr -https://github.com/AdamWawrow/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:57:17.680444 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -reed-chi/flasktaskr -https://github.com/reed-chi/flasktaskr -Entry file: None -Scanned: 2016-10-20 12:57:18.186216 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -thippo/FlaskFrame -https://github.com/thippo/FlaskFrame -Entry file: FlaskFrame/myweb/__init__.py -Scanned: 2016-10-20 12:57:25.357996 -Vulnerability 1: -File: FlaskFrame/myweb/bitcoin/bitcoin.py - > User input at line 12, trigger word ".data": - data = form.q.data.strip() -Reassigned in: - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 18: transfer_dict['pkuc'] = data - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 19: transfer_dict['pkc'] = utils.WIF_to_compressed(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 20: p2a = py3private2address.Private2Address(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 21: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 22: transfer_dict['bac'] = p2a.bitcoinaddress_compressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 24: transfer_dict['type'] = 1 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 25: transfer_dict['pkc'] = data - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 26: transfer_dict['pkuc'] = utils.compressed_to_WIF(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 27: p2a = py3private2address.Private2Address(data) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 28: transfer_dict['bauc'] = p2a.bitcoinaddress_uncompressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 29: transfer_dict['bac'] = p2a.bitcoinaddress_compressed - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 34: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 36: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 38: transfer_dict['type'] = 0 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 39: ret_MAYBE_FUNCTION_NAME = render_template('bitcoin',transfer_dict=transfer_dict, form=form) - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 14: transfer_dict['type'] = 2 - File: FlaskFrame/myweb/bitcoin/bitcoin.py - > Line 17: transfer_dict['type'] = 1 -File: FlaskFrame/myweb/bitcoin/bitcoin.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('bitcoinaddress',data=data, form=form) - - - -sevenZz/FlaskTest -https://github.com/sevenZz/FlaskTest -Entry file: None -Scanned: 2016-10-20 12:57:25.878974 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sevenZz/FlaskTest. - -omokehinde/FlaskExam -https://github.com/omokehinde/FlaskExam -Entry file: FlaskExam/app.py -Scanned: 2016-10-20 12:57:26.880830 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -Niel2016/FlaskApp -https://github.com/Niel2016/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 12:57:27.465301 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Chemoday/FlaskPractice -https://github.com/Chemoday/FlaskPractice -Entry file: FlaskPractice/app/__init__.py -Scanned: 2016-10-20 12:57:28.894510 -No vulnerabilities found. - - -JonathanFrederick/flask-cards -https://github.com/JonathanFrederick/flask-cards -Entry file: flask-cards/app.py -Scanned: 2016-10-20 12:57:30.955645 -Vulnerability 1: -File: flask-cards/app.py - > User input at line 20, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: flask-cards/app.py - > Line 26: user = models.User(username=username, password=password) -File: flask-cards/app.py - > reaches line 29, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201) - -Vulnerability 2: -File: flask-cards/app.py - > User input at line 21, trigger word "get(": - password = request.json.get('password') -Reassigned in: - File: flask-cards/app.py - > Line 26: user = models.User(username=username, password=password) -File: flask-cards/app.py - > reaches line 29, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201) - - - -petersowa/flask_blog -https://github.com/petersowa/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:57:32.467443 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -janreyho/flask-demo -https://github.com/janreyho/flask-demo -Entry file: None -Scanned: 2016-10-20 12:57:34.051893 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/janreyho/flask-demo. - -morpy/flask_app -https://github.com/morpy/flask_app -Entry file: None -Scanned: 2016-10-20 12:57:42.599402 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/morpy/flask_app. - -sacktla/JOURNAL_FLASK -https://github.com/sacktla/JOURNAL_FLASK -Entry file: JOURNAL_FLASK/journal.py -Scanned: 2016-10-20 12:57:45.049418 -No vulnerabilities found. - - -MrRedAmber/SlackFlask -https://github.com/MrRedAmber/SlackFlask -Entry file: SlackFlask/k.py -Scanned: 2016-10-20 12:57:45.577886 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -flavio99/Flask-Scaffold -https://github.com/flavio99/Flask-Scaffold -Entry file: None -Scanned: 2016-10-20 12:57:47.159498 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/flavio99/Flask-Scaffold. - -Caveat4U/flask.docker -https://github.com/Caveat4U/flask.docker -Entry file: flask/hello.py -Scanned: 2016-10-20 12:57:47.734394 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -MustafaAdam/flask_app -https://github.com/MustafaAdam/flask_app -Entry file: None -Scanned: 2016-10-20 12:57:50.254812 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MustafaAdam/flask_app. - -huyuguo/flask_small -https://github.com/huyuguo/flask_small -Entry file: flask_small/small.py -Scanned: 2016-10-20 12:57:52.571211 -No vulnerabilities found. - - -michaelbahng999/dnd-flask -https://github.com/michaelbahng999/dnd-flask -Entry file: dnd-flask/run.py -Scanned: 2016-10-20 12:57:53.144834 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sbarratt/flask-prometheus -https://github.com/sbarratt/flask-prometheus -Entry file: flask-prometheus/flask_prometheus/__init__.py -Scanned: 2016-10-20 12:57:57.597811 -No vulnerabilities found. - - -tjctw/flask_intro -https://github.com/tjctw/flask_intro -Entry file: flask_intro/first_app.py -Scanned: 2016-10-20 12:58:00.116811 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py - -evanxg852000/flask-starter -https://github.com/evanxg852000/flask-starter -Entry file: flask-starter/app/__init__.py -Scanned: 2016-10-20 12:58:02.624614 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rafaelescrich/pdf-flask -https://github.com/rafaelescrich/pdf-flask -Entry file: pdf-flask/app.py -Scanned: 2016-10-20 12:58:04.360576 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wouzar/flask-microblog -https://github.com/wouzar/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:58:05.872277 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DanielQujun/flask-web -https://github.com/DanielQujun/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 12:58:06.377888 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -CiscoPartnerCloudRotation/sparkbot-flask -https://github.com/CiscoPartnerCloudRotation/sparkbot-flask -Entry file: sparkbot-flask/spark_integration.py -Scanned: 2016-10-20 12:58:09.860889 -No vulnerabilities found. - - -vennyk/flask-blog -https://github.com/vennyk/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 12:58:10.444326 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -we444/flask-myblog -https://github.com/we444/flask-myblog -Entry file: flask-myblog/app/__init__.py -Scanned: 2016-10-20 12:58:14.118909 -No vulnerabilities found. - - -crhowell/plj-flask -https://github.com/crhowell/plj-flask -Entry file: plj-flask/app.py -Scanned: 2016-10-20 12:58:17.686623 -Vulnerability 1: -File: plj-flask/app.py - > User input at line 76, trigger word "get(": - entry = models.Entry.get(id=entry_id) -Reassigned in: - File: plj-flask/app.py - > Line 92: form.title.data = entry.title - File: plj-flask/app.py - > Line 93: form.date.data = entry.date - File: plj-flask/app.py - > Line 94: form.time_spent.data = entry.time_spent - File: plj-flask/app.py - > Line 95: form.learned.data = entry.learned - File: plj-flask/app.py - > Line 96: form.resources.data = entry.resources - File: plj-flask/app.py - > Line 97: form.tags.data = entry.tags - File: plj-flask/app.py - > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id) - File: plj-flask/app.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) -File: plj-flask/app.py - > reaches line 88, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id)) - -Vulnerability 2: -File: plj-flask/app.py - > User input at line 76, trigger word "get(": - entry = models.Entry.get(id=entry_id) -Reassigned in: - File: plj-flask/app.py - > Line 92: form.title.data = entry.title - File: plj-flask/app.py - > Line 93: form.date.data = entry.date - File: plj-flask/app.py - > Line 94: form.time_spent.data = entry.time_spent - File: plj-flask/app.py - > Line 95: form.learned.data = entry.learned - File: plj-flask/app.py - > Line 96: form.resources.data = entry.resources - File: plj-flask/app.py - > Line 97: form.tags.data = entry.tags - File: plj-flask/app.py - > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id) - File: plj-flask/app.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) -File: plj-flask/app.py - > reaches line 88, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id)) - -Vulnerability 3: -File: plj-flask/app.py - > User input at line 76, trigger word "get(": - entry = models.Entry.get(id=entry_id) -Reassigned in: - File: plj-flask/app.py - > Line 92: form.title.data = entry.title - File: plj-flask/app.py - > Line 93: form.date.data = entry.date - File: plj-flask/app.py - > Line 94: form.time_spent.data = entry.time_spent - File: plj-flask/app.py - > Line 95: form.learned.data = entry.learned - File: plj-flask/app.py - > Line 96: form.resources.data = entry.resources - File: plj-flask/app.py - > Line 97: form.tags.data = entry.tags - File: plj-flask/app.py - > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id) - File: plj-flask/app.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) -File: plj-flask/app.py - > reaches line 90, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id)) - -Vulnerability 4: -File: plj-flask/app.py - > User input at line 76, trigger word "get(": - entry = models.Entry.get(id=entry_id) -Reassigned in: - File: plj-flask/app.py - > Line 92: form.title.data = entry.title - File: plj-flask/app.py - > Line 93: form.date.data = entry.date - File: plj-flask/app.py - > Line 94: form.time_spent.data = entry.time_spent - File: plj-flask/app.py - > Line 95: form.learned.data = entry.learned - File: plj-flask/app.py - > Line 96: form.resources.data = entry.resources - File: plj-flask/app.py - > Line 97: form.tags.data = entry.tags - File: plj-flask/app.py - > Line 99: ret_MAYBE_FUNCTION_NAME = render_template('edit.html',form=form, entry_id=entry_id) - File: plj-flask/app.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) -File: plj-flask/app.py - > reaches line 90, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_detail',entry_id=entry.id)) - -Vulnerability 5: -File: plj-flask/app.py - > User input at line 110, trigger word "get(": - entry = models.Entry.get(id=entry_id) -Reassigned in: - File: plj-flask/app.py - > Line 114: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) - File: plj-flask/app.py - > Line 115: ret_MAYBE_FUNCTION_NAME = redirect(url_for('entry_list')) -File: plj-flask/app.py - > reaches line 111, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('detail.html',entry=entry) - - - -bgiesa/flask-test -https://github.com/bgiesa/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 12:58:18.714920 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -neoden/flask-nmail -https://github.com/neoden/flask-nmail -Entry file: flask-nmail/flask-nmail.py -Scanned: 2016-10-20 12:58:23.052425 -No vulnerabilities found. - - -vThaian/flask_example -https://github.com/vThaian/flask_example -Entry file: None -Scanned: 2016-10-20 12:58:24.922662 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -helelily/flask-demo -https://github.com/helelily/flask-demo -Entry file: None -Scanned: 2016-10-20 12:58:26.584605 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/helelily/flask-demo. - -HCT118/Flask-web -https://github.com/HCT118/Flask-web -Entry file: Flask-web/app/__init__.py -Scanned: 2016-10-20 12:58:28.528027 -Vulnerability 1: -File: Flask-web/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 55: posts = pagination.items - File: Flask-web/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-web/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Flask-web/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 45: show_followed = False - File: Flask-web/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-web/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Flask-web/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 67: posts = pagination.items -File: Flask-web/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Flask-web/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Flask-web/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 134: comments = pagination.items - File: Flask-web/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Flask-web/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Flask-web/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Flask-web/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-web/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Flask-web/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Flask-web/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-web/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Flask-web/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/main/views.py - > Line 246: comments = pagination.items -File: Flask-web/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: Flask-web/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 23: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: Flask-web/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 23: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: Flask-web/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 23: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: Flask-web/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 42: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 46: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: Flask-web/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 42: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 46: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: Flask-web/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: Flask-web/app/api_1_0/users.py - > Line 42: prev = None - File: Flask-web/app/api_1_0/users.py - > Line 46: next = None -File: Flask-web/app/api_1_0/users.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: Flask-web/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: Flask-web/app/api_1_0/posts.py - > Line 16: prev = None - File: Flask-web/app/api_1_0/posts.py - > Line 19: next = None -File: Flask-web/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: Flask-web/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: Flask-web/app/api_1_0/posts.py - > Line 16: prev = None - File: Flask-web/app/api_1_0/posts.py - > Line 19: next = None -File: Flask-web/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: Flask-web/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: Flask-web/app/api_1_0/posts.py - > Line 16: prev = None - File: Flask-web/app/api_1_0/posts.py - > Line 19: next = None -File: Flask-web/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: Flask-web/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: Flask-web/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: Flask-web/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: Flask-web/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 43: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 46: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: Flask-web/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 43: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 46: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: Flask-web/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-web/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-web/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: Flask-web/app/api_1_0/comments.py - > Line 43: prev = None - File: Flask-web/app/api_1_0/comments.py - > Line 46: next = None -File: Flask-web/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -chenglinguang/flask_blog -https://github.com/chenglinguang/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:58:29.085782 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jraaurellano/first-flask -https://github.com/jraaurellano/first-flask -Entry file: None -Scanned: 2016-10-20 12:58:29.718398 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -olagodavid/Flask-project -https://github.com/olagodavid/Flask-project -Entry file: None -Scanned: 2016-10-20 12:58:30.380338 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tsriram/flask-playground -https://github.com/tsriram/flask-playground -Entry file: flask-playground/app/__init__.py -Scanned: 2016-10-20 12:58:30.908461 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -RatulGhosh/flask_tutorial -https://github.com/RatulGhosh/flask_tutorial -Entry file: None -Scanned: 2016-10-20 12:58:33.418712 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -voltagemeeder/flask-intro -https://github.com/voltagemeeder/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 12:58:35.021024 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rdammkoehler/root_flask -https://github.com/rdammkoehler/root_flask -Entry file: root_flask/n/s/f/app_factory.py -Scanned: 2016-10-20 12:58:44.808906 -No vulnerabilities found. - - -aniruddhabarapatre/flask-microblog -https://github.com/aniruddhabarapatre/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:58:45.318275 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -shutdown57/learning_flask -https://github.com/shutdown57/learning_flask -Entry file: learning_flask/src/app.py -Scanned: 2016-10-20 12:58:48.588649 -Vulnerability 1: -File: learning_flask/src/users/views.py - > User input at line 79, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/src/users/views.py - > Line 83: my_coordinates = p.address_to_latlng(address) - File: learning_flask/src/users/views.py - > Line 84: places = p.query(address) - File: learning_flask/src/users/views.py - > Line 67: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/src/users/views.py - > Line 71: places = [] - File: learning_flask/src/users/views.py - > Line 72: my_coordinates = (37.4221, -122.0844) - File: learning_flask/src/users/views.py - > Line 76: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/src/users/views.py - > reaches line 87, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - -Vulnerability 2: -File: learning_flask/src/users/views.py - > User input at line 79, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/src/users/views.py - > Line 83: my_coordinates = p.address_to_latlng(address) - File: learning_flask/src/users/views.py - > Line 84: places = p.query(address) - File: learning_flask/src/users/views.py - > Line 67: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/src/users/views.py - > Line 71: places = [] - File: learning_flask/src/users/views.py - > Line 72: my_coordinates = (37.4221, -122.0844) - File: learning_flask/src/users/views.py - > Line 76: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/src/users/views.py - > reaches line 90, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - - - -KeyJia/Flask-Python -https://github.com/KeyJia/Flask-Python -Entry file: Flask-Python/Flask.py -Scanned: 2016-10-20 12:58:49.123906 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GuanYQ0926/flask-restful -https://github.com/GuanYQ0926/flask-restful -Entry file: flask-restful/app.py -Scanned: 2016-10-20 12:58:50.489618 -Vulnerability 1: -File: flask-restful/app.py - > User input at line 72, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flask-restful/app.py - > reaches line 79, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -kuaiwu/MyFlask -https://github.com/kuaiwu/MyFlask -Entry file: MyFlask/app/__init__.py -Scanned: 2016-10-20 12:58:52.580361 -Vulnerability 1: -File: MyFlask/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 55: posts = pagination.items - File: MyFlask/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlask/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: MyFlask/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 45: show_followed = False - File: MyFlask/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlask/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: MyFlask/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 67: posts = pagination.items -File: MyFlask/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: MyFlask/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: MyFlask/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 134: comments = pagination.items - File: MyFlask/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: MyFlask/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: MyFlask/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: MyFlask/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlask/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: MyFlask/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: MyFlask/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlask/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: MyFlask/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/main/views.py - > Line 246: comments = pagination.items -File: MyFlask/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: MyFlask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 23: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: MyFlask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 23: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: MyFlask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 23: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: MyFlask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 46: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: MyFlask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 46: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: MyFlask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlask/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlask/app/api_1_0/users.py - > Line 46: next = None -File: MyFlask/app/api_1_0/users.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: MyFlask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlask/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlask/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlask/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: MyFlask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlask/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlask/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlask/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: MyFlask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlask/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlask/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlask/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: MyFlask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: MyFlask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: MyFlask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: MyFlask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: MyFlask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: MyFlask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlask/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlask/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlask/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -Tangugo/flask_learn -https://github.com/Tangugo/flask_learn -Entry file: flask_learn/hello.py -Scanned: 2016-10-20 12:58:53.132786 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -upbit/flask_whiteboard -https://github.com/upbit/flask_whiteboard -Entry file: flask_whiteboard/main.py -Scanned: 2016-10-20 12:58:58.145570 -Vulnerability 1: -File: flask_whiteboard/main.py - > User input at line 41, trigger word "get(": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 46: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 51: segments = jieba.cut_for_search(word) - File: flask_whiteboard/main.py - > Line 53: segments = jieba.cut(word,cut_all=True) - File: flask_whiteboard/main.py - > Line 55: segments = jieba.cut(word) - File: flask_whiteboard/main.py - > Line 57: segments = mmseg.seg_txt(word) - File: flask_whiteboard/main.py - > Line 59: segments = mmseg.search.seg_txt_search(word) - File: flask_whiteboard/main.py - > Line 62: result = ', '.join(segments) - File: flask_whiteboard/main.py - > Line 65: result = result.encode('utf-8') - File: flask_whiteboard/main.py - > Line 69: content = result - File: flask_whiteboard/main.py - > Line 71: content += '
' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2)) - File: flask_whiteboard/main.py - > Line 74: word = '' - File: flask_whiteboard/main.py - > Line 77: content += '支持的模式:
  jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式
  mmseg: /mm mmseg模式; /mms mmseg.search模式' -File: flask_whiteboard/main.py - > reaches line 76, trigger word "url_for(": - content = '请在地址栏后或输入框中,输入要分词的内容
例如: %s

' % (url_for('cut_words',word=EXAMPLE_WORDS).encode('utf8'), '/cut/' + EXAMPLE_WORDS) - -Vulnerability 2: -File: flask_whiteboard/main.py - > User input at line 41, trigger word "form[": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 46: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 51: segments = jieba.cut_for_search(word) - File: flask_whiteboard/main.py - > Line 53: segments = jieba.cut(word,cut_all=True) - File: flask_whiteboard/main.py - > Line 55: segments = jieba.cut(word) - File: flask_whiteboard/main.py - > Line 57: segments = mmseg.seg_txt(word) - File: flask_whiteboard/main.py - > Line 59: segments = mmseg.search.seg_txt_search(word) - File: flask_whiteboard/main.py - > Line 62: result = ', '.join(segments) - File: flask_whiteboard/main.py - > Line 65: result = result.encode('utf-8') - File: flask_whiteboard/main.py - > Line 69: content = result - File: flask_whiteboard/main.py - > Line 71: content += '
' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2)) - File: flask_whiteboard/main.py - > Line 74: word = '' - File: flask_whiteboard/main.py - > Line 77: content += '支持的模式:
  jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式
  mmseg: /mm mmseg模式; /mms mmseg.search模式' -File: flask_whiteboard/main.py - > reaches line 76, trigger word "url_for(": - content = '请在地址栏后或输入框中,输入要分词的内容
例如: %s

' % (url_for('cut_words',word=EXAMPLE_WORDS).encode('utf8'), '/cut/' + EXAMPLE_WORDS) - -Vulnerability 3: -File: flask_whiteboard/main.py - > User input at line 41, trigger word "get(": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 46: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 51: segments = jieba.cut_for_search(word) - File: flask_whiteboard/main.py - > Line 53: segments = jieba.cut(word,cut_all=True) - File: flask_whiteboard/main.py - > Line 55: segments = jieba.cut(word) - File: flask_whiteboard/main.py - > Line 57: segments = mmseg.seg_txt(word) - File: flask_whiteboard/main.py - > Line 59: segments = mmseg.search.seg_txt_search(word) - File: flask_whiteboard/main.py - > Line 62: result = ', '.join(segments) - File: flask_whiteboard/main.py - > Line 65: result = result.encode('utf-8') - File: flask_whiteboard/main.py - > Line 69: content = result - File: flask_whiteboard/main.py - > Line 71: content += '
' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2)) - File: flask_whiteboard/main.py - > Line 74: word = '' - File: flask_whiteboard/main.py - > Line 77: content += '支持的模式:
  jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式
  mmseg: /mm mmseg模式; /mms mmseg.search模式' -File: flask_whiteboard/main.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试') - -Vulnerability 4: -File: flask_whiteboard/main.py - > User input at line 41, trigger word "form[": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 46: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 51: segments = jieba.cut_for_search(word) - File: flask_whiteboard/main.py - > Line 53: segments = jieba.cut(word,cut_all=True) - File: flask_whiteboard/main.py - > Line 55: segments = jieba.cut(word) - File: flask_whiteboard/main.py - > Line 57: segments = mmseg.seg_txt(word) - File: flask_whiteboard/main.py - > Line 59: segments = mmseg.search.seg_txt_search(word) - File: flask_whiteboard/main.py - > Line 62: result = ', '.join(segments) - File: flask_whiteboard/main.py - > Line 65: result = result.encode('utf-8') - File: flask_whiteboard/main.py - > Line 69: content = result - File: flask_whiteboard/main.py - > Line 71: content += '
' + '关键词: ' + add_red(word, analyse.extract_tags(word,topK=2)) - File: flask_whiteboard/main.py - > Line 74: word = '' - File: flask_whiteboard/main.py - > Line 77: content += '支持的模式:
  jieba: /d 精确模式; /a 全模式; /s 搜索引擎模式
  mmseg: /mm mmseg模式; /mms mmseg.search模式' -File: flask_whiteboard/main.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试') - -Vulnerability 5: -File: flask_whiteboard/main.py - > User input at line 43, trigger word "get(": - mode = request.method == 'POST'request.form['mode']request.args.get('mode') -Reassigned in: - File: flask_whiteboard/main.py - > Line 48: mode = 'mms' - File: flask_whiteboard/main.py - > Line 75: mode = '' -File: flask_whiteboard/main.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试') - -Vulnerability 6: -File: flask_whiteboard/main.py - > User input at line 43, trigger word "form[": - mode = request.method == 'POST'request.form['mode']request.args.get('mode') -Reassigned in: - File: flask_whiteboard/main.py - > Line 48: mode = 'mms' - File: flask_whiteboard/main.py - > Line 75: mode = '' -File: flask_whiteboard/main.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, mode=mode, mode_names=CUT_MOD_NAMES, content=content, title='Jieba切词测试') - -Vulnerability 7: -File: flask_whiteboard/main.py - > User input at line 87, trigger word "get(": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 90: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 91: segments = ['%s/%s' % (w, f) for (w, f) in pseg.cut(word)] - File: flask_whiteboard/main.py - > Line 95: word = '' -File: flask_whiteboard/main.py - > reaches line 98, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, content=content, title='Jieba词性标注测试') - -Vulnerability 8: -File: flask_whiteboard/main.py - > User input at line 87, trigger word "form[": - word = request.method == 'POST'request.form['word']request.args.get('word') -Reassigned in: - File: flask_whiteboard/main.py - > Line 90: word = word.encode('utf-8') - File: flask_whiteboard/main.py - > Line 91: segments = ['%s/%s' % (w, f) for (w, f) in pseg.cut(word)] - File: flask_whiteboard/main.py - > Line 95: word = '' -File: flask_whiteboard/main.py - > reaches line 98, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('whiteboard.html',word=word, content=content, title='Jieba词性标注测试') - - - -python-ning/flask_blog -https://github.com/python-ning/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 12:59:00.866911 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kenju254/flask-microblog -https://github.com/kenju254/flask-microblog -Entry file: None -Scanned: 2016-10-20 12:59:03.369548 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chloebecker/flask-tutorial -https://github.com/chloebecker/flask-tutorial -Entry file: None -Scanned: 2016-10-20 12:59:04.880092 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -4dsolutions/tiny_flask -https://github.com/4dsolutions/tiny_flask -Entry file: tiny_flask/flask_app.py -Scanned: 2016-10-20 12:59:07.690638 -No vulnerabilities found. - - -EduhG/Flask-App -https://github.com/EduhG/Flask-App -Entry file: Flask-App/app/flaskapp/__init__.py -Scanned: 2016-10-20 12:59:09.150171 -No vulnerabilities found. - - -submorphic/hello-flask -https://github.com/submorphic/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 12:59:09.767080 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -jmontroy90/first-flask -https://github.com/jmontroy90/first-flask -Entry file: None -Scanned: 2016-10-20 12:59:11.301923 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -szomolanyi/flask-base -https://github.com/szomolanyi/flask-base -Entry file: None -Scanned: 2016-10-20 12:59:13.855546 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/szomolanyi/flask-base. - -DGideas/flask_microservice -https://github.com/DGideas/flask_microservice -Entry file: flask_microservice/main.py -Scanned: 2016-10-20 12:59:18.186308 -No vulnerabilities found. - - -johnngugi/flask-assesment -https://github.com/johnngugi/flask-assesment -Entry file: flask-assesment/app/__init__.py -Scanned: 2016-10-20 12:59:20.819821 -No vulnerabilities found. - - -lieuhon/First-Flask -https://github.com/lieuhon/First-Flask -Entry file: First-Flask/app/__init__.py -Scanned: 2016-10-20 12:59:23.774836 -Vulnerability 1: -File: First-Flask/app/mod_auth/views.py - > User input at line 33, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: First-Flask/app/mod_auth/views.py - > Line 37: session['user_id'] = user.id -File: First-Flask/app/mod_auth/views.py - > reaches line 39, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -YuliYaSokolova/microservices_flask -https://github.com/YuliYaSokolova/microservices_flask -Entry file: microservices_flask/rating_route.py -Scanned: 2016-10-20 12:59:25.482766 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: microservices_flask/.envi/lib/python3.4/struct.py - -nenodias/flask-bigapp -https://github.com/nenodias/flask-bigapp -Entry file: flask-bigapp/app/__init__.py -Scanned: 2016-10-20 12:59:27.820807 -No vulnerabilities found. - - -rezastd/flask_two -https://github.com/rezastd/flask_two -Entry file: flask_two/app.py -Scanned: 2016-10-20 12:59:28.721677 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_two/venv/lib/python2.7/genericpath.py - -wuruthie/FirstFlask -https://github.com/wuruthie/FirstFlask -Entry file: FirstFlask/app.py -Scanned: 2016-10-20 12:59:29.304274 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py - -ahoff314/geet -https://github.com/ahoff314/geet -Entry file: geet/geet/app/main.py -Scanned: 2016-10-20 12:59:37.019660 -No vulnerabilities found. - - -patoupatou/microblog -https://github.com/patoupatou/microblog -Entry file: None -Scanned: 2016-10-20 12:59:37.549702 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -csyouk/faust-register-py -https://github.com/csyouk/faust-register-py -Entry file: faust-register-py/register_server.py -Scanned: 2016-10-20 12:59:41.348032 -Vulnerability 1: -File: faust-register-py/register_server.py - > User input at line 56, trigger word "form[": - session = game.find_session(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 53: session = [] -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 2: -File: faust-register-py/register_server.py - > User input at line 57, trigger word "form[": - player_list = player.get_all_player(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 52: player_list = [] -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 3: -File: faust-register-py/register_server.py - > User input at line 58, trigger word "form[": - player_count = player.get_count(request.form['session']) -Reassigned in: - File: faust-register-py/register_server.py - > Line 54: player_count = 0 -File: faust-register-py/register_server.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('player-list.html',session_list=session_list, player_list=player_list, session=session, player_count=player_count) - -Vulnerability 4: -File: faust-register-py/register_server.py - > User input at line 139, trigger word "get(": - error_type = request.args.get('error_type') -File: faust-register-py/register_server.py - > reaches line 142, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('alert.html',error_type=error_type) - - - -krandmm/firstapp -https://github.com/krandmm/firstapp -Entry file: None -Scanned: 2016-10-20 12:59:43.890872 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/krandmm/firstapp. - -jasonboykin/headlines -https://github.com/jasonboykin/headlines -Entry file: headlines/headlines.py -Scanned: 2016-10-20 12:59:45.413726 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -theparadoxer02/flask -https://github.com/theparadoxer02/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:59:49.521307 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -alazar-gm/flask -https://github.com/alazar-gm/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:59:50.164899 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -krasytod/flask -https://github.com/krasytod/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:59:51.788486 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -saiprakashreddymarasani/flask -https://github.com/saiprakashreddymarasani/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:59:53.364824 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -yinqiaoyicjx/flask -https://github.com/yinqiaoyicjx/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 12:59:53.952794 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -zakzou/flask-weixin-pay -https://github.com/zakzou/flask-weixin-pay -Entry file: flask-weixin-pay/example.py -Scanned: 2016-10-20 13:00:01.926478 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hitakaken/flask-wechat -https://github.com/hitakaken/flask-wechat -Entry file: flask-wechat/fenghuang/__init__.py -Scanned: 2016-10-20 13:00:03.439681 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -benman1/tensorflow_flask -https://github.com/benman1/tensorflow_flask -Entry file: tensorflow_flask/api.py -Scanned: 2016-10-20 13:00:07.355533 -No vulnerabilities found. - - -freakxx/flaskdemo -https://github.com/freakxx/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 13:00:08.874885 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Baindaer/flaskr -https://github.com/Baindaer/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:00:10.385264 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lindentao/flaskr -https://github.com/lindentao/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:00:11.893175 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -demory191/flasktaskr -https://github.com/demory191/flasktaskr -Entry file: None -Scanned: 2016-10-20 13:00:14.454855 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Daylightmazekun/flaskfollow -https://github.com/Daylightmazekun/flaskfollow -Entry file: flaskfollow/app/__init__.py -Scanned: 2016-10-20 13:00:19.572787 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -0x24a537r9/flasktest -https://github.com/0x24a537r9/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 13:00:20.084994 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tw7613781/flasky -https://github.com/tw7613781/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:00:21.599952 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mcquam/flasktaskr -https://github.com/mcquam/flasktaskr -Entry file: None -Scanned: 2016-10-20 13:00:23.143134 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lxw15337674/flasklearn -https://github.com/lxw15337674/flasklearn -Entry file: flasklearn/flasklearn.py -Scanned: 2016-10-20 13:00:34.061410 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Sventenhaaf/flasktries -https://github.com/Sventenhaaf/flasktries -Entry file: flasktries/app.py -Scanned: 2016-10-20 13:00:40.931831 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasktries/env/lib/python2.7/genericpath.py - -liangfei2016x/flaskweb -https://github.com/liangfei2016x/flaskweb -Entry file: None -Scanned: 2016-10-20 13:00:41.445197 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -manuellah/flaskapp -https://github.com/manuellah/flaskapp -Entry file: None -Scanned: 2016-10-20 13:00:41.989544 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/manuellah/flaskapp. - -musarahm/flaskbook -https://github.com/musarahm/flaskbook -Entry file: flaskbook/premier.py -Scanned: 2016-10-20 13:00:42.556599 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskbook/lib/python2.7/genericpath.py - -qhdong/flasky -https://github.com/qhdong/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:00:43.065680 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wuqingwuqingwu/flaskk -https://github.com/wuqingwuqingwu/flaskk -Entry file: flaskk/hello.py -Scanned: 2016-10-20 13:00:43.659873 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskk/venv/lib/python2.7/genericpath.py - -Katebasoft/Flaskr -https://github.com/Katebasoft/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 13:00:44.684778 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zangree/flaskytest -https://github.com/zangree/flaskytest -Entry file: flaskytest/app.py -Scanned: 2016-10-20 13:00:46.025531 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -he1chenglong/flasktest -https://github.com/he1chenglong/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 13:00:46.550043 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -omegayang/flasklearn -https://github.com/omegayang/flasklearn -Entry file: flasklearn/flasklearn.py -Scanned: 2016-10-20 13:00:47.085131 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ranchow/flaskapp -https://github.com/ranchow/flaskapp -Entry file: None -Scanned: 2016-10-20 13:00:49.619971 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ranchow/flaskapp. - -fbreversg/flaskify -https://github.com/fbreversg/flaskify -Entry file: flaskify/flaskify.py -Scanned: 2016-10-20 13:00:50.157195 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -1dot75cm/flasky -https://github.com/1dot75cm/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:00:52.660774 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ethan-funny/flask-todo-app -https://github.com/ethan-funny/flask-todo-app -Entry file: flask-todo-app/application/app.py -Scanned: 2016-10-20 13:00:55.660268 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -karchevz/FlaskTasker -https://github.com/karchevz/FlaskTasker -Entry file: FlaskTasker/extras/views.py -Scanned: 2016-10-20 13:00:57.182960 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jghess/flaskTrain -https://github.com/jghess/flaskTrain -Entry file: flaskTrain/app.py -Scanned: 2016-10-20 13:00:58.472092 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wwxFromTju/python-flask -https://github.com/wwxFromTju/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 13:01:03.470148 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Elsis-Sitati/flask-login -https://github.com/Elsis-Sitati/flask-login -Entry file: flask-login/yan.py -Scanned: 2016-10-20 13:01:05.089981 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -allbegray/flask_mvc -https://github.com/allbegray/flask_mvc -Entry file: flask_mvc/app.py -Scanned: 2016-10-20 13:01:07.513157 -Vulnerability 1: -File: flask_mvc/app.py - > User input at line 41, trigger word "get(": - board = Board.query.get(id) -Reassigned in: - File: flask_mvc/app.py - > Line 42: form = BoardInsertForm(csrf_enabled=False, obj=board) -File: flask_mvc/app.py - > reaches line 43, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('board/board_form.html',form=form) - -Vulnerability 2: -File: flask_mvc/app.py - > User input at line 50, trigger word ".data": - id = form.id.data -Reassigned in: - File: flask_mvc/app.py - > Line 55: id = b.id - File: flask_mvc/app.py - > Line 58: board = Board.query.get(id) - File: flask_mvc/app.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('board/board_form.html',form=form) -File: flask_mvc/app.py - > reaches line 64, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('board_view',id=id)) - -Vulnerability 3: -File: flask_mvc/app.py - > User input at line 52, trigger word ".data": - b = Board(title=form.title.data, content=form.content.data) -Reassigned in: - File: flask_mvc/app.py - > Line 55: id = b.id - File: flask_mvc/app.py - > Line 58: board = Board.query.get(id) - File: flask_mvc/app.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('board/board_form.html',form=form) - File: flask_mvc/app.py - > Line 50: id = form.id.data -File: flask_mvc/app.py - > reaches line 64, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('board_view',id=id)) - -Vulnerability 4: -File: flask_mvc/app.py - > User input at line 50, trigger word ".data": - id = form.id.data -Reassigned in: - File: flask_mvc/app.py - > Line 55: id = b.id - File: flask_mvc/app.py - > Line 58: board = Board.query.get(id) - File: flask_mvc/app.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('board/board_form.html',form=form) -File: flask_mvc/app.py - > reaches line 64, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('board_view',id=id)) - -Vulnerability 5: -File: flask_mvc/app.py - > User input at line 52, trigger word ".data": - b = Board(title=form.title.data, content=form.content.data) -Reassigned in: - File: flask_mvc/app.py - > Line 55: id = b.id - File: flask_mvc/app.py - > Line 58: board = Board.query.get(id) - File: flask_mvc/app.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('board/board_form.html',form=form) - File: flask_mvc/app.py - > Line 50: id = form.id.data -File: flask_mvc/app.py - > reaches line 64, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('board_view',id=id)) - -Vulnerability 6: -File: flask_mvc/app.py - > User input at line 71, trigger word "get(": - board = Board.query.get(id) -File: flask_mvc/app.py - > reaches line 72, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('board/board_view.html',board=board) - - - -MustafaAdam/flask_app -https://github.com/MustafaAdam/flask_app -Entry file: None -Scanned: 2016-10-20 13:01:09.044055 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MustafaAdam/flask_app. - -osnagovskyi/flask_tutorial -https://github.com/osnagovskyi/flask_tutorial -Entry file: None -Scanned: 2016-10-20 13:01:10.571841 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -greenoneo0/arduFlask -https://github.com/greenoneo0/arduFlask -Entry file: arduFlask/run.py -Scanned: 2016-10-20 13:01:13.007710 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -huyuguo/flask_small -https://github.com/huyuguo/flask_small -Entry file: flask_small/small.py -Scanned: 2016-10-20 13:01:15.316457 -No vulnerabilities found. - - -no140/flask-demo -https://github.com/no140/flask-demo -Entry file: None -Scanned: 2016-10-20 13:01:20.334462 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/no140/flask-demo. - -EduhG/Discovering-Flask -https://github.com/EduhG/Discovering-Flask -Entry file: Discovering-Flask/app.py -Scanned: 2016-10-20 13:01:28.610774 -No vulnerabilities found. - - -Kentovski/Flask_Battlefield -https://github.com/Kentovski/Flask_Battlefield -Entry file: Flask_Battlefield/server.py -Scanned: 2016-10-20 13:01:30.075783 -Vulnerability 1: -File: Flask_Battlefield/server.py - > User input at line 16, trigger word "form[": - armies_num = int(request.form['armies_num']) -Reassigned in: - File: Flask_Battlefield/server.py - > Line 18: battlefield = factory.create_battlefield(armies_num) -File: Flask_Battlefield/server.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',result=battlefield.start()) - - - -per19/crud-flask -https://github.com/per19/crud-flask -Entry file: crud-flask/main.py -Scanned: 2016-10-20 13:01:31.534343 -No vulnerabilities found. - - -calsaviour/flask-blog -https://github.com/calsaviour/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:01:35.106588 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -zhangshaofu/BestFlask -https://github.com/zhangshaofu/BestFlask -Entry file: BestFlask/BestFlask.py -Scanned: 2016-10-20 13:01:42.419521 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tjgrist/Flask-psql -https://github.com/tjgrist/Flask-psql -Entry file: Flask-psql/app.py -Scanned: 2016-10-20 13:01:43.842749 -Vulnerability 1: -File: Flask-psql/todo.py - > User input at line 39, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: Flask-psql/todo.py - > reaches line 46, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -hsyyf/flask_blog -https://github.com/hsyyf/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 13:01:44.376133 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -eswizardry/flask-blog -https://github.com/eswizardry/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:01:44.973505 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -yeongseon/Python_Flask -https://github.com/yeongseon/Python_Flask -Entry file: Python_Flask/SQLAlchemy/run.py -Scanned: 2016-10-20 13:01:46.919908 -No vulnerabilities found. - - -wonwooddo/flask_proj -https://github.com/wonwooddo/flask_proj -Entry file: flask_proj/flask_chart/routes.py -Scanned: 2016-10-20 13:01:54.543661 -No vulnerabilities found. - - -tsilevych/flask_test -https://github.com/tsilevych/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 13:01:55.170263 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chloebecker/flask-tutorial -https://github.com/chloebecker/flask-tutorial -Entry file: None -Scanned: 2016-10-20 13:01:55.670460 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ilyaLibin/flask-videostreaming -https://github.com/ilyaLibin/flask-videostreaming -Entry file: flask-videostreaming/main.py -Scanned: 2016-10-20 13:02:04.480915 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -remcohaszing/flask-openapi -https://github.com/remcohaszing/flask-openapi -Entry file: flask-openapi/example/app.py -Scanned: 2016-10-20 13:02:06.037732 -No vulnerabilities found. - - -epiedad/flask-blog -https://github.com/epiedad/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:02:06.576382 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -travisoneill/algo-flask -https://github.com/travisoneill/algo-flask -Entry file: algo-flask/flask_server.py -Scanned: 2016-10-20 13:02:08.002709 -No vulnerabilities found. - - -doublenns/flask_playground -https://github.com/doublenns/flask_playground -Entry file: flask_playground/hello_world.py -Scanned: 2016-10-20 13:02:08.534614 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -j99d99/Flask_Web -https://github.com/j99d99/Flask_Web -Entry file: Flask_Web/app_models/app/__init__.py -Scanned: 2016-10-20 13:02:10.350372 -No vulnerabilities found. - - -karchevz/flask-blog -https://github.com/karchevz/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:02:10.911382 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -rohrmic1/flask-intro -https://github.com/rohrmic1/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 13:02:11.415412 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yubo1911/flask-upload -https://github.com/yubo1911/flask-upload -Entry file: flask-upload/index.py -Scanned: 2016-10-20 13:02:11.923865 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arquenum13/Flask-Demo -https://github.com/arquenum13/Flask-Demo -Entry file: None -Scanned: 2016-10-20 13:02:12.440204 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/arquenum13/Flask-Demo. - -MedericFourmy/flask_introduction -https://github.com/MedericFourmy/flask_introduction -Entry file: flask_introduction/quickstart/quickstart.py -Scanned: 2016-10-20 13:02:13.949273 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -palapython/Flask-Web -https://github.com/palapython/Flask-Web -Entry file: Flask-Web/hello.py -Scanned: 2016-10-20 13:02:15.798489 -No vulnerabilities found. - - -Remmyjay/flask_app -https://github.com/Remmyjay/flask_app -Entry file: None -Scanned: 2016-10-20 13:02:16.339779 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Remmyjay/flask_app. - -musarahm/flask_blog -https://github.com/musarahm/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 13:02:18.876252 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AnHeBridge/pyweb_flask -https://github.com/AnHeBridge/pyweb_flask -Entry file: pyweb_flask/app/__init__.py -Scanned: 2016-10-20 13:02:21.301867 -No vulnerabilities found. - - -Yu-Shuhua/flask-micblog -https://github.com/Yu-Shuhua/flask-micblog -Entry file: None -Scanned: 2016-10-20 13:02:38.499824 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -KillianDavitt/Flask-Boilerplate -https://github.com/KillianDavitt/Flask-Boilerplate -Entry file: Flask-Boilerplate/flaskapp.py -Scanned: 2016-10-20 13:02:39.045956 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -RunKen/learnFlask -https://github.com/RunKen/learnFlask -Entry file: None -Scanned: 2016-10-20 13:02:42.556636 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/RunKen/learnFlask. - -aleccunningham/flask-registration -https://github.com/aleccunningham/flask-registration -Entry file: flask-registration/views.py -Scanned: 2016-10-20 13:02:44.904355 -No vulnerabilities found. - - -wuruthie/FirstFlask -https://github.com/wuruthie/FirstFlask -Entry file: FirstFlask/app.py -Scanned: 2016-10-20 13:02:45.476250 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FirstFlask/env/lib/python2.7/genericpath.py - -joe62/flask_helloworld -https://github.com/joe62/flask_helloworld -Entry file: flask_helloworld/flask_helloworld.py -Scanned: 2016-10-20 13:02:45.985714 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bukhonenko/flask-blog -https://github.com/bukhonenko/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:02:47.032754 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -njoyce/flask-letsencrypt -https://github.com/njoyce/flask-letsencrypt -Entry file: flask-letsencrypt/flask_letsencrypt/__init__.py -Scanned: 2016-10-20 13:02:48.471294 -No vulnerabilities found. - - -theglassbean/flask-blog -https://github.com/theglassbean/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:02:56.025401 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -nitin42/Flask-REST -https://github.com/nitin42/Flask-REST -Entry file: Flask-REST/main.py -Scanned: 2016-10-20 13:02:57.356720 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AngelMunoz/FlaskWebProjects -https://github.com/AngelMunoz/FlaskWebProjects -Entry file: FlaskWebProjects/FlaskBlueprintAPI/FlaskBlueprintAPI/__init__.py -Scanned: 2016-10-20 13:03:04.770833 -No vulnerabilities found. - - -brizow/FlaskBookmarkSite -https://github.com/brizow/FlaskBookmarkSite -Entry file: FlaskBookmarkSite/FlaskAdvancedTutorial/FlaskAdvancedTutorial/__init__.py -Scanned: 2016-10-20 13:03:12.358595 -Vulnerability 1: -File: FlaskBookmarkSite/FlaskAdvancedTutorial/FlaskAdvancedTutorial/views.py - > User input at line 52, trigger word ".data": - description = form.description.data -File: FlaskBookmarkSite/FlaskAdvancedTutorial/FlaskAdvancedTutorial/views.py - > reaches line 54, trigger word "flash(": - flash('Stored '{}''.format(description)) - - - -Kryvonis/SimpleLargeAppFlask -https://github.com/Kryvonis/SimpleLargeAppFlask -Entry file: SimpleLargeAppFlask/app/__init__.py -Scanned: 2016-10-20 13:03:13.752607 -No vulnerabilities found. - - -vlfedotov/server_client_flask -https://github.com/vlfedotov/server_client_flask -Entry file: server_client_flask/server.py -Scanned: 2016-10-20 13:03:15.067365 -No vulnerabilities found. - - -justinpezzack/flask-app-js -https://github.com/justinpezzack/flask-app-js -Entry file: flask-app-js/app/__init__.py -Scanned: 2016-10-20 13:03:16.733193 -No vulnerabilities found. - - -bekkam/flask-script-practice -https://github.com/bekkam/flask-script-practice -Entry file: flask-script-practice/myapp.py -Scanned: 2016-10-20 13:03:18.038622 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coding-happily/Dive-into-Flask -https://github.com/coding-happily/Dive-into-Flask -Entry file: Dive-into-Flask/main.py -Scanned: 2016-10-20 13:03:20.877106 -No vulnerabilities found. - - -iruwl/sample-python-flask-rest -https://github.com/iruwl/sample-python-flask-rest -Entry file: sample-python-flask-rest/todo-api/app.py -Scanned: 2016-10-20 13:03:28.397402 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: sample-python-flask-rest/todo-api/flask/lib/python2.7/genericpath.py - -yoophi/flask-thumbnail-test -https://github.com/yoophi/flask-thumbnail-test -Entry file: flask-thumbnail-test/app/__init__.py -Scanned: 2016-10-20 13:03:31.010782 -No vulnerabilities found. - - -roselmamendes/security-on-flask -https://github.com/roselmamendes/security-on-flask -Entry file: security-on-flask/black_girls/black_girls_app.py -Scanned: 2016-10-20 13:03:32.491354 -Vulnerability 1: -File: security-on-flask/black_girls/black_girls_app.py - > User input at line 33, trigger word "get(": - token = request.headers.get('Authorization') -Reassigned in: - File: security-on-flask/black_girls/black_girls_app.py - > Line 35: id = decode_token(token) - File: security-on-flask/black_girls/black_girls_app.py - > Line 36: ret_MAYBE_FUNCTION_NAME = girl_by_id(id) -File: security-on-flask/black_girls/black_girls_app.py - > reaches line 34, trigger word "replace(": - token = tokentoken.replace('Basic', '', 1)'' - - - -fabian-rump/flask_modular_auth -https://github.com/fabian-rump/flask_modular_auth -Entry file: flask_modular_auth/tests/modular_auth_test_case.py -Scanned: 2016-10-20 13:03:34.056435 -No vulnerabilities found. - - -timmyreilly/introduction-to-flask -https://github.com/timmyreilly/introduction-to-flask -Entry file: introduction-to-flask/hello.py -Scanned: 2016-10-20 13:03:38.213644 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jacksonyoudi/flask -https://github.com/jacksonyoudi/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:03:39.357295 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -jamesd3ao/Flask -https://github.com/jamesd3ao/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:03:39.867458 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -berstearns/flask -https://github.com/berstearns/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:03:40.500294 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -kkltcjk/flask -https://github.com/kkltcjk/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:03:41.078612 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -hit9/flask-docjson -https://github.com/hit9/flask-docjson -Entry file: flask-docjson/example.py -Scanned: 2016-10-20 13:03:42.893978 -No vulnerabilities found. - - -on3iro/cookiecutter-flask -https://github.com/on3iro/cookiecutter-flask -Entry file: None -Scanned: 2016-10-20 13:03:43.450794 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/on3iro/cookiecutter-flask. - -DanielTimLee/flask_tutorial -https://github.com/DanielTimLee/flask_tutorial -Entry file: None -Scanned: 2016-10-20 13:03:43.947319 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lbx6z-2/flaskr -https://github.com/lbx6z-2/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:03:44.454270 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Daylightmazekun/flaskfollow -https://github.com/Daylightmazekun/flaskfollow -Entry file: flaskfollow/app/__init__.py -Scanned: 2016-10-20 13:03:45.003223 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -trevorwitter/flaskr -https://github.com/trevorwitter/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:03:45.515795 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -26huitailang/flaskr -https://github.com/26huitailang/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:03:46.021213 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -caser789/flaskrr -https://github.com/caser789/flaskrr -Entry file: flaskrr/flaskr/flaskr.py -Scanned: 2016-10-20 13:03:47.875740 -No vulnerabilities found. - - -xuxiaoxing/flasky -https://github.com/xuxiaoxing/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:03:48.393342 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EenTang/flaskdev -https://github.com/EenTang/flaskdev -Entry file: flaskdev/app/__init__.py -Scanned: 2016-10-20 13:04:03.683335 -Vulnerability 1: -File: flaskdev/app/main/views.py - > User input at line 17, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 15: show_followed = False -File: flaskdev/app/main/views.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskdev/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 23: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskdev/app/main/views.py - > Line 26: posts = pagination.items -File: flaskdev/app/main/views.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskdev/app/main/views.py - > User input at line 61, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 63: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskdev/app/main/views.py - > Line 65: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskdev/app/main/views.py - > Line 68: comments = pagination.items - File: flaskdev/app/main/views.py - > Line 60: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskdev/app/main/views.py - > reaches line 70, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',comments=comments, posts=[post], form=form, pagination=pagination) - -Vulnerability 4: -File: flaskdev/app/main/views.py - > User input at line 78, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 79: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskdev/app/main/views.py - > Line 82: comments = pagination.items -File: flaskdev/app/main/views.py - > reaches line 83, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 5: -File: flaskdev/app/main/views.py - > User input at line 133, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 134: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskdev/app/main/views.py - > Line 137: posts = pagination.items -File: flaskdev/app/main/views.py - > reaches line 138, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 6: -File: flaskdev/app/main/views.py - > User input at line 224, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 225: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskdev/app/main/views.py - > Line 228: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskdev/app/main/views.py - > Line 223: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskdev/app/main/views.py - > reaches line 230, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='的关注者', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flaskdev/app/main/views.py - > User input at line 241, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 242: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskdev/app/main/views.py - > Line 245: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskdev/app/main/views.py - > Line 240: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskdev/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注的人', endpoint='.followed', pagination=pagination, follows=follows) - -Vulnerability 8: -File: flaskdev/app/main/forms.py - > User input at line 28, trigger word "files[": - fileobj = request.files['upload'] -Reassigned in: - File: flaskdev/app/main/forms.py - > Line 29: fname = os.path.splitext(fileobj.filename) - File: flaskdev/app/main/forms.py - > Line 29: fext = os.path.splitext(fileobj.filename) - File: flaskdev/app/main/forms.py - > Line 30: rnd_name = '%s%s' % (self.gen_rnd_filename(), fext) - File: flaskdev/app/main/forms.py - > Line 32: filepath = os.path.join(endpoint.static_folder, 'upload', rnd_name) - File: flaskdev/app/main/forms.py - > Line 34: dirname = os.path.dirname(filepath) - File: flaskdev/app/main/forms.py - > Line 48: res = ' - - ' % (callback, url, error) - File: flaskdev/app/main/forms.py - > Line 54: response = make_response(res) - File: flaskdev/app/main/forms.py - > Line 56: ret_MAYBE_FUNCTION_NAME = response - File: flaskdev/app/main/forms.py - > Line 23: url = '' -File: flaskdev/app/main/forms.py - > reaches line 44, trigger word "url_for(": - url = url_for('main.static',filename='%s/%s' % ('upload', rnd_name)) - - - -sjeeva/flaskapp -https://github.com/sjeeva/flaskapp -Entry file: None -Scanned: 2016-10-20 13:04:04.697054 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sjeeva/flaskapp. - -Cesaaar/flaskr -https://github.com/Cesaaar/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:04:06.231797 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jiangnenghua/flasky -https://github.com/jiangnenghua/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:04:13.749337 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -micahculpepper/flaskplayground -https://github.com/micahculpepper/flaskplayground -Entry file: flaskplayground/api.py -Scanned: 2016-10-20 13:04:15.389857 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tomtom92/FlaskTaskr -https://github.com/tomtom92/FlaskTaskr -Entry file: FlaskTaskr/views.py -Scanned: 2016-10-20 13:04:17.501991 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTaskr/ENV/lib/python2.7/genericpath.py - -karchevz/FlaskTasker -https://github.com/karchevz/FlaskTasker -Entry file: FlaskTasker/extras/views.py -Scanned: 2016-10-20 13:04:19.015256 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lypro09539/FlaskWeb -https://github.com/lypro09539/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-20 13:04:21.612576 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -classTC/FlaskDemo -https://github.com/classTC/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 13:04:29.171033 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Taimoorarshad/flasktasker6 -https://github.com/Taimoorarshad/flasktasker6 -Entry file: flasktasker6/project/__init__.py -Scanned: 2016-10-20 13:04:32.689268 -No vulnerabilities found. - - -swetankvarun18/FlaskApp -https://github.com/swetankvarun18/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 13:04:33.299291 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -didier-schmitt/demystify-flask -https://github.com/didier-schmitt/demystify-flask -Entry file: demystify-flask/main.py -Scanned: 2016-10-20 13:04:37.161200 -No vulnerabilities found. - - -per19/app-flask -https://github.com/per19/app-flask -Entry file: app-flask/app.py -Scanned: 2016-10-20 13:04:40.517527 -No vulnerabilities found. - - -harish-rajendran/Flask-Project -https://github.com/harish-rajendran/Flask-Project -Entry file: Flask-Project/routes.py -Scanned: 2016-10-20 13:04:41.851768 -Vulnerability 1: -File: Flask-Project/routes.py - > User input at line 33, trigger word ".data": - name = form.name.data -Reassigned in: - File: Flask-Project/routes.py - > Line 54: c = 'hey , ' + name + '..Have a good day!!!' - File: Flask-Project/routes.py - > Line 55: ret_MAYBE_FUNCTION_NAME = c - File: Flask-Project/routes.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('register.html',form=form) - File: Flask-Project/routes.py - > Line 31: ret_MAYBE_FUNCTION_NAME = 'ALL FIELDS ARE REQUIRED' - File: Flask-Project/routes.py - > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('redirect.html') -File: Flask-Project/routes.py - > reaches line 52, trigger word "execute(": - cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date)) - -Vulnerability 2: -File: Flask-Project/routes.py - > User input at line 34, trigger word ".data": - email = form.email.data -File: Flask-Project/routes.py - > reaches line 52, trigger word "execute(": - cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date)) - -Vulnerability 3: -File: Flask-Project/routes.py - > User input at line 35, trigger word ".data": - password = form.password.data -File: Flask-Project/routes.py - > reaches line 52, trigger word "execute(": - cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date)) - -Vulnerability 4: -File: Flask-Project/routes.py - > User input at line 66, trigger word ".data": - email = form.email.data -File: Flask-Project/routes.py - > reaches line 84, trigger word "execute(": - cursor.execute('INSERT INTO log(email,Password,Date)VALUES(%s,%s,%s)', (email, password, date)) - -Vulnerability 5: -File: Flask-Project/routes.py - > User input at line 67, trigger word ".data": - password = form.password.data -File: Flask-Project/routes.py - > reaches line 84, trigger word "execute(": - cursor.execute('INSERT INTO log(email,Password,Date)VALUES(%s,%s,%s)', (email, password, date)) - - - -wtakase/hello_flask -https://github.com/wtakase/hello_flask -Entry file: hello_flask/Flask.py -Scanned: 2016-10-20 13:04:42.856989 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xiezg247/flask_demo -https://github.com/xiezg247/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 13:04:43.374002 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -abhitron/flask-examples -https://github.com/abhitron/flask-examples -Entry file: flask-examples/Guestbook/app.py -Scanned: 2016-10-20 13:04:43.886782 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -gunavara/guniFlask -https://github.com/gunavara/guniFlask -Entry file: guniFlask/app.py -Scanned: 2016-10-20 13:04:46.830828 -Vulnerability 1: -File: guniFlask/app.py - > User input at line 50, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: guniFlask/app.py - > Line 58: reguser = 'INSERT INTO users (username, password, email) VALUES ('%s', '%s', '%s')' % (username, password, email) -File: guniFlask/app.py - > reaches line 53, trigger word "execute(": - x = cur.execute('SELECT * FROM users WHERE username = '%s'' % thwart(username)) - -Vulnerability 2: -File: guniFlask/app.py - > User input at line 50, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: guniFlask/app.py - > Line 58: reguser = 'INSERT INTO users (username, password, email) VALUES ('%s', '%s', '%s')' % (username, password, email) -File: guniFlask/app.py - > reaches line 59, trigger word "execute(": - cur.execute(reguser) - -Vulnerability 3: -File: guniFlask/app.py - > User input at line 51, trigger word "form[": - password = sha256_crypt.encrypt(request.form['password']) -Reassigned in: - File: guniFlask/app.py - > Line 58: reguser = 'INSERT INTO users (username, password, email) VALUES ('%s', '%s', '%s')' % (username, password, email) -File: guniFlask/app.py - > reaches line 59, trigger word "execute(": - cur.execute(reguser) - -Vulnerability 4: -File: guniFlask/app.py - > User input at line 52, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: guniFlask/app.py - > Line 58: reguser = 'INSERT INTO users (username, password, email) VALUES ('%s', '%s', '%s')' % (username, password, email) -File: guniFlask/app.py - > reaches line 59, trigger word "execute(": - cur.execute(reguser) - -Vulnerability 5: -File: guniFlask/app.py - > User input at line 73, trigger word "form[": - data = cur.execute('SELECT * FROM (users) WHERE (username) = '%s'' % thwart(request.form['username'])) -Reassigned in: - File: guniFlask/app.py - > Line 74: data = cur.fetchone()[2] -File: guniFlask/app.py - > reaches line 73, trigger word "execute(": - data = cur.execute('SELECT * FROM (users) WHERE (username) = '%s'' % thwart(request.form['username'])) - -Vulnerability 6: -File: guniFlask/app.py - > User input at line 117, trigger word "form[": - vidrazhod = request.form['razhod'] -Reassigned in: - File: guniFlask/app.py - > Line 123: addrazhodqry = 'INSERT INTO razhodi (razhod) VALUES ('%s')' % vidrazhod -File: guniFlask/app.py - > reaches line 118, trigger word "execute(": - x = cur.execute('SELECT razhod FROM (razhodi) WHERE (razhod) = '%s'' % vidrazhod) - -Vulnerability 7: -File: guniFlask/app.py - > User input at line 117, trigger word "form[": - vidrazhod = request.form['razhod'] -Reassigned in: - File: guniFlask/app.py - > Line 123: addrazhodqry = 'INSERT INTO razhodi (razhod) VALUES ('%s')' % vidrazhod -File: guniFlask/app.py - > reaches line 124, trigger word "execute(": - cur.execute(addrazhodqry) - -Vulnerability 8: -File: guniFlask/app.py - > User input at line 159, trigger word "form[": - tiprazhod = request.form['tiprazhod'] -Reassigned in: - File: guniFlask/app.py - > Line 160: razhod_id = 'SELECT id FROM razhodi WHERE razhod = '%s'' % tiprazhod - File: guniFlask/app.py - > Line 163: razhod_id = datarazhod[0] - File: guniFlask/app.py - > Line 165: razhod_name = 'SELECT razhod FROM razhodi WHERE id = '%s'' % razhod_id - File: guniFlask/app.py - > Line 167: razhod_name = cur.fetchone()[0] - File: guniFlask/app.py - > Line 171: addplashtane = 'INSERT INTO potrebitelski_razhodi (user_id, user_name, razhod_id, razhod_name, date_posted, suma_razhod) VALUES ('%s', '%s', '%s', '%s', '%s', '%s')' % (user_id, username, razhod_id, razhod_name, date_posted, suma) -File: guniFlask/app.py - > reaches line 161, trigger word "execute(": - cur.execute(razhod_id) - -Vulnerability 9: -File: guniFlask/app.py - > User input at line 159, trigger word "form[": - tiprazhod = request.form['tiprazhod'] -Reassigned in: - File: guniFlask/app.py - > Line 160: razhod_id = 'SELECT id FROM razhodi WHERE razhod = '%s'' % tiprazhod - File: guniFlask/app.py - > Line 163: razhod_id = datarazhod[0] - File: guniFlask/app.py - > Line 165: razhod_name = 'SELECT razhod FROM razhodi WHERE id = '%s'' % razhod_id - File: guniFlask/app.py - > Line 167: razhod_name = cur.fetchone()[0] - File: guniFlask/app.py - > Line 171: addplashtane = 'INSERT INTO potrebitelski_razhodi (user_id, user_name, razhod_id, razhod_name, date_posted, suma_razhod) VALUES ('%s', '%s', '%s', '%s', '%s', '%s')' % (user_id, username, razhod_id, razhod_name, date_posted, suma) -File: guniFlask/app.py - > reaches line 166, trigger word "execute(": - cur.execute(razhod_name) - -Vulnerability 10: -File: guniFlask/app.py - > User input at line 159, trigger word "form[": - tiprazhod = request.form['tiprazhod'] -Reassigned in: - File: guniFlask/app.py - > Line 160: razhod_id = 'SELECT id FROM razhodi WHERE razhod = '%s'' % tiprazhod - File: guniFlask/app.py - > Line 163: razhod_id = datarazhod[0] - File: guniFlask/app.py - > Line 165: razhod_name = 'SELECT razhod FROM razhodi WHERE id = '%s'' % razhod_id - File: guniFlask/app.py - > Line 167: razhod_name = cur.fetchone()[0] - File: guniFlask/app.py - > Line 171: addplashtane = 'INSERT INTO potrebitelski_razhodi (user_id, user_name, razhod_id, razhod_name, date_posted, suma_razhod) VALUES ('%s', '%s', '%s', '%s', '%s', '%s')' % (user_id, username, razhod_id, razhod_name, date_posted, suma) -File: guniFlask/app.py - > reaches line 172, trigger word "execute(": - cur.execute(addplashtane) - -Vulnerability 11: -File: guniFlask/app.py - > User input at line 168, trigger word "form[": - suma = request.form['suma'] -Reassigned in: - File: guniFlask/app.py - > Line 171: addplashtane = 'INSERT INTO potrebitelski_razhodi (user_id, user_name, razhod_id, razhod_name, date_posted, suma_razhod) VALUES ('%s', '%s', '%s', '%s', '%s', '%s')' % (user_id, username, razhod_id, razhod_name, date_posted, suma) -File: guniFlask/app.py - > reaches line 172, trigger word "execute(": - cur.execute(addplashtane) - - - -alekspankov/docker-flask -https://github.com/alekspankov/docker-flask -Entry file: None -Scanned: 2016-10-20 13:04:47.379777 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/alekspankov/docker-flask. - -Kryvonis/Flask-RQ -https://github.com/Kryvonis/Flask-RQ -Entry file: Flask-RQ/app.py -Scanned: 2016-10-20 13:04:48.679245 -No vulnerabilities found. - - -httpslixc/flask-web -https://github.com/httpslixc/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 13:04:49.197964 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -calsaviour/flask-blog -https://github.com/calsaviour/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:04:49.752715 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -naboson/messenger-flask -https://github.com/naboson/messenger-flask -Entry file: messenger-flask/entry.py -Scanned: 2016-10-20 13:04:51.061816 -No vulnerabilities found. - - -Kryvonis/Flask_colorize -https://github.com/Kryvonis/Flask_colorize -Entry file: Flask_colorize/app/__init__.py -Scanned: 2016-10-20 13:04:52.693260 -No vulnerabilities found. - - -rd93/flask-app -https://github.com/rd93/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 13:04:53.219107 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cpavanelli/testeFlask -https://github.com/cpavanelli/testeFlask -Entry file: None -Scanned: 2016-10-20 13:05:09.019675 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kelvinleong57/teammaker_flask -https://github.com/kelvinleong57/teammaker_flask -Entry file: teammaker_flask/teammaker_flask/__init__.py -Scanned: 2016-10-20 13:05:10.818034 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -him229/flask-demo -https://github.com/him229/flask-demo -Entry file: None -Scanned: 2016-10-20 13:05:11.327527 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/him229/flask-demo. - -spurll/flask-template -https://github.com/spurll/flask-template -Entry file: None -Scanned: 2016-10-20 13:05:11.838082 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/spurll/flask-template. - -yuriymironov96/flask-webservice -https://github.com/yuriymironov96/flask-webservice -Entry file: flask-webservice/app/__init__.py -Scanned: 2016-10-20 13:05:16.200565 -Vulnerability 1: -File: flask-webservice/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-webservice/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flask-webservice/app/main/views.py - > Line 32: posts = pagination.items - File: flask-webservice/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-webservice/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: flask-webservice/app/main/views.py - > User input at line 109, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-webservice/app/main/views.py - > Line 111: page = post.comments.count() - 1 / current_app.config['COMMENTS_PER_PAGE'] + 1 - File: flask-webservice/app/main/views.py - > Line 113: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flask-webservice/app/main/views.py - > Line 116: comments = pagination.items - File: flask-webservice/app/main/views.py - > Line 108: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask-webservice/app/main/views.py - > reaches line 117, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 3: -File: flask-webservice/app/main/views.py - > User input at line 140, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-webservice/app/main/views.py - > Line 141: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flask-webservice/app/main/views.py - > Line 144: comments = pagination.items -File: flask-webservice/app/main/views.py - > reaches line 145, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 4: -File: flask-webservice/app/main/views.py - > User input at line 204, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-webservice/app/main/views.py - > Line 205: pagination = user.followers.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-webservice/app/main/views.py - > Line 208: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask-webservice/app/main/views.py - > Line 203: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-webservice/app/main/views.py - > reaches line 210, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: flask-webservice/app/main/views.py - > User input at line 220, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-webservice/app/main/views.py - > Line 221: pagination = user.followed.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-webservice/app/main/views.py - > Line 224: followed = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask-webservice/app/main/views.py - > Line 219: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-webservice/app/main/views.py - > reaches line 226, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followed.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, followed=followed) - - - -tomaszguzialek/flask-api -https://github.com/tomaszguzialek/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-20 13:05:16.740109 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ianunruh/hello-flask -https://github.com/ianunruh/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 13:05:17.326493 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -sternmatt/FLASK_DEMO -https://github.com/sternmatt/FLASK_DEMO -Entry file: FLASK_DEMO/app.py -Scanned: 2016-10-20 13:05:18.658354 -Vulnerability 1: -File: FLASK_DEMO/app.py - > User input at line 29, trigger word "form[": - stock = request.form['stockticker'] -Reassigned in: - File: FLASK_DEMO/app.py - > Line 30: api_url = 'https://www.quandl.com/api/v1/datasets/WIKI/%s.json' % stock - File: FLASK_DEMO/app.py - > Line 33: raw_data = session.get(api_url) - File: FLASK_DEMO/app.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('userinfo.html') -File: FLASK_DEMO/app.py - > reaches line 72, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('graph.html',stockticker=stock, script=script, div=div) - - - -fishen/python_flask -https://github.com/fishen/python_flask -Entry file: None -Scanned: 2016-10-20 13:05:19.195480 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fishen/python_flask. - -VladyslavVelychko/Flask-microblog -https://github.com/VladyslavVelychko/Flask-microblog -Entry file: None -Scanned: 2016-10-20 13:05:21.734465 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -holygeek01/Learn-Flask -https://github.com/holygeek01/Learn-Flask -Entry file: Learn-Flask/main.py -Scanned: 2016-10-20 13:05:35.373623 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -xiyinmoon/flask_blog -https://github.com/xiyinmoon/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 13:05:35.886841 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -QMickael/easy_flask -https://github.com/QMickael/easy_flask -Entry file: None -Scanned: 2016-10-20 13:05:37.492356 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/QMickael/easy_flask. - -gordoning/todolist_flask -https://github.com/gordoning/todolist_flask -Entry file: todolist_flask/doc/sample.py -Scanned: 2016-10-20 13:05:38.964911 -No vulnerabilities found. - - -artakak/TestFlask -https://github.com/artakak/TestFlask -Entry file: TestFlask/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-20 13:05:48.524983 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhangzju/flask_api -https://github.com/zhangzju/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-20 13:05:49.054666 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -travisoneill/algo-flask -https://github.com/travisoneill/algo-flask -Entry file: algo-flask/flask_server.py -Scanned: 2016-10-20 13:05:50.490385 -No vulnerabilities found. - - -shawnpdoherty/MegaFlask -https://github.com/shawnpdoherty/MegaFlask -Entry file: MegaFlask/flask/lib/python3.5/site-packages/flask_openid.py -Scanned: 2016-10-20 13:06:06.151435 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -denewman/flask-api -https://github.com/denewman/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-20 13:06:07.208751 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -printxy/flask_app -https://github.com/printxy/flask_app -Entry file: None -Scanned: 2016-10-20 13:06:07.719156 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/printxy/flask_app. - -Kryvonis/Thread-Flask -https://github.com/Kryvonis/Thread-Flask -Entry file: Thread-Flask/main.py -Scanned: 2016-10-20 13:06:09.050085 -No vulnerabilities found. - - -SergiySavarin/flask_ex -https://github.com/SergiySavarin/flask_ex -Entry file: flask_ex/wsgi.py -Scanned: 2016-10-20 13:06:09.571664 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -supermenxxx/flask_tutorial -https://github.com/supermenxxx/flask_tutorial -Entry file: None -Scanned: 2016-10-20 13:06:10.089360 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vvijayak/flask_boilerplate -https://github.com/vvijayak/flask_boilerplate -Entry file: flask_boilerplate/application/__init__.py -Scanned: 2016-10-20 13:06:10.605593 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SicunStudio/signup-flask -https://github.com/SicunStudio/signup-flask -Entry file: signup-flask/app/__init__.py -Scanned: 2016-10-20 13:06:12.049437 -No vulnerabilities found. - - -theglassbean/flask-blog -https://github.com/theglassbean/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:06:12.607564 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -pgeez/flask-demo -https://github.com/pgeez/flask-demo -Entry file: None -Scanned: 2016-10-20 13:06:13.123050 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pgeez/flask-demo. - -tahanasir/flask-microblog -https://github.com/tahanasir/flask-microblog -Entry file: None -Scanned: 2016-10-20 13:06:13.626533 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -curious725/blog-flask -https://github.com/curious725/blog-flask -Entry file: blog-flask/project/views.py -Scanned: 2016-10-20 13:06:14.344596 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -andbraga/ProbotFlask -https://github.com/andbraga/ProbotFlask -Entry file: ProbotFlask/flask_starter/flaskstarter/__init__.py -Scanned: 2016-10-20 13:06:26.476451 -Vulnerability 1: -File: ProbotFlask/flask_starter/flaskstarter/views/main.py - > User input at line 43, trigger word ".data": - chosen_probot_id = form.probot.data -Reassigned in: - File: ProbotFlask/flask_starter/flaskstarter/views/main.py - > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('probots.html',form=form, available_probot=available_probot) -File: ProbotFlask/flask_starter/flaskstarter/views/main.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('botcontrolphone.html',chosen_probot_id=chosen_probot_id) - -Vulnerability 2: -File: ProbotFlask/flask_starter/flaskstarter/views/main.py - > User input at line 43, trigger word ".data": - chosen_probot_id = form.probot.data -Reassigned in: - File: ProbotFlask/flask_starter/flaskstarter/views/main.py - > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('probots.html',form=form, available_probot=available_probot) -File: ProbotFlask/flask_starter/flaskstarter/views/main.py - > reaches line 61, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('botcontrol.html',chosen_probot_id=chosen_probot_id) - -Vulnerability 3: -File: ProbotFlask/flask_starter/flaskstarter/views/auth.py - > User input at line 50, trigger word "get(": - root_url = app.config.get('ROOT_URL') -File: ProbotFlask/flask_starter/flaskstarter/views/auth.py - > reaches line 52, trigger word "render_template(": - html = render_template('user/activate.html',confirm_url=confirm_url, username=username, root_url=root_url) - -Vulnerability 4: -File: ProbotFlask/flask_starter/flaskstarter/views/auth.py - > User input at line 82, trigger word ".data": - user = User(username=form.username.data, email=form.email.data) -Reassigned in: - File: ProbotFlask/flask_starter/flaskstarter/views/auth.py - > Line 91: token = generate_confirmation_token(user.email) -File: ProbotFlask/flask_starter/flaskstarter/views/auth.py - > reaches line 92, trigger word "url_for(": - confirm_url = url_for('auth.confirm_email',token=token, _external=True) - - - -xxxxsars/Flask_SQLite -https://github.com/xxxxsars/Flask_SQLite -Entry file: Flask_SQLite/draw_member.py -Scanned: 2016-10-20 13:06:28.094809 -Vulnerability 1: -File: Flask_SQLite/draw_member.py - > User input at line 21, trigger word "get(": - group_name = request.form.get('group_name', 'ALL') -Reassigned in: - File: Flask_SQLite/draw_member.py - > Line 32: valid_member_ids = [row[0] for row in cursor] - File: Flask_SQLite/draw_member.py - > Line 37: error_msg = '

No memebers in group '%s'

' % group_name - File: Flask_SQLite/draw_member.py - > Line 38: ret_MAYBE_FUNCTION_NAME = (error_msg, 404) - File: Flask_SQLite/draw_member.py - > Line 40: lucky_memeber_id = random.choice(valid_member_ids) -File: Flask_SQLite/draw_member.py - > reaches line 26, trigger word "execute(": - cursor = db.execute(valid_members_sql) - -Vulnerability 2: -File: Flask_SQLite/draw_member.py - > User input at line 21, trigger word "get(": - group_name = request.form.get('group_name', 'ALL') -Reassigned in: - File: Flask_SQLite/draw_member.py - > Line 32: valid_member_ids = [row[0] for row in cursor] - File: Flask_SQLite/draw_member.py - > Line 37: error_msg = '

No memebers in group '%s'

' % group_name - File: Flask_SQLite/draw_member.py - > Line 38: ret_MAYBE_FUNCTION_NAME = (error_msg, 404) - File: Flask_SQLite/draw_member.py - > Line 40: lucky_memeber_id = random.choice(valid_member_ids) -File: Flask_SQLite/draw_member.py - > reaches line 31, trigger word "execute(": - cursor = db.execute(valid_members_sql, (group_name)) - -Vulnerability 3: -File: Flask_SQLite/draw_member.py - > User input at line 21, trigger word "get(": - group_name = request.form.get('group_name', 'ALL') -Reassigned in: - File: Flask_SQLite/draw_member.py - > Line 32: valid_member_ids = [row[0] for row in cursor] - File: Flask_SQLite/draw_member.py - > Line 37: error_msg = '

No memebers in group '%s'

' % group_name - File: Flask_SQLite/draw_member.py - > Line 38: ret_MAYBE_FUNCTION_NAME = (error_msg, 404) - File: Flask_SQLite/draw_member.py - > Line 40: lucky_memeber_id = random.choice(valid_member_ids) -File: Flask_SQLite/draw_member.py - > reaches line 42, trigger word "execute(": - member_group_name = db.execute('SELECT name, group_name FROM members WHERE id = ?', (lucky_memeber_id)).fetchone() - -Vulnerability 4: -File: Flask_SQLite/draw_member.py - > User input at line 21, trigger word "get(": - group_name = request.form.get('group_name', 'ALL') -Reassigned in: - File: Flask_SQLite/draw_member.py - > Line 32: valid_member_ids = [row[0] for row in cursor] - File: Flask_SQLite/draw_member.py - > Line 37: error_msg = '

No memebers in group '%s'

' % group_name - File: Flask_SQLite/draw_member.py - > Line 38: ret_MAYBE_FUNCTION_NAME = (error_msg, 404) - File: Flask_SQLite/draw_member.py - > Line 40: lucky_memeber_id = random.choice(valid_member_ids) -File: Flask_SQLite/draw_member.py - > reaches line 48, trigger word "execute(": - db.execute('insert into draw_histories (memberid) values(?)', (lucky_memeber_id)) - -Vulnerability 5: -File: Flask_SQLite/draw_member.py - > User input at line 21, trigger word "get(": - group_name = request.form.get('group_name', 'ALL') -Reassigned in: - File: Flask_SQLite/draw_member.py - > Line 32: valid_member_ids = [row[0] for row in cursor] - File: Flask_SQLite/draw_member.py - > Line 37: error_msg = '

No memebers in group '%s'

' % group_name - File: Flask_SQLite/draw_member.py - > Line 38: ret_MAYBE_FUNCTION_NAME = (error_msg, 404) - File: Flask_SQLite/draw_member.py - > Line 40: lucky_memeber_id = random.choice(valid_member_ids) -File: Flask_SQLite/draw_member.py - > reaches line 49, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('draw.html',name=member_name, group=group_name) - - - -Itaah/flask_itah -https://github.com/Itaah/flask_itah -Entry file: flask_itah/flask_itah.py -Scanned: 2016-10-20 13:06:29.369381 -No vulnerabilities found. - - -atomist-project-templates/flask-service -https://github.com/atomist-project-templates/flask-service -Entry file: flask-service/service.py -Scanned: 2016-10-20 13:06:29.899879 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qqxx6661/micblog -https://github.com/qqxx6661/micblog -Entry file: micblog/app/__init__.py -Scanned: 2016-10-20 13:06:31.582331 -Vulnerability 1: -File: micblog/app/views.py - > User input at line 81, trigger word "get(": - user_name = request.form.get('user_name') -Reassigned in: - File: micblog/app/views.py - > Line 89: user.nickname = user_name -File: micblog/app/views.py - > reaches line 83, trigger word "filter(": - register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first() - -Vulnerability 2: -File: micblog/app/views.py - > User input at line 82, trigger word "get(": - user_email = request.form.get('user_email') -Reassigned in: - File: micblog/app/views.py - > Line 90: user.email = user_email -File: micblog/app/views.py - > reaches line 83, trigger word "filter(": - register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first() - - - -optrv/Flog -https://github.com/optrv/Flog -Entry file: None -Scanned: 2016-10-20 13:06:42.638952 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/optrv/Flog. - -qing-stanley/web-flask-tutorial -https://github.com/qing-stanley/web-flask-tutorial -Entry file: web-flask-tutorial/app/__init__.py -Scanned: 2016-10-20 13:06:52.425838 -No vulnerabilities found. - - -AngelMunoz/FlaskWebProjects -https://github.com/AngelMunoz/FlaskWebProjects -Entry file: FlaskWebProjects/FlaskBlueprintAPI/FlaskBlueprintAPI/__init__.py -Scanned: 2016-10-20 13:07:00.015928 -No vulnerabilities found. - - -TommyBlanchard/FlaskHerokuStockTicker -https://github.com/TommyBlanchard/FlaskHerokuStockTicker -Entry file: FlaskHerokuStockTicker/app.py -Scanned: 2016-10-20 13:07:01.456835 -No vulnerabilities found. - - -adilmoujahid/flask-twitter-clone -https://github.com/adilmoujahid/flask-twitter-clone -Entry file: flask-twitter-clone/project/__init__.py -Scanned: 2016-10-20 13:07:03.199329 -No vulnerabilities found. - - -bekkam/flask-script-practice -https://github.com/bekkam/flask-script-practice -Entry file: flask-script-practice/myapp.py -Scanned: 2016-10-20 13:07:03.711940 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Wintermute1/Flask-Restful-Api -https://github.com/Wintermute1/Flask-Restful-Api -Entry file: Flask-Restful-Api/FlaskRestfulApi.py -Scanned: 2016-10-20 13:07:05.683755 -No vulnerabilities found. - - -bekkam/flask-migration-practice -https://github.com/bekkam/flask-migration-practice -Entry file: flask-migration-practice/app.py -Scanned: 2016-10-20 13:07:07.147065 -No vulnerabilities found. - - -kkweon/price_alert_flask -https://github.com/kkweon/price_alert_flask -Entry file: price_alert_flask/src/app.py -Scanned: 2016-10-20 13:07:08.803164 -Vulnerability 1: -File: price_alert_flask/src/models/stores/views.py - > User input at line 30, trigger word "form[": - query = json.loads(request.form['query'].replace(''', '"')) -Reassigned in: - File: price_alert_flask/src/models/stores/views.py - > Line 35: store.query = query -File: price_alert_flask/src/models/stores/views.py - > reaches line 30, trigger word "replace(": - query = json.loads(request.form['query'].replace(''', '"')) - -Vulnerability 2: -File: price_alert_flask/src/models/stores/views.py - > User input at line 56, trigger word "form[": - query = json.loads(request.form['query'].replace(''', '"')) -File: price_alert_flask/src/models/stores/views.py - > reaches line 56, trigger word "replace(": - query = json.loads(request.form['query'].replace(''', '"')) - - - -absinthetized/uwsgi-flask-multiprocess-test -https://github.com/absinthetized/uwsgi-flask-multiprocess-test -Entry file: uwsgi-flask-multiprocess-test/app.py -Scanned: 2016-10-20 13:07:10.104424 -No vulnerabilities found. - - -wallacejd12/FSND-Udacity-Flask-App -https://github.com/wallacejd12/FSND-Udacity-Flask-App -Entry file: FSND-Udacity-Flask-App/catalog.py -Scanned: 2016-10-20 13:07:17.217242 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -artempronevskiy/Small-test-Flask-app -https://github.com/artempronevskiy/Small-test-Flask-app -Entry file: Small-test-Flask-app/main.py -Scanned: 2016-10-20 13:07:18.570206 -Vulnerability 1: -File: Small-test-Flask-app/main.py - > User input at line 34, trigger word "form[": - username = request.form['username'] -File: Small-test-Flask-app/main.py - > reaches line 41, trigger word "execute(": - cursor.execute(sql_query, (str(username), str(sha256(password.encode('utf-8')).hexdigest()))) - -Vulnerability 2: -File: Small-test-Flask-app/main.py - > User input at line 35, trigger word "form[": - password = request.form['password'] -File: Small-test-Flask-app/main.py - > reaches line 41, trigger word "execute(": - cursor.execute(sql_query, (str(username), str(sha256(password.encode('utf-8')).hexdigest()))) - -Vulnerability 3: -File: Small-test-Flask-app/main.py - > User input at line 58, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: Small-test-Flask-app/main.py - > Line 71: session['username'] = username -File: Small-test-Flask-app/main.py - > reaches line 64, trigger word "execute(": - cursor.execute(sql, (username)) - - - -MrXcitement/python-flask-hello -https://github.com/MrXcitement/python-flask-hello -Entry file: python-flask-hello/app/app.py -Scanned: 2016-10-20 13:07:19.874905 -No vulnerabilities found. - - -samabhi/MegaFlaskTut -https://github.com/samabhi/MegaFlaskTut -Entry file: MegaFlaskTut/app/__init__.py -Scanned: 2016-10-20 13:07:21.164589 -No vulnerabilities found. - - -LarsBergqvist/python_flask_authentication -https://github.com/LarsBergqvist/python_flask_authentication -Entry file: python_flask_authentication/basic_auth/__init__.py -Scanned: 2016-10-20 13:07:22.597249 -No vulnerabilities found. - - -ianunruh/flask-api-skeleton -https://github.com/ianunruh/flask-api-skeleton -Entry file: flask-api-skeleton/backend/app.py -Scanned: 2016-10-20 13:07:24.052520 -No vulnerabilities found. - - -ajeyamk/flask-python-epoch -https://github.com/ajeyamk/flask-python-epoch -Entry file: flask-python-epoch/controller.py -Scanned: 2016-10-20 13:07:25.549308 -Vulnerability 1: -File: flask-python-epoch/logservice.py - > User input at line 197, trigger word "get(": - update_log_query = LogTable.select().where(LogTable.logged_date == data['log_date'] & LogTable.user == return_data['User_id'] & LogTable.project == data['proj_id'] & LogTable.job_type == data['jobtype_id']).get() -Reassigned in: - File: flask-python-epoch/logservice.py - > Line 199: update_log_object = LogTable.update(update_log).where(LogTable.id == update_log_query.id) - File: flask-python-epoch/logservice.py - > Line 201: last_update = LogTable.get(LogTable.id == update_log_query.id) -File: flask-python-epoch/logservice.py - > reaches line 200, trigger word "execute(": - update_log_object.execute() - - - -s0rata/flask-by-example -https://github.com/s0rata/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-20 13:07:26.323378 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lassegit/flask-reactjs -https://github.com/lassegit/flask-reactjs -Entry file: None -Scanned: 2016-10-20 13:07:29.452757 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lassegit/flask-reactjs. - -YellowGB/Flask -https://github.com/YellowGB/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:07:29.963216 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -zhaokefei/flask -https://github.com/zhaokefei/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:07:30.556599 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -k9imJ/flask -https://github.com/k9imJ/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:07:31.136810 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -berstearns/flask -https://github.com/berstearns/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:07:31.728364 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -minglan01/flask -https://github.com/minglan01/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:07:32.337625 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -bellcodo/fisrt-flask-app -https://github.com/bellcodo/fisrt-flask-app -Entry file: fisrt-flask-app/hello_app.py -Scanned: 2016-10-20 13:07:33.657879 -No vulnerabilities found. - - -EverestYAO/flask-blog -https://github.com/EverestYAO/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:07:34.213332 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Sthacks/sthacksWebsite -https://github.com/Sthacks/sthacksWebsite -Entry file: sthacksWebsite/app.py -Scanned: 2016-10-20 13:07:38.114349 -No vulnerabilities found. - - -gregwebb/flaskproject -https://github.com/gregwebb/flaskproject -Entry file: None -Scanned: 2016-10-20 13:07:38.632220 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MakrMelon/flasky -https://github.com/MakrMelon/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:07:39.144873 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lbx6z-2/flaskr -https://github.com/lbx6z-2/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:07:43.640495 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shalev67/flasky -https://github.com/shalev67/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:07:53.189932 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ramramu3433/flaskapp -https://github.com/ramramu3433/flaskapp -Entry file: None -Scanned: 2016-10-20 13:08:00.690994 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ramramu3433/flaskapp. - -sanjayankur31/flaskr -https://github.com/sanjayankur31/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:08:02.200483 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kaish5536/Flaskr -https://github.com/kaish5536/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 13:08:04.717500 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hackeris/flasktest -https://github.com/hackeris/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 13:08:05.239863 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mariavarley/flaskr -https://github.com/mariavarley/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:08:05.760373 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hmc-cs-gdiehl/flaskr -https://github.com/hmc-cs-gdiehl/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:08:06.267131 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wwwxmu/flaskweb -https://github.com/wwwxmu/flaskweb -Entry file: None -Scanned: 2016-10-20 13:08:07.802464 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -beautilut/FlaskTemplate -https://github.com/beautilut/FlaskTemplate -Entry file: FlaskTemplate/root.py -Scanned: 2016-10-20 13:08:11.144103 -No vulnerabilities found. - - -alleyb/flaskPractice -https://github.com/alleyb/flaskPractice -Entry file: flaskPractice/flaskr.py -Scanned: 2016-10-20 13:08:12.469983 -No vulnerabilities found. - - -YuiJL/myweblog -https://github.com/YuiJL/myweblog -Entry file: myweblog/www/app/__init__.py -Scanned: 2016-10-20 13:08:20.105977 -Vulnerability 1: -File: myweblog/www/app/utilities.py - > User input at line 126, trigger word "get(": - cookie = request.cookies.get(current_app.config['COOKIE_NAME']).split('+').pop() -File: myweblog/www/app/utilities.py - > reaches line 127, trigger word "set_cookie(": - response.set_cookie(current_app.config['COOKIE_NAME'], '+' + cookie,httponly=True) - -Vulnerability 2: -File: myweblog/www/app/views/route.py - > User input at line 103, trigger word "get(": - name = request.form.get('name') -Reassigned in: - File: myweblog/www/app/views/route.py - > Line 113: user = User(name=name, email=email, password=password) - File: myweblog/www/app/views/route.py - > Line 114: user_resp = user.__dict__ - File: myweblog/www/app/views/route.py - > Line 116: cookie = user_to_cookie(user_resp) - File: myweblog/www/app/views/route.py - > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('route.index')) - File: myweblog/www/app/views/route.py - > Line 100: ret_MAYBE_FUNCTION_NAME = render_template('register.html',site_key=current_app.config['RECAPTCHA_SITE_KEY']) - File: myweblog/www/app/views/route.py - > Line 105: ret_MAYBE_FUNCTION_NAME = make_response('Username is taken, please try another.', 403) - File: myweblog/www/app/views/route.py - > Line 108: ret_MAYBE_FUNCTION_NAME = make_response('E-mail is taken, please try another.', 403) - File: myweblog/www/app/views/route.py - > Line 111: ret_MAYBE_FUNCTION_NAME = make_response('You're a bot.', 403) -File: myweblog/www/app/views/route.py - > reaches line 118, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = login_response(jsonify(user=user_resp), cookie) - -Vulnerability 3: -File: myweblog/www/app/views/route.py - > User input at line 106, trigger word "get(": - email = request.form.get('email') -Reassigned in: - File: myweblog/www/app/views/route.py - > Line 113: user = User(name=name, email=email, password=password) - File: myweblog/www/app/views/route.py - > Line 114: user_resp = user.__dict__ - File: myweblog/www/app/views/route.py - > Line 116: cookie = user_to_cookie(user_resp) - File: myweblog/www/app/views/route.py - > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('route.index')) - File: myweblog/www/app/views/route.py - > Line 100: ret_MAYBE_FUNCTION_NAME = render_template('register.html',site_key=current_app.config['RECAPTCHA_SITE_KEY']) - File: myweblog/www/app/views/route.py - > Line 105: ret_MAYBE_FUNCTION_NAME = make_response('Username is taken, please try another.', 403) - File: myweblog/www/app/views/route.py - > Line 108: ret_MAYBE_FUNCTION_NAME = make_response('E-mail is taken, please try another.', 403) - File: myweblog/www/app/views/route.py - > Line 111: ret_MAYBE_FUNCTION_NAME = make_response('You're a bot.', 403) -File: myweblog/www/app/views/route.py - > reaches line 118, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = login_response(jsonify(user=user_resp), cookie) - -Vulnerability 4: -File: myweblog/www/app/views/route.py - > User input at line 112, trigger word "get(": - password = request.form.get('sha1_password') -Reassigned in: - File: myweblog/www/app/views/route.py - > Line 113: user = User(name=name, email=email, password=password) - File: myweblog/www/app/views/route.py - > Line 114: user_resp = user.__dict__ - File: myweblog/www/app/views/route.py - > Line 116: cookie = user_to_cookie(user_resp) - File: myweblog/www/app/views/route.py - > Line 99: ret_MAYBE_FUNCTION_NAME = redirect(url_for('route.index')) - File: myweblog/www/app/views/route.py - > Line 100: ret_MAYBE_FUNCTION_NAME = render_template('register.html',site_key=current_app.config['RECAPTCHA_SITE_KEY']) - File: myweblog/www/app/views/route.py - > Line 105: ret_MAYBE_FUNCTION_NAME = make_response('Username is taken, please try another.', 403) - File: myweblog/www/app/views/route.py - > Line 108: ret_MAYBE_FUNCTION_NAME = make_response('E-mail is taken, please try another.', 403) - File: myweblog/www/app/views/route.py - > Line 111: ret_MAYBE_FUNCTION_NAME = make_response('You're a bot.', 403) -File: myweblog/www/app/views/route.py - > reaches line 118, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = login_response(jsonify(user=user_resp), cookie) - -Vulnerability 5: -File: myweblog/www/app/views/route.py - > User input at line 128, trigger word "get(": - email = request.form.get('email') -Reassigned in: - File: myweblog/www/app/views/route.py - > Line 130: user_resp = db.users.find_one('email'email) - File: myweblog/www/app/views/route.py - > Line 138: cookie = userToCookie(user_resp) - File: myweblog/www/app/views/route.py - > Line 133: ret_MAYBE_FUNCTION_NAME = make_response('Invalid email', 403) - File: myweblog/www/app/views/route.py - > Line 136: ret_MAYBE_FUNCTION_NAME = make_response('Wrong password', 403) -File: myweblog/www/app/views/route.py - > reaches line 140, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = login_response(jsonify(user=user_resp), cookie) - -Vulnerability 6: -File: myweblog/www/app/views/route.py - > User input at line 156, trigger word "get(": - view_mode = request.args.get('view') -Reassigned in: - File: myweblog/www/app/views/route.py - > Line 157: cookie = view_to_cookie(view_mode) - File: myweblog/www/app/views/route.py - > Line 160: ret_MAYBE_FUNCTION_NAME = response -File: myweblog/www/app/views/route.py - > reaches line 158, trigger word "jsonify(": - response = jsonify(view=view_mode) - -Vulnerability 7: -File: myweblog/www/app/views/route.py - > User input at line 156, trigger word "get(": - view_mode = request.args.get('view') -Reassigned in: - File: myweblog/www/app/views/route.py - > Line 157: cookie = view_to_cookie(view_mode) - File: myweblog/www/app/views/route.py - > Line 160: ret_MAYBE_FUNCTION_NAME = response -File: myweblog/www/app/views/route.py - > reaches line 159, trigger word "set_cookie(": - response.set_cookie(current_app.config['COOKIE_NAME'], cookie,max_age=86400, httponly=True) - -Vulnerability 8: -File: myweblog/www/app/views/api.py - > User input at line 89, trigger word "get(": - tag = request.form.get('tag').lstrip('/\;,. ').rstrip('/\;,. ') -Reassigned in: - File: myweblog/www/app/views/api.py - > Line 92: blog = Blog(user_id=g.__user__.get('_id'), user_name=g.__user__.get('name'), user_image=g.__user__.get('image'), title=title.strip(), tag=re.split('[\s\;\,\.\\\/]+', tag), content=content.lstrip(' -').rstrip()) - File: myweblog/www/app/views/api.py - > Line 100: blog_resp = blog.__dict__ - File: myweblog/www/app/views/api.py - > Line 87: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403) -File: myweblog/www/app/views/api.py - > reaches line 101, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(blog_id=str(blog_resp['_id'])) - -Vulnerability 9: -File: myweblog/www/app/views/api.py - > User input at line 92, trigger word "get(": - blog = Blog(user_id=g.__user__.get('_id'), user_name=g.__user__.get('name'), user_image=g.__user__.get('image'), title=title.strip(), tag=re.split('[\s\;\,\.\\\/]+', tag), content=content.lstrip(' -').rstrip()) -Reassigned in: - File: myweblog/www/app/views/api.py - > Line 100: blog_resp = blog.__dict__ - File: myweblog/www/app/views/api.py - > Line 87: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403) -File: myweblog/www/app/views/api.py - > reaches line 101, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(blog_id=str(blog_resp['_id'])) - -Vulnerability 10: -File: myweblog/www/app/views/api.py - > User input at line 216, trigger word "get(": - blog_id = db.comments.find_one('_id'ObjectId(item_id)).get('blog_id') -Reassigned in: - File: myweblog/www/app/views/api.py - > Line 224: ret_MAYBE_FUNCTION_NAME = jsonify(item_id=item_id) - File: myweblog/www/app/views/api.py - > Line 213: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403) -File: myweblog/www/app/views/api.py - > reaches line 223, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('api.api_get_blog_comments',blog_id=blog_id)) - -Vulnerability 11: -File: myweblog/www/app/views/api.py - > User input at line 216, trigger word "get(": - blog_id = db.comments.find_one('_id'ObjectId(item_id)).get('blog_id') -Reassigned in: - File: myweblog/www/app/views/api.py - > Line 224: ret_MAYBE_FUNCTION_NAME = jsonify(item_id=item_id) - File: myweblog/www/app/views/api.py - > Line 213: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403) -File: myweblog/www/app/views/api.py - > reaches line 223, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('api.api_get_blog_comments',blog_id=blog_id)) - -Vulnerability 12: -File: myweblog/www/app/views/api.py - > User input at line 247, trigger word "get(": - blog_id = db.comments.find_one('_id'ObjectId(comment_id)).get('blog_id') -Reassigned in: - File: myweblog/www/app/views/api.py - > Line 235: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403) -File: myweblog/www/app/views/api.py - > reaches line 248, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('api.api_get_blog_comments',blog_id=blog_id)) - -Vulnerability 13: -File: myweblog/www/app/views/api.py - > User input at line 247, trigger word "get(": - blog_id = db.comments.find_one('_id'ObjectId(comment_id)).get('blog_id') -Reassigned in: - File: myweblog/www/app/views/api.py - > Line 235: ret_MAYBE_FUNCTION_NAME = make_response('Permission denied.', 403) -File: myweblog/www/app/views/api.py - > reaches line 248, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('api.api_get_blog_comments',blog_id=blog_id)) - - - -SIG-IR/flask_demo -https://github.com/SIG-IR/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 13:08:20.625377 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -per19/app-flask -https://github.com/per19/app-flask -Entry file: app-flask/app.py -Scanned: 2016-10-20 13:08:22.041302 -No vulnerabilities found. - - -harish-rajendran/Flask-Project -https://github.com/harish-rajendran/Flask-Project -Entry file: Flask-Project/routes.py -Scanned: 2016-10-20 13:08:23.349451 -Vulnerability 1: -File: Flask-Project/routes.py - > User input at line 33, trigger word ".data": - name = form.name.data -Reassigned in: - File: Flask-Project/routes.py - > Line 54: c = 'hey , ' + name + '..Have a good day!!!' - File: Flask-Project/routes.py - > Line 55: ret_MAYBE_FUNCTION_NAME = c - File: Flask-Project/routes.py - > Line 57: ret_MAYBE_FUNCTION_NAME = render_template('register.html',form=form) - File: Flask-Project/routes.py - > Line 31: ret_MAYBE_FUNCTION_NAME = 'ALL FIELDS ARE REQUIRED' - File: Flask-Project/routes.py - > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('redirect.html') -File: Flask-Project/routes.py - > reaches line 52, trigger word "execute(": - cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date)) - -Vulnerability 2: -File: Flask-Project/routes.py - > User input at line 34, trigger word ".data": - email = form.email.data -File: Flask-Project/routes.py - > reaches line 52, trigger word "execute(": - cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date)) - -Vulnerability 3: -File: Flask-Project/routes.py - > User input at line 35, trigger word ".data": - password = form.password.data -File: Flask-Project/routes.py - > reaches line 52, trigger word "execute(": - cursor.execute('INSERT INTO example(Name,email,Password,Date)VALUES(%s,%s,%s,%s)', (name, email, password, date)) - -Vulnerability 4: -File: Flask-Project/routes.py - > User input at line 66, trigger word ".data": - email = form.email.data -File: Flask-Project/routes.py - > reaches line 84, trigger word "execute(": - cursor.execute('INSERT INTO log(email,Password,Date)VALUES(%s,%s,%s)', (email, password, date)) - -Vulnerability 5: -File: Flask-Project/routes.py - > User input at line 67, trigger word ".data": - password = form.password.data -File: Flask-Project/routes.py - > reaches line 84, trigger word "execute(": - cursor.execute('INSERT INTO log(email,Password,Date)VALUES(%s,%s,%s)', (email, password, date)) - - - -ovidiu1/python-flask -https://github.com/ovidiu1/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 13:08:23.847659 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -leighmforrest/flask_app -https://github.com/leighmforrest/flask_app -Entry file: None -Scanned: 2016-10-20 13:08:25.348366 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/leighmforrest/flask_app. - -sourcreme/pythonFlask -https://github.com/sourcreme/pythonFlask -Entry file: pythonFlask/server.py -Scanned: 2016-10-20 13:08:26.954603 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dmlevering/learning-flask -https://github.com/dmlevering/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 13:08:27.528541 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wsygkfz/flask_frame -https://github.com/wsygkfz/flask_frame -Entry file: None -Scanned: 2016-10-20 13:08:31.957488 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wsygkfz/flask_frame. - -volmaster/flask-app -https://github.com/volmaster/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 13:08:32.986583 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -calsaviour/flask-intro -https://github.com/calsaviour/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 13:08:33.501423 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alviandk/flask-judul -https://github.com/alviandk/flask-judul -Entry file: flask-judul/app/__init__.py -Scanned: 2016-10-20 13:08:34.999655 -No vulnerabilities found. - - -val-sytch/blog_flask -https://github.com/val-sytch/blog_flask -Entry file: None -Scanned: 2016-10-20 13:08:43.983999 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/val-sytch/blog_flask. - -EgorKurito/flask_project -https://github.com/EgorKurito/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-20 13:08:45.796305 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -juwaini/flask-tutorial -https://github.com/juwaini/flask-tutorial -Entry file: None -Scanned: 2016-10-20 13:08:46.291783 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cloudyuga/flask-app -https://github.com/cloudyuga/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 13:08:46.787675 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hazybluedot/indie_flask -https://github.com/hazybluedot/indie_flask -Entry file: indie_flask/indie_flask/__init__.py -Scanned: 2016-10-20 13:08:54.279546 -Vulnerability 1: -File: indie_flask/indie_flask/__init__.py - > User input at line 59, trigger word "form[": - source = request.form['source'] -Reassigned in: - File: indie_flask/indie_flask/__init__.py - > Line 72: uparts = urlparse(source) - File: indie_flask/indie_flask/__init__.py - > Line 80: task = validate_and_publish.delay(source, target) - File: indie_flask/indie_flask/__init__.py - > Line 83: response = 'status''summary''location''queued''Webmention was queued for processing'status_url - File: indie_flask/indie_flask/__init__.py - > Line 61: ret_MAYBE_FUNCTION_NAME = make_response('no source defined', 400) - File: indie_flask/indie_flask/__init__.py - > Line 66: ret_MAYBE_FUNCTION_NAME = make_response('no target defined', 400) - File: indie_flask/indie_flask/__init__.py - > Line 68: uparts = urlparse(target) - File: indie_flask/indie_flask/__init__.py - > Line 70: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400) - File: indie_flask/indie_flask/__init__.py - > Line 74: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400) - File: indie_flask/indie_flask/__init__.py - > Line 77: ret_MAYBE_FUNCTION_NAME = make_response('source and target must be different', 400) -File: indie_flask/indie_flask/__init__.py - > reaches line 82, trigger word "url_for(": - status_url = url_for('taskstatus',task_id=task.id) - -Vulnerability 2: -File: indie_flask/indie_flask/__init__.py - > User input at line 64, trigger word "form[": - target = request.form['target'] -Reassigned in: - File: indie_flask/indie_flask/__init__.py - > Line 68: uparts = urlparse(target) - File: indie_flask/indie_flask/__init__.py - > Line 72: uparts = urlparse(source) - File: indie_flask/indie_flask/__init__.py - > Line 80: task = validate_and_publish.delay(source, target) - File: indie_flask/indie_flask/__init__.py - > Line 83: response = 'status''summary''location''queued''Webmention was queued for processing'status_url - File: indie_flask/indie_flask/__init__.py - > Line 61: ret_MAYBE_FUNCTION_NAME = make_response('no source defined', 400) - File: indie_flask/indie_flask/__init__.py - > Line 66: ret_MAYBE_FUNCTION_NAME = make_response('no target defined', 400) - File: indie_flask/indie_flask/__init__.py - > Line 70: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400) - File: indie_flask/indie_flask/__init__.py - > Line 74: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400) - File: indie_flask/indie_flask/__init__.py - > Line 77: ret_MAYBE_FUNCTION_NAME = make_response('source and target must be different', 400) -File: indie_flask/indie_flask/__init__.py - > reaches line 82, trigger word "url_for(": - status_url = url_for('taskstatus',task_id=task.id) - -Vulnerability 3: -File: indie_flask/indie_flask/__init__.py - > User input at line 59, trigger word "form[": - source = request.form['source'] -Reassigned in: - File: indie_flask/indie_flask/__init__.py - > Line 72: uparts = urlparse(source) - File: indie_flask/indie_flask/__init__.py - > Line 80: task = validate_and_publish.delay(source, target) - File: indie_flask/indie_flask/__init__.py - > Line 83: response = 'status''summary''location''queued''Webmention was queued for processing'status_url - File: indie_flask/indie_flask/__init__.py - > Line 61: ret_MAYBE_FUNCTION_NAME = make_response('no source defined', 400) - File: indie_flask/indie_flask/__init__.py - > Line 66: ret_MAYBE_FUNCTION_NAME = make_response('no target defined', 400) - File: indie_flask/indie_flask/__init__.py - > Line 68: uparts = urlparse(target) - File: indie_flask/indie_flask/__init__.py - > Line 70: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400) - File: indie_flask/indie_flask/__init__.py - > Line 74: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400) - File: indie_flask/indie_flask/__init__.py - > Line 77: ret_MAYBE_FUNCTION_NAME = make_response('source and target must be different', 400) -File: indie_flask/indie_flask/__init__.py - > reaches line 88, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(response), 201, 'Location'status_url) - -Vulnerability 4: -File: indie_flask/indie_flask/__init__.py - > User input at line 64, trigger word "form[": - target = request.form['target'] -Reassigned in: - File: indie_flask/indie_flask/__init__.py - > Line 68: uparts = urlparse(target) - File: indie_flask/indie_flask/__init__.py - > Line 72: uparts = urlparse(source) - File: indie_flask/indie_flask/__init__.py - > Line 80: task = validate_and_publish.delay(source, target) - File: indie_flask/indie_flask/__init__.py - > Line 83: response = 'status''summary''location''queued''Webmention was queued for processing'status_url - File: indie_flask/indie_flask/__init__.py - > Line 61: ret_MAYBE_FUNCTION_NAME = make_response('no source defined', 400) - File: indie_flask/indie_flask/__init__.py - > Line 66: ret_MAYBE_FUNCTION_NAME = make_response('no target defined', 400) - File: indie_flask/indie_flask/__init__.py - > Line 70: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400) - File: indie_flask/indie_flask/__init__.py - > Line 74: ret_MAYBE_FUNCTION_NAME = make_response('unhandled scheme', 400) - File: indie_flask/indie_flask/__init__.py - > Line 77: ret_MAYBE_FUNCTION_NAME = make_response('source and target must be different', 400) -File: indie_flask/indie_flask/__init__.py - > reaches line 88, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(response), 201, 'Location'status_url) - - - -httpslixc/flask-web -https://github.com/httpslixc/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 13:09:00.812792 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -neefrankie/flask-demo -https://github.com/neefrankie/flask-demo -Entry file: None -Scanned: 2016-10-20 13:09:02.314841 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/neefrankie/flask-demo. - -arnobroekhof/flask-boilerplate -https://github.com/arnobroekhof/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 13:09:04.822278 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/arnobroekhof/flask-boilerplate. - -jasontatem/flask_demo -https://github.com/jasontatem/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-20 13:09:05.370903 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vasilaky/formtest_flask -https://github.com/vasilaky/formtest_flask -Entry file: formtest_flask/Form/__init__.py -Scanned: 2016-10-20 13:09:07.186398 -No vulnerabilities found. - - -sirko1990/flask_app -https://github.com/sirko1990/flask_app -Entry file: None -Scanned: 2016-10-20 13:09:08.703538 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sirko1990/flask_app. - -edwinyoung/personal-flask -https://github.com/edwinyoung/personal-flask -Entry file: personal-flask/Personal-Flask.py -Scanned: 2016-10-20 13:09:12.040519 -No vulnerabilities found. - - -dineshk8666/Flask_Examples -https://github.com/dineshk8666/Flask_Examples -Entry file: Flask_Examples/hello.py -Scanned: 2016-10-20 13:09:13.352071 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adarshmammen/flask_stocks -https://github.com/adarshmammen/flask_stocks -Entry file: flask_stocks/app.py -Scanned: 2016-10-20 13:09:19.669969 -No vulnerabilities found. - - -sternmatt/FLASK_DEMO -https://github.com/sternmatt/FLASK_DEMO -Entry file: FLASK_DEMO/app.py -Scanned: 2016-10-20 13:09:22.092060 -Vulnerability 1: -File: FLASK_DEMO/app.py - > User input at line 29, trigger word "form[": - stock = request.form['stockticker'] -Reassigned in: - File: FLASK_DEMO/app.py - > Line 30: api_url = 'https://www.quandl.com/api/v1/datasets/WIKI/%s.json' % stock - File: FLASK_DEMO/app.py - > Line 33: raw_data = session.get(api_url) - File: FLASK_DEMO/app.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('userinfo.html') -File: FLASK_DEMO/app.py - > reaches line 72, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('graph.html',stockticker=stock, script=script, div=div) - - - -harshmathur1990/flask_boilerplate -https://github.com/harshmathur1990/flask_boilerplate -Entry file: flask_boilerplate/application/__init__.py -Scanned: 2016-10-20 13:09:22.620328 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dtrodger/first_flask -https://github.com/dtrodger/first_flask -Entry file: first_flask/app/__init__.py -Scanned: 2016-10-20 13:09:30.720000 -No vulnerabilities found. - - -gamte19/Flask_dojo -https://github.com/gamte19/Flask_dojo -Entry file: Flask_dojo/main.py -Scanned: 2016-10-20 13:09:32.129000 -No vulnerabilities found. - - -lepkebocs/flask_dojo -https://github.com/lepkebocs/flask_dojo -Entry file: flask_dojo/dojo.py -Scanned: 2016-10-20 13:09:33.431673 -No vulnerabilities found. - - -bjnooms/flask_wiki -https://github.com/bjnooms/flask_wiki -Entry file: flask_wiki/__init__.py -Scanned: 2016-10-20 13:09:36.251168 -No vulnerabilities found. - - -sp41mer/Flask_logger -https://github.com/sp41mer/Flask_logger -Entry file: Flask_logger/Logger.py -Scanned: 2016-10-20 13:09:37.590138 -No vulnerabilities found. - - -sanjayankur31/flask-grinberg -https://github.com/sanjayankur31/flask-grinberg -Entry file: flask-grinberg/app/__init__.py -Scanned: 2016-10-20 13:09:39.088866 -No vulnerabilities found. - - -xiyinmoon/flask_blog -https://github.com/xiyinmoon/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 13:09:39.598983 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -QMickael/easy_flask -https://github.com/QMickael/easy_flask -Entry file: None -Scanned: 2016-10-20 13:09:40.107864 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/QMickael/easy_flask. - -gordoning/todolist_flask -https://github.com/gordoning/todolist_flask -Entry file: todolist_flask/doc/sample.py -Scanned: 2016-10-20 13:09:41.511064 -No vulnerabilities found. - - -artakak/TestFlask -https://github.com/artakak/TestFlask -Entry file: TestFlask/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-20 13:09:44.816522 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sunghyunzz/flask-ultrajson -https://github.com/sunghyunzz/flask-ultrajson -Entry file: flask-ultrajson/tests/app.py -Scanned: 2016-10-20 13:09:46.252429 -No vulnerabilities found. - - -qmehdi/flask_app -https://github.com/qmehdi/flask_app -Entry file: None -Scanned: 2016-10-20 13:09:46.773546 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/qmehdi/flask_app. - -navcat/flask_baidu -https://github.com/navcat/flask_baidu -Entry file: flask_baidu/baidu.py -Scanned: 2016-10-20 13:09:48.090386 -No vulnerabilities found. - - -Ezi4Zy/mastering_flask -https://github.com/Ezi4Zy/mastering_flask -Entry file: mastering_flask/mastering_flask.py -Scanned: 2016-10-20 13:09:49.409907 -No vulnerabilities found. - - -BasalGanglia/flask-aws -https://github.com/BasalGanglia/flask-aws -Entry file: flask-aws/hello.py -Scanned: 2016-10-20 13:09:50.947468 -No vulnerabilities found. - - -SergiySavarin/flask_ex -https://github.com/SergiySavarin/flask_ex -Entry file: flask_ex/wsgi.py -Scanned: 2016-10-20 13:09:51.461733 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lorszil/flask-dojo -https://github.com/lorszil/flask-dojo -Entry file: flask-dojo/request-counter.py -Scanned: 2016-10-20 13:09:52.752595 -No vulnerabilities found. - - -krs89/flask_dojo -https://github.com/krs89/flask_dojo -Entry file: flask_dojo/app.py -Scanned: 2016-10-20 13:09:55.115169 -No vulnerabilities found. - - -breezeofjune/flask-todolist -https://github.com/breezeofjune/flask-todolist -Entry file: flask-todolist/todolist/app/__init__.py -Scanned: 2016-10-20 13:10:06.174669 -Vulnerability 1: -File: flask-todolist/todolist/app/main/views.py - > User input at line 28, trigger word "get(": - page_index = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-todolist/todolist/app/main/views.py - > Line 31: pagination = cur_user_todos.paginate(page_index,per_page=5, error_out=False) - File: flask-todolist/todolist/app/main/views.py - > Line 33: todo_result = pagination.items -File: flask-todolist/todolist/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('main.html',title='My_todo_list', todos=todo_result, pagination=pagination) - - - -nn243823163/flask_qichacha -https://github.com/nn243823163/flask_qichacha -Entry file: flask_qichacha/app/__init__.py -Scanned: 2016-10-20 13:10:07.838875 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -synnick/flask-quickstart -https://github.com/synnick/flask-quickstart -Entry file: flask-quickstart/flask-quickstart/cli.py -Scanned: 2016-10-20 13:10:08.362290 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mrcosta/flask-boilerplate -https://github.com/mrcosta/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 13:10:08.883228 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrcosta/flask-boilerplate. - -bullkyker/flask_app -https://github.com/bullkyker/flask_app -Entry file: None -Scanned: 2016-10-20 13:10:09.382515 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bullkyker/flask_app. - -acraig94/curly-flask -https://github.com/acraig94/curly-flask -Entry file: curly-flask/app.py -Scanned: 2016-10-20 13:10:10.714234 -No vulnerabilities found. - - -levi-james/flask_blog -https://github.com/levi-james/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 13:10:11.226991 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -antoniocsz/LivroFlask -https://github.com/antoniocsz/LivroFlask -Entry file: LivroFlask/app/__init__.py -Scanned: 2016-10-20 13:10:12.902508 -Vulnerability 1: -File: LivroFlask/app/main/views.py - > User input at line 18, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: LivroFlask/app/main/views.py - > Line 26: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: LivroFlask/app/main/views.py - > Line 29: posts = pagination.items - File: LivroFlask/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: LivroFlask/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: LivroFlask/app/main/views.py - > User input at line 21, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: LivroFlask/app/main/views.py - > Line 19: show_followed = False - File: LivroFlask/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: LivroFlask/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: LivroFlask/app/main/views.py - > User input at line 36, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: LivroFlask/app/main/views.py - > Line 37: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: LivroFlask/app/main/views.py - > Line 40: posts = pagination.items -File: LivroFlask/app/main/views.py - > reaches line 41, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: LivroFlask/app/main/views.py - > User input at line 146, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: LivroFlask/app/main/views.py - > Line 147: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: LivroFlask/app/main/views.py - > Line 148: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: LivroFlask/app/main/views.py - > Line 145: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: LivroFlask/app/main/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: LivroFlask/app/main/views.py - > User input at line 158, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: LivroFlask/app/main/views.py - > Line 159: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: LivroFlask/app/main/views.py - > Line 160: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: LivroFlask/app/main/views.py - > Line 157: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: LivroFlask/app/main/views.py - > reaches line 161, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followers', pagination=pagination, follows=follows) - - - -ivanpch/microblog -https://github.com/ivanpch/microblog -Entry file: None -Scanned: 2016-10-20 13:10:13.417036 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lihuii/Log -https://github.com/lihuii/Log -Entry file: Log/app/__init__.py -Scanned: 2016-10-20 13:10:19.817173 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -DevinCalado/FlaskWebApp -https://github.com/DevinCalado/FlaskWebApp -Entry file: FlaskWebApp/FanGuardFlask/__init__.py -Scanned: 2016-10-20 13:10:21.341406 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -BeiShanKin/FlaskPersonalBlog -https://github.com/BeiShanKin/FlaskPersonalBlog -Entry file: FlaskPersonalBlog/app/__init__.py -Scanned: 2016-10-20 13:10:30.761479 -No vulnerabilities found. - - -imapex-training/spark-webhook-tutorial -https://github.com/imapex-training/spark-webhook-tutorial -Entry file: spark-webhook-tutorial/app.py -Scanned: 2016-10-20 13:10:35.986025 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -josleahy/flask_hello_world -https://github.com/josleahy/flask_hello_world -Entry file: None -Scanned: 2016-10-20 13:10:36.988716 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/josleahy/flask_hello_world. - -SangTran01/python-crud-with-Flask -https://github.com/SangTran01/python-crud-with-Flask -Entry file: python-crud-with-Flask/vagrant/webserver/project.py -Scanned: 2016-10-20 13:10:38.421776 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kamieb03/first-flask-app -https://github.com/kamieb03/first-flask-app -Entry file: None -Scanned: 2016-10-20 13:10:38.940953 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -marb61a/Simple_Flask_Blog -https://github.com/marb61a/Simple_Flask_Blog -Entry file: Simple_Flask_Blog/__init__.py -Scanned: 2016-10-20 13:10:47.376469 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Simple_Flask_Blog/venv/lib/python3.4/struct.py - -ezequielo/flask_celery_exp -https://github.com/ezequielo/flask_celery_exp -Entry file: flask_celery_exp/app/__init__.py -Scanned: 2016-10-20 13:10:48.692188 -No vulnerabilities found. - - -sadu99/Flask-MongoDB-Setup -https://github.com/sadu99/Flask-MongoDB-Setup -Entry file: Flask-MongoDB-Setup/crud.py -Scanned: 2016-10-20 13:10:50.017722 -No vulnerabilities found. - - -dduong26/flask_api_practice -https://github.com/dduong26/flask_api_practice -Entry file: flask_api_practice/mongo_connect.py -Scanned: 2016-10-20 13:10:51.457395 -No vulnerabilities found. - - -Faffola/MyFlaskDemo -https://github.com/Faffola/MyFlaskDemo -Entry file: MyFlaskDemo/app.py -Scanned: 2016-10-20 13:10:59.084859 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: MyFlaskDemo/venv/lib/python2.7/genericpath.py - -dsreliete/HelloWorld_Flask -https://github.com/dsreliete/HelloWorld_Flask -Entry file: HelloWorld_Flask/hello.py -Scanned: 2016-10-20 13:11:00.403548 -No vulnerabilities found. - - -epiedad/flask-social-app -https://github.com/epiedad/flask-social-app -Entry file: None -Scanned: 2016-10-20 13:11:01.829823 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/epiedad/flask-social-app. - -Ben0mega/SimpleFlaskWiki -https://github.com/Ben0mega/SimpleFlaskWiki -Entry file: SimpleFlaskWiki/main.py -Scanned: 2016-10-20 13:11:03.246539 -Vulnerability 1: -File: SimpleFlaskWiki/main.py - > User input at line 33, trigger word "Markup(": - content = Markup(markdown.markdown(content)) -Reassigned in: - File: SimpleFlaskWiki/main.py - > Line 32: content = f.read() -File: SimpleFlaskWiki/main.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('wiki_page.html',content=content, title=title) - -Vulnerability 2: -File: SimpleFlaskWiki/main.py - > User input at line 138, trigger word "form[": - name = request.form['title'] -Reassigned in: - File: SimpleFlaskWiki/main.py - > Line 140: msg = 'User {0!s} @ IP {1!s} edited {2!s} with message: {3!s}'.format(request.form['user'], request.remote_addr, name, request.form['msg']) - File: SimpleFlaskWiki/main.py - > Line 148: fn = nameToFileName(name) - File: SimpleFlaskWiki/main.py - > Line 151: fn = nameToFileName(name, 'text/plain') - File: SimpleFlaskWiki/main.py - > Line 159: fn = nameToFileName(name, file_.mimetype) -File: SimpleFlaskWiki/main.py - > reaches line 156, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('wiki_page',name=name)) - -Vulnerability 3: -File: SimpleFlaskWiki/main.py - > User input at line 138, trigger word "form[": - name = request.form['title'] -Reassigned in: - File: SimpleFlaskWiki/main.py - > Line 140: msg = 'User {0!s} @ IP {1!s} edited {2!s} with message: {3!s}'.format(request.form['user'], request.remote_addr, name, request.form['msg']) - File: SimpleFlaskWiki/main.py - > Line 148: fn = nameToFileName(name) - File: SimpleFlaskWiki/main.py - > Line 151: fn = nameToFileName(name, 'text/plain') - File: SimpleFlaskWiki/main.py - > Line 159: fn = nameToFileName(name, file_.mimetype) -File: SimpleFlaskWiki/main.py - > reaches line 156, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('wiki_page',name=name)) - -Vulnerability 4: -File: SimpleFlaskWiki/main.py - > User input at line 138, trigger word "form[": - name = request.form['title'] -Reassigned in: - File: SimpleFlaskWiki/main.py - > Line 140: msg = 'User {0!s} @ IP {1!s} edited {2!s} with message: {3!s}'.format(request.form['user'], request.remote_addr, name, request.form['msg']) - File: SimpleFlaskWiki/main.py - > Line 148: fn = nameToFileName(name) - File: SimpleFlaskWiki/main.py - > Line 151: fn = nameToFileName(name, 'text/plain') - File: SimpleFlaskWiki/main.py - > Line 159: fn = nameToFileName(name, file_.mimetype) -File: SimpleFlaskWiki/main.py - > reaches line 161, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('wiki_page',name=name)) - -Vulnerability 5: -File: SimpleFlaskWiki/main.py - > User input at line 138, trigger word "form[": - name = request.form['title'] -Reassigned in: - File: SimpleFlaskWiki/main.py - > Line 140: msg = 'User {0!s} @ IP {1!s} edited {2!s} with message: {3!s}'.format(request.form['user'], request.remote_addr, name, request.form['msg']) - File: SimpleFlaskWiki/main.py - > Line 148: fn = nameToFileName(name) - File: SimpleFlaskWiki/main.py - > Line 151: fn = nameToFileName(name, 'text/plain') - File: SimpleFlaskWiki/main.py - > Line 159: fn = nameToFileName(name, file_.mimetype) -File: SimpleFlaskWiki/main.py - > reaches line 161, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('wiki_page',name=name)) - - - -QLGQ/awesome-flask-todo -https://github.com/QLGQ/awesome-flask-todo -Entry file: None -Scanned: 2016-10-20 13:11:03.761388 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/QLGQ/awesome-flask-todo. - -vimalloc/flask-jwt-extended -https://github.com/vimalloc/flask-jwt-extended -Entry file: flask-jwt-extended/examples/simple.py -Scanned: 2016-10-20 13:11:07.685677 -Vulnerability 1: -File: flask-jwt-extended/examples/simple.py - > User input at line 16, trigger word "get(": - username = request.json.get('username', None) -Reassigned in: - File: flask-jwt-extended/examples/simple.py - > Line 22: ret = 'access_token'create_access_token(identity=username) - File: flask-jwt-extended/examples/simple.py - > Line 19: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401) -File: flask-jwt-extended/examples/simple.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200) - -Vulnerability 2: -File: flask-jwt-extended/examples/blacklist.py - > User input at line 35, trigger word "get(": - username = request.json.get('username', None) -Reassigned in: - File: flask-jwt-extended/examples/blacklist.py - > Line 40: ret = 'access_token''refresh_token'create_access_token(identity=username)create_refresh_token(identity=username) - File: flask-jwt-extended/examples/blacklist.py - > Line 38: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401) -File: flask-jwt-extended/examples/blacklist.py - > reaches line 44, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200) - -Vulnerability 3: -File: flask-jwt-extended/examples/refresh_tokens.py - > User input at line 13, trigger word "get(": - username = request.json.get('username', None) -Reassigned in: - File: flask-jwt-extended/examples/refresh_tokens.py - > Line 20: ret = 'access_token''refresh_token'create_access_token(identity=username)create_refresh_token(identity=username) - File: flask-jwt-extended/examples/refresh_tokens.py - > Line 16: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401) -File: flask-jwt-extended/examples/refresh_tokens.py - > reaches line 24, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200) - -Vulnerability 4: -File: flask-jwt-extended/examples/token_freshness.py - > User input at line 15, trigger word "get(": - username = request.json.get('username', None) -Reassigned in: - File: flask-jwt-extended/examples/token_freshness.py - > Line 24: ret = 'access_token''refresh_token'create_access_token(identity=username, fresh=True)create_refresh_token(identity=username) - File: flask-jwt-extended/examples/token_freshness.py - > Line 18: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401) -File: flask-jwt-extended/examples/token_freshness.py - > reaches line 28, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200) - -Vulnerability 5: -File: flask-jwt-extended/examples/token_freshness.py - > User input at line 38, trigger word "get(": - username = request.json.get('username', None) -Reassigned in: - File: flask-jwt-extended/examples/token_freshness.py - > Line 43: new_token = create_access_token(identity=username, fresh=True) - File: flask-jwt-extended/examples/token_freshness.py - > Line 44: ret = 'access_token'new_token - File: flask-jwt-extended/examples/token_freshness.py - > Line 41: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401) -File: flask-jwt-extended/examples/token_freshness.py - > reaches line 45, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200) - -Vulnerability 6: -File: flask-jwt-extended/examples/additional_data_in_access_token.py - > User input at line 24, trigger word "get(": - username = request.json.get('username', None) -Reassigned in: - File: flask-jwt-extended/examples/additional_data_in_access_token.py - > Line 29: ret = 'access_token'create_access_token(username) - File: flask-jwt-extended/examples/additional_data_in_access_token.py - > Line 27: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401) -File: flask-jwt-extended/examples/additional_data_in_access_token.py - > reaches line 30, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200) - -Vulnerability 7: -File: flask-jwt-extended/examples/loaders.py - > User input at line 24, trigger word "get(": - username = request.json.get('username', None) -Reassigned in: - File: flask-jwt-extended/examples/loaders.py - > Line 29: ret = 'access_token'create_access_token(username) - File: flask-jwt-extended/examples/loaders.py - > Line 27: ret_MAYBE_FUNCTION_NAME = (jsonify('msg''Bad username or password'), 401) -File: flask-jwt-extended/examples/loaders.py - > reaches line 30, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(ret), 200) - - - -mayurvaidya09/Flask -https://github.com/mayurvaidya09/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:11:08.214938 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -harryjia/flask -https://github.com/harryjia/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:11:08.808239 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -randm-/flask -https://github.com/randm-/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:11:09.393016 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -zhaokefei/flask -https://github.com/zhaokefei/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:11:09.968838 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -xjr7670/flask -https://github.com/xjr7670/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:11:10.554398 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Morfyo/Flask -https://github.com/Morfyo/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:11:11.065611 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hamdimuzakkiy/Flask -https://github.com/hamdimuzakkiy/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:11:11.582967 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bellcodo/fisrt-flask-app -https://github.com/bellcodo/fisrt-flask-app -Entry file: fisrt-flask-app/hello_app.py -Scanned: 2016-10-20 13:11:12.887180 -No vulnerabilities found. - - -georgigeorgiev/flaskbe -https://github.com/georgigeorgiev/flaskbe -Entry file: flaskbe/flaskbe/__init__.py -Scanned: 2016-10-20 13:11:14.314267 -No vulnerabilities found. - - -ryanruthart/flasktaskr -https://github.com/ryanruthart/flasktaskr -Entry file: None -Scanned: 2016-10-20 13:11:14.840268 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Sventenhaaf/flasktwo -https://github.com/Sventenhaaf/flasktwo -Entry file: flasktwo/app.py -Scanned: 2016-10-20 13:11:25.815750 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -martyni/flaskstrap -https://github.com/martyni/flaskstrap -Entry file: flaskstrap/flaskstrap/app.py -Scanned: 2016-10-20 13:11:27.615639 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -irritant/flasktory -https://github.com/irritant/flasktory -Entry file: flasktory/template/app/__init__.py -Scanned: 2016-10-20 13:11:33.062235 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -isyippee/flasky -https://github.com/isyippee/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:11:33.570465 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -iteong/flaskbot -https://github.com/iteong/flaskbot -Entry file: flaskbot/app.py -Scanned: 2016-10-20 13:11:42.565076 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -juwaini/flaskr -https://github.com/juwaini/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:11:43.078253 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -reasonoughtrule/flaskr -https://github.com/reasonoughtrule/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:11:43.589537 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ipeacocks/flasktaskr -https://github.com/ipeacocks/flasktaskr -Entry file: None -Scanned: 2016-10-20 13:11:44.096310 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -klouskingsley/flaskdemo -https://github.com/klouskingsley/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 13:11:44.609799 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -reshama/flaskapps -https://github.com/reshama/flaskapps -Entry file: flaskapps/testgoogleauth/app/__init__.py -Scanned: 2016-10-20 13:11:48.130954 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kpotash/flasknotes -https://github.com/kpotash/flasknotes -Entry file: flasknotes/notes.py -Scanned: 2016-10-20 13:11:50.565291 -No vulnerabilities found. - - -jehuston/text_classifier -https://github.com/jehuston/text_classifier -Entry file: text_classifier/app.py -Scanned: 2016-10-20 13:12:00.807853 -Vulnerability 1: -File: text_classifier/app.py - > User input at line 19, trigger word "form[": - text = str(request.form['input_text']) -Reassigned in: - File: text_classifier/app.py - > Line 20: X = vectorizer.transform([text]) - File: text_classifier/app.py - > Line 21: prediction = model.predict(X)[0] -File: text_classifier/app.py - > reaches line 22, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('predict.html',prediction=prediction, title='Results') - -Vulnerability 2: -File: text_classifier/app.py - > User input at line 20, trigger word "form(": - X = vectorizer.transform([text]) -Reassigned in: - File: text_classifier/app.py - > Line 21: prediction = model.predict(X)[0] -File: text_classifier/app.py - > reaches line 22, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('predict.html',prediction=prediction, title='Results') - - - -Miserlou/zappa-bittorrent-tracker -https://github.com/Miserlou/zappa-bittorrent-tracker -Entry file: zappa-bittorrent-tracker/track.py -Scanned: 2016-10-20 13:12:02.302822 -No vulnerabilities found. - - -mcquam/flasky2 -https://github.com/mcquam/flasky2 -Entry file: flasky2/app/__init__.py -Scanned: 2016-10-20 13:12:04.019182 -Vulnerability 1: -File: flasky2/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/main/views.py - > Line 55: posts = pagination.items - File: flasky2/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flasky2/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flasky2/app/main/views.py - > Line 45: show_followed = False - File: flasky2/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flasky2/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/main/views.py - > Line 67: posts = pagination.items -File: flasky2/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flasky2/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flasky2/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2/app/main/views.py - > Line 134: comments = pagination.items - File: flasky2/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flasky2/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flasky2/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky2/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flasky2/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flasky2/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky2/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flasky2/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flasky2/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2/app/main/views.py - > Line 246: comments = pagination.items -File: flasky2/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 8: -File: flasky2/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky2/app/api_1_0/users.py - > Line 20: prev = None - File: flasky2/app/api_1_0/users.py - > Line 23: next = None -File: flasky2/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 9: -File: flasky2/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky2/app/api_1_0/users.py - > Line 20: prev = None - File: flasky2/app/api_1_0/users.py - > Line 23: next = None -File: flasky2/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 10: -File: flasky2/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky2/app/api_1_0/users.py - > Line 20: prev = None - File: flasky2/app/api_1_0/users.py - > Line 23: next = None -File: flasky2/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 11: -File: flasky2/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky2/app/api_1_0/users.py - > Line 42: prev = None - File: flasky2/app/api_1_0/users.py - > Line 46: next = None -File: flasky2/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 12: -File: flasky2/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky2/app/api_1_0/users.py - > Line 42: prev = None - File: flasky2/app/api_1_0/users.py - > Line 46: next = None -File: flasky2/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 13: -File: flasky2/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky2/app/api_1_0/users.py - > Line 42: prev = None - File: flasky2/app/api_1_0/users.py - > Line 46: next = None -File: flasky2/app/api_1_0/users.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 14: -File: flasky2/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky2/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky2/app/api_1_0/posts.py - > Line 19: next = None -File: flasky2/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 15: -File: flasky2/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky2/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky2/app/api_1_0/posts.py - > Line 19: next = None -File: flasky2/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 16: -File: flasky2/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky2/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky2/app/api_1_0/posts.py - > Line 19: next = None -File: flasky2/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 17: -File: flasky2/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky2/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky2/app/api_1_0/comments.py - > Line 18: next = None -File: flasky2/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 18: -File: flasky2/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky2/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky2/app/api_1_0/comments.py - > Line 18: next = None -File: flasky2/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 19: -File: flasky2/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky2/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky2/app/api_1_0/comments.py - > Line 18: next = None -File: flasky2/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 20: -File: flasky2/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky2/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky2/app/api_1_0/comments.py - > Line 46: next = None -File: flasky2/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 21: -File: flasky2/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky2/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky2/app/api_1_0/comments.py - > Line 46: next = None -File: flasky2/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 22: -File: flasky2/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky2/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky2/app/api_1_0/comments.py - > Line 46: next = None -File: flasky2/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - - - -jiwpark00/FlaskTutorial -https://github.com/jiwpark00/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 13:12:04.535233 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -WYoYao/flaskCode -https://github.com/WYoYao/flaskCode -Entry file: flaskCode/setup.py -Scanned: 2016-10-20 13:12:11.433927 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -MittalShruti/FlaskApp -https://github.com/MittalShruti/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 13:12:12.007661 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -egolus/flaskApp -https://github.com/egolus/flaskApp -Entry file: flaskApp/apiApp_new.py -Scanned: 2016-10-20 13:12:12.529226 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mayurvaidya09/FlaskDemo -https://github.com/mayurvaidya09/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 13:12:13.046458 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ethanchewy/FlaskAjax -https://github.com/ethanchewy/FlaskAjax -Entry file: FlaskAjax/main/app.py -Scanned: 2016-10-20 13:12:20.687951 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AnthonyShalagin/FlaskTutorial -https://github.com/AnthonyShalagin/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 13:12:21.700654 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pigaov10/FlaskApi -https://github.com/pigaov10/FlaskApi -Entry file: FlaskApi/app/provider.py -Scanned: 2016-10-20 13:12:23.041295 -No vulnerabilities found. - - -sarvex/FlaskBasics -https://github.com/sarvex/FlaskBasics -Entry file: FlaskBasics/FlaskBasics.py -Scanned: 2016-10-20 13:12:24.449857 -No vulnerabilities found. - - -SubhrajyotiSen/FlaskBlog -https://github.com/SubhrajyotiSen/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 13:12:25.114189 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dyrkabes/FlaskApp -https://github.com/dyrkabes/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 13:12:25.693779 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -adiol/flask-project -https://github.com/adiol/flask-project -Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py -Scanned: 2016-10-20 13:12:33.479771 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ovidiu1/python-flask -https://github.com/ovidiu1/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 13:12:34.028084 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chiphwang/flask_app -https://github.com/chiphwang/flask_app -Entry file: None -Scanned: 2016-10-20 13:12:34.541726 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/chiphwang/flask_app. - -xxxxsars/Flask_upload -https://github.com/xxxxsars/Flask_upload -Entry file: Flask_upload/flask_upload.py -Scanned: 2016-10-20 13:12:35.896799 -No vulnerabilities found. - - -DenGodunov/flask_microblog -https://github.com/DenGodunov/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-20 13:12:36.461127 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -liangkai6419/learn_flask -https://github.com/liangkai6419/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 13:12:36.973308 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -huiyaoren/Learn_Flask -https://github.com/huiyaoren/Learn_Flask -Entry file: Learn_Flask/app/__init__.py -Scanned: 2016-10-20 13:12:39.164968 -No vulnerabilities found. - - -socialwifi/flask-oauthres -https://github.com/socialwifi/flask-oauthres -Entry file: flask-oauthres/tests/_app.py -Scanned: 2016-10-20 13:12:40.610310 -No vulnerabilities found. - - -pwh0903/flask-todo -https://github.com/pwh0903/flask-todo -Entry file: flask-todo/backend/app.py -Scanned: 2016-10-20 13:12:43.148198 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -GuessWhoSamFoo/Flask-Website -https://github.com/GuessWhoSamFoo/Flask-Website -Entry file: Flask-Website/app.py -Scanned: 2016-10-20 13:12:59.223799 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -agafonovdev/flask_template -https://github.com/agafonovdev/flask_template -Entry file: None -Scanned: 2016-10-20 13:12:59.727355 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/agafonovdev/flask_template. - -Lijin111/Flask-Web -https://github.com/Lijin111/Flask-Web -Entry file: Flask-Web/Flask.py -Scanned: 2016-10-20 13:13:01.952629 -Vulnerability 1: -File: Flask-Web/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Web/app/main/views.py - > Line 32: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Web/app/main/views.py - > Line 35: posts = pagination.items - File: Flask-Web/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Web/app/main/views.py - > reaches line 55, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Flask-Web/app/main/views.py - > User input at line 26, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Flask-Web/app/main/views.py - > Line 24: show_followed = False - File: Flask-Web/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Web/app/main/views.py - > reaches line 55, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Flask-Web/app/main/views.py - > User input at line 123, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Web/app/main/views.py - > Line 125: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Flask-Web/app/main/views.py - > Line 127: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-Web/app/main/views.py - > Line 130: comments = pagination.items - File: Flask-Web/app/main/views.py - > Line 122: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Flask-Web/app/main/views.py - > reaches line 131, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: Flask-Web/app/main/views.py - > User input at line 190, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Web/app/main/views.py - > Line 191: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Flask-Web/app/main/views.py - > Line 194: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Flask-Web/app/main/views.py - > Line 189: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Web/app/main/views.py - > reaches line 196, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: Flask-Web/app/main/views.py - > User input at line 207, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Web/app/main/views.py - > Line 208: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Flask-Web/app/main/views.py - > Line 211: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Flask-Web/app/main/views.py - > Line 206: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Web/app/main/views.py - > reaches line 213, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Flask-Web/app/main/views.py - > User input at line 236, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Web/app/main/views.py - > Line 237: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-Web/app/main/views.py - > Line 240: comments = pagination.items -File: Flask-Web/app/main/views.py - > reaches line 241, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -chaitjo/flask-mongodb -https://github.com/chaitjo/flask-mongodb -Entry file: flask-mongodb/api.py -Scanned: 2016-10-20 13:13:03.754929 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -action-hong/study_flask -https://github.com/action-hong/study_flask -Entry file: None -Scanned: 2016-10-20 13:13:04.311582 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -carrbs/flask-tutorial -https://github.com/carrbs/flask-tutorial -Entry file: None -Scanned: 2016-10-20 13:13:04.816449 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -javierdva/flask-example -https://github.com/javierdva/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-20 13:13:05.338661 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EgorKurito/flask_bot -https://github.com/EgorKurito/flask_bot -Entry file: flask_bot/bot.py -Scanned: 2016-10-20 13:13:06.656464 -No vulnerabilities found. - - -jurrehart/flask_tut -https://github.com/jurrehart/flask_tut -Entry file: flask_tut/microblog/app/__init__.py -Scanned: 2016-10-20 13:13:07.168660 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -saiprakashreddymarasani/MyFlask -https://github.com/saiprakashreddymarasani/MyFlask -Entry file: MyFlask/FlaskSample/app.py -Scanned: 2016-10-20 13:13:14.140442 -No vulnerabilities found. - - -Atheloses/Flask-Bones -https://github.com/Atheloses/Flask-Bones -Entry file: Flask-Bones/app/__init__.py -Scanned: 2016-10-20 13:13:20.188505 -Vulnerability 1: -File: Flask-Bones/app/auth/views.py - > User input at line 46, trigger word ".data": - group = Group.create(nazev=form.data['nazev']) -File: Flask-Bones/app/auth/views.py - > reaches line 48, trigger word "flash(": - flash(gettext('Group {name} created').format(name=group.nazev), 'success') - -Vulnerability 2: -File: Flask-Bones/app/auth/views.py - > User input at line 58, trigger word ".data": - firma = Firma.create(nazev=form.data['nazev'], state=form.data['state'], address=form.data['address'], phone_number=form.data['phone_number'], contact_person=form.data['contact_person'], website=form.data['website']) -File: Flask-Bones/app/auth/views.py - > reaches line 65, trigger word "flash(": - flash(gettext('Organization {name} created').format(name=firma.nazev), 'success') - -Vulnerability 3: -File: Flask-Bones/app/public/views.py - > User input at line 37, trigger word ".data": - user = User.create(username=form.data['username'], email=form.data['email'], password=form.data['password'], remote_addr=request.remote_addr, jmeno=form.data['jmeno'], prijmeni=form.data['prijmeni']) -Reassigned in: - File: Flask-Bones/app/public/views.py - > Line 47: token = s.dumps(user.id) -File: Flask-Bones/app/public/views.py - > reaches line 51, trigger word "flash(": - flash(gettext('Sent verification email to {email}').format(email=user.email), 'success') - - - -joelcolucci/flask-dropin -https://github.com/joelcolucci/flask-dropin -Entry file: flask-dropin/tests/test_dropin.py -Scanned: 2016-10-20 13:13:21.550724 -No vulnerabilities found. - - -KingOkay/flask-book -https://github.com/KingOkay/flask-book -Entry file: flask-book/app/__init__.py -Scanned: 2016-10-20 13:13:27.469377 -Vulnerability 1: -File: flask-book/app/auth/verify.py - > User input at line 64, trigger word "form(": - img = img.transform(size, Image.PERSPECTIVE, params) -Reassigned in: - File: flask-book/app/auth/verify.py - > Line 20: img = Image.new(mode, size, bg_color) - File: flask-book/app/auth/verify.py - > Line 21: draw = ImageDraw.Draw(img) - File: flask-book/app/auth/verify.py - > Line 68: ret_MAYBE_FUNCTION_NAME = (img, strs) -File: flask-book/app/auth/verify.py - > reaches line 66, trigger word "filter(": - img = img.filter(ImageFilter.EDGE_ENHANCE_MORE) - -Vulnerability 2: -File: flask-book/app/main/views.py - > User input at line 18, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, title='首页', books=books, order_books=order_books, types=types, books1=books1) -File: flask-book/app/main/views.py - > reaches line 19, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 3: -File: flask-book/app/main/views.py - > User input at line 18, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, title='首页', books=books, order_books=order_books, types=types, books1=books1) -File: flask-book/app/main/views.py - > reaches line 19, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 4: -File: flask-book/app/main/views.py - > User input at line 46, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id) -File: flask-book/app/main/views.py - > reaches line 47, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 5: -File: flask-book/app/main/views.py - > User input at line 46, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id) -File: flask-book/app/main/views.py - > reaches line 47, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 6: -File: flask-book/app/main/views.py - > User input at line 49, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 50: pagination = Book.query.filter_by(booktype_id=id).order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_BOOKSHOWS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 53: books = pagination.items - File: flask-book/app/main/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) -File: flask-book/app/main/views.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id) - -Vulnerability 7: -File: flask-book/app/main/views.py - > User input at line 62, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999) -File: flask-book/app/main/views.py - > reaches line 63, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 8: -File: flask-book/app/main/views.py - > User input at line 62, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999) -File: flask-book/app/main/views.py - > reaches line 63, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 9: -File: flask-book/app/main/views.py - > User input at line 65, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 66: pagination = Book.query.order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_BOOKSHOWS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 69: books = pagination.items - File: flask-book/app/main/views.py - > Line 63: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) -File: flask-book/app/main/views.py - > reaches line 70, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999) - -Vulnerability 10: -File: flask-book/app/main/views.py - > User input at line 76, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 77: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 80: posts = pagination.items -File: flask-book/app/main/views.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('all-post.html',title='好书推荐', posts=posts, pagination=pagination) - -Vulnerability 11: -File: flask-book/app/main/views.py - > User input at line 97, trigger word ".data": - my_address = Address.query.filter_by(id=form.order_address.data).first() -Reassigned in: - File: flask-book/app/main/views.py - > Line 98: order_address = '详细地址: ' + my_address.area + my_address.detailed + ' 邮编: ' + str(my_address.zip_code) + ' 收货人: ' + my_address.name + ' 电话号码: ' + str(my_address.phone_number) - File: flask-book/app/main/views.py - > Line 101: order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1) - File: flask-book/app/main/views.py - > Line 107: a = float(order.amount) - File: flask-book/app/main/views.py - > Line 109: order.price = a * b - File: flask-book/app/main/views.py - > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address) -File: flask-book/app/main/views.py - > reaches line 112, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id)) - -Vulnerability 12: -File: flask-book/app/main/views.py - > User input at line 101, trigger word ".data": - order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1) -Reassigned in: - File: flask-book/app/main/views.py - > Line 107: a = float(order.amount) - File: flask-book/app/main/views.py - > Line 109: order.price = a * b - File: flask-book/app/main/views.py - > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address) -File: flask-book/app/main/views.py - > reaches line 112, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id)) - -Vulnerability 13: -File: flask-book/app/main/views.py - > User input at line 97, trigger word ".data": - my_address = Address.query.filter_by(id=form.order_address.data).first() -Reassigned in: - File: flask-book/app/main/views.py - > Line 98: order_address = '详细地址: ' + my_address.area + my_address.detailed + ' 邮编: ' + str(my_address.zip_code) + ' 收货人: ' + my_address.name + ' 电话号码: ' + str(my_address.phone_number) - File: flask-book/app/main/views.py - > Line 101: order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1) - File: flask-book/app/main/views.py - > Line 107: a = float(order.amount) - File: flask-book/app/main/views.py - > Line 109: order.price = a * b - File: flask-book/app/main/views.py - > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address) -File: flask-book/app/main/views.py - > reaches line 112, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id)) - -Vulnerability 14: -File: flask-book/app/main/views.py - > User input at line 101, trigger word ".data": - order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1) -Reassigned in: - File: flask-book/app/main/views.py - > Line 107: a = float(order.amount) - File: flask-book/app/main/views.py - > Line 109: order.price = a * b - File: flask-book/app/main/views.py - > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address) -File: flask-book/app/main/views.py - > reaches line 112, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id)) - -Vulnerability 15: -File: flask-book/app/main/views.py - > User input at line 168, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 170: page = book.bookcos.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask-book/app/main/views.py - > Line 172: pagination = book.bookcos.order_by(BookCo.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 175: comments = pagination.items -File: flask-book/app/main/views.py - > reaches line 176, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book.html',book=book, title=book.name, comments=comments, pagination=pagination) - -Vulnerability 16: -File: flask-book/app/main/views.py - > User input at line 275, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 276: pagination = Order.query.filter_by(author_id=current_user.id).order_by(Order.order_time.desc()).paginate(page,per_page=current_app.config['FLASKY_ORDERS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 279: orders = pagination.items -File: flask-book/app/main/views.py - > reaches line 280, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('my-order.html',orders=orders, title='我的订单', pagination=pagination) - -Vulnerability 17: -File: flask-book/app/main/views.py - > User input at line 297, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form) -File: flask-book/app/main/views.py - > reaches line 298, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 18: -File: flask-book/app/main/views.py - > User input at line 297, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form) -File: flask-book/app/main/views.py - > reaches line 298, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 19: -File: flask-book/app/main/views.py - > User input at line 297, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form) -File: flask-book/app/main/views.py - > reaches line 299, trigger word "filter(": - books = Book.query.filter(Book.name.like('%' + str + '%')) - -Vulnerability 20: -File: flask-book/app/main/views.py - > User input at line 309, trigger word ".data": - post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object()) -Reassigned in: - File: flask-book/app/main/views.py - > Line 315: ret_MAYBE_FUNCTION_NAME = render_template('create_post.html',form=form, title='创建新文章') -File: flask-book/app/main/views.py - > reaches line 314, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id)) - -Vulnerability 21: -File: flask-book/app/main/views.py - > User input at line 309, trigger word ".data": - post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object()) -Reassigned in: - File: flask-book/app/main/views.py - > Line 315: ret_MAYBE_FUNCTION_NAME = render_template('create_post.html',form=form, title='创建新文章') -File: flask-book/app/main/views.py - > reaches line 314, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id)) - -Vulnerability 22: -File: flask-book/app/main/views.py - > User input at line 340, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 342: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask-book/app/main/views.py - > Line 344: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 347: comments = pagination.items - File: flask-book/app/main/views.py - > Line 339: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=1)) -File: flask-book/app/main/views.py - > reaches line 348, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], title='文章内容', form=form, comments=comments, pagination=pagination) - -Vulnerability 23: -File: flask-book/app/main/views.py - > User input at line 358, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 359: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 362: posts = pagination.items -File: flask-book/app/main/views.py - > reaches line 363, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination, title='我的资料') - -Vulnerability 24: -File: flask-book/app/admin/views.py - > User input at line 29, trigger word ".data": - book = Book(name=form.name.data, author=form.author.data, price=form.price.data, isbn=form.isbn.data, press=form.press.data, booktype_id=form.type.data, words=form.words.data, des=form.des.data, page_numbers=form.page_numbers.data) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('admin/add-book.html',form=form, title='添加图书') -File: flask-book/app/admin/views.py - > reaches line 46, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.book',id=book.id)) - -Vulnerability 25: -File: flask-book/app/admin/views.py - > User input at line 29, trigger word ".data": - book = Book(name=form.name.data, author=form.author.data, price=form.price.data, isbn=form.isbn.data, press=form.press.data, booktype_id=form.type.data, words=form.words.data, des=form.des.data, page_numbers=form.page_numbers.data) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('admin/add-book.html',form=form, title='添加图书') -File: flask-book/app/admin/views.py - > reaches line 46, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.book',id=book.id)) - -Vulnerability 26: -File: flask-book/app/admin/views.py - > User input at line 98, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 99: pagination = Book.query.order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False) - File: flask-book/app/admin/views.py - > Line 102: book_lists = pagination.items -File: flask-book/app/admin/views.py - > reaches line 103, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/book-list.html',title='图书列表', pagination=pagination, book_lists=book_lists) - -Vulnerability 27: -File: flask-book/app/admin/views.py - > User input at line 111, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 112: pagination = User.query.order_by(User.member_since.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False) - File: flask-book/app/admin/views.py - > Line 115: user_lists = pagination.items -File: flask-book/app/admin/views.py - > reaches line 116, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/user-list.html',title='用户列表', user_lists=user_lists, pagination=pagination) - -Vulnerability 28: -File: flask-book/app/admin/views.py - > User input at line 164, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 165: pagination = Order.query.order_by(Order.order_time.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-book/app/admin/views.py - > Line 168: orders = pagination.items -File: flask-book/app/admin/views.py - > reaches line 169, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/order-list.html',orders=orders, pagination=pagination, page=page, title='订单处理') - -Vulnerability 29: -File: flask-book/app/admin/views.py - > User input at line 188, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 189: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-book/app/admin/views.py - > Line 192: comments = pagination.items -File: flask-book/app/admin/views.py - > reaches line 193, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/moderate.html',comments=comments, pagination=pagination, page=page, title='评论管理') - - - -tvenis/flask_app -https://github.com/tvenis/flask_app -Entry file: None -Scanned: 2016-10-20 13:13:27.970931 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tvenis/flask_app. - -kangnahua/flask-blog -https://github.com/kangnahua/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:13:28.545883 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -mmeehan07/flask_app -https://github.com/mmeehan07/flask_app -Entry file: None -Scanned: 2016-10-20 13:13:29.052153 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mmeehan07/flask_app. - -maiku08/starwars-flask -https://github.com/maiku08/starwars-flask -Entry file: starwars-flask/starwars-flask/app.py -Scanned: 2016-10-20 13:13:31.100349 -No vulnerabilities found. - - -Balta-zar/flask-migrations -https://github.com/Balta-zar/flask-migrations -Entry file: flask-migrations/migration.py -Scanned: 2016-10-20 13:13:32.477165 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vitaliylevitskiand/wordsplay_flask -https://github.com/vitaliylevitskiand/wordsplay_flask -Entry file: wordsplay_flask/wordsplay_flask.py -Scanned: 2016-10-20 13:13:36.112035 -No vulnerabilities found. - - -zeroSwift/startFlask -https://github.com/zeroSwift/startFlask -Entry file: startFlask/simpleGET.py -Scanned: 2016-10-20 13:13:37.594291 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ferrufino/Flask-Learning -https://github.com/ferrufino/Flask-Learning -Entry file: Flask-Learning/restAPI/api.py -Scanned: 2016-10-20 13:13:39.111357 -No vulnerabilities found. - - -zackchew42/flask-web -https://github.com/zackchew42/flask-web -Entry file: flask-web/local_debug.py -Scanned: 2016-10-20 13:13:39.624454 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -arutishauser/flask_app -https://github.com/arutishauser/flask_app -Entry file: None -Scanned: 2016-10-20 13:13:40.137125 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/arutishauser/flask_app. - -mdecourse/ByFlask -https://github.com/mdecourse/ByFlask -Entry file: ByFlask/flaskapp.py -Scanned: 2016-10-20 13:13:48.699825 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -buttercms/buttercms-flask -https://github.com/buttercms/buttercms-flask -Entry file: buttercms-flask/app.py -Scanned: 2016-10-20 13:13:50.026977 -Vulnerability 1: -File: buttercms-flask/buttercms/blog_blueprint.py - > User input at line 25, trigger word "get(": - response = client.posts.get(slug) -Reassigned in: - File: buttercms-flask/buttercms/blog_blueprint.py - > Line 27: post = response['data'] -File: buttercms-flask/buttercms/blog_blueprint.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',post=post) - -Vulnerability 2: -File: buttercms-flask/buttercms/blog_blueprint.py - > User input at line 36, trigger word "get(": - response = client.authors.get(author_slug, 'include''recent_posts') -Reassigned in: - File: buttercms-flask/buttercms/blog_blueprint.py - > Line 39: author = response['data'] -File: buttercms-flask/buttercms/blog_blueprint.py - > reaches line 43, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('author.html',author=author) - -Vulnerability 3: -File: buttercms-flask/buttercms/blog_blueprint.py - > User input at line 48, trigger word "get(": - response = client.categories.get(category_slug, 'include''recent_posts') -Reassigned in: - File: buttercms-flask/buttercms/blog_blueprint.py - > Line 50: category = response['data'] -File: buttercms-flask/buttercms/blog_blueprint.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.html',category=category) - - - -AlexN34/flask-tdd -https://github.com/AlexN34/flask-tdd -Entry file: flask-tdd/app.py -Scanned: 2016-10-20 13:13:55.644668 -No vulnerabilities found. - - -jillbourque/flask_app -https://github.com/jillbourque/flask_app -Entry file: None -Scanned: 2016-10-20 13:13:56.164590 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jillbourque/flask_app. - -ghkdgustn29/flask-practice -https://github.com/ghkdgustn29/flask-practice -Entry file: None -Scanned: 2016-10-20 13:13:56.684489 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ghkdgustn29/flask-practice. - -lbarberiscanoni/Flask-Ex -https://github.com/lbarberiscanoni/Flask-Ex -Entry file: Flask-Ex/app.py -Scanned: 2016-10-20 13:13:57.989801 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joegotflow83/todo_flask -https://github.com/joegotflow83/todo_flask -Entry file: todo_flask/app.py -Scanned: 2016-10-20 13:13:59.300192 -No vulnerabilities found. - - -tianyuwu/docker-flask -https://github.com/tianyuwu/docker-flask -Entry file: None -Scanned: 2016-10-20 13:13:59.810590 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tianyuwu/docker-flask. - -rbrecheisen/flask-storage -https://github.com/rbrecheisen/flask-storage -Entry file: flask-storage/tests/__init__.py -Scanned: 2016-10-20 13:14:00.323925 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -songyawei/flask-demo -https://github.com/songyawei/flask-demo -Entry file: None -Scanned: 2016-10-20 13:14:02.839983 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/songyawei/flask-demo. - -matthewshim88/flask_mysql -https://github.com/matthewshim88/flask_mysql -Entry file: flask_mysql/friends/server.py -Scanned: 2016-10-20 13:14:04.691140 -No vulnerabilities found. - - -Yunobububu/Hello_Flask -https://github.com/Yunobububu/Hello_Flask -Entry file: None -Scanned: 2016-10-20 13:14:06.062853 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Yunobububu/Hello_Flask. - -brpowell/flask-example -https://github.com/brpowell/flask-example -Entry file: flask-example/main.py -Scanned: 2016-10-20 13:14:06.569886 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -waldo7/flask-hello-world -https://github.com/waldo7/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 13:14:07.137501 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -mmomo/Rpi_auto -https://github.com/mmomo/Rpi_auto -Entry file: Rpi_auto/app/__init__.py -Scanned: 2016-10-20 13:14:08.487765 -No vulnerabilities found. - - -alm958/FlaskNumberGame -https://github.com/alm958/FlaskNumberGame -Entry file: FlaskNumberGame/numgameserver.py -Scanned: 2016-10-20 13:14:09.785883 -No vulnerabilities found. - - -chiangyiyang/FlaskSocketIO_Test -https://github.com/chiangyiyang/FlaskSocketIO_Test -Entry file: FlaskSocketIO_Test/app.py -Scanned: 2016-10-20 13:14:14.133879 -No vulnerabilities found. - - -YiCorleone/FlaskHelloWorld -https://github.com/YiCorleone/FlaskHelloWorld -Entry file: FlaskHelloWorld/hello.py -Scanned: 2016-10-20 13:14:16.439797 -No vulnerabilities found. - - -tloszabno/vuejs-flask-test -https://github.com/tloszabno/vuejs-flask-test -Entry file: None -Scanned: 2016-10-20 13:14:21.751204 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tloszabno/vuejs-flask-test. - -Spider0io/flask-hello-world -https://github.com/Spider0io/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-20 13:14:22.291766 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/venv/lib/python2.7/genericpath.py - -prabaprakash/Flask_Rest_APP -https://github.com/prabaprakash/Flask_Rest_APP -Entry file: Flask_Rest_APP/App/__init__.py -Scanned: 2016-10-20 13:14:29.682757 -No vulnerabilities found. - - -josleahy/flask_hello_world -https://github.com/josleahy/flask_hello_world -Entry file: None -Scanned: 2016-10-20 13:14:30.187130 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/josleahy/flask_hello_world. - -VamsikrishnaNallabothu/PyFlask_DataTables -https://github.com/VamsikrishnaNallabothu/PyFlask_DataTables -Entry file: PyFlask_DataTables/Flask1.py -Scanned: 2016-10-20 13:14:32.472525 -No vulnerabilities found. - - -jglee1/pi-flask-test -https://github.com/jglee1/pi-flask-test -Entry file: pi-flask-test/app.py -Scanned: 2016-10-20 13:14:33.795616 -No vulnerabilities found. - - -kamieb03/first-flask-app -https://github.com/kamieb03/first-flask-app -Entry file: None -Scanned: 2016-10-20 13:14:37.307737 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -BYUFootball/first-flask-app -https://github.com/BYUFootball/first-flask-app -Entry file: None -Scanned: 2016-10-20 13:14:38.817233 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fortune599/flask -https://github.com/fortune599/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:14:41.681029 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -iamdavidmt/flask -https://github.com/iamdavidmt/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:14:42.251822 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -DIYer22/flask -https://github.com/DIYer22/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:14:49.840248 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -woowooh/flask -https://github.com/woowooh/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:14:51.408230 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -jasondebolt/flask -https://github.com/jasondebolt/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:14:57.001835 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -nsuJolie/flask -https://github.com/nsuJolie/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:14:57.568256 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -pandapan0021/myblog -https://github.com/pandapan0021/myblog -Entry file: None -Scanned: 2016-10-20 13:15:00.139342 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -qwertypomy/flask-example-app -https://github.com/qwertypomy/flask-example-app -Entry file: flask-example-app/app.py -Scanned: 2016-10-20 13:15:07.909004 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -AminHP/flask-mvc -https://github.com/AminHP/flask-mvc -Entry file: flask-mvc/project/application.py -Scanned: 2016-10-20 13:15:09.359599 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shitx/flaskapp -https://github.com/shitx/flaskapp -Entry file: None -Scanned: 2016-10-20 13:15:10.342699 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shitx/flaskapp. - -eswizardry/flasktaskr -https://github.com/eswizardry/flasktaskr -Entry file: None -Scanned: 2016-10-20 13:15:10.839873 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -waldo7/flasktaskr -https://github.com/waldo7/flasktaskr -Entry file: None -Scanned: 2016-10-20 13:15:11.340656 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -arsalanam/flasky -https://github.com/arsalanam/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:15:11.841550 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Spider0io/flasktaskr -https://github.com/Spider0io/flasktaskr -Entry file: None -Scanned: 2016-10-20 13:15:12.360644 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -martyni/flaskstrap -https://github.com/martyni/flaskstrap -Entry file: flaskstrap/flaskstrap/app.py -Scanned: 2016-10-20 13:15:13.879582 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -naviplay/flasktutorial -https://github.com/naviplay/flasktutorial -Entry file: None -Scanned: 2016-10-20 13:15:16.410312 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MagicRoc/flaskoc -https://github.com/MagicRoc/flaskoc -Entry file: flaskoc/hello.py -Scanned: 2016-10-20 13:15:23.246918 -Vulnerability 1: -File: flaskoc/app/main/views.py - > User input at line 56, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskoc/app/main/views.py - > Line 57: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskoc/app/main/views.py - > Line 60: posts = pagination.items - File: flaskoc/app/main/views.py - > Line 55: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskoc/app/main/views.py - > reaches line 61, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: flaskoc/app/main/views.py - > User input at line 72, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskoc/app/main/views.py - > Line 73: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskoc/app/main/views.py - > Line 76: posts = pagination.items -File: flaskoc/app/main/views.py - > reaches line 77, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - - - -yorolifarg/flasksample -https://github.com/yorolifarg/flasksample -Entry file: flasksample/chapter2/app.py -Scanned: 2016-10-20 13:15:30.827722 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Arlus/flasktest -https://github.com/Arlus/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 13:15:31.338508 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rschmidtz/flaskr -https://github.com/rschmidtz/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:15:31.846907 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ThisIsMyNick/flasky -https://github.com/ThisIsMyNick/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:15:32.387464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -topleft/flasktasker -https://github.com/topleft/flasktasker -Entry file: flasktasker/views.py -Scanned: 2016-10-20 13:15:32.929295 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -TangXinCN/flaskdev -https://github.com/TangXinCN/flaskdev -Entry file: flaskdev/app/__init__.py -Scanned: 2016-10-20 13:15:34.839988 -Vulnerability 1: -File: flaskdev/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 22: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskdev/app/main/views.py - > Line 26: posts = pagination.items - File: flaskdev/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskdev/app/main/views.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: flaskdev/app/main/views.py - > User input at line 35, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 36: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskdev/app/main/views.py - > Line 40: posts = pagination.items -File: flaskdev/app/main/views.py - > reaches line 41, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 3: -File: flaskdev/app/main/views.py - > User input at line 89, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 91: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskdev/app/main/views.py - > Line 93: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskdev/app/main/views.py - > Line 97: comments = pagination.items - File: flaskdev/app/main/views.py - > Line 88: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskdev/app/main/views.py - > reaches line 98, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: flaskdev/app/main/views.py - > User input at line 122, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdev/app/main/views.py - > Line 123: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskdev/app/main/views.py - > Line 127: comments = pagination.items -File: flaskdev/app/main/views.py - > reaches line 128, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -jyang8/flasktemp -https://github.com/jyang8/flasktemp -Entry file: flasktemp/work01.py -Scanned: 2016-10-20 13:15:36.175979 -No vulnerabilities found. - - -hhzrabbit/flaskwebpage -https://github.com/hhzrabbit/flaskwebpage -Entry file: flaskwebpage/app2.py -Scanned: 2016-10-20 13:15:38.475073 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jyang1737/flask1 -https://github.com/jyang1737/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-20 13:15:39.162074 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -zhengnan/FlaskDemo -https://github.com/zhengnan/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 13:15:40.683337 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ethanchewy/FlaskAjax -https://github.com/ethanchewy/FlaskAjax -Entry file: FlaskAjax/main/app.py -Scanned: 2016-10-20 13:15:42.352751 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elinah/flaskTemplate -https://github.com/elinah/flaskTemplate -Entry file: flaskTemplate/flask-app/app/__init__.py -Scanned: 2016-10-20 13:15:42.859481 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -urbanhacker/flask101 -https://github.com/urbanhacker/flask101 -Entry file: flask101/hello.py -Scanned: 2016-10-20 13:15:51.160981 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -evookelj/flaskTemplate -https://github.com/evookelj/flaskTemplate -Entry file: flaskTemplate/flask-app/app/__init__.py -Scanned: 2016-10-20 13:15:51.679832 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -nfichter/FlaskTemplate -https://github.com/nfichter/FlaskTemplate -Entry file: FlaskTemplate/app2.py -Scanned: 2016-10-20 13:15:58.493354 -No vulnerabilities found. - - -Vanna-M/flaskIntro -https://github.com/Vanna-M/flaskIntro -Entry file: flaskIntro/hello.py -Scanned: 2016-10-20 13:15:59.794399 -No vulnerabilities found. - - -klochenok/FlaskTask -https://github.com/klochenok/FlaskTask -Entry file: FlaskTask/project/views.py -Scanned: 2016-10-20 13:16:01.230489 -No vulnerabilities found. - - -Caynosadler/user-Authentication-using-flask -https://github.com/Caynosadler/user-Authentication-using-flask -Entry file: user-Authentication-using-flask/register.py -Scanned: 2016-10-20 13:16:03.045638 -Vulnerability 1: -File: user-Authentication-using-flask/register.py - > User input at line 49, trigger word "get(": - email_address = request.form.get('email_address') -Reassigned in: - File: user-Authentication-using-flask/register.py - > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('username_buster.html') - File: user-Authentication-using-flask/register.py - > Line 65: ret_MAYBE_FUNCTION_NAME = render_template('password_buster.html') - File: user-Authentication-using-flask/register.py - > Line 77: ret_MAYBE_FUNCTION_NAME = render_template('home.html',name=username) -File: user-Authentication-using-flask/register.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('email_buster.html',email=email_address) - -Vulnerability 2: -File: user-Authentication-using-flask/register.py - > User input at line 49, trigger word "get(": - email_address = request.form.get('email_address') -Reassigned in: - File: user-Authentication-using-flask/register.py - > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('username_buster.html') - File: user-Authentication-using-flask/register.py - > Line 65: ret_MAYBE_FUNCTION_NAME = render_template('password_buster.html') - File: user-Authentication-using-flask/register.py - > Line 77: ret_MAYBE_FUNCTION_NAME = render_template('home.html',name=username) -File: user-Authentication-using-flask/register.py - > reaches line 61, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('email_buster.html',email=email_address) - -Vulnerability 3: -File: user-Authentication-using-flask/register.py - > User input at line 50, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: user-Authentication-using-flask/register.py - > Line 59: ret_MAYBE_FUNCTION_NAME = render_template('email_buster.html',email=email_address) - File: user-Authentication-using-flask/register.py - > Line 61: ret_MAYBE_FUNCTION_NAME = render_template('email_buster.html',email=email_address) - File: user-Authentication-using-flask/register.py - > Line 63: ret_MAYBE_FUNCTION_NAME = render_template('username_buster.html') - File: user-Authentication-using-flask/register.py - > Line 65: ret_MAYBE_FUNCTION_NAME = render_template('password_buster.html') -File: user-Authentication-using-flask/register.py - > reaches line 77, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',name=username) - -Vulnerability 4: -File: user-Authentication-using-flask/login.py - > User input at line 12, trigger word "get(": - user = request.form.get('login_name') -File: user-Authentication-using-flask/login.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',name=user) - -Vulnerability 5: -File: user-Authentication-using-flask/login.py - > User input at line 12, trigger word "get(": - user = request.form.get('login_name') -File: user-Authentication-using-flask/login.py - > reaches line 21, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('buster',name=user)) - -Vulnerability 6: -File: user-Authentication-using-flask/login.py - > User input at line 12, trigger word "get(": - user = request.form.get('login_name') -File: user-Authentication-using-flask/login.py - > reaches line 21, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('buster',name=user)) - - - -lu-z/auxioneer-flask -https://github.com/lu-z/auxioneer-flask -Entry file: auxioneer-flask/app.py -Scanned: 2016-10-20 13:16:10.901362 -No vulnerabilities found. - - -chelBot/flask-microblog -https://github.com/chelBot/flask-microblog -Entry file: None -Scanned: 2016-10-20 13:16:11.404118 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -waldo7/flask-blog -https://github.com/waldo7/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:16:11.952476 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -maxbert/flask_template -https://github.com/maxbert/flask_template -Entry file: None -Scanned: 2016-10-20 13:16:12.463921 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/maxbert/flask_template. - -zhangruochi/LearnFlask -https://github.com/zhangruochi/LearnFlask -Entry file: LearnFlask/ex1_URL解析.py -Scanned: 2016-10-20 13:16:13.000568 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -st234pa/flask-template -https://github.com/st234pa/flask-template -Entry file: None -Scanned: 2016-10-20 13:16:13.506980 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/st234pa/flask-template. - -nanobox-quickstarts/nanobox-flask -https://github.com/nanobox-quickstarts/nanobox-flask -Entry file: nanobox-flask/hello.py -Scanned: 2016-10-20 13:16:17.442052 -No vulnerabilities found. - - -luolidong/SaltFlask -https://github.com/luolidong/SaltFlask -Entry file: SaltFlask/app/__init__.py -Scanned: 2016-10-20 13:16:22.889494 -Vulnerability 1: -File: SaltFlask/app/views.py - > User input at line 37, trigger word ".data": - saltclient = SaltClient(form.serverId.data) -File: SaltFlask/app/views.py - > reaches line 38, trigger word "flash(": - flash(saltclient.GetServerInfo()) - -Vulnerability 2: -File: SaltFlask/app/views.py - > User input at line 43, trigger word ".data": - logStr = 'server id:' + form.serverId.data + ' start' -Reassigned in: - File: SaltFlask/app/views.py - > Line 40: logStr = '' - File: SaltFlask/app/views.py - > Line 46: logStr = 'server id:' + form.serverId.data + ' close' - File: SaltFlask/app/views.py - > Line 50: logStr = 'server id:' + form.serverId.data + ' time:' + timeStr - File: SaltFlask/app/views.py - > Line 52: logStr = saltclient.ServerInfo() - File: SaltFlask/app/views.py - > Line 54: logStr = saltclient.ServerLog() - File: SaltFlask/app/views.py - > Line 56: logStr = saltclient.ServerCheck() -File: SaltFlask/app/views.py - > reaches line 58, trigger word "flash(": - flash(logStr) - -Vulnerability 3: -File: SaltFlask/app/views.py - > User input at line 46, trigger word ".data": - logStr = 'server id:' + form.serverId.data + ' close' -Reassigned in: - File: SaltFlask/app/views.py - > Line 40: logStr = '' - File: SaltFlask/app/views.py - > Line 43: logStr = 'server id:' + form.serverId.data + ' start' - File: SaltFlask/app/views.py - > Line 50: logStr = 'server id:' + form.serverId.data + ' time:' + timeStr - File: SaltFlask/app/views.py - > Line 52: logStr = saltclient.ServerInfo() - File: SaltFlask/app/views.py - > Line 54: logStr = saltclient.ServerLog() - File: SaltFlask/app/views.py - > Line 56: logStr = saltclient.ServerCheck() -File: SaltFlask/app/views.py - > reaches line 58, trigger word "flash(": - flash(logStr) - -Vulnerability 4: -File: SaltFlask/app/views.py - > User input at line 48, trigger word ".data": - timeStr = str(form.serverTime.data.year) + '-' + str(form.serverTime.data.month) + '-' + str(form.serverTime.data.day) -Reassigned in: - File: SaltFlask/app/views.py - > Line 50: logStr = 'server id:' + form.serverId.data + ' time:' + timeStr - File: SaltFlask/app/views.py - > Line 52: logStr = saltclient.ServerInfo() - File: SaltFlask/app/views.py - > Line 54: logStr = saltclient.ServerLog() - File: SaltFlask/app/views.py - > Line 56: logStr = saltclient.ServerCheck() - File: SaltFlask/app/views.py - > Line 40: logStr = '' - File: SaltFlask/app/views.py - > Line 43: logStr = 'server id:' + form.serverId.data + ' start' - File: SaltFlask/app/views.py - > Line 46: logStr = 'server id:' + form.serverId.data + ' close' -File: SaltFlask/app/views.py - > reaches line 58, trigger word "flash(": - flash(logStr) - -Vulnerability 5: -File: SaltFlask/app/views.py - > User input at line 50, trigger word ".data": - logStr = 'server id:' + form.serverId.data + ' time:' + timeStr -Reassigned in: - File: SaltFlask/app/views.py - > Line 40: logStr = '' - File: SaltFlask/app/views.py - > Line 43: logStr = 'server id:' + form.serverId.data + ' start' - File: SaltFlask/app/views.py - > Line 46: logStr = 'server id:' + form.serverId.data + ' close' - File: SaltFlask/app/views.py - > Line 52: logStr = saltclient.ServerInfo() - File: SaltFlask/app/views.py - > Line 54: logStr = saltclient.ServerLog() - File: SaltFlask/app/views.py - > Line 56: logStr = saltclient.ServerCheck() -File: SaltFlask/app/views.py - > reaches line 58, trigger word "flash(": - flash(logStr) - - - -achencoms/flask-template -https://github.com/achencoms/flask-template -Entry file: None -Scanned: 2016-10-20 13:16:24.403512 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/achencoms/flask-template. - -lindseyma/flask-template -https://github.com/lindseyma/flask-template -Entry file: None -Scanned: 2016-10-20 13:16:31.917182 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lindseyma/flask-template. - -babydeya/flask_web -https://github.com/babydeya/flask_web -Entry file: flask_web/helloflask.py -Scanned: 2016-10-20 13:16:32.505797 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py - -fengyunlsm/Flask-Blog -https://github.com/fengyunlsm/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-20 13:16:33.047515 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stephen679/learning_flask -https://github.com/stephen679/learning_flask -Entry file: learning_flask/flaskcard/flaskcard.py -Scanned: 2016-10-20 13:16:34.479388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kblumke/flask-tracking -https://github.com/kblumke/flask-tracking -Entry file: flask-tracking/app/__init__.py -Scanned: 2016-10-20 13:16:35.008462 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sm-azure/flask-api -https://github.com/sm-azure/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-20 13:16:35.524866 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -creamchoco3080/flask_practice -https://github.com/creamchoco3080/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-20 13:16:38.069421 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -agafonovdev/flask_template -https://github.com/agafonovdev/flask_template -Entry file: None -Scanned: 2016-10-20 13:16:39.568095 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/agafonovdev/flask_template. - -Chemoday/Flask-microblog -https://github.com/Chemoday/Flask-microblog -Entry file: None -Scanned: 2016-10-20 13:16:41.074106 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -markstory/flask-boomerang -https://github.com/markstory/flask-boomerang -Entry file: flask-boomerang/app.py -Scanned: 2016-10-20 13:16:43.445588 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rburgos240/flask-blog -https://github.com/rburgos240/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:16:43.990211 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -Karol-Regula/flask-template -https://github.com/Karol-Regula/flask-template -Entry file: None -Scanned: 2016-10-20 13:16:50.496600 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Karol-Regula/flask-template. - -carrbs/flask-tutorial -https://github.com/carrbs/flask-tutorial -Entry file: None -Scanned: 2016-10-20 13:16:57.486634 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sd16fall/Toolbox-Flask -https://github.com/sd16fall/Toolbox-Flask -Entry file: Toolbox-Flask/hello.py -Scanned: 2016-10-20 13:16:58.844464 -No vulnerabilities found. - - -noobbyte/flask-template -https://github.com/noobbyte/flask-template -Entry file: None -Scanned: 2016-10-20 13:16:59.358328 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/noobbyte/flask-template. - -Niklane/flask_tutorial -https://github.com/Niklane/flask_tutorial -Entry file: None -Scanned: 2016-10-20 13:17:00.864067 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -billywongstuy/Flask-Start -https://github.com/billywongstuy/Flask-Start -Entry file: Flask-Start/app.py -Scanned: 2016-10-20 13:17:09.291943 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Start/virtual/lib/python2.7/genericpath.py - -deveshaggrawal19/flask_project -https://github.com/deveshaggrawal19/flask_project -Entry file: flask_project/myflaskapp.py -Scanned: 2016-10-20 13:17:10.105443 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Zzcnick/hello_flask -https://github.com/Zzcnick/hello_flask -Entry file: hello_flask/Flask.py -Scanned: 2016-10-20 13:17:11.133251 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Einsteinish/akadrone-flask -https://github.com/Einsteinish/akadrone-flask -Entry file: akadrone-flask/aka.py -Scanned: 2016-10-20 13:17:24.245766 -No vulnerabilities found. - - -alex1x/flask-app -https://github.com/alex1x/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 13:17:24.770656 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jorujlu/flask_task -https://github.com/jorujlu/flask_task -Entry file: flask_task/gistapi/gistapi.py -Scanned: 2016-10-20 13:17:33.679478 -No vulnerabilities found. - - -jeffsui/flask_app -https://github.com/jeffsui/flask_app -Entry file: None -Scanned: 2016-10-20 13:17:34.298966 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jeffsui/flask_app. - -topleft/flask-blog -https://github.com/topleft/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:17:34.869500 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -SushisMakis/Flask-Firewall -https://github.com/SushisMakis/Flask-Firewall -Entry file: Flask-Firewall/flask-example.py -Scanned: 2016-10-20 13:17:36.197878 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Atheloses/Flask-Bones -https://github.com/Atheloses/Flask-Bones -Entry file: Flask-Bones/app/__init__.py -Scanned: 2016-10-20 13:17:42.260844 -Vulnerability 1: -File: Flask-Bones/app/auth/views.py - > User input at line 46, trigger word ".data": - group = Group.create(nazev=form.data['nazev']) -File: Flask-Bones/app/auth/views.py - > reaches line 48, trigger word "flash(": - flash(gettext('Group {name} created').format(name=group.nazev), 'success') - -Vulnerability 2: -File: Flask-Bones/app/auth/views.py - > User input at line 58, trigger word ".data": - firma = Firma.create(nazev=form.data['nazev'], state=form.data['state'], address=form.data['address'], phone_number=form.data['phone_number'], contact_person=form.data['contact_person'], website=form.data['website']) -File: Flask-Bones/app/auth/views.py - > reaches line 65, trigger word "flash(": - flash(gettext('Organization {name} created').format(name=firma.nazev), 'success') - -Vulnerability 3: -File: Flask-Bones/app/public/views.py - > User input at line 37, trigger word ".data": - user = User.create(username=form.data['username'], email=form.data['email'], password=form.data['password'], remote_addr=request.remote_addr, jmeno=form.data['jmeno'], prijmeni=form.data['prijmeni']) -Reassigned in: - File: Flask-Bones/app/public/views.py - > Line 47: token = s.dumps(user.id) -File: Flask-Bones/app/public/views.py - > reaches line 51, trigger word "flash(": - flash(gettext('Sent verification email to {email}').format(email=user.email), 'success') - - - -Brian-Lu/flask-template -https://github.com/Brian-Lu/flask-template -Entry file: None -Scanned: 2016-10-20 13:17:42.785983 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Brian-Lu/flask-template. - -billywongstuy/Flask-Twoo -https://github.com/billywongstuy/Flask-Twoo -Entry file: Flask-Twoo/app.py -Scanned: 2016-10-20 13:17:44.197401 -No vulnerabilities found. - - -sebastianCain/flask-template -https://github.com/sebastianCain/flask-template -Entry file: None -Scanned: 2016-10-20 13:17:45.218935 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sebastianCain/flask-template. - -KingOkay/flask-book -https://github.com/KingOkay/flask-book -Entry file: flask-book/app/__init__.py -Scanned: 2016-10-20 13:17:51.037913 -Vulnerability 1: -File: flask-book/app/auth/verify.py - > User input at line 64, trigger word "form(": - img = img.transform(size, Image.PERSPECTIVE, params) -Reassigned in: - File: flask-book/app/auth/verify.py - > Line 20: img = Image.new(mode, size, bg_color) - File: flask-book/app/auth/verify.py - > Line 21: draw = ImageDraw.Draw(img) - File: flask-book/app/auth/verify.py - > Line 68: ret_MAYBE_FUNCTION_NAME = (img, strs) -File: flask-book/app/auth/verify.py - > reaches line 66, trigger word "filter(": - img = img.filter(ImageFilter.EDGE_ENHANCE_MORE) - -Vulnerability 2: -File: flask-book/app/main/views.py - > User input at line 18, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, title='首页', books=books, order_books=order_books, types=types, books1=books1) -File: flask-book/app/main/views.py - > reaches line 19, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 3: -File: flask-book/app/main/views.py - > User input at line 18, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 24: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, title='首页', books=books, order_books=order_books, types=types, books1=books1) -File: flask-book/app/main/views.py - > reaches line 19, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 4: -File: flask-book/app/main/views.py - > User input at line 46, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id) -File: flask-book/app/main/views.py - > reaches line 47, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 5: -File: flask-book/app/main/views.py - > User input at line 46, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id) -File: flask-book/app/main/views.py - > reaches line 47, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 6: -File: flask-book/app/main/views.py - > User input at line 49, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 50: pagination = Book.query.filter_by(booktype_id=id).order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_BOOKSHOWS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 53: books = pagination.items - File: flask-book/app/main/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) -File: flask-book/app/main/views.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book-type.html',pagination=pagination, title='图书列表', types=types, books=books, form=form, id=id) - -Vulnerability 7: -File: flask-book/app/main/views.py - > User input at line 62, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999) -File: flask-book/app/main/views.py - > reaches line 63, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 8: -File: flask-book/app/main/views.py - > User input at line 62, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 70: ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999) -File: flask-book/app/main/views.py - > reaches line 63, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 9: -File: flask-book/app/main/views.py - > User input at line 65, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 66: pagination = Book.query.order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_BOOKSHOWS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 69: books = pagination.items - File: flask-book/app/main/views.py - > Line 63: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) -File: flask-book/app/main/views.py - > reaches line 70, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book-type-all.html',pagination=pagination, types=types, title='图书列表', books=books, form=form, active=999) - -Vulnerability 10: -File: flask-book/app/main/views.py - > User input at line 76, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 77: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 80: posts = pagination.items -File: flask-book/app/main/views.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('all-post.html',title='好书推荐', posts=posts, pagination=pagination) - -Vulnerability 11: -File: flask-book/app/main/views.py - > User input at line 97, trigger word ".data": - my_address = Address.query.filter_by(id=form.order_address.data).first() -Reassigned in: - File: flask-book/app/main/views.py - > Line 98: order_address = '详细地址: ' + my_address.area + my_address.detailed + ' 邮编: ' + str(my_address.zip_code) + ' 收货人: ' + my_address.name + ' 电话号码: ' + str(my_address.phone_number) - File: flask-book/app/main/views.py - > Line 101: order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1) - File: flask-book/app/main/views.py - > Line 107: a = float(order.amount) - File: flask-book/app/main/views.py - > Line 109: order.price = a * b - File: flask-book/app/main/views.py - > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address) -File: flask-book/app/main/views.py - > reaches line 112, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id)) - -Vulnerability 12: -File: flask-book/app/main/views.py - > User input at line 101, trigger word ".data": - order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1) -Reassigned in: - File: flask-book/app/main/views.py - > Line 107: a = float(order.amount) - File: flask-book/app/main/views.py - > Line 109: order.price = a * b - File: flask-book/app/main/views.py - > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address) -File: flask-book/app/main/views.py - > reaches line 112, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id)) - -Vulnerability 13: -File: flask-book/app/main/views.py - > User input at line 97, trigger word ".data": - my_address = Address.query.filter_by(id=form.order_address.data).first() -Reassigned in: - File: flask-book/app/main/views.py - > Line 98: order_address = '详细地址: ' + my_address.area + my_address.detailed + ' 邮编: ' + str(my_address.zip_code) + ' 收货人: ' + my_address.name + ' 电话号码: ' + str(my_address.phone_number) - File: flask-book/app/main/views.py - > Line 101: order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1) - File: flask-book/app/main/views.py - > Line 107: a = float(order.amount) - File: flask-book/app/main/views.py - > Line 109: order.price = a * b - File: flask-book/app/main/views.py - > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address) -File: flask-book/app/main/views.py - > reaches line 112, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id)) - -Vulnerability 14: -File: flask-book/app/main/views.py - > User input at line 101, trigger word ".data": - order = Order(amount=form.amount.data, author_id=current_user.id, book=book, address=order_address, order_number=order_number, status_id=1) -Reassigned in: - File: flask-book/app/main/views.py - > Line 107: a = float(order.amount) - File: flask-book/app/main/views.py - > Line 109: order.price = a * b - File: flask-book/app/main/views.py - > Line 113: ret_MAYBE_FUNCTION_NAME = render_template('place-order.html',book=book, form=form, title='提交订单', query_address=query_address) -File: flask-book/app/main/views.py - > reaches line 112, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.buy_ok',id=order.id)) - -Vulnerability 15: -File: flask-book/app/main/views.py - > User input at line 168, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 170: page = book.bookcos.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask-book/app/main/views.py - > Line 172: pagination = book.bookcos.order_by(BookCo.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 175: comments = pagination.items -File: flask-book/app/main/views.py - > reaches line 176, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book.html',book=book, title=book.name, comments=comments, pagination=pagination) - -Vulnerability 16: -File: flask-book/app/main/views.py - > User input at line 275, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 276: pagination = Order.query.filter_by(author_id=current_user.id).order_by(Order.order_time.desc()).paginate(page,per_page=current_app.config['FLASKY_ORDERS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 279: orders = pagination.items -File: flask-book/app/main/views.py - > reaches line 280, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('my-order.html',orders=orders, title='我的订单', pagination=pagination) - -Vulnerability 17: -File: flask-book/app/main/views.py - > User input at line 297, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form) -File: flask-book/app/main/views.py - > reaches line 298, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 18: -File: flask-book/app/main/views.py - > User input at line 297, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form) -File: flask-book/app/main/views.py - > reaches line 298, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.search',str=str)) - -Vulnerability 19: -File: flask-book/app/main/views.py - > User input at line 297, trigger word ".data": - str = form.str.data -Reassigned in: - File: flask-book/app/main/views.py - > Line 300: ret_MAYBE_FUNCTION_NAME = render_template('search.html',books=books, title='搜索结果', form=form) -File: flask-book/app/main/views.py - > reaches line 299, trigger word "filter(": - books = Book.query.filter(Book.name.like('%' + str + '%')) - -Vulnerability 20: -File: flask-book/app/main/views.py - > User input at line 309, trigger word ".data": - post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object()) -Reassigned in: - File: flask-book/app/main/views.py - > Line 315: ret_MAYBE_FUNCTION_NAME = render_template('create_post.html',form=form, title='创建新文章') -File: flask-book/app/main/views.py - > reaches line 314, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id)) - -Vulnerability 21: -File: flask-book/app/main/views.py - > User input at line 309, trigger word ".data": - post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object()) -Reassigned in: - File: flask-book/app/main/views.py - > Line 315: ret_MAYBE_FUNCTION_NAME = render_template('create_post.html',form=form, title='创建新文章') -File: flask-book/app/main/views.py - > reaches line 314, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id)) - -Vulnerability 22: -File: flask-book/app/main/views.py - > User input at line 340, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 342: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask-book/app/main/views.py - > Line 344: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 347: comments = pagination.items - File: flask-book/app/main/views.py - > Line 339: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=1)) -File: flask-book/app/main/views.py - > reaches line 348, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], title='文章内容', form=form, comments=comments, pagination=pagination) - -Vulnerability 23: -File: flask-book/app/main/views.py - > User input at line 358, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/main/views.py - > Line 359: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-book/app/main/views.py - > Line 362: posts = pagination.items -File: flask-book/app/main/views.py - > reaches line 363, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination, title='我的资料') - -Vulnerability 24: -File: flask-book/app/admin/views.py - > User input at line 29, trigger word ".data": - book = Book(name=form.name.data, author=form.author.data, price=form.price.data, isbn=form.isbn.data, press=form.press.data, booktype_id=form.type.data, words=form.words.data, des=form.des.data, page_numbers=form.page_numbers.data) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('admin/add-book.html',form=form, title='添加图书') -File: flask-book/app/admin/views.py - > reaches line 46, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.book',id=book.id)) - -Vulnerability 25: -File: flask-book/app/admin/views.py - > User input at line 29, trigger word ".data": - book = Book(name=form.name.data, author=form.author.data, price=form.price.data, isbn=form.isbn.data, press=form.press.data, booktype_id=form.type.data, words=form.words.data, des=form.des.data, page_numbers=form.page_numbers.data) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = render_template('admin/add-book.html',form=form, title='添加图书') -File: flask-book/app/admin/views.py - > reaches line 46, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.book',id=book.id)) - -Vulnerability 26: -File: flask-book/app/admin/views.py - > User input at line 98, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 99: pagination = Book.query.order_by(Book.id.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False) - File: flask-book/app/admin/views.py - > Line 102: book_lists = pagination.items -File: flask-book/app/admin/views.py - > reaches line 103, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/book-list.html',title='图书列表', pagination=pagination, book_lists=book_lists) - -Vulnerability 27: -File: flask-book/app/admin/views.py - > User input at line 111, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 112: pagination = User.query.order_by(User.member_since.desc()).paginate(page,per_page=current_app.config['FLASKY_USERLISTS_PER_PAGE'], error_out=False) - File: flask-book/app/admin/views.py - > Line 115: user_lists = pagination.items -File: flask-book/app/admin/views.py - > reaches line 116, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/user-list.html',title='用户列表', user_lists=user_lists, pagination=pagination) - -Vulnerability 28: -File: flask-book/app/admin/views.py - > User input at line 164, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 165: pagination = Order.query.order_by(Order.order_time.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-book/app/admin/views.py - > Line 168: orders = pagination.items -File: flask-book/app/admin/views.py - > reaches line 169, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/order-list.html',orders=orders, pagination=pagination, page=page, title='订单处理') - -Vulnerability 29: -File: flask-book/app/admin/views.py - > User input at line 188, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-book/app/admin/views.py - > Line 189: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-book/app/admin/views.py - > Line 192: comments = pagination.items -File: flask-book/app/admin/views.py - > reaches line 193, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('admin/moderate.html',comments=comments, pagination=pagination, page=page, title='评论管理') - - - -zouliuyun/devops_flask -https://github.com/zouliuyun/devops_flask -Entry file: devops_flask/devops/api/__init__.py -Scanned: 2016-10-20 13:17:59.176728 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rburgos240/hello-flask -https://github.com/rburgos240/hello-flask -Entry file: hello-flask/app.py -Scanned: 2016-10-20 13:17:59.764193 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: hello-flask/venv/lib/python2.7/genericpath.py - -vonvick/learning-flask -https://github.com/vonvick/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 13:18:00.316931 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Wooden-Robot/flask-blog -https://github.com/Wooden-Robot/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:18:00.868895 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -RichardzWang/flask-template -https://github.com/RichardzWang/flask-template -Entry file: None -Scanned: 2016-10-20 13:18:01.394827 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/RichardzWang/flask-template. - -yawata159/flask-template -https://github.com/yawata159/flask-template -Entry file: None -Scanned: 2016-10-20 13:18:01.899958 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yawata159/flask-template. - -kelly3649/Flask-Template -https://github.com/kelly3649/Flask-Template -Entry file: Flask-Template/appHW.py -Scanned: 2016-10-20 13:18:03.723121 -No vulnerabilities found. - - -tvenis/flask_app -https://github.com/tvenis/flask_app -Entry file: None -Scanned: 2016-10-20 13:18:04.223856 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tvenis/flask_app. - -caipfei/blog_flask -https://github.com/caipfei/blog_flask -Entry file: None -Scanned: 2016-10-20 13:18:04.754393 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/caipfei/blog_flask. - -vitaliylevitskiand/wordsplay_flask -https://github.com/vitaliylevitskiand/wordsplay_flask -Entry file: wordsplay_flask/wordsplay_flask.py -Scanned: 2016-10-20 13:18:08.345604 -No vulnerabilities found. - - -joshparrish/docker-flask -https://github.com/joshparrish/docker-flask -Entry file: None -Scanned: 2016-10-20 13:18:08.867590 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/joshparrish/docker-flask. - -Alexanderklau/Flask-Blog -https://github.com/Alexanderklau/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-20 13:18:09.395439 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jschluger/Flask_Occupations -https://github.com/jschluger/Flask_Occupations -Entry file: Flask_Occupations/app.py -Scanned: 2016-10-20 13:18:10.839471 -No vulnerabilities found. - - -lgarces/flask_app -https://github.com/lgarces/flask_app -Entry file: None -Scanned: 2016-10-20 13:18:11.340797 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lgarces/flask_app. - -Horla74/Flask-blog -https://github.com/Horla74/Flask-blog -Entry file: Flask-blog/app/__init__.py -Scanned: 2016-10-20 13:18:11.849593 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cuttlesoft/flask-workshop -https://github.com/cuttlesoft/flask-workshop -Entry file: flask-workshop/hello_world/hello.py -Scanned: 2016-10-20 13:18:13.755392 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulVudutala/flask -https://github.com/rahulVudutala/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:18:14.343414 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -jesusalatorre/Flask -https://github.com/jesusalatorre/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:18:24.906139 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mod2695/flask -https://github.com/mod2695/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:18:25.535544 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -yueqingwang/flask -https://github.com/yueqingwang/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:18:35.140389 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -tcyfs/flask -https://github.com/tcyfs/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:18:35.714274 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -lastone9182/flask -https://github.com/lastone9182/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:18:36.304936 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -sakuuat/Flask -https://github.com/sakuuat/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:18:36.809014 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -hit9/flask-idempotent2 -https://github.com/hit9/flask-idempotent2 -Entry file: flask-idempotent2/flask_idempotent2.py -Scanned: 2016-10-20 13:18:44.285604 -No vulnerabilities found. - - -AminHP/flask-mvc -https://github.com/AminHP/flask-mvc -Entry file: flask-mvc/project/application.py -Scanned: 2016-10-20 13:18:45.286225 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -juli1/flaskyelp -https://github.com/juli1/flaskyelp -Entry file: None -Scanned: 2016-10-20 13:18:46.702380 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/juli1/flaskyelp. - -SchmidtWong/flaskr -https://github.com/SchmidtWong/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:18:47.216624 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ChrisDBrooks/flaskbyexample -https://github.com/ChrisDBrooks/flaskbyexample -Entry file: flaskbyexample/hello.py -Scanned: 2016-10-20 13:18:52.534512 -No vulnerabilities found. - - -mkykadir/flaskrofficialtut -https://github.com/mkykadir/flaskrofficialtut -Entry file: flaskrofficialtut/flaskr.py -Scanned: 2016-10-20 13:19:00.828821 -No vulnerabilities found. - - -rbunch-dc/flasksql -https://github.com/rbunch-dc/flasksql -Entry file: flasksql/flaskMysql.py -Scanned: 2016-10-20 13:19:07.925789 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yorolifarg/flasksample -https://github.com/yorolifarg/flasksample -Entry file: flasksample/chapter2/app.py -Scanned: 2016-10-20 13:19:08.521456 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cirocfc/flaskapi -https://github.com/cirocfc/flaskapi -Entry file: flaskapi/aydaapi3.py -Scanned: 2016-10-20 13:19:09.188230 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapi/flaskenv/lib/python2.7/genericpath.py - -Arlus/flasktest -https://github.com/Arlus/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 13:19:09.733855 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Githuberzhang/flaskdemo -https://github.com/Githuberzhang/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 13:19:10.247881 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -cagdasgerede/flaskdemo -https://github.com/cagdasgerede/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 13:19:10.756145 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -TaiyuanHot/Flaskr -https://github.com/TaiyuanHot/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-20 13:19:11.269437 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ouguangqian/flasklearn -https://github.com/ouguangqian/flasklearn -Entry file: flasklearn/flasklearn.py -Scanned: 2016-10-20 13:19:11.842659 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tsicroxe/flaskprojects -https://github.com/tsicroxe/flaskprojects -Entry file: flaskprojects/greatNumberGame/server.py -Scanned: 2016-10-20 13:19:20.331154 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Saksham9Thakur/flask1 -https://github.com/Saksham9Thakur/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-20 13:19:20.951663 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -joserferreyra/FlaskApp -https://github.com/joserferreyra/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 13:19:21.524624 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -topher91/FlaskTutorial -https://github.com/topher91/FlaskTutorial -Entry file: None -Scanned: 2016-10-20 13:19:22.510165 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hal0eye/FlaskWeb -https://github.com/hal0eye/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-20 13:19:23.106004 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -rschmidtz/flaskRestaurant -https://github.com/rschmidtz/flaskRestaurant -Entry file: flaskRestaurant/project2.py -Scanned: 2016-10-20 13:19:24.883167 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JFreyra/FlaskLogin -https://github.com/JFreyra/FlaskLogin -Entry file: FlaskLogin/app.py -Scanned: 2016-10-20 13:19:26.201917 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -soulerforgit/FlaskWeb -https://github.com/soulerforgit/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-20 13:19:26.792364 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venu/lib/python2.7/genericpath.py - -paigen11/flask101 -https://github.com/paigen11/flask101 -Entry file: flask101/hello.py -Scanned: 2016-10-20 13:19:27.320701 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Edisontom/flaskBlog -https://github.com/Edisontom/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-20 13:19:27.930051 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py - -codingPingjun/FlaskDemo -https://github.com/codingPingjun/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 13:19:35.439113 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -giladsh1/flaskTest -https://github.com/giladsh1/flaskTest -Entry file: flaskTest/url.py -Scanned: 2016-10-20 13:19:35.961956 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PirieD704/flask101 -https://github.com/PirieD704/flask101 -Entry file: flask101/hello.py -Scanned: 2016-10-20 13:19:36.473565 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jkaberg/tvhProxy -https://github.com/jkaberg/tvhProxy -Entry file: tvhProxy/tvhProxy.py -Scanned: 2016-10-20 13:19:37.917796 -No vulnerabilities found. - - -fengyunlsm/Flask-Blog -https://github.com/fengyunlsm/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-20 13:19:43.511955 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jttwnsnd/flask_example -https://github.com/jttwnsnd/flask_example -Entry file: None -Scanned: 2016-10-20 13:19:45.052867 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -max-l-weaver/flask_microblog -https://github.com/max-l-weaver/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-20 13:19:45.573566 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tangzhiyi11/flask_blog -https://github.com/tangzhiyi11/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 13:19:46.070058 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -imhuwq/read_flask -https://github.com/imhuwq/read_flask -Entry file: read_flask/app/__init__.py -Scanned: 2016-10-20 13:19:48.446263 -Vulnerability 1: -File: read_flask/app/__init__.py - > User input at line 18, trigger word "get(": - msg = request.args.get('msg', 'Hello Flask') -File: read_flask/app/__init__.py - > reaches line 19, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('msg'msg) - -Vulnerability 2: -File: read_flask/app/__init__.py - > User input at line 27, trigger word "get(": - name = session.get('user', 'stranger') -File: read_flask/app/__init__.py - > reaches line 28, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('greeting''Hello %s' % name) - -Vulnerability 3: -File: read_flask/app/__init__.py - > User input at line 40, trigger word "get(": - user = session.get('user') -Reassigned in: - File: read_flask/app/__init__.py - > Line 46: user = users.get(uid, None) -File: read_flask/app/__init__.py - > reaches line 42, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user)) - -Vulnerability 4: -File: read_flask/app/__init__.py - > User input at line 43, trigger word "get(": - uid = request.form.get('uid') -Reassigned in: - File: read_flask/app/__init__.py - > Line 46: user = users.get(uid, None) - File: read_flask/app/__init__.py - > Line 40: user = session.get('user') -File: read_flask/app/__init__.py - > reaches line 42, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user)) - -Vulnerability 5: -File: read_flask/app/__init__.py - > User input at line 46, trigger word "get(": - user = users.get(uid, None) -Reassigned in: - File: read_flask/app/__init__.py - > Line 40: user = session.get('user') -File: read_flask/app/__init__.py - > reaches line 42, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user)) - -Vulnerability 6: -File: read_flask/app/__init__.py - > User input at line 40, trigger word "get(": - user = session.get('user') -Reassigned in: - File: read_flask/app/__init__.py - > Line 46: user = users.get(uid, None) -File: read_flask/app/__init__.py - > reaches line 42, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user)) - -Vulnerability 7: -File: read_flask/app/__init__.py - > User input at line 43, trigger word "get(": - uid = request.form.get('uid') -Reassigned in: - File: read_flask/app/__init__.py - > Line 46: user = users.get(uid, None) - File: read_flask/app/__init__.py - > Line 40: user = session.get('user') -File: read_flask/app/__init__.py - > reaches line 42, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user)) - -Vulnerability 8: -File: read_flask/app/__init__.py - > User input at line 46, trigger word "get(": - user = users.get(uid, None) -Reassigned in: - File: read_flask/app/__init__.py - > Line 40: user = session.get('user') -File: read_flask/app/__init__.py - > reaches line 42, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user.index',name=user)) - -Vulnerability 9: -File: read_flask/app/__init__.py - > User input at line 40, trigger word "get(": - user = session.get('user') -Reassigned in: - File: read_flask/app/__init__.py - > Line 46: user = users.get(uid, None) -File: read_flask/app/__init__.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('msg''hello %s' % user.get('name')) - -Vulnerability 10: -File: read_flask/app/__init__.py - > User input at line 43, trigger word "get(": - uid = request.form.get('uid') -Reassigned in: - File: read_flask/app/__init__.py - > Line 46: user = users.get(uid, None) - File: read_flask/app/__init__.py - > Line 40: user = session.get('user') -File: read_flask/app/__init__.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('msg''hello %s' % user.get('name')) - -Vulnerability 11: -File: read_flask/app/__init__.py - > User input at line 46, trigger word "get(": - user = users.get(uid, None) -Reassigned in: - File: read_flask/app/__init__.py - > Line 40: user = session.get('user') -File: read_flask/app/__init__.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('msg''hello %s' % user.get('name')) - - - -lawliet89/flask-redirector -https://github.com/lawliet89/flask-redirector -Entry file: flask-redirector/redirector/app.py -Scanned: 2016-10-20 13:19:52.906200 -No vulnerabilities found. - - -jonathan-kosgei/flask-rq -https://github.com/jonathan-kosgei/flask-rq -Entry file: flask-rq/app.py -Scanned: 2016-10-20 13:20:01.206360 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -huazhicai/flask-blog -https://github.com/huazhicai/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:20:01.764322 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -tpapic/flask-login -https://github.com/tpapic/flask-login -Entry file: flask-login/yan.py -Scanned: 2016-10-20 13:20:09.365582 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lcfyuen/RPiFlask -https://github.com/lcfyuen/RPiFlask -Entry file: RPiFlask/main.py -Scanned: 2016-10-20 13:20:09.893837 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -getDolla/flask-login -https://github.com/getDolla/flask-login -Entry file: flask-login/yan.py -Scanned: 2016-10-20 13:20:10.489464 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -citaret/flask-intro -https://github.com/citaret/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 13:20:10.993388 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sm-azure/flask-api -https://github.com/sm-azure/flask-api -Entry file: flask-api/sports.py -Scanned: 2016-10-20 13:20:11.498166 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brennv/flask-app -https://github.com/brennv/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 13:20:11.997395 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stw1/python_flask -https://github.com/stw1/python_flask -Entry file: None -Scanned: 2016-10-20 13:20:12.512296 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/stw1/python_flask. - -billywongstuy/Login-Flask -https://github.com/billywongstuy/Login-Flask -Entry file: Login-Flask/app.py -Scanned: 2016-10-20 13:20:13.953678 -No vulnerabilities found. - - -Horla74/Flask-bbs -https://github.com/Horla74/Flask-bbs -Entry file: Flask-bbs/app.py -Scanned: 2016-10-20 13:20:22.904720 -Vulnerability 1: -File: Flask-bbs/routes/comment.py - > User input at line 34, trigger word "get(": - article_id = form.get('article_id', '') -Reassigned in: - File: Flask-bbs/routes/comment.py - > Line 35: m.num = get_num(article_id) -File: Flask-bbs/routes/comment.py - > reaches line 37, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id)) - -Vulnerability 2: -File: Flask-bbs/routes/comment.py - > User input at line 34, trigger word "get(": - article_id = form.get('article_id', '') -Reassigned in: - File: Flask-bbs/routes/comment.py - > Line 35: m.num = get_num(article_id) -File: Flask-bbs/routes/comment.py - > reaches line 37, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id)) - -Vulnerability 3: -File: Flask-bbs/routes/comment.py - > User input at line 43, trigger word "get(": - t = Model.query.get(id) -Reassigned in: - File: Flask-bbs/routes/comment.py - > Line 45: article_id = t.article.id -File: Flask-bbs/routes/comment.py - > reaches line 46, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id)) - -Vulnerability 4: -File: Flask-bbs/routes/comment.py - > User input at line 43, trigger word "get(": - t = Model.query.get(id) -Reassigned in: - File: Flask-bbs/routes/comment.py - > Line 45: article_id = t.article.id -File: Flask-bbs/routes/comment.py - > reaches line 46, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id)) - -Vulnerability 5: -File: Flask-bbs/routes/comment.py - > User input at line 51, trigger word "get(": - t = Model.query.get(id) -Reassigned in: - File: Flask-bbs/routes/comment.py - > Line 52: article_id = t.article.id -File: Flask-bbs/routes/comment.py - > reaches line 54, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id)) - -Vulnerability 6: -File: Flask-bbs/routes/comment.py - > User input at line 51, trigger word "get(": - t = Model.query.get(id) -Reassigned in: - File: Flask-bbs/routes/comment.py - > Line 52: article_id = t.article.id -File: Flask-bbs/routes/comment.py - > reaches line 54, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article.show',id=article_id)) - - - -marlon407/flask-rest -https://github.com/marlon407/flask-rest -Entry file: flask-rest/haystack/core.py -Scanned: 2016-10-20 13:20:23.907763 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -shihuibei/flask-project -https://github.com/shihuibei/flask-project -Entry file: flask-project/flask/lib/python3.5/site-packages/flask_openid.py -Scanned: 2016-10-20 13:20:31.700327 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -ethan-funny/flask-demos -https://github.com/ethan-funny/flask-demos -Entry file: flask-demos/application/app.py -Scanned: 2016-10-20 13:20:33.184014 -No vulnerabilities found. - - -HedleyPty/learning-flask -https://github.com/HedleyPty/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 13:20:33.770675 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alex1x/flask-app -https://github.com/alex1x/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-20 13:20:34.273896 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lilharry/occupation_flask -https://github.com/lilharry/occupation_flask -Entry file: occupation_flask/fp.py -Scanned: 2016-10-20 13:20:35.602524 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jeffsui/flask_app -https://github.com/jeffsui/flask_app -Entry file: None -Scanned: 2016-10-20 13:20:36.116254 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jeffsui/flask_app. - -SushisMakis/Flask-Firewall -https://github.com/SushisMakis/Flask-Firewall -Entry file: Flask-Firewall/flask-example.py -Scanned: 2016-10-20 13:20:36.638680 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ssepehrnoush/Learning-Flask -https://github.com/ssepehrnoush/Learning-Flask -Entry file: Learning-Flask/routes.py -Scanned: 2016-10-20 13:20:44.313751 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -igortmb/flask_blog -https://github.com/igortmb/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 13:20:44.845401 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -fleeby/flask_tutorial -https://github.com/fleeby/flask_tutorial -Entry file: None -Scanned: 2016-10-20 13:20:45.368544 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SwartzCr/flask_app -https://github.com/SwartzCr/flask_app -Entry file: None -Scanned: 2016-10-20 13:20:45.881035 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SwartzCr/flask_app. - -lunemec/flask_twitter -https://github.com/lunemec/flask_twitter -Entry file: flask_twitter/twitter/__main__.py -Scanned: 2016-10-20 13:20:47.223609 -No vulnerabilities found. - - -uehara1414/flask-heroku -https://github.com/uehara1414/flask-heroku -Entry file: flask-heroku/app.py -Scanned: 2016-10-20 13:20:48.568346 -No vulnerabilities found. - - -AnumSheraz/test_flask -https://github.com/AnumSheraz/test_flask -Entry file: test_flask/init.py -Scanned: 2016-10-20 13:20:49.894336 -No vulnerabilities found. - - -eladitzhakian/flask-boilerplate -https://github.com/eladitzhakian/flask-boilerplate -Entry file: None -Scanned: 2016-10-20 13:20:50.434625 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/eladitzhakian/flask-boilerplate. - -zouliuyun/devops_flask -https://github.com/zouliuyun/devops_flask -Entry file: devops_flask/devops/api/__init__.py -Scanned: 2016-10-20 13:20:52.442293 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -drvc57/learning-flask -https://github.com/drvc57/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 13:21:01.020510 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bharris62/flask-blog -https://github.com/bharris62/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:21:02.586468 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -midoribaka/flask-board -https://github.com/midoribaka/flask-board -Entry file: flask-board/app/__init__.py -Scanned: 2016-10-20 13:21:10.926282 -No vulnerabilities found. - - -joshparrish/docker-flask -https://github.com/joshparrish/docker-flask -Entry file: None -Scanned: 2016-10-20 13:21:11.443332 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/joshparrish/docker-flask. - -blacktrub/test_flask -https://github.com/blacktrub/test_flask -Entry file: test_flask/test_run.py -Scanned: 2016-10-20 13:21:12.847761 -No vulnerabilities found. - - -whittlbc/flask-boiler -https://github.com/whittlbc/flask-boiler -Entry file: None -Scanned: 2016-10-20 13:21:13.360880 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zhengxit/flask_web -https://github.com/zhengxit/flask_web -Entry file: flask_web/helloflask.py -Scanned: 2016-10-20 13:21:13.958511 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_web/lib/python2.7/genericpath.py - -clivegross/flask-usermgr -https://github.com/clivegross/flask-usermgr -Entry file: flask-usermgr/app/__init__.py -Scanned: 2016-10-20 13:21:22.275207 -Vulnerability 1: -File: flask-usermgr/app/module_auth/controllers.py - > User input at line 19, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-usermgr/app/module_auth/controllers.py - > Line 21: session['user_id'] = user.id -File: flask-usermgr/app/module_auth/controllers.py - > reaches line 22, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -williamcabrera4/docker-flask -https://github.com/williamcabrera4/docker-flask -Entry file: None -Scanned: 2016-10-20 13:21:22.845918 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/williamcabrera4/docker-flask. - -Zzcnick/flask_forms -https://github.com/Zzcnick/flask_forms -Entry file: flask_forms/flask_app/app.py -Scanned: 2016-10-20 13:21:24.286733 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garydai/flask_vpnserver -https://github.com/garydai/flask_vpnserver -Entry file: flask_vpnserver/start.py -Scanned: 2016-10-20 13:21:25.605922 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kelly3649/04_flask -https://github.com/kelly3649/04_flask -Entry file: 04_flask/appHW.py -Scanned: 2016-10-20 13:21:27.000548 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yhzhan/login_flask -https://github.com/yhzhan/login_flask -Entry file: login_flask/app.py -Scanned: 2016-10-20 13:21:28.297942 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ogal7/flask_login -https://github.com/ogal7/flask_login -Entry file: None -Scanned: 2016-10-20 13:21:28.813802 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ogal7/flask_login. - -axiaoxin/flask-demo -https://github.com/axiaoxin/flask-demo -Entry file: None -Scanned: 2016-10-20 13:21:32.334662 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/axiaoxin/flask-demo. - -hmdfsn/test_flask -https://github.com/hmdfsn/test_flask -Entry file: test_flask/setup.py -Scanned: 2016-10-20 13:21:42.392969 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ilyinon/flask_test -https://github.com/ilyinon/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 13:21:42.972318 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -xxiaoxiao/flask_practice -https://github.com/xxiaoxiao/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-20 13:21:43.494318 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -qimiaoxue/flask_todo -https://github.com/qimiaoxue/flask_todo -Entry file: None -Scanned: 2016-10-20 13:21:44.000210 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gaotongfei/flask_tutorial -https://github.com/gaotongfei/flask_tutorial -Entry file: None -Scanned: 2016-10-20 13:21:44.529767 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sp0rkie/flask-framework -https://github.com/sp0rkie/flask-framework -Entry file: flask-framework/app/__init__.py -Scanned: 2016-10-20 13:21:46.360093 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -boddumanohar/Flask-tdd -https://github.com/boddumanohar/Flask-tdd -Entry file: Flask-tdd/app.py -Scanned: 2016-10-20 13:21:47.694046 -No vulnerabilities found. - - -fpgentil/flask-learning -https://github.com/fpgentil/flask-learning -Entry file: flask-learning/app.py -Scanned: 2016-10-20 13:21:54.796956 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-learning/venv/lib/python2.7/genericpath.py - -volneyrock/ProjFlask -https://github.com/volneyrock/ProjFlask -Entry file: ProjFlask/app/__init__.py -Scanned: 2016-10-20 13:21:56.123848 -No vulnerabilities found. - - -jschluger/Flask_Login -https://github.com/jschluger/Flask_Login -Entry file: Flask_Login/app.py -Scanned: 2016-10-20 13:21:57.524381 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rahulVudutala/flask -https://github.com/rahulVudutala/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:21:59.430479 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -sanie4eg/Flask -https://github.com/sanie4eg/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:21:59.940540 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -skraiman/flask -https://github.com/skraiman/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:22:00.520476 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -g00302826/Flask -https://github.com/g00302826/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:22:01.030558 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rdeeds/flask -https://github.com/rdeeds/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:22:02.575929 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -rionagreally/Flask -https://github.com/rionagreally/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:22:11.111813 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -konwan/flask -https://github.com/konwan/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:22:11.646425 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -arcVyas/flask -https://github.com/arcVyas/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:22:12.199769 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -VishnuArukat/flask -https://github.com/VishnuArukat/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:22:13.787535 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -lk-geimfari/flask_church -https://github.com/lk-geimfari/flask_church -Entry file: flask_church/example.py -Scanned: 2016-10-20 13:22:15.522191 -No vulnerabilities found. - - -padznich/_flask -https://github.com/padznich/_flask -Entry file: _flask/proj_3_Sijax/start.py -Scanned: 2016-10-20 13:22:16.984473 -No vulnerabilities found. - - -rofrano/nyu-lab-restful-flask -https://github.com/rofrano/nyu-lab-restful-flask -Entry file: nyu-lab-restful-flask/server.py -Scanned: 2016-10-20 13:22:24.457830 -No vulnerabilities found. - - -sharath1231/flaskpythonapp -https://github.com/sharath1231/flaskpythonapp -Entry file: flaskpythonapp/routes.py -Scanned: 2016-10-20 13:22:26.976033 -No vulnerabilities found. - - -SchmidtWong/flaskr -https://github.com/SchmidtWong/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:22:27.487485 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mwoo99/flasktemplate -https://github.com/mwoo99/flasktemplate -Entry file: flasktemplate/flask_template.py -Scanned: 2016-10-20 13:22:28.777401 -No vulnerabilities found. - - -ChrisDBrooks/flaskbyexample -https://github.com/ChrisDBrooks/flaskbyexample -Entry file: flaskbyexample/hello.py -Scanned: 2016-10-20 13:22:30.250232 -No vulnerabilities found. - - -smancebo/flasktest -https://github.com/smancebo/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 13:22:30.787100 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cagdasgerede/flaskdemo -https://github.com/cagdasgerede/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 13:22:33.304614 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -timabe/flasky -https://github.com/timabe/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:22:34.826952 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -melmandd/flaskr -https://github.com/melmandd/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:22:43.337513 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -AlexAerow/flasktest -https://github.com/AlexAerow/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 13:22:43.877285 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -downtownhub/flaskapp -https://github.com/downtownhub/flaskapp -Entry file: None -Scanned: 2016-10-20 13:22:44.408970 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/downtownhub/flaskapp. - -ouguangqian/flasklearn -https://github.com/ouguangqian/flasklearn -Entry file: flasklearn/flasklearn.py -Scanned: 2016-10-20 13:22:44.932153 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mabbie/flasky -https://github.com/mabbie/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:22:45.428905 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paulmoliva/flaskr -https://github.com/paulmoliva/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:22:45.951787 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -proxyroot/flaskit -https://github.com/proxyroot/flaskit -Entry file: flaskit/__init__.py -Scanned: 2016-10-20 13:22:48.284724 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SwartzCr/flaskr -https://github.com/SwartzCr/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:22:48.803220 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lisaheff95/flask1 -https://github.com/lisaheff95/flask1 -Entry file: flask1/fl.py -Scanned: 2016-10-20 13:22:56.971766 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask1/env34/lib/python3.4/struct.py - -willieaugustine/FlaskApp -https://github.com/willieaugustine/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 13:22:58.567233 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -matsuh/FlaskSample -https://github.com/matsuh/FlaskSample -Entry file: FlaskSample/flask03.py -Scanned: 2016-10-20 13:23:00.890914 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JFreyra/FlaskLogin -https://github.com/JFreyra/FlaskLogin -Entry file: FlaskLogin/app.py -Scanned: 2016-10-20 13:23:01.400200 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ogilhinn/flaskTest -https://github.com/ogilhinn/flaskTest -Entry file: flaskTest/url.py -Scanned: 2016-10-20 13:23:01.922594 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -scottfabini/flaskApp -https://github.com/scottfabini/flaskApp -Entry file: flaskApp/apiApp_new.py -Scanned: 2016-10-20 13:23:02.442332 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ricardomart/FlaskApp -https://github.com/ricardomart/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-20 13:23:03.017769 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -chiawen82/flaskFirst -https://github.com/chiawen82/flaskFirst -Entry file: None -Scanned: 2016-10-20 13:23:19.215150 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -meledir/flaskBlog -https://github.com/meledir/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-20 13:23:19.801312 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/genericpath.py - -lcfyuen/RPiFlask -https://github.com/lcfyuen/RPiFlask -Entry file: RPiFlask/main.py -Scanned: 2016-10-20 13:23:20.304755 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -sasham43/flask-test -https://github.com/sasham43/flask-test -Entry file: flask-test/FlaskApp/__init__.py -Scanned: 2016-10-20 13:23:20.868488 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/FlaskApp/venv/lib/python2.7/genericpath.py - -mickengland/vagrant-flask -https://github.com/mickengland/vagrant-flask -Entry file: vagrant-flask/api.py -Scanned: 2016-10-20 13:23:22.209786 -No vulnerabilities found. - - -citaret/flask-intro -https://github.com/citaret/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 13:23:22.717679 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -elderjoe/rest_flask -https://github.com/elderjoe/rest_flask -Entry file: rest_flask/api/__init__.py -Scanned: 2016-10-20 13:23:24.237353 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -manassolanki/ProjectFlask -https://github.com/manassolanki/ProjectFlask -Entry file: ProjectFlask/project.py -Scanned: 2016-10-20 13:23:30.838552 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Parlefan/flask-blog -https://github.com/Parlefan/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:23:31.387692 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -bamboo-yujiro/my_flask -https://github.com/bamboo-yujiro/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-20 13:23:32.093427 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -igortmb/flask_blog -https://github.com/igortmb/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 13:23:32.610253 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lunemec/flask_twitter -https://github.com/lunemec/flask_twitter -Entry file: flask_twitter/twitter/__main__.py -Scanned: 2016-10-20 13:23:33.955698 -No vulnerabilities found. - - -uehara1414/flask-heroku -https://github.com/uehara1414/flask-heroku -Entry file: flask-heroku/app.py -Scanned: 2016-10-20 13:23:35.261480 -No vulnerabilities found. - - -AnumSheraz/test_flask -https://github.com/AnumSheraz/test_flask -Entry file: test_flask/setup.py -Scanned: 2016-10-20 13:23:35.926429 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vzhz/flask_blog -https://github.com/vzhz/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 13:23:43.454888 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -garibo/Flask-Social -https://github.com/garibo/Flask-Social -Entry file: Flask-Social/app.py -Scanned: 2016-10-20 13:23:46.820552 -Vulnerability 1: -File: Flask-Social/app.py - > User input at line 108, trigger word "get(": - user = models.User.select().where(models.User.username ** username).get() -Reassigned in: - File: Flask-Social/app.py - > Line 116: user = current_user -File: Flask-Social/app.py - > reaches line 119, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user) - -Vulnerability 2: -File: Flask-Social/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social/app.py - > reaches line 146, trigger word "flash(": - flash('You're now following {}!'.format(to_user.username), 'success') - -Vulnerability 3: -File: Flask-Social/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social/app.py - > reaches line 147, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 4: -File: Flask-Social/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social/app.py - > reaches line 147, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 5: -File: Flask-Social/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social/app.py - > reaches line 165, trigger word "flash(": - flash('You've unfollowed {}!'.format(to_user.username), 'success') - -Vulnerability 6: -File: Flask-Social/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social/app.py - > reaches line 166, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 7: -File: Flask-Social/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social/app.py - > reaches line 166, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - - - -harishtm/flask-blog -https://github.com/harishtm/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:23:47.391211 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -AdamSalma/flask-experiment -https://github.com/AdamSalma/flask-experiment -Entry file: flask-experiment/test/test.py -Scanned: 2016-10-20 13:23:48.412196 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lyoncc/learn-flask -https://github.com/lyoncc/learn-flask -Entry file: learn-flask/flask/lib/python2.7/site-packages/flask_openid.py -Scanned: 2016-10-20 13:23:49.074077 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wunderlins/todo-flask -https://github.com/wunderlins/todo-flask -Entry file: None -Scanned: 2016-10-20 13:23:49.580586 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wunderlins/todo-flask. - -affinespaces/flask_test -https://github.com/affinespaces/flask_test -Entry file: flask_test/app.py -Scanned: 2016-10-20 13:23:50.187034 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -clivegross/flask-usermgr -https://github.com/clivegross/flask-usermgr -Entry file: flask-usermgr/app/__init__.py -Scanned: 2016-10-20 13:24:03.548334 -Vulnerability 1: -File: flask-usermgr/app/module_auth/controllers.py - > User input at line 19, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-usermgr/app/module_auth/controllers.py - > Line 21: session['user_id'] = user.id -File: flask-usermgr/app/module_auth/controllers.py - > reaches line 22, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -seantking/flask-introduction -https://github.com/seantking/flask-introduction -Entry file: flask-introduction/exercise2_1.py -Scanned: 2016-10-20 13:24:09.073185 -No vulnerabilities found. - - -FelixRiegBaumhauer/flask-template -https://github.com/FelixRiegBaumhauer/flask-template -Entry file: None -Scanned: 2016-10-20 13:24:09.582599 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/FelixRiegBaumhauer/flask-template. - -bluenight1994/flask_time -https://github.com/bluenight1994/flask_time -Entry file: None -Scanned: 2016-10-20 13:24:16.582111 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Zzcnick/flask_forms -https://github.com/Zzcnick/flask_forms -Entry file: flask_forms/flask_app/app.py -Scanned: 2016-10-20 13:24:17.106503 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -canofre/flask_crud -https://github.com/canofre/flask_crud -Entry file: flask_crud/app/__init__.py -Scanned: 2016-10-20 13:24:18.544338 -No vulnerabilities found. - - -kelly3649/04_flask -https://github.com/kelly3649/04_flask -Entry file: 04_flask/appHW.py -Scanned: 2016-10-20 13:24:19.065476 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -yhzhan/login_flask -https://github.com/yhzhan/login_flask -Entry file: login_flask/app.py -Scanned: 2016-10-20 13:24:19.559428 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ogal7/flask_login -https://github.com/ogal7/flask_login -Entry file: None -Scanned: 2016-10-20 13:24:20.070846 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ogal7/flask_login. - -axiaoxin/flask-demo -https://github.com/axiaoxin/flask-demo -Entry file: None -Scanned: 2016-10-20 13:24:20.577222 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/axiaoxin/flask-demo. - -bschumacher/Flask-BS -https://github.com/bschumacher/Flask-BS -Entry file: Flask-BS/test.py -Scanned: 2016-10-20 13:24:22.024947 -No vulnerabilities found. - - -towercity/flask-tutorial -https://github.com/towercity/flask-tutorial -Entry file: None -Scanned: 2016-10-20 13:24:22.561657 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ed201971/simple_flask -https://github.com/ed201971/simple_flask -Entry file: simple_flask/hello.py -Scanned: 2016-10-20 13:24:23.189890 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jschluger/Flask_Login -https://github.com/jschluger/Flask_Login -Entry file: Flask_Login/app.py -Scanned: 2016-10-20 13:24:23.693382 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Might-M/flask_repo -https://github.com/Might-M/flask_repo -Entry file: flask_repo/app/__init__.py -Scanned: 2016-10-20 13:24:27.565761 -No vulnerabilities found. - - -BAM-X/Flask-seed -https://github.com/BAM-X/Flask-seed -Entry file: Flask-seed/app/app.py -Scanned: 2016-10-20 13:24:33.041433 -No vulnerabilities found. - - -zhangzhidao/Flask-blog -https://github.com/zhangzhidao/Flask-blog -Entry file: Flask-blog/app/__init__.py -Scanned: 2016-10-20 13:24:33.585647 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -rforgione/flask_playground -https://github.com/rforgione/flask_playground -Entry file: flask_playground/hello_world.py -Scanned: 2016-10-20 13:24:34.100581 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -argetamorina/Python-Flask -https://github.com/argetamorina/Python-Flask -Entry file: None -Scanned: 2016-10-20 13:24:34.623743 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/argetamorina/Python-Flask. - -JavierGarciaD/flask_ing -https://github.com/JavierGarciaD/flask_ing -Entry file: flask_ing/blog/blog.py -Scanned: 2016-10-20 13:24:36.039161 -No vulnerabilities found. - - -PavanTejaAnne/Flask-SQLAlchemy -https://github.com/PavanTejaAnne/Flask-SQLAlchemy -Entry file: Flask-SQLAlchemy/app.py -Scanned: 2016-10-20 13:24:36.583994 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -clakits/Flask_Webapp -https://github.com/clakits/Flask_Webapp -Entry file: Flask_Webapp/Redirect.py -Scanned: 2016-10-20 13:24:45.048679 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -keathmilligan/flask-quickstart -https://github.com/keathmilligan/flask-quickstart -Entry file: flask-quickstart/flask-quickstart/cli.py -Scanned: 2016-10-20 13:24:45.562420 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -dhurataK/flask_mysql -https://github.com/dhurataK/flask_mysql -Entry file: flask_mysql/email_validation_with_db/server.py -Scanned: 2016-10-20 13:24:49.065281 -Vulnerability 1: -File: flask_mysql/email_validation_with_db/server.py - > User input at line 16, trigger word "form[": - email = request.form['email'] -File: flask_mysql/email_validation_with_db/server.py - > reaches line 28, trigger word "flash(": - flash('The email address you entered ' + email + ' is a VALID email address! Thank you!') - - - -Urumasi/Flask-Bones -https://github.com/Urumasi/Flask-Bones -Entry file: Flask-Bones/app/__init__.py -Scanned: 2016-10-20 13:24:54.970530 -Vulnerability 1: -File: Flask-Bones/app/auth/views.py - > User input at line 48, trigger word ".data": - group = Group.create(nazev=form.data['nazev']) -File: Flask-Bones/app/auth/views.py - > reaches line 50, trigger word "flash(": - flash(gettext('Group {name} created').format(name=group.nazev), 'success') - -Vulnerability 2: -File: Flask-Bones/app/auth/views.py - > User input at line 60, trigger word ".data": - firma = Firma.create(nazev=form.data['nazev'], state=form.data['state'], address=form.data['address'], phone_number=form.data['phone_number'], contact_person=form.data['contact_person'], website=form.data['website']) -File: Flask-Bones/app/auth/views.py - > reaches line 67, trigger word "flash(": - flash(gettext('Organization {name} created').format(name=firma.nazev), 'success') - -Vulnerability 3: -File: Flask-Bones/app/public/views.py - > User input at line 39, trigger word ".data": - user = User.create(username=form.data['username'], email=form.data['email'], password=form.data['password'], remote_addr=request.remote_addr, jmeno=form.data['jmeno'], prijmeni=form.data['prijmeni']) -Reassigned in: - File: Flask-Bones/app/public/views.py - > Line 49: token = s.dumps(user.id) -File: Flask-Bones/app/public/views.py - > reaches line 53, trigger word "flash(": - flash(gettext('Sent verification email to {email}').format(email=user.email), 'success') - - - -MekonenW/Dojo_survey -https://github.com/MekonenW/Dojo_survey -Entry file: Dojo_survey/survey.py -Scanned: 2016-10-20 13:25:01.895464 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Dojo_survey/venv/lib/python2.7/genericpath.py - -mat105/Docker-Test -https://github.com/mat105/Docker-Test -Entry file: Docker-Test/aplicacion/app.py -Scanned: 2016-10-20 13:25:03.220057 -No vulnerabilities found. - - -gauravkulkarni96/microblog -https://github.com/gauravkulkarni96/microblog -Entry file: None -Scanned: 2016-10-20 13:25:03.737065 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -BreslawScripts/flask_hello_world -https://github.com/BreslawScripts/flask_hello_world -Entry file: None -Scanned: 2016-10-20 13:25:04.248873 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/BreslawScripts/flask_hello_world. - -PeteLing/my_blog -https://github.com/PeteLing/my_blog -Entry file: my_blog/app/__init__.py -Scanned: 2016-10-20 13:25:07.323984 -No vulnerabilities found. - - -MatthewLally/FlaskProblemSheet -https://github.com/MatthewLally/FlaskProblemSheet -Entry file: FlaskProblemSheet/hello.py -Scanned: 2016-10-20 13:25:08.652822 -No vulnerabilities found. - - -ysalimi/flaskRestCrud -https://github.com/ysalimi/flaskRestCrud -Entry file: flaskRestCrud/project/__init__.py -Scanned: 2016-10-20 13:25:11.116951 -Vulnerability 1: -File: flaskRestCrud/project/api_v1/authority.py - > User input at line 29, trigger word ".data": - res = scheme.data -Reassigned in: - File: flaskRestCrud/project/api_v1/authority.py - > Line 31: ret_MAYBE_FUNCTION_NAME = (jsonify(), 400) -File: flaskRestCrud/project/api_v1/authority.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = authority_schema.jsonify(res) - -Vulnerability 2: -File: flaskRestCrud/project/api_v1/authority.py - > User input at line 40, trigger word "get(": - authority = Authority.query.get(id) -File: flaskRestCrud/project/api_v1/authority.py - > reaches line 46, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = authority_schema.jsonify(authority) - -Vulnerability 3: -File: flaskRestCrud/project/api_v1/user.py - > User input at line 127, trigger word ".data": - res = scheme.data -Reassigned in: - File: flaskRestCrud/project/api_v1/user.py - > Line 129: ret_MAYBE_FUNCTION_NAME = (jsonify(), 400) -File: flaskRestCrud/project/api_v1/user.py - > reaches line 131, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (user_schema_secure.jsonify(User.query.filter_by(email=res.email).first()), 409) - -Vulnerability 4: -File: flaskRestCrud/project/api_v1/user.py - > User input at line 127, trigger word ".data": - res = scheme.data -Reassigned in: - File: flaskRestCrud/project/api_v1/user.py - > Line 129: ret_MAYBE_FUNCTION_NAME = (jsonify(), 400) -File: flaskRestCrud/project/api_v1/user.py - > reaches line 134, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = user_schema_secure.jsonify(res) - -Vulnerability 5: -File: flaskRestCrud/project/api_v1/user.py - > User input at line 140, trigger word "get(": - user = User.query.get(id) -File: flaskRestCrud/project/api_v1/user.py - > reaches line 151, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = user_schema_secure.jsonify(user) - -Vulnerability 6: -File: flaskRestCrud/project/api_v1/role.py - > User input at line 32, trigger word ".data": - res = scheme.data -Reassigned in: - File: flaskRestCrud/project/api_v1/role.py - > Line 34: ret_MAYBE_FUNCTION_NAME = (jsonify(), 400) -File: flaskRestCrud/project/api_v1/role.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = role_schema.jsonify(res) - -Vulnerability 7: -File: flaskRestCrud/project/api_v1/role.py - > User input at line 46, trigger word "get(": - role = Role.query.get(id) -Reassigned in: - File: flaskRestCrud/project/api_v1/role.py - > Line 48: ret_MAYBE_FUNCTION_NAME = (jsonify(), 404) -File: flaskRestCrud/project/api_v1/role.py - > reaches line 53, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = role_schema.jsonify(role) - - - -richardadalton/flask2google -https://github.com/richardadalton/flask2google -Entry file: flask2google/main.py -Scanned: 2016-10-20 13:25:12.440340 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -JFreyra/FlaskLogin_02 -https://github.com/JFreyra/FlaskLogin_02 -Entry file: FlaskLogin_02/app.py -Scanned: 2016-10-20 13:25:18.828628 -No vulnerabilities found. - - -JesseTellez/FlaskWordApp -https://github.com/JesseTellez/FlaskWordApp -Entry file: FlaskWordApp/myenv/app.py -Scanned: 2016-10-20 13:25:25.032342 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -ribbondz/erp_flask_app -https://github.com/ribbondz/erp_flask_app -Entry file: erp_flask_app/site-packages/flask/sessions.py -Scanned: 2016-10-20 13:25:33.098863 -No vulnerabilities found. - - -IanLondon/simple_flask_docker -https://github.com/IanLondon/simple_flask_docker -Entry file: simple_flask_docker/app/main.py -Scanned: 2016-10-20 13:25:35.475341 -No vulnerabilities found. - - -mustafawm/Flask-LocationApp -https://github.com/mustafawm/Flask-LocationApp -Entry file: Flask-LocationApp/routes.py -Scanned: 2016-10-20 13:25:38.781465 -Vulnerability 1: -File: Flask-LocationApp/routes.py - > User input at line 31, trigger word ".data": - address = form.address.data -Reassigned in: - File: Flask-LocationApp/routes.py - > Line 33: my_coordinates = p.address_to_latlng(address) - File: Flask-LocationApp/routes.py - > Line 34: places = p.query(address) - File: Flask-LocationApp/routes.py - > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: Flask-LocationApp/routes.py - > Line 24: my_coordinates = (37.4221, -122.0844) - File: Flask-LocationApp/routes.py - > Line 25: places = [] - File: Flask-LocationApp/routes.py - > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: Flask-LocationApp/routes.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - -Vulnerability 2: -File: Flask-LocationApp/routes.py - > User input at line 31, trigger word ".data": - address = form.address.data -Reassigned in: - File: Flask-LocationApp/routes.py - > Line 33: my_coordinates = p.address_to_latlng(address) - File: Flask-LocationApp/routes.py - > Line 34: places = p.query(address) - File: Flask-LocationApp/routes.py - > Line 22: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: Flask-LocationApp/routes.py - > Line 24: my_coordinates = (37.4221, -122.0844) - File: Flask-LocationApp/routes.py - > Line 25: places = [] - File: Flask-LocationApp/routes.py - > Line 29: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: Flask-LocationApp/routes.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - - - -ImNaren/Docker_Compose-Flask-Mysql- -https://github.com/ImNaren/Docker_Compose-Flask-Mysql- -Entry file: Docker_Compose-Flask-Mysql-/app/model.py -Scanned: 2016-10-20 13:25:40.616794 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -konwan/flask -https://github.com/konwan/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:42.681025 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -dalyddaly/flask -https://github.com/dalyddaly/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:43.264929 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -CliveCullen/flask -https://github.com/CliveCullen/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:43.839382 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Carryopendoor1/flask -https://github.com/Carryopendoor1/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:44.406488 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -lsyff210/flask -https://github.com/lsyff210/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:44.986284 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -jyntran/flask -https://github.com/jyntran/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:45.559935 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -larry1994/flask -https://github.com/larry1994/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:46.141398 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -juliascript/Flask -https://github.com/juliascript/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:25:46.644252 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -davinbutler/flask -https://github.com/davinbutler/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:47.222754 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -skraiman/flask -https://github.com/skraiman/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:47.790716 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Gershine/Flask -https://github.com/Gershine/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:25:48.296992 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ricardonhuang/flask -https://github.com/ricardonhuang/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:49.875289 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -cmeisinger/flask -https://github.com/cmeisinger/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:25:56.462039 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -sanie4eg/Flask -https://github.com/sanie4eg/Flask -Entry file: Flask/test_hello.py -Scanned: 2016-10-20 13:26:02.974846 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -vojtahelle/flask -https://github.com/vojtahelle/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:26:04.545317 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -bharatsush/flask -https://github.com/bharatsush/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:26:05.111910 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -Tangugo/flask -https://github.com/Tangugo/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:26:05.678315 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -darylkeane/flask -https://github.com/darylkeane/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:26:08.262356 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -fushouhai/flask -https://github.com/fushouhai/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:26:10.826922 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -sadscv/flask -https://github.com/sadscv/flask -Entry file: flask/hello.py -Scanned: 2016-10-20 13:26:12.403198 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask/venv/lib/python3.5/struct.py - -arpitbbhayani/flasksr -https://github.com/arpitbbhayani/flasksr -Entry file: flasksr/examples/basicsr.py -Scanned: 2016-10-20 13:26:19.920165 -No vulnerabilities found. - - -I-am-Gabi/flask-minicurso -https://github.com/I-am-Gabi/flask-minicurso -Entry file: flask-minicurso/minicurso-flask.py -Scanned: 2016-10-20 13:26:26.596546 -No vulnerabilities found. - - -Millyn/uFlask -https://github.com/Millyn/uFlask -Entry file: uFlask/project/__init__.py -Scanned: 2016-10-20 13:26:27.933919 -No vulnerabilities found. - - -zhangheli/flask-google -https://github.com/zhangheli/flask-google -Entry file: flask-google/g.py -Scanned: 2016-10-20 13:26:35.377393 -No vulnerabilities found. - - -janmandel/flasktest -https://github.com/janmandel/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 13:26:35.923096 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -springleeo/flasklearning -https://github.com/springleeo/flasklearning -Entry file: flasklearning/flasklearning.py -Scanned: 2016-10-20 13:26:37.251556 -No vulnerabilities found. - - -Irabor/flaskbg -https://github.com/Irabor/flaskbg -Entry file: flaskbg/app.py -Scanned: 2016-10-20 13:26:38.564021 -No vulnerabilities found. - - -hartwork/flasktop -https://github.com/hartwork/flasktop -Entry file: flasktop/flasktop.py -Scanned: 2016-10-20 13:26:40.943668 -No vulnerabilities found. - - -xhygh/flaskr -https://github.com/xhygh/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:26:41.456992 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -joaozecchin/flasktemp -https://github.com/joaozecchin/flasktemp -Entry file: flasktemp/app/__init__.py -Scanned: 2016-10-20 13:26:42.767784 -No vulnerabilities found. - - -HecvStyle/flasky -https://github.com/HecvStyle/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:26:43.277454 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -superdachs/flaskdaemon -https://github.com/superdachs/flaskdaemon -Entry file: flaskdaemon/flaskdaemon.py -Scanned: 2016-10-20 13:26:44.583368 -No vulnerabilities found. - - -Cushionyten0/flasktaskr -https://github.com/Cushionyten0/flasktaskr -Entry file: None -Scanned: 2016-10-20 13:26:45.098068 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -uMtMu/flasksite -https://github.com/uMtMu/flasksite -Entry file: flasksite/app.py -Scanned: 2016-10-20 13:26:45.625320 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -brianmugweru/flaskpython -https://github.com/brianmugweru/flaskpython -Entry file: None -Scanned: 2016-10-20 13:26:53.739355 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -asynte/flasktechdemo -https://github.com/asynte/flasktechdemo -Entry file: flasktechdemo/app/__init__.py -Scanned: 2016-10-20 13:27:02.091807 -No vulnerabilities found. - - -btotharye/flaskmicroblog -https://github.com/btotharye/flaskmicroblog -Entry file: None -Scanned: 2016-10-20 13:27:02.642785 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gavinroderick/flaskapp -https://github.com/gavinroderick/flaskapp -Entry file: None -Scanned: 2016-10-20 13:27:03.149221 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/gavinroderick/flaskapp. - -pradyumnac/flasklearn -https://github.com/pradyumnac/flasklearn -Entry file: flasklearn/flasklearn.py -Scanned: 2016-10-20 13:27:03.667230 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -songxiaowei/flaskdemo -https://github.com/songxiaowei/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 13:27:04.234193 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ryanmartinneutrino/flaskwf -https://github.com/ryanmartinneutrino/flaskwf -Entry file: flaskwf/flaskwf.py -Scanned: 2016-10-20 13:27:05.689363 -No vulnerabilities found. - - -Jorge-Fuentes/flaskrplus -https://github.com/Jorge-Fuentes/flaskrplus -Entry file: flaskrplus/flaskr+.py -Scanned: 2016-10-20 13:27:07.142112 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -ajjkennedy/flaskaws -https://github.com/ajjkennedy/flaskaws -Entry file: flaskaws/flask-aws/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-20 13:27:17.318490 -No vulnerabilities found. - - -xando/flaskr -https://github.com/xando/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:27:18.451094 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -tiancegit/flasky -https://github.com/tiancegit/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:27:18.995448 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wasabi222/flaskdemo -https://github.com/wasabi222/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-20 13:27:19.510120 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -HuanChenLu/flasky -https://github.com/HuanChenLu/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:27:20.010369 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -phillinzzz/flasky -https://github.com/phillinzzz/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:27:20.522235 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -paulmoliva/flaskr -https://github.com/paulmoliva/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:27:21.020217 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -mdzhang/flaskr -https://github.com/mdzhang/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:27:27.538080 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jaysharm/flaskio -https://github.com/jaysharm/flaskio -Entry file: flaskio/app.py -Scanned: 2016-10-20 13:27:35.912375 -No vulnerabilities found. - - -SeamusGillespie/flasktest -https://github.com/SeamusGillespie/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-20 13:27:36.426063 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -cw-andrews/flasked -https://github.com/cw-andrews/flasked -Entry file: flasked/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-20 13:27:48.668744 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -princess0307/flaskapp -https://github.com/princess0307/flaskapp -Entry file: None -Scanned: 2016-10-20 13:27:49.190999 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/princess0307/flaskapp. - -cabbagesmasher/flaskapp -https://github.com/cabbagesmasher/flaskapp -Entry file: None -Scanned: 2016-10-20 13:27:49.738677 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cabbagesmasher/flaskapp. - -tazou/flasktickets -https://github.com/tazou/flasktickets -Entry file: flasktickets/main.py -Scanned: 2016-10-20 13:27:51.585884 -No vulnerabilities found. - - -WtemptyE/flaskr -https://github.com/WtemptyE/flaskr -Entry file: flaskr/flaskr.py -Scanned: 2016-10-20 13:27:52.091538 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -SpringToooh/flasky -https://github.com/SpringToooh/flasky -Entry file: flasky/flasky/flask/app.py -Scanned: 2016-10-20 13:27:52.596866 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -LostMailman/FlaskPractice -https://github.com/LostMailman/FlaskPractice -Entry file: FlaskPractice/flask/Lib/site-packages/flask_openid.py -Scanned: 2016-10-20 13:28:03.060253 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -harishtm/FlaskDemo -https://github.com/harishtm/FlaskDemo -Entry file: FlaskDemo/test.py -Scanned: 2016-10-20 13:28:03.605326 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Original-heapsters/FlaskPortal -https://github.com/Original-heapsters/FlaskPortal -Entry file: FlaskPortal/Portal_Main/app.py -Scanned: 2016-10-20 13:28:04.937013 -Vulnerability 1: -File: FlaskPortal/Portal_Main/app.py - > User input at line 20, trigger word "form[": - POST_USERNAME = str(request.form['username']) -File: FlaskPortal/Portal_Main/app.py - > reaches line 26, trigger word "filter(": - query = s.query(User).filter(User.username.in_([POST_USERNAME]), User.password.in_([POST_PASSWORD])) - -Vulnerability 2: -File: FlaskPortal/Portal_Main/app.py - > User input at line 21, trigger word "form[": - POST_PASSWORD = str(request.form['password']) -File: FlaskPortal/Portal_Main/app.py - > reaches line 26, trigger word "filter(": - query = s.query(User).filter(User.username.in_([POST_USERNAME]), User.password.in_([POST_PASSWORD])) - - - -dsikes/FlaskSample -https://github.com/dsikes/FlaskSample -Entry file: FlaskSample/flask03.py -Scanned: 2016-10-20 13:28:05.479281 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -stackeric/flask_starter -https://github.com/stackeric/flask_starter -Entry file: flask_starter/resources/__init__.py -Scanned: 2016-10-20 13:28:06.799432 -No vulnerabilities found. - - -yimuyang/FlaskStudy -https://github.com/yimuyang/FlaskStudy -Entry file: FlaskStudy/flaskr.py -Scanned: 2016-10-20 13:28:07.323139 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -lisaheff95/flask2 -https://github.com/lisaheff95/flask2 -Entry file: flask2/app.py -Scanned: 2016-10-20 13:28:07.837338 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -coderminer/FlaskBlog -https://github.com/coderminer/FlaskBlog -Entry file: FlaskBlog/flask/lib/python2.7/site-packages/flask_sqlalchemy.py -Scanned: 2016-10-20 13:28:08.472339 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -smitthakkar96/flask-restful-boilerplate -https://github.com/smitthakkar96/flask-restful-boilerplate -Entry file: flask-restful-boilerplate/api.py -Scanned: 2016-10-20 13:28:09.878182 -No vulnerabilities found. - - -pwgraham91/flask-template -https://github.com/pwgraham91/flask-template -Entry file: None -Scanned: 2016-10-20 13:28:10.394425 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pwgraham91/flask-template. - -MarFerPra/learning-flask -https://github.com/MarFerPra/learning-flask -Entry file: learning-flask/hello.py -Scanned: 2016-10-20 13:28:10.941876 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -bamboo-yujiro/my_flask -https://github.com/bamboo-yujiro/my_flask -Entry file: my_flask/hello.py -Scanned: 2016-10-20 13:28:11.566025 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_flask/venv/lib/python2.7/genericpath.py - -zheng-zy/flask_app -https://github.com/zheng-zy/flask_app -Entry file: None -Scanned: 2016-10-20 13:28:12.064100 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zheng-zy/flask_app. - -amarshukla/flask_app -https://github.com/amarshukla/flask_app -Entry file: None -Scanned: 2016-10-20 13:28:18.593184 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/amarshukla/flask_app. - -ultimatesword/learn_flask -https://github.com/ultimatesword/learn_flask -Entry file: learn_flask/hello.py -Scanned: 2016-10-20 13:28:19.139492 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Fiksers/myFlask -https://github.com/Fiksers/myFlask -Entry file: myFlask/project.py -Scanned: 2016-10-20 13:28:19.652881 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -Naivee-Bref/Flask-Bref -https://github.com/Naivee-Bref/Flask-Bref -Entry file: Flask-Bref/app.py -Scanned: 2016-10-20 13:28:20.984732 -No vulnerabilities found. - - -jacquelineawatts/Flask_Intro -https://github.com/jacquelineawatts/Flask_Intro -Entry file: Flask_Intro/nice.py -Scanned: 2016-10-20 13:28:21.575253 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Intro/env/lib/python2.7/genericpath.py - -mrkewen/flask-blog -https://github.com/mrkewen/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-20 13:28:22.121891 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-blog/venv/lib/python2.7/genericpath.py - -kszgbr/flask-min -https://github.com/kszgbr/flask-min -Entry file: flask-min/main.py -Scanned: 2016-10-20 13:28:23.456588 -No vulnerabilities found. - - -renefs87/flask-skeleton -https://github.com/renefs87/flask-skeleton -Entry file: None -Scanned: 2016-10-20 13:28:27.989512 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/renefs87/flask-skeleton. - -LuckyLuke201/flask-skeleton -https://github.com/LuckyLuke201/flask-skeleton -Entry file: None -Scanned: 2016-10-20 13:28:35.531869 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/LuckyLuke201/flask-skeleton. - -curiousboy2/flask_blog -https://github.com/curiousboy2/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-20 13:28:37.041947 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -wqxu/flask_practice -https://github.com/wqxu/flask_practice -Entry file: flask_practice/app/__init__.py -Scanned: 2016-10-20 13:28:37.567585 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -alrifqi/flask-learning -https://github.com/alrifqi/flask-learning -Entry file: flask-learning/app.py -Scanned: 2016-10-20 13:28:50.202894 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-learning/venv/lib/python2.7/genericpath.py - -noelis/flask-intro -https://github.com/noelis/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 13:28:50.713224 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jrhian/Flask-intro -https://github.com/jrhian/Flask-intro -Entry file: Flask-intro/nice.py -Scanned: 2016-10-20 13:28:51.225498 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -kmjch/flask-intro -https://github.com/kmjch/flask-intro -Entry file: flask-intro/routes.py -Scanned: 2016-10-20 13:28:51.744601 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -PSquared0/Flask_lab -https://github.com/PSquared0/Flask_lab -Entry file: Flask_lab/nice.py -Scanned: 2016-10-20 13:28:53.086458 -No vulnerabilities found. - - -hughmcpartlan/hello_flask -https://github.com/hughmcpartlan/hello_flask -Entry file: hello_flask/Flask.py -Scanned: 2016-10-20 13:28:53.609693 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -EddyCodeIt/flask-problem -https://github.com/EddyCodeIt/flask-problem -Entry file: flask-problem/flask_1.py -Scanned: 2016-10-20 13:28:54.912507 -No vulnerabilities found. - - -bschumacher/Flask-Navigate -https://github.com/bschumacher/Flask-Navigate -Entry file: Flask-Navigate/test.py -Scanned: 2016-10-20 13:29:05.514731 -No vulnerabilities found. - - -mapleque/flask_framework -https://github.com/mapleque/flask_framework -Entry file: flask_framework/app/__init__.py -Scanned: 2016-10-20 13:29:06.834165 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - -jk-aneirin/stu_flask -https://github.com/jk-aneirin/stu_flask -Entry file: None -Scanned: 2016-10-20 13:29:07.335066 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kaharonus/flask-skeleton -https://github.com/Kaharonus/flask-skeleton -Entry file: None -Scanned: 2016-10-20 13:29:07.849313 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Kaharonus/flask-skeleton. - -neilmaldy/flask_upload -https://github.com/neilmaldy/flask_upload -Entry file: flask_upload/test.py -Scanned: 2016-10-20 13:29:09.185137 -Vulnerability 1: -File: flask_upload/test.py - > User input at line 28, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flask_upload/test.py - > Line 35: filename = secure_filename(file.filename) - File: flask_upload/test.py - > Line 43: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' - File: flask_upload/test.py - > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(request.url) - File: flask_upload/test.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: flask_upload/test.py - > reaches line 41, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename='new_' + filename)) - -Vulnerability 2: -File: flask_upload/test.py - > User input at line 28, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flask_upload/test.py - > Line 35: filename = secure_filename(file.filename) - File: flask_upload/test.py - > Line 43: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' - File: flask_upload/test.py - > Line 27: ret_MAYBE_FUNCTION_NAME = redirect(request.url) - File: flask_upload/test.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: flask_upload/test.py - > reaches line 41, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename='new_' + filename)) - -Vulnerability 3: -File: flask_upload/quote_scrub_server.py - > User input at line 54, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flask_upload/quote_scrub_server.py - > Line 61: filename = secure_filename(file.filename) - File: flask_upload/quote_scrub_server.py - > Line 65: new_filename = scrub(os.path.join(app.config['UPLOAD_FOLDER'], filename)) - File: flask_upload/quote_scrub_server.py - > Line 70: ret_MAYBE_FUNCTION_NAME = ' - - Quote Scrub -

Quote XLSX File

-
-

- -

- ' - File: flask_upload/quote_scrub_server.py - > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(request.url) - File: flask_upload/quote_scrub_server.py - > Line 59: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: flask_upload/quote_scrub_server.py - > reaches line 69, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=os.path.basename(new_filename))) - -Vulnerability 4: -File: flask_upload/quote_scrub_server.py - > User input at line 54, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flask_upload/quote_scrub_server.py - > Line 61: filename = secure_filename(file.filename) - File: flask_upload/quote_scrub_server.py - > Line 65: new_filename = scrub(os.path.join(app.config['UPLOAD_FOLDER'], filename)) - File: flask_upload/quote_scrub_server.py - > Line 70: ret_MAYBE_FUNCTION_NAME = ' - - Quote Scrub -

Quote XLSX File

-
-

- -

- ' - File: flask_upload/quote_scrub_server.py - > Line 53: ret_MAYBE_FUNCTION_NAME = redirect(request.url) - File: flask_upload/quote_scrub_server.py - > Line 59: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: flask_upload/quote_scrub_server.py - > reaches line 69, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=os.path.basename(new_filename))) - -Vulnerability 5: -File: flask_upload/quote_scrub_server.py - > User input at line 88, trigger word ".data": - file = form.file_reference.data -Reassigned in: - File: flask_upload/quote_scrub_server.py - > Line 91: filename = secure_filename(file.filename) - File: flask_upload/quote_scrub_server.py - > Line 96: new_filename = scrub(os.path.join(app.config['UPLOAD_FOLDER'], filename)) - File: flask_upload/quote_scrub_server.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Unexpected error, please contact Neil Maldonado') - File: flask_upload/quote_scrub_server.py - > Line 104: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Unexpected error, please contact Neil Maldonado') - File: flask_upload/quote_scrub_server.py - > Line 106: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Please insure quote file is in XLSX format') - File: flask_upload/quote_scrub_server.py - > Line 108: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='') -File: flask_upload/quote_scrub_server.py - > reaches line 100, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=os.path.basename(new_filename))) - -Vulnerability 6: -File: flask_upload/quote_scrub_server.py - > User input at line 88, trigger word ".data": - file = form.file_reference.data -Reassigned in: - File: flask_upload/quote_scrub_server.py - > Line 91: filename = secure_filename(file.filename) - File: flask_upload/quote_scrub_server.py - > Line 96: new_filename = scrub(os.path.join(app.config['UPLOAD_FOLDER'], filename)) - File: flask_upload/quote_scrub_server.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Unexpected error, please contact Neil Maldonado') - File: flask_upload/quote_scrub_server.py - > Line 104: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Unexpected error, please contact Neil Maldonado') - File: flask_upload/quote_scrub_server.py - > Line 106: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='Please insure quote file is in XLSX format') - File: flask_upload/quote_scrub_server.py - > Line 108: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, error='') -File: flask_upload/quote_scrub_server.py - > reaches line 100, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=os.path.basename(new_filename))) - - - -debuggerboy/flask-appserv -https://github.com/debuggerboy/flask-appserv -Entry file: flask-appserv/app/main.py -Scanned: 2016-10-20 13:29:10.600344 -No vulnerabilities found. - - -SujoyDU/python-flask -https://github.com/SujoyDU/python-flask -Entry file: python-flask/rest/__init__.py -Scanned: 2016-10-20 13:29:11.118038 -No vulnerabilities found. -An Error occurred while scanning the repo: The ast module can not parse the file and the python 2 to 3 conversion also failed. - diff --git a/scan_results/archived_26_10_scan.pyt b/scan_results/archived_26_10_scan.pyt deleted file mode 100644 index ae82019a..00000000 --- a/scan_results/archived_26_10_scan.pyt +++ /dev/null @@ -1,43642 +0,0 @@ -maxcountryman/flask-uploads -https://github.com/maxcountryman/flask-uploads -Entry file: flask-uploads/tests.py -Scanned: 2016-10-25 14:55:15.361457 -No vulnerabilities found. - - -masonicGIT/21-Flask-Boilerplate -https://github.com/masonicGIT/21-Flask-Boilerplate -Entry file: 21-Flask-Boilerplate/app/__init__.py -Scanned: 2016-10-25 14:55:21.213012 -Vulnerability 1: -File: 21-Flask-Boilerplate/app/views/main.py - > User input at line 64, trigger word ".data": - tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password) -Reassigned in: - File: 21-Flask-Boilerplate/app/views/main.py - > Line 67: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: 21-Flask-Boilerplate/app/views/main.py - > reaches line 68, trigger word "flash(": - flash(message, 'positive') - -Vulnerability 2: -File: 21-Flask-Boilerplate/app/views/main.py - > User input at line 67, trigger word ".data": - message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: 21-Flask-Boilerplate/app/views/main.py - > reaches line 68, trigger word "flash(": - flash(message, 'positive') - -Vulnerability 3: -File: 21-Flask-Boilerplate/app/views/main.py - > User input at line 64, trigger word ".data": - tx = multisig_wallet.send_bitcoin(username, form.address.data, form.amount.data, user.password) -Reassigned in: - File: 21-Flask-Boilerplate/app/views/main.py - > Line 67: message = 'You just sent ' + str(form.amount.data) + ' Satoshis to: ' + str(form.address.data) + ' - You may view your transaction at: https://btc.blockr.io/tx/info/' + str(tx) -File: 21-Flask-Boilerplate/app/views/main.py - > reaches line 72, trigger word "flash(": - flash(tx['message'], 'negative') - -Vulnerability 4: -File: 21-Flask-Boilerplate/app/views/main.py - > User input at line 78, trigger word "form(": - points = [(random.uniform(48.84341, 48.86341), random.uniform(2.3388, 2.3588)) for _ in range(random.randint(2, 9))] -File: 21-Flask-Boilerplate/app/views/main.py - > reaches line 81, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('points'points) - -Vulnerability 5: -File: 21-Flask-Boilerplate/app/views/user.py - > User input at line 24, trigger word ".data": - user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data) -Reassigned in: - File: 21-Flask-Boilerplate/app/views/user.py - > Line 39: token = ts.dumps(user.email,salt='email-confirm-key') -File: 21-Flask-Boilerplate/app/views/user.py - > reaches line 41, trigger word "url_for(": - confirmUrl = url_for('userbp.confirm',token=token, _external=True) - -Vulnerability 6: -File: 21-Flask-Boilerplate/app/views/user.py - > User input at line 24, trigger word ".data": - user = models.User(name=form.name.data, surname=form.surname.data, phone=form.phone.data, email=form.email.data, confirmation=False, password=form.password.data) -Reassigned in: - File: 21-Flask-Boilerplate/app/views/user.py - > Line 39: token = ts.dumps(user.email,salt='email-confirm-key') -File: 21-Flask-Boilerplate/app/views/user.py - > reaches line 43, trigger word "render_template(": - html = render_template('email/confirm.html',confirm_url=confirmUrl) - -Vulnerability 7: -File: 21-Flask-Boilerplate/app/views/user.py - > User input at line 118, trigger word ".data": - user = models.User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: 21-Flask-Boilerplate/app/views/user.py - > Line 124: token = ts.dumps(user.email,salt='password-reset-key') -File: 21-Flask-Boilerplate/app/views/user.py - > reaches line 126, trigger word "url_for(": - resetUrl = url_for('userbp.reset',token=token, _external=True) - -Vulnerability 8: -File: 21-Flask-Boilerplate/app/views/user.py - > User input at line 118, trigger word ".data": - user = models.User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: 21-Flask-Boilerplate/app/views/user.py - > Line 124: token = ts.dumps(user.email,salt='password-reset-key') -File: 21-Flask-Boilerplate/app/views/user.py - > reaches line 128, trigger word "render_template(": - html = render_template('email/reset.html',reset_url=resetUrl) - -Vulnerability 9: -File: 21-Flask-Boilerplate/app/forms/user.py - > User input at line 25, trigger word ".data": - check = self.model.query.filter(self.field == field.data).first() -File: 21-Flask-Boilerplate/app/forms/user.py - > reaches line 25, trigger word "filter(": - check = self.model.query.filter(self.field == field.data).first() - - - -ChinaChou/Flask -https://github.com/ChinaChou/Flask -Entry file: Flask/application/debugs.py -Scanned: 2016-10-25 14:55:22.541094 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -extranjero/flask -https://github.com/extranjero/flask -Entry file: flask/app/__init__.py -Scanned: 2016-10-25 14:55:23.878824 -Vulnerability 1: -File: flask/app/handlers/subjects.py - > User input at line 22, trigger word "get(": - subject = Subject.query.get(id) -Reassigned in: - File: flask/app/handlers/subjects.py - > Line 23: subject.name = request.json.get('name', subject.name) -File: flask/app/handlers/subjects.py - > reaches line 25, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(subject.dict()) - -Vulnerability 2: -File: flask/app/handlers/students.py - > User input at line 22, trigger word "get(": - student = Student.query.get(id) -Reassigned in: - File: flask/app/handlers/students.py - > Line 23: student.name = request.json.get('name', student.name) -File: flask/app/handlers/students.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(student.dict()) - -Vulnerability 3: -File: flask/app/handlers/marks.py - > User input at line 15, trigger word "get(": - mark = Mark.query.get(id) -File: flask/app/handlers/marks.py - > reaches line 16, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(mark.dict()) - -Vulnerability 4: -File: flask/app/handlers/marks.py - > User input at line 20, trigger word "get(": - mark = Mark.query.get(id) -Reassigned in: - File: flask/app/handlers/marks.py - > Line 21: mark.student_id = request.json.get('student_id', mark.student_id) - File: flask/app/handlers/marks.py - > Line 22: mark.subject_id = request.json.get('subject_id', mark.subject_id) - File: flask/app/handlers/marks.py - > Line 23: mark.mark = request.json.get('mark', mark.mark) -File: flask/app/handlers/marks.py - > reaches line 25, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(mark.dict()) - - - -aolSvt/flask -https://github.com/aolSvt/flask -Entry file: flask/flask/xmas.py -Scanned: 2016-10-25 14:55:25.257430 -Vulnerability 1: -File: flask/flask/route.py - > User input at line 16, trigger word "form[": - santa_name = request.form['name'] -Reassigned in: - File: flask/flask/route.py - > Line 21: santa_dict = 'name''index''address''email'santa_namesanta_indexsanta_addresssanta_email -File: flask/flask/route.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(santa_dict), 200) - -Vulnerability 2: -File: flask/flask/route.py - > User input at line 17, trigger word "form[": - santa_index = request.form['index'] -Reassigned in: - File: flask/flask/route.py - > Line 21: santa_dict = 'name''index''address''email'santa_namesanta_indexsanta_addresssanta_email -File: flask/flask/route.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(santa_dict), 200) - -Vulnerability 3: -File: flask/flask/route.py - > User input at line 18, trigger word "form[": - santa_address = request.form['address'] -Reassigned in: - File: flask/flask/route.py - > Line 21: santa_dict = 'name''index''address''email'santa_namesanta_indexsanta_addresssanta_email -File: flask/flask/route.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(santa_dict), 200) - -Vulnerability 4: -File: flask/flask/route.py - > User input at line 19, trigger word "form[": - santa_email = request.form['email'] -Reassigned in: - File: flask/flask/route.py - > Line 21: santa_dict = 'name''index''address''email'santa_namesanta_indexsanta_addresssanta_email -File: flask/flask/route.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify(santa_dict), 200) - - - -ShoJinto/flask -https://github.com/ShoJinto/flask -Entry file: flask/flaskr/flaskr.py -Scanned: 2016-10-25 14:55:26.514529 -No vulnerabilities found. - - -jhn316/Flask -https://github.com/jhn316/Flask -Entry file: None -Scanned: 2016-10-25 14:55:33.690747 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bh45k4r/flask -https://github.com/bh45k4r/flask -Entry file: flask/http_echo_server/http_echo_server.py -Scanned: 2016-10-25 14:55:34.977119 -No vulnerabilities found. - - -lhw4d4/flask -https://github.com/lhw4d4/flask -Entry file: None -Scanned: 2016-10-25 14:55:44.709996 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chenyuntc/flask -https://github.com/chenyuntc/flask -Entry file: None -Scanned: 2016-10-25 14:55:45.230521 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Gmingming/Flask -https://github.com/Gmingming/Flask -Entry file: None -Scanned: 2016-10-25 14:55:46.265450 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gd452/flask -https://github.com/gd452/flask -Entry file: None -Scanned: 2016-10-25 14:55:46.798446 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -llh335/flask -https://github.com/llh335/flask -Entry file: None -Scanned: 2016-10-25 14:55:47.328446 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tahmidshahriar/flask -https://github.com/tahmidshahriar/flask -Entry file: None -Scanned: 2016-10-25 14:55:47.841934 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vstorm/Flask -https://github.com/vstorm/Flask -Entry file: None -Scanned: 2016-10-25 14:55:48.385942 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Neo0/flask -https://github.com/Neo0/flask -Entry file: None -Scanned: 2016-10-25 14:55:48.919458 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Berarik/Flask -https://github.com/Berarik/Flask -Entry file: None -Scanned: 2016-10-25 14:55:49.453921 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -seeInside/Flask -https://github.com/seeInside/Flask -Entry file: None -Scanned: 2016-10-25 14:55:50.082534 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -paulmin55/flask -https://github.com/paulmin55/flask -Entry file: None -Scanned: 2016-10-25 14:55:50.594947 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -TwilioDevEd/airtng-flask -https://github.com/TwilioDevEd/airtng-flask -Entry file: airtng-flask/airtng_flask/__init__.py -Scanned: 2016-10-25 14:55:55.948136 -Vulnerability 1: -File: airtng-flask/airtng_flask/views.py - > User input at line 51, trigger word ".data": - candidate_user = User.query.filter(User.email == form.email.data).first() -File: airtng-flask/airtng_flask/views.py - > reaches line 51, trigger word "filter(": - candidate_user = User.query.filter(User.email == form.email.data).first() - -Vulnerability 2: -File: airtng-flask/airtng_flask/views.py - > User input at line 131, trigger word ".data": - user = User.query.filter(User.phone_number == form.From.data).first() -File: airtng-flask/airtng_flask/views.py - > reaches line 131, trigger word "filter(": - user = User.query.filter(User.phone_number == form.From.data).first() - -Vulnerability 3: -File: airtng-flask/airtng_flask/views.py - > User input at line 131, trigger word ".data": - user = User.query.filter(User.phone_number == form.From.data).first() -File: airtng-flask/airtng_flask/views.py - > reaches line 132, trigger word "filter(": - reservation = Reservation.query.filter(Reservation.status == 'pending' and Reservation.vacation_property.host.id == user.id).first() - - - -tilda-center/flask-tutorial -https://github.com/tilda-center/flask-tutorial -Entry file: flask-tutorial/manage.py -Scanned: 2016-10-25 14:55:57.390206 -No vulnerabilities found. - - -smoqadam/PyFladesk -https://github.com/smoqadam/PyFladesk -Entry file: PyFladesk/routes.py -Scanned: 2016-10-25 14:55:58.835770 -No vulnerabilities found. - - -CarlEkerot/flask-orm -https://github.com/CarlEkerot/flask-orm -Entry file: flask-orm/webapp/__init__.py -Scanned: 2016-10-25 14:56:00.938781 -No vulnerabilities found. - - -Maru-zhang/iCCUT-Server-Flask -https://github.com/Maru-zhang/iCCUT-Server-Flask -Entry file: None -Scanned: 2016-10-25 14:56:02.716911 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jeffwidman/flask-uploads -https://github.com/jeffwidman/flask-uploads -Entry file: flask-uploads/tests.py -Scanned: 2016-10-25 14:56:04.402423 -No vulnerabilities found. - - -wdm0006/gitnoc -https://github.com/wdm0006/gitnoc -Entry file: gitnoc/gitnoc/app.py -Scanned: 2016-10-25 14:56:10.248676 -Vulnerability 1: -File: gitnoc/gitnoc/services/metrics.py - > User input at line 65, trigger word "get(": - extensions = settings.get('extensions', None) -Reassigned in: - File: gitnoc/gitnoc/services/metrics.py - > Line 71: df = repo.file_detail(extensions=extensions, ignore_dir=ignore_dir) - File: gitnoc/gitnoc/services/metrics.py - > Line 72: df = df.reset_index(level=2) - File: gitnoc/gitnoc/services/metrics.py - > Line 73: df = df.sort_values(by=['loc'], ascending=False) -File: gitnoc/gitnoc/services/metrics.py - > reaches line 76, trigger word "replace(": - out.append('file_name''loc''owner''extension''last_edit''clean_file_name'df.loc[(idx, 'file')]df.loc[(idx, 'loc')]df.loc[(idx, 'file_owner')]df.loc[(idx, 'ext')]df.loc[(idx, 'last_edit_date')].strftime('%H:%M %d-%m-%Y')df.loc[(idx, 'file')].replace('/', '-')) - -Vulnerability 2: -File: gitnoc/gitnoc/services/metrics.py - > User input at line 66, trigger word "get(": - ignore_dir = settings.get('ignore_dir', None) -Reassigned in: - File: gitnoc/gitnoc/services/metrics.py - > Line 71: df = repo.file_detail(extensions=extensions, ignore_dir=ignore_dir) - File: gitnoc/gitnoc/services/metrics.py - > Line 72: df = df.reset_index(level=2) - File: gitnoc/gitnoc/services/metrics.py - > Line 73: df = df.sort_values(by=['loc'], ascending=False) -File: gitnoc/gitnoc/services/metrics.py - > reaches line 76, trigger word "replace(": - out.append('file_name''loc''owner''extension''last_edit''clean_file_name'df.loc[(idx, 'file')]df.loc[(idx, 'loc')]df.loc[(idx, 'file_owner')]df.loc[(idx, 'ext')]df.loc[(idx, 'last_edit_date')].strftime('%H:%M %d-%m-%Y')df.loc[(idx, 'file')].replace('/', '-')) - - - -parulsingh/FlaskAppCS194 -https://github.com/parulsingh/FlaskAppCS194 -Entry file: FlaskAppCS194/yelpapp.py -Scanned: 2016-10-25 14:56:21.372166 -Vulnerability 1: -File: FlaskAppCS194/yelpapp.py - > User input at line 89, trigger word "form[": - reviews = request.form['reviews'] -Reassigned in: - File: FlaskAppCS194/yelpapp.py - > Line 90: rating = clf.predictRating(reviews) -File: FlaskAppCS194/yelpapp.py - > reaches line 95, trigger word "execute(": - db.execute('INSERT INTO predictions (lyrics, artist) values (?, ?)', [reviews, str(rating)]) - - - -BeginMan/flask-timing -https://github.com/BeginMan/flask-timing -Entry file: flask-timing/app.py -Scanned: 2016-10-25 14:56:27.593268 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ibininja/upload_file_python -https://github.com/ibininja/upload_file_python -Entry file: upload_file_python/src/app_display_multiple_images.py -Scanned: 2016-10-25 14:56:28.901590 -No vulnerabilities found. - - -fraoustin/flaskserver -https://github.com/fraoustin/flaskserver -Entry file: None -Scanned: 2016-10-25 14:56:30.275553 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fraoustin/flaskserver. - -yaojf/python3 -https://github.com/yaojf/python3 -Entry file: python3/app.py -Scanned: 2016-10-25 14:56:32.390376 -Vulnerability 1: -File: python3/app.py - > User input at line 17, trigger word "form[": - username = request.form['username'] -File: python3/app.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('signin-ok.html',username=username) - -Vulnerability 2: -File: python3/app.py - > User input at line 17, trigger word "form[": - username = request.form['username'] -File: python3/app.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('form.html',message='Bad username or password', username=username) - - - -pdonorio/restangulask -https://github.com/pdonorio/restangulask -Entry file: restangulask/frontend/felask/server.py -Scanned: 2016-10-25 14:56:38.036810 -Vulnerability 1: -File: restangulask/frontend/felask/forms.py - > User input at line 50, trigger word "get(": - target = get_redirect_target() -Reassigned in: - File: restangulask/frontend/felask/forms.py - > Line 49: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data) -File: restangulask/frontend/felask/forms.py - > reaches line 51, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values)) - -Vulnerability 2: -File: restangulask/frontend/felask/forms.py - > User input at line 50, trigger word "get(": - target = get_redirect_target() -Reassigned in: - File: restangulask/frontend/felask/forms.py - > Line 49: ret_MAYBE_FUNCTION_NAME = redirect(self.next.data) -File: restangulask/frontend/felask/forms.py - > reaches line 51, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(target or url_for(endpoint,values)) - - - -CodeSelfStudy/flask_mongoengine_example -https://github.com/CodeSelfStudy/flask_mongoengine_example -Entry file: flask_mongoengine_example/app.py -Scanned: 2016-10-25 14:56:39.361239 -Vulnerability 1: -File: flask_mongoengine_example/app.py - > User input at line 20, trigger word "get(": - page = Page.objects.get(id=page_id) -File: flask_mongoengine_example/app.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('page.html',page=page) - -Vulnerability 2: -File: flask_mongoengine_example/app.py - > User input at line 34, trigger word "get(": - profile = Profile.objects.get(id=profile_id) -File: flask_mongoengine_example/app.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('profiles/profile.html',profile=profile) - - - -brennv/flaskr-dataset -https://github.com/brennv/flaskr-dataset -Entry file: flaskr-dataset/flaskr.py -Scanned: 2016-10-25 14:56:41.295474 -No vulnerabilities found. - - -weex/basic-flask21 -https://github.com/weex/basic-flask21 -Entry file: basic-flask21/server.py -Scanned: 2016-10-25 14:56:42.562274 -No vulnerabilities found. - - -c0deTalk/flask-deploy -https://github.com/c0deTalk/flask-deploy -Entry file: None -Scanned: 2016-10-25 14:56:43.816258 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/c0deTalk/flask-deploy. - -jinpark/flask-fts -https://github.com/jinpark/flask-fts -Entry file: flask-fts/app.py -Scanned: 2016-10-25 14:56:46.107264 -Vulnerability 1: -File: flask-fts/app.py - > User input at line 65, trigger word "form[": - search_term = request.form['search_term'] -Reassigned in: - File: flask-fts/app.py - > Line 66: results = Document.query.search(search_term) - File: flask-fts/app.py - > Line 69: ret_MAYBE_FUNCTION_NAME = render_template('search.html') -File: flask-fts/app.py - > reaches line 67, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_results.html',results=results, search_term=search_term) - -Vulnerability 2: -File: flask-fts/app.py - > User input at line 74, trigger word "form[": - search_term = request.form['search_term'] -Reassigned in: - File: flask-fts/app.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html') -File: flask-fts/app.py - > reaches line 79, trigger word "filter(": - results = search(db.session.query(Place).filter(func.ST_DWithin(Place.point, point, float(distance))), search_term) - -Vulnerability 3: -File: flask-fts/app.py - > User input at line 75, trigger word "form[": - distance = request.form['distance'] -Reassigned in: - File: flask-fts/app.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html') -File: flask-fts/app.py - > reaches line 79, trigger word "filter(": - results = search(db.session.query(Place).filter(func.ST_DWithin(Place.point, point, float(distance))), search_term) - -Vulnerability 4: -File: flask-fts/app.py - > User input at line 76, trigger word "form[": - latitude = request.form['latitude'] -Reassigned in: - File: flask-fts/app.py - > Line 78: point = WKTElement('POINT({0} {1})'.format(latitude, longitude),srid=4326) - File: flask-fts/app.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html') -File: flask-fts/app.py - > reaches line 79, trigger word "filter(": - results = search(db.session.query(Place).filter(func.ST_DWithin(Place.point, point, float(distance))), search_term) - -Vulnerability 5: -File: flask-fts/app.py - > User input at line 77, trigger word "form[": - longitude = request.form['longitude'] -Reassigned in: - File: flask-fts/app.py - > Line 78: point = WKTElement('POINT({0} {1})'.format(latitude, longitude),srid=4326) - File: flask-fts/app.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html') -File: flask-fts/app.py - > reaches line 79, trigger word "filter(": - results = search(db.session.query(Place).filter(func.ST_DWithin(Place.point, point, float(distance))), search_term) - -Vulnerability 6: -File: flask-fts/app.py - > User input at line 74, trigger word "form[": - search_term = request.form['search_term'] -Reassigned in: - File: flask-fts/app.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html') -File: flask-fts/app.py - > reaches line 80, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_place_results.html',results=results, search_term=search_term, distance=distance, latitude=latitude, longitude=longitude) - -Vulnerability 7: -File: flask-fts/app.py - > User input at line 75, trigger word "form[": - distance = request.form['distance'] -Reassigned in: - File: flask-fts/app.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html') -File: flask-fts/app.py - > reaches line 80, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_place_results.html',results=results, search_term=search_term, distance=distance, latitude=latitude, longitude=longitude) - -Vulnerability 8: -File: flask-fts/app.py - > User input at line 76, trigger word "form[": - latitude = request.form['latitude'] -Reassigned in: - File: flask-fts/app.py - > Line 78: point = WKTElement('POINT({0} {1})'.format(latitude, longitude),srid=4326) - File: flask-fts/app.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html') -File: flask-fts/app.py - > reaches line 80, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_place_results.html',results=results, search_term=search_term, distance=distance, latitude=latitude, longitude=longitude) - -Vulnerability 9: -File: flask-fts/app.py - > User input at line 77, trigger word "form[": - longitude = request.form['longitude'] -Reassigned in: - File: flask-fts/app.py - > Line 78: point = WKTElement('POINT({0} {1})'.format(latitude, longitude),srid=4326) - File: flask-fts/app.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('search_place.html') -File: flask-fts/app.py - > reaches line 80, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_place_results.html',results=results, search_term=search_term, distance=distance, latitude=latitude, longitude=longitude) - - - -breakbase/flask-cent -https://github.com/breakbase/flask-cent -Entry file: flask-cent/tests.py -Scanned: 2016-10-25 14:56:47.500942 -No vulnerabilities found. - - -ecerami/hello_flask -https://github.com/ecerami/hello_flask -Entry file: hello_flask/app.py -Scanned: 2016-10-25 14:56:48.764316 -No vulnerabilities found. - - -wq1308786830/flaskr -https://github.com/wq1308786830/flaskr -Entry file: None -Scanned: 2016-10-25 14:56:50.635410 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wq1308786830/flaskr. - -danparshall/flaskmilestone -https://github.com/danparshall/flaskmilestone -Entry file: flaskmilestone/app.py -Scanned: 2016-10-25 14:56:52.000179 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sabertwilight/flasky -https://github.com/sabertwilight/flasky -Entry file: flasky/flasky/app/__init__.py -Scanned: 2016-10-25 14:56:55.881811 -No vulnerabilities found. - - -jj199611/flaskr -https://github.com/jj199611/flaskr -Entry file: None -Scanned: 2016-10-25 14:56:56.424576 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jj199611/flaskr. - -goosling/flaskapp -https://github.com/goosling/flaskapp -Entry file: flaskapp/urltest.py -Scanned: 2016-10-25 14:56:57.719744 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -FredericoVieira/flaskapp -https://github.com/FredericoVieira/flaskapp -Entry file: flaskapp/app/__init__.py -Scanned: 2016-10-25 14:56:59.177336 -Vulnerability 1: -File: flaskapp/app/insertdata/views.py - > User input at line 21, trigger word ".data": - firstName = str(form.firstName.data) -File: flaskapp/app/insertdata/views.py - > reaches line 27, trigger word "execute(": - cursor.execute('INSERT INTO users (firstName, lastName, phone) VALUES ('%s', '%s', '%s')' % (firstName, lastName, phone)) - -Vulnerability 2: -File: flaskapp/app/insertdata/views.py - > User input at line 22, trigger word ".data": - lastName = str(form.lastName.data) -File: flaskapp/app/insertdata/views.py - > reaches line 27, trigger word "execute(": - cursor.execute('INSERT INTO users (firstName, lastName, phone) VALUES ('%s', '%s', '%s')' % (firstName, lastName, phone)) - -Vulnerability 3: -File: flaskapp/app/insertdata/views.py - > User input at line 23, trigger word ".data": - phone = str(form.phone.data) -File: flaskapp/app/insertdata/views.py - > reaches line 27, trigger word "execute(": - cursor.execute('INSERT INTO users (firstName, lastName, phone) VALUES ('%s', '%s', '%s')' % (firstName, lastName, phone)) - -Vulnerability 4: -File: flaskapp/app/insertdata/views.py - > User input at line 21, trigger word ".data": - firstName = str(form.firstName.data) -File: flaskapp/app/insertdata/views.py - > reaches line 30, trigger word "flash(": - flash('Dados inseridos com sucesso! First Name = "%s", Last Name = "%s", Phone = "%s"' % (firstName, lastName, phone)) - -Vulnerability 5: -File: flaskapp/app/insertdata/views.py - > User input at line 22, trigger word ".data": - lastName = str(form.lastName.data) -File: flaskapp/app/insertdata/views.py - > reaches line 30, trigger word "flash(": - flash('Dados inseridos com sucesso! First Name = "%s", Last Name = "%s", Phone = "%s"' % (firstName, lastName, phone)) - -Vulnerability 6: -File: flaskapp/app/insertdata/views.py - > User input at line 23, trigger word ".data": - phone = str(form.phone.data) -File: flaskapp/app/insertdata/views.py - > reaches line 30, trigger word "flash(": - flash('Dados inseridos com sucesso! First Name = "%s", Last Name = "%s", Phone = "%s"' % (firstName, lastName, phone)) - - - -dogom/flasky -https://github.com/dogom/flasky -Entry file: flasky/hello.py -Scanned: 2016-10-25 14:57:00.497624 -No vulnerabilities found. - - -alex-marmot/flaskr -https://github.com/alex-marmot/flaskr -Entry file: None -Scanned: 2016-10-25 14:57:01.058126 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/alex-marmot/flaskr. - -kai1/flasktest -https://github.com/kai1/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-25 14:57:02.627573 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -willianribeiro/flaskr -https://github.com/willianribeiro/flaskr -Entry file: None -Scanned: 2016-10-25 14:57:03.174986 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/willianribeiro/flaskr. - -lz1988/flaskweb -https://github.com/lz1988/flaskweb -Entry file: flaskweb/flaskr/flaskr.py -Scanned: 2016-10-25 14:57:09.411711 -No vulnerabilities found. - - -StuartChristie/Flasky -https://github.com/StuartChristie/Flasky -Entry file: Flasky/untitled.py -Scanned: 2016-10-25 14:57:10.701712 -No vulnerabilities found. - - -buchenglei/flaskr -https://github.com/buchenglei/flaskr -Entry file: None -Scanned: 2016-10-25 14:57:11.223012 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/buchenglei/flaskr. - -cteeeri/flaskblueprint -https://github.com/cteeeri/flaskblueprint -Entry file: flaskblueprint/app/__init__.py -Scanned: 2016-10-25 14:57:12.457312 -No vulnerabilities found. - - -KevinFuU/flasky -https://github.com/KevinFuU/flasky -Entry file: flasky/hello1.py -Scanned: 2016-10-25 14:57:14.294197 -Vulnerability 1: -File: flasky/tests/test_client.py - > User input at line 22, trigger word "get(": - response = self.client.get(url_for('main.index')) -File: flasky/tests/test_client.py - > reaches line 22, trigger word "url_for(": - response = self.client.get(url_for('main.index')) - -Vulnerability 2: -File: flasky/tests/test_client.py - > User input at line 47, trigger word "get(": - response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True) -File: flasky/tests/test_client.py - > reaches line 27, trigger word "url_for(": - response = self.client.post(url_for('auth.register'),data='email''username''password''password2''john@example.com''john''cat''cat') - -Vulnerability 3: -File: flasky/tests/test_client.py - > User input at line 53, trigger word "get(": - response = self.client.get(url_for('auth.logout'),follow_redirects=True) -File: flasky/tests/test_client.py - > reaches line 27, trigger word "url_for(": - response = self.client.post(url_for('auth.register'),data='email''username''password''password2''john@example.com''john''cat''cat') - -Vulnerability 4: -File: flasky/tests/test_client.py - > User input at line 47, trigger word "get(": - response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True) -File: flasky/tests/test_client.py - > reaches line 36, trigger word "url_for(": - response = self.client.post(url_for('auth.login'),data='email''password''john@example.com''cat', follow_redirects=True) - -Vulnerability 5: -File: flasky/tests/test_client.py - > User input at line 53, trigger word "get(": - response = self.client.get(url_for('auth.logout'),follow_redirects=True) -File: flasky/tests/test_client.py - > reaches line 36, trigger word "url_for(": - response = self.client.post(url_for('auth.login'),data='email''password''john@example.com''cat', follow_redirects=True) - -Vulnerability 6: -File: flasky/tests/test_client.py - > User input at line 47, trigger word "get(": - response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True) -File: flasky/tests/test_client.py - > reaches line 47, trigger word "url_for(": - response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True) - -Vulnerability 7: -File: flasky/tests/test_client.py - > User input at line 53, trigger word "get(": - response = self.client.get(url_for('auth.logout'),follow_redirects=True) -File: flasky/tests/test_client.py - > reaches line 47, trigger word "url_for(": - response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True) - -Vulnerability 8: -File: flasky/tests/test_client.py - > User input at line 47, trigger word "get(": - response = self.client.get(url_for('auth.confirm',token=token),follow_redirects=True) -File: flasky/tests/test_client.py - > reaches line 53, trigger word "url_for(": - response = self.client.get(url_for('auth.logout'),follow_redirects=True) - -Vulnerability 9: -File: flasky/tests/test_client.py - > User input at line 53, trigger word "get(": - response = self.client.get(url_for('auth.logout'),follow_redirects=True) -File: flasky/tests/test_client.py - > reaches line 53, trigger word "url_for(": - response = self.client.get(url_for('auth.logout'),follow_redirects=True) - -Vulnerability 10: -File: flasky/tests/test_api.py - > User input at line 41, trigger word "get(": - response = self.client.get(url_for('api.get_posts'),content_type='application/json') -File: flasky/tests/test_api.py - > reaches line 41, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),content_type='application/json') - -Vulnerability 11: -File: flasky/tests/test_api.py - > User input at line 55, trigger word "get(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('john@example.com', 'dog')) -File: flasky/tests/test_api.py - > reaches line 55, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('john@example.com', 'dog')) - -Vulnerability 12: -File: flasky/tests/test_api.py - > User input at line 70, trigger word "get(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', '')) -File: flasky/tests/test_api.py - > reaches line 70, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', '')) - -Vulnerability 13: -File: flasky/tests/test_api.py - > User input at line 76, trigger word "get(": - response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 70, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', '')) - -Vulnerability 14: -File: flasky/tests/test_api.py - > User input at line 80, trigger word ".data": - json_response = json.loads(response.data.decode('utf-8')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 82: token = json_response['token'] -File: flasky/tests/test_api.py - > reaches line 70, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', '')) - -Vulnerability 15: -File: flasky/tests/test_api.py - > User input at line 85, trigger word "get(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, '')) -File: flasky/tests/test_api.py - > reaches line 70, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', '')) - -Vulnerability 16: -File: flasky/tests/test_api.py - > User input at line 70, trigger word "get(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', '')) -File: flasky/tests/test_api.py - > reaches line 76, trigger word "url_for(": - response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 17: -File: flasky/tests/test_api.py - > User input at line 76, trigger word "get(": - response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 76, trigger word "url_for(": - response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 18: -File: flasky/tests/test_api.py - > User input at line 80, trigger word ".data": - json_response = json.loads(response.data.decode('utf-8')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 82: token = json_response['token'] -File: flasky/tests/test_api.py - > reaches line 76, trigger word "url_for(": - response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 19: -File: flasky/tests/test_api.py - > User input at line 85, trigger word "get(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, '')) -File: flasky/tests/test_api.py - > reaches line 76, trigger word "url_for(": - response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 20: -File: flasky/tests/test_api.py - > User input at line 70, trigger word "get(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('bad-token', '')) -File: flasky/tests/test_api.py - > reaches line 85, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, '')) - -Vulnerability 21: -File: flasky/tests/test_api.py - > User input at line 76, trigger word "get(": - response = self.client.get(url_for('api.get_token'),headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 85, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, '')) - -Vulnerability 22: -File: flasky/tests/test_api.py - > User input at line 80, trigger word ".data": - json_response = json.loads(response.data.decode('utf-8')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 82: token = json_response['token'] -File: flasky/tests/test_api.py - > reaches line 85, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, '')) - -Vulnerability 23: -File: flasky/tests/test_api.py - > User input at line 85, trigger word "get(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, '')) -File: flasky/tests/test_api.py - > reaches line 85, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers(token, '')) - -Vulnerability 24: -File: flasky/tests/test_api.py - > User input at line 91, trigger word "get(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('', '')) -File: flasky/tests/test_api.py - > reaches line 91, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('', '')) - -Vulnerability 25: -File: flasky/tests/test_api.py - > User input at line 106, trigger word "get(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 106, trigger word "url_for(": - response = self.client.get(url_for('api.get_posts'),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 26: -File: flasky/tests/test_api.py - > User input at line 133, trigger word "get(": - url = response.headers.get('Location') -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 121, trigger word "url_for(": - response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''')) - -Vulnerability 27: -File: flasky/tests/test_api.py - > User input at line 137, trigger word "get(": - response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 121, trigger word "url_for(": - response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''')) - -Vulnerability 28: -File: flasky/tests/test_api.py - > User input at line 149, trigger word "get(": - response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 121, trigger word "url_for(": - response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''')) - -Vulnerability 29: -File: flasky/tests/test_api.py - > User input at line 159, trigger word "get(": - response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 121, trigger word "url_for(": - response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''')) - -Vulnerability 30: -File: flasky/tests/test_api.py - > User input at line 133, trigger word "get(": - url = response.headers.get('Location') -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 128, trigger word "url_for(": - response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''body of the *blog* post')) - -Vulnerability 31: -File: flasky/tests/test_api.py - > User input at line 137, trigger word "get(": - response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 128, trigger word "url_for(": - response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''body of the *blog* post')) - -Vulnerability 32: -File: flasky/tests/test_api.py - > User input at line 149, trigger word "get(": - response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 128, trigger word "url_for(": - response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''body of the *blog* post')) - -Vulnerability 33: -File: flasky/tests/test_api.py - > User input at line 159, trigger word "get(": - response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 128, trigger word "url_for(": - response = self.client.post(url_for('api.new_post'),headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''body of the *blog* post')) - -Vulnerability 34: -File: flasky/tests/test_api.py - > User input at line 133, trigger word "get(": - url = response.headers.get('Location') -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 149, trigger word "url_for(": - response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 35: -File: flasky/tests/test_api.py - > User input at line 137, trigger word "get(": - response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 149, trigger word "url_for(": - response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 36: -File: flasky/tests/test_api.py - > User input at line 149, trigger word "get(": - response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 149, trigger word "url_for(": - response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 37: -File: flasky/tests/test_api.py - > User input at line 159, trigger word "get(": - response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 149, trigger word "url_for(": - response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 38: -File: flasky/tests/test_api.py - > User input at line 133, trigger word "get(": - url = response.headers.get('Location') -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 159, trigger word "url_for(": - response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 39: -File: flasky/tests/test_api.py - > User input at line 137, trigger word "get(": - response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 159, trigger word "url_for(": - response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 40: -File: flasky/tests/test_api.py - > User input at line 149, trigger word "get(": - response = self.client.get(url_for('api.get_user_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 159, trigger word "url_for(": - response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 41: -File: flasky/tests/test_api.py - > User input at line 159, trigger word "get(": - response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 137: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) - File: flasky/tests/test_api.py - > Line 169: response = self.client.put(url,headers=self.get_api_headers('john@example.com', 'cat'), data=json.dumps('body''updated body')) -File: flasky/tests/test_api.py - > reaches line 159, trigger word "url_for(": - response = self.client.get(url_for('api.get_user_followed_posts',id=u.id),headers=self.get_api_headers('john@example.com', 'cat')) - -Vulnerability 42: -File: flasky/tests/test_api.py - > User input at line 191, trigger word "get(": - response = self.client.get(url_for('api.get_user',id=u1.id),headers=self.get_api_headers('susan@example.com', 'dog')) -File: flasky/tests/test_api.py - > reaches line 191, trigger word "url_for(": - response = self.client.get(url_for('api.get_user',id=u1.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 43: -File: flasky/tests/test_api.py - > User input at line 197, trigger word "get(": - response = self.client.get(url_for('api.get_user',id=u2.id),headers=self.get_api_headers('susan@example.com', 'dog')) -File: flasky/tests/test_api.py - > reaches line 191, trigger word "url_for(": - response = self.client.get(url_for('api.get_user',id=u1.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 44: -File: flasky/tests/test_api.py - > User input at line 191, trigger word "get(": - response = self.client.get(url_for('api.get_user',id=u1.id),headers=self.get_api_headers('susan@example.com', 'dog')) -File: flasky/tests/test_api.py - > reaches line 197, trigger word "url_for(": - response = self.client.get(url_for('api.get_user',id=u2.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 45: -File: flasky/tests/test_api.py - > User input at line 197, trigger word "get(": - response = self.client.get(url_for('api.get_user',id=u2.id),headers=self.get_api_headers('susan@example.com', 'dog')) -File: flasky/tests/test_api.py - > reaches line 197, trigger word "url_for(": - response = self.client.get(url_for('api.get_user',id=u2.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 46: -File: flasky/tests/test_api.py - > User input at line 227, trigger word "get(": - url = response.headers.get('Location') -Reassigned in: - File: flasky/tests/test_api.py - > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 221, trigger word "url_for(": - response = self.client.post(url_for('api.new_post_comment',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'), data=json.dumps('body''Good [post](http://example.com)!')) - -Vulnerability 47: -File: flasky/tests/test_api.py - > User input at line 235, trigger word "get(": - response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 221, trigger word "url_for(": - response = self.client.post(url_for('api.new_post_comment',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'), data=json.dumps('body''Good [post](http://example.com)!')) - -Vulnerability 48: -File: flasky/tests/test_api.py - > User input at line 250, trigger word "get(": - response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 221, trigger word "url_for(": - response = self.client.post(url_for('api.new_post_comment',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'), data=json.dumps('body''Good [post](http://example.com)!')) - -Vulnerability 49: -File: flasky/tests/test_api.py - > User input at line 259, trigger word "get(": - response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 221, trigger word "url_for(": - response = self.client.post(url_for('api.new_post_comment',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog'), data=json.dumps('body''Good [post](http://example.com)!')) - -Vulnerability 50: -File: flasky/tests/test_api.py - > User input at line 227, trigger word "get(": - url = response.headers.get('Location') -Reassigned in: - File: flasky/tests/test_api.py - > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 250, trigger word "url_for(": - response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 51: -File: flasky/tests/test_api.py - > User input at line 235, trigger word "get(": - response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 250, trigger word "url_for(": - response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 52: -File: flasky/tests/test_api.py - > User input at line 250, trigger word "get(": - response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 250, trigger word "url_for(": - response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 53: -File: flasky/tests/test_api.py - > User input at line 259, trigger word "get(": - response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 250, trigger word "url_for(": - response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 54: -File: flasky/tests/test_api.py - > User input at line 227, trigger word "get(": - url = response.headers.get('Location') -Reassigned in: - File: flasky/tests/test_api.py - > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 259, trigger word "url_for(": - response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 55: -File: flasky/tests/test_api.py - > User input at line 235, trigger word "get(": - response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 259, trigger word "url_for(": - response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 56: -File: flasky/tests/test_api.py - > User input at line 250, trigger word "get(": - response = self.client.get(url_for('api.get_post_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 259, trigger word "url_for(": - response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 57: -File: flasky/tests/test_api.py - > User input at line 259, trigger word "get(": - response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) -Reassigned in: - File: flasky/tests/test_api.py - > Line 235: response = self.client.get(url,headers=self.get_api_headers('john@example.com', 'cat')) -File: flasky/tests/test_api.py - > reaches line 259, trigger word "url_for(": - response = self.client.get(url_for('api.get_comments',id=post.id),headers=self.get_api_headers('susan@example.com', 'dog')) - -Vulnerability 58: -File: flasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky/app/api_1_0/posts.py - > Line 19: next = None -File: flasky/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 59: -File: flasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky/app/api_1_0/posts.py - > Line 19: next = None -File: flasky/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 60: -File: flasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky/app/api_1_0/posts.py - > Line 19: next = None -File: flasky/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 61: -File: flasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky/app/api_1_0/users.py - > Line 20: prev = None - File: flasky/app/api_1_0/users.py - > Line 23: next = None -File: flasky/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 62: -File: flasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky/app/api_1_0/users.py - > Line 20: prev = None - File: flasky/app/api_1_0/users.py - > Line 23: next = None -File: flasky/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 63: -File: flasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky/app/api_1_0/users.py - > Line 20: prev = None - File: flasky/app/api_1_0/users.py - > Line 23: next = None -File: flasky/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 64: -File: flasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky/app/api_1_0/users.py - > Line 42: prev = None - File: flasky/app/api_1_0/users.py - > Line 45: next = None -File: flasky/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 65: -File: flasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky/app/api_1_0/users.py - > Line 42: prev = None - File: flasky/app/api_1_0/users.py - > Line 45: next = None -File: flasky/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 66: -File: flasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky/app/api_1_0/users.py - > Line 42: prev = None - File: flasky/app/api_1_0/users.py - > Line 45: next = None -File: flasky/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 67: -File: flasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky/app/api_1_0/comments.py - > Line 18: next = None -File: flasky/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 68: -File: flasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky/app/api_1_0/comments.py - > Line 18: next = None -File: flasky/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 69: -File: flasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky/app/api_1_0/comments.py - > Line 18: next = None -File: flasky/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 70: -File: flasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky/app/api_1_0/comments.py - > Line 46: next = None -File: flasky/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 71: -File: flasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky/app/api_1_0/comments.py - > Line 46: next = None -File: flasky/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 72: -File: flasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky/app/api_1_0/comments.py - > Line 46: next = None -File: flasky/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 73: -File: flasky/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/main/views.py - > Line 55: posts = pagination.items - File: flasky/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 74: -File: flasky/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flasky/app/main/views.py - > Line 45: show_followed = False - File: flasky/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 75: -File: flasky/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky/app/main/views.py - > Line 67: posts = pagination.items -File: flasky/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 76: -File: flasky/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flasky/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky/app/main/views.py - > Line 134: comments = pagination.items - File: flasky/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flasky/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 77: -File: flasky/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flasky/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 78: -File: flasky/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flasky/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 79: -File: flasky/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky/app/main/views.py - > Line 246: comments = pagination.items -File: flasky/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -chipmakk/flaskproject -https://github.com/chipmakk/flaskproject -Entry file: flaskproject/server2.py -Scanned: 2016-10-25 14:57:23.670682 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -githubfun/flaskr -https://github.com/githubfun/flaskr -Entry file: None -Scanned: 2016-10-25 14:57:28.208866 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/githubfun/flaskr. - -sachprem/flaskdemosac -https://github.com/sachprem/flaskdemosac -Entry file: flaskdemosac/app.py -Scanned: 2016-10-25 14:57:30.614654 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -joe8767/flaskr -https://github.com/joe8767/flaskr -Entry file: None -Scanned: 2016-10-25 14:57:31.146534 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/joe8767/flaskr. - -milinbhakta/flaskmaterialdesign -https://github.com/milinbhakta/flaskmaterialdesign -Entry file: flaskmaterialdesign/venv/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-25 14:57:40.314079 -No vulnerabilities found. - - -Hellemos/flaskapp -https://github.com/Hellemos/flaskapp -Entry file: flaskapp/routes.py -Scanned: 2016-10-25 14:57:48.230451 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapp/flaskapp_env/lib/python2.7/sre_compile.py - -ssssergey/flaskengine -https://github.com/ssssergey/flaskengine -Entry file: flaskengine/app/__init__.py -Scanned: 2016-10-25 14:57:49.990002 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -davidkurkov/flasktaskr -https://github.com/davidkurkov/flasktaskr -Entry file: flasktaskr/views.py -Scanned: 2016-10-25 14:57:51.398339 -No vulnerabilities found. - - -a1GoXplorer/flaskmodellingpractice -https://github.com/a1GoXplorer/flaskmodellingpractice -Entry file: flaskmodellingpractice/flaskr/flaskr.py -Scanned: 2016-10-25 14:57:58.430752 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskmodellingpractice/flaskr/venv/lib/python2.7/sre_compile.py - -stepsame/flaskq -https://github.com/stepsame/flaskq -Entry file: flaskq/app/__init__.py -Scanned: 2016-10-25 14:58:01.987540 -Vulnerability 1: -File: flaskq/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/users.py - > Line 16: pagination = user.questions.order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/users.py - > Line 19: questions = pagination.items - File: flaskq/app/api_1_0/users.py - > Line 20: prev = None - File: flaskq/app/api_1_0/users.py - > Line 23: next = None -File: flaskq/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_questions',page=page - 1, _external=True) - -Vulnerability 2: -File: flaskq/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/users.py - > Line 16: pagination = user.questions.order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/users.py - > Line 19: questions = pagination.items - File: flaskq/app/api_1_0/users.py - > Line 20: prev = None - File: flaskq/app/api_1_0/users.py - > Line 23: next = None -File: flaskq/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_questions',page=page + 1, _external=True) - -Vulnerability 3: -File: flaskq/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/users.py - > Line 16: pagination = user.questions.order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/users.py - > Line 19: questions = pagination.items - File: flaskq/app/api_1_0/users.py - > Line 20: prev = None - File: flaskq/app/api_1_0/users.py - > Line 23: next = None -File: flaskq/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('questions''prev''next''count'[question.to_json() for question in questions]prevnextpagination.total) - -Vulnerability 4: -File: flaskq/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/users.py - > Line 38: pagination = user.answers.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/users.py - > Line 41: answers = pagination.items - File: flaskq/app/api_1_0/users.py - > Line 42: prev = None - File: flaskq/app/api_1_0/users.py - > Line 45: next = None -File: flaskq/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_answers',page=page - 1, _external=True) - -Vulnerability 5: -File: flaskq/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/users.py - > Line 38: pagination = user.answers.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/users.py - > Line 41: answers = pagination.items - File: flaskq/app/api_1_0/users.py - > Line 42: prev = None - File: flaskq/app/api_1_0/users.py - > Line 45: next = None -File: flaskq/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_user_answers',page=page + 1, _external=True) - -Vulnerability 6: -File: flaskq/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/users.py - > Line 38: pagination = user.answers.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/users.py - > Line 41: answers = pagination.items - File: flaskq/app/api_1_0/users.py - > Line 42: prev = None - File: flaskq/app/api_1_0/users.py - > Line 45: next = None -File: flaskq/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('answers''prev''next''count'[answer.to_json() for answer in answers]prevnextpagination.total) - -Vulnerability 7: -File: flaskq/app/api_1_0/users.py - > User input at line 59, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/users.py - > Line 60: pagination = user.followed_activities.order_by(Activity.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ACTIVITIES_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/users.py - > Line 63: activities = pagination.items - File: flaskq/app/api_1_0/users.py - > Line 64: prev = None - File: flaskq/app/api_1_0/users.py - > Line 68: next = None -File: flaskq/app/api_1_0/users.py - > reaches line 66, trigger word "url_for(": - prev = url_for('api.get_user_followed_activities',page=page - 1, _external=True) - -Vulnerability 8: -File: flaskq/app/api_1_0/users.py - > User input at line 59, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/users.py - > Line 60: pagination = user.followed_activities.order_by(Activity.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ACTIVITIES_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/users.py - > Line 63: activities = pagination.items - File: flaskq/app/api_1_0/users.py - > Line 64: prev = None - File: flaskq/app/api_1_0/users.py - > Line 68: next = None -File: flaskq/app/api_1_0/users.py - > reaches line 70, trigger word "url_for(": - next = url_for('api.get_user_followed_activities',page=page + 1, _external=True) - -Vulnerability 9: -File: flaskq/app/api_1_0/users.py - > User input at line 59, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/users.py - > Line 60: pagination = user.followed_activities.order_by(Activity.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ACTIVITIES_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/users.py - > Line 63: activities = pagination.items - File: flaskq/app/api_1_0/users.py - > Line 64: prev = None - File: flaskq/app/api_1_0/users.py - > Line 68: next = None -File: flaskq/app/api_1_0/users.py - > reaches line 72, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('activities''prev''next''count'[activity.object.to_json() for activity in activities]prevnextpagination.total) - -Vulnerability 10: -File: flaskq/app/api_1_0/answers.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/answers.py - > Line 12: pagination = Answer.query.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/answers.py - > Line 15: answers = pagination.items - File: flaskq/app/api_1_0/answers.py - > Line 16: prev = None - File: flaskq/app/api_1_0/answers.py - > Line 19: next = None -File: flaskq/app/api_1_0/answers.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_answers',page=page - 1, _external=True) - -Vulnerability 11: -File: flaskq/app/api_1_0/answers.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/answers.py - > Line 12: pagination = Answer.query.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/answers.py - > Line 15: answers = pagination.items - File: flaskq/app/api_1_0/answers.py - > Line 16: prev = None - File: flaskq/app/api_1_0/answers.py - > Line 19: next = None -File: flaskq/app/api_1_0/answers.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_answers',page=page + 1, _external=True) - -Vulnerability 12: -File: flaskq/app/api_1_0/answers.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/answers.py - > Line 12: pagination = Answer.query.order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/answers.py - > Line 15: answers = pagination.items - File: flaskq/app/api_1_0/answers.py - > Line 16: prev = None - File: flaskq/app/api_1_0/answers.py - > Line 19: next = None -File: flaskq/app/api_1_0/answers.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('answers''prev''next''count'[answer.to_json() for answer in answers]prevnextpagination.total) - -Vulnerability 13: -File: flaskq/app/api_1_0/answers.py - > User input at line 32, trigger word "get(": - answer = Answer.query.get(id) -File: flaskq/app/api_1_0/answers.py - > reaches line 33, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(answer.to_json()) - -Vulnerability 14: -File: flaskq/app/api_1_0/answers.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/answers.py - > Line 40: pagination = question.answers.order_by(Answer.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/answers.py - > Line 43: answers = pagination.items - File: flaskq/app/api_1_0/answers.py - > Line 44: prev = None - File: flaskq/app/api_1_0/answers.py - > Line 47: next = None -File: flaskq/app/api_1_0/answers.py - > reaches line 46, trigger word "url_for(": - prev = url_for('api.get_question_answers',page=page - 1, _external=True) - -Vulnerability 15: -File: flaskq/app/api_1_0/answers.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/answers.py - > Line 40: pagination = question.answers.order_by(Answer.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/answers.py - > Line 43: answers = pagination.items - File: flaskq/app/api_1_0/answers.py - > Line 44: prev = None - File: flaskq/app/api_1_0/answers.py - > Line 47: next = None -File: flaskq/app/api_1_0/answers.py - > reaches line 49, trigger word "url_for(": - next = url_for('api.get_question_answers',page=page + 1, _external=True) - -Vulnerability 16: -File: flaskq/app/api_1_0/answers.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/answers.py - > Line 40: pagination = question.answers.order_by(Answer.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/answers.py - > Line 43: answers = pagination.items - File: flaskq/app/api_1_0/answers.py - > Line 44: prev = None - File: flaskq/app/api_1_0/answers.py - > Line 47: next = None -File: flaskq/app/api_1_0/answers.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('answers''prev''next''count'[answer.to_json() for answer in answers]prevnextpagination.total) - -Vulnerability 17: -File: flaskq/app/api_1_0/questions.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/questions.py - > Line 12: pagination = Question.query.paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/questions.py - > Line 15: questions = pagination.items - File: flaskq/app/api_1_0/questions.py - > Line 16: prev = None - File: flaskq/app/api_1_0/questions.py - > Line 19: next = None -File: flaskq/app/api_1_0/questions.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_questions',page=page - 1, _external=True) - -Vulnerability 18: -File: flaskq/app/api_1_0/questions.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/questions.py - > Line 12: pagination = Question.query.paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/questions.py - > Line 15: questions = pagination.items - File: flaskq/app/api_1_0/questions.py - > Line 16: prev = None - File: flaskq/app/api_1_0/questions.py - > Line 19: next = None -File: flaskq/app/api_1_0/questions.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_questions',page=page + 1, _external=True) - -Vulnerability 19: -File: flaskq/app/api_1_0/questions.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/questions.py - > Line 12: pagination = Question.query.paginate(page,per_page=current_app.config['FLASKQ_QUESTIONS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/questions.py - > Line 15: questions = pagination.items - File: flaskq/app/api_1_0/questions.py - > Line 16: prev = None - File: flaskq/app/api_1_0/questions.py - > Line 19: next = None -File: flaskq/app/api_1_0/questions.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('questions''prev''next''count'[question.to_json() for question in questions]prevnextpagination.total) - -Vulnerability 20: -File: flaskq/app/api_1_0/questions.py - > User input at line 32, trigger word "get(": - question = Question.query.get(id) -File: flaskq/app/api_1_0/questions.py - > reaches line 33, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(question.to_json()) - -Vulnerability 21: -File: flaskq/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskq/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskq/app/api_1_0/comments.py - > Line 18: next = None -File: flaskq/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 22: -File: flaskq/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskq/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskq/app/api_1_0/comments.py - > Line 18: next = None -File: flaskq/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 23: -File: flaskq/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskq/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskq/app/api_1_0/comments.py - > Line 18: next = None -File: flaskq/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 24: -File: flaskq/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/comments.py - > Line 39: pagination = question.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskq/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskq/app/api_1_0/comments.py - > Line 46: next = None -File: flaskq/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_question_comments',page=page - 1, _external=True) - -Vulnerability 25: -File: flaskq/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/comments.py - > Line 39: pagination = question.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskq/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskq/app/api_1_0/comments.py - > Line 46: next = None -File: flaskq/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_question_comments',page=page + 1, _external=True) - -Vulnerability 26: -File: flaskq/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/comments.py - > Line 39: pagination = question.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskq/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskq/app/api_1_0/comments.py - > Line 46: next = None -File: flaskq/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 27: -File: flaskq/app/api_1_0/comments.py - > User input at line 60, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/comments.py - > Line 61: pagination = answer.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/comments.py - > Line 64: comments = pagination.items - File: flaskq/app/api_1_0/comments.py - > Line 65: prev = None - File: flaskq/app/api_1_0/comments.py - > Line 68: next = None -File: flaskq/app/api_1_0/comments.py - > reaches line 67, trigger word "url_for(": - prev = url_for('api.get_answer_comments',page=page - 1, _external=True) - -Vulnerability 28: -File: flaskq/app/api_1_0/comments.py - > User input at line 60, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/comments.py - > Line 61: pagination = answer.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/comments.py - > Line 64: comments = pagination.items - File: flaskq/app/api_1_0/comments.py - > Line 65: prev = None - File: flaskq/app/api_1_0/comments.py - > Line 68: next = None -File: flaskq/app/api_1_0/comments.py - > reaches line 70, trigger word "url_for(": - next = url_for('api.get_answer_comments',page=page + 1, _external=True) - -Vulnerability 29: -File: flaskq/app/api_1_0/comments.py - > User input at line 60, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/api_1_0/comments.py - > Line 61: pagination = answer.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKQ_COMMENTS_PER_PAGE'], error_out=False) - File: flaskq/app/api_1_0/comments.py - > Line 64: comments = pagination.items - File: flaskq/app/api_1_0/comments.py - > Line 65: prev = None - File: flaskq/app/api_1_0/comments.py - > Line 68: next = None -File: flaskq/app/api_1_0/comments.py - > reaches line 71, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 30: -File: flaskq/app/main/views.py - > User input at line 52, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/main/views.py - > Line 60: pagination = query.order_by(Activity.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKQ_ACTIVITIES_PER_PAGE'], error_out=False) - File: flaskq/app/main/views.py - > Line 63: activities = pagination.items - File: flaskq/app/main/views.py - > Line 51: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskq/app/main/views.py - > reaches line 65, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, activities=activities, show_followed=show_followed, pagination=pagination, comment_form=comment_form) - -Vulnerability 31: -File: flaskq/app/main/views.py - > User input at line 55, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskq/app/main/views.py - > Line 53: show_followed = False - File: flaskq/app/main/views.py - > Line 51: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskq/app/main/views.py - > reaches line 65, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, activities=activities, show_followed=show_followed, pagination=pagination, comment_form=comment_form) - -Vulnerability 32: -File: flaskq/app/main/views.py - > User input at line 74, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/main/views.py - > Line 75: pagination = user.answers.order_by(Answer.timestamp.desc()).paginate(page=page, per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/main/views.py - > Line 78: answers = pagination.items -File: flaskq/app/main/views.py - > reaches line 79, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, answers=answers, pagination=pagination, profile=True) - -Vulnerability 33: -File: flaskq/app/main/views.py - > User input at line 131, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/main/views.py - > Line 132: pagination = question.answers.order_by(Answer.ranking.desc()).paginate(page,per_page=current_app.config['FLASKQ_ANSWERS_PER_PAGE'], error_out=False) - File: flaskq/app/main/views.py - > Line 135: answers = pagination.items -File: flaskq/app/main/views.py - > reaches line 136, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('question.html',questions=[question], answers=answers, pagination=pagination) - -Vulnerability 34: -File: flaskq/app/main/views.py - > User input at line 248, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/main/views.py - > Line 249: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKQ_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskq/app/main/views.py - > Line 252: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskq/app/main/views.py - > Line 247: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskq/app/main/views.py - > reaches line 254, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Follwers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 35: -File: flaskq/app/main/views.py - > User input at line 266, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskq/app/main/views.py - > Line 267: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKQ_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskq/app/main/views.py - > Line 270: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskq/app/main/views.py - > Line 265: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskq/app/main/views.py - > reaches line 272, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Follwed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 36: -File: flaskq/app/main/views.py - > User input at line 339, trigger word "get(": - q = request.args.get('q') -File: flaskq/app/main/views.py - > reaches line 340, trigger word "filter(": - questions = Question.query.filter(Question.body.like('%' + q + '%')).all() - -Vulnerability 37: -File: flaskq/app/main/views.py - > User input at line 339, trigger word "get(": - q = request.args.get('q') -File: flaskq/app/main/views.py - > reaches line 341, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('results.html',questions=questions, q=q) - - - -rschmidtz/flaskbook -https://github.com/rschmidtz/flaskbook -Entry file: flaskbook/book/__init__.py -Scanned: 2016-10-25 14:58:04.887903 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -vincent-fei/flaskr -https://github.com/vincent-fei/flaskr -Entry file: None -Scanned: 2016-10-25 14:58:05.451470 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vincent-fei/flaskr. - -milinbhakta/flaskjinja -https://github.com/milinbhakta/flaskjinja -Entry file: flaskjinja/hello.py -Scanned: 2016-10-25 14:58:15.328086 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -chouisbo/flaskdemo -https://github.com/chouisbo/flaskdemo -Entry file: flaskdemo/app/app.py -Scanned: 2016-10-25 14:58:17.258596 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -saucecode/flaskcat -https://github.com/saucecode/flaskcat -Entry file: flaskcat/flaskcat.py -Scanned: 2016-10-25 14:58:18.549245 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -wiggitywalt/flasktaskr -https://github.com/wiggitywalt/flasktaskr -Entry file: flasktaskr/project/__init__.py -Scanned: 2016-10-25 14:58:25.133556 -No vulnerabilities found. - - -mcruger/flaskr -https://github.com/mcruger/flaskr -Entry file: None -Scanned: 2016-10-25 14:58:25.644123 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mcruger/flaskr. - -zerodaemon/flaskr -https://github.com/zerodaemon/flaskr -Entry file: None -Scanned: 2016-10-25 14:58:26.153462 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zerodaemon/flaskr. - -jalp/flaskscaffolding -https://github.com/jalp/flaskscaffolding -Entry file: None -Scanned: 2016-10-25 14:58:27.405492 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jalp/flaskscaffolding. - -vbidin/flasktest -https://github.com/vbidin/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-25 14:58:33.992939 -Vulnerability 1: -File: flasktest/app/auth/controllers.py - > User input at line 19, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flasktest/app/auth/controllers.py - > Line 21: session['user_id'] = user.id -File: flasktest/app/auth/controllers.py - > reaches line 22, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -xuxiaoxing/flaskweb -https://github.com/xuxiaoxing/flaskweb -Entry file: flaskweb/app.py -Scanned: 2016-10-25 14:58:35.316239 -No vulnerabilities found. - - -ashishkx/Flaskr -https://github.com/ashishkx/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-25 14:58:36.581360 -No vulnerabilities found. - - -jward1/flasktaskr -https://github.com/jward1/flasktaskr -Entry file: flasktaskr/flasktaskr_project/project/__init__.py -Scanned: 2016-10-25 14:58:38.106621 -No vulnerabilities found. - - -mediocrecheng/flaskr -https://github.com/mediocrecheng/flaskr -Entry file: None -Scanned: 2016-10-25 14:58:38.619317 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mediocrecheng/flaskr. - -huiyaoren/Flasky -https://github.com/huiyaoren/Flasky -Entry file: Flasky/flasky.py -Scanned: 2016-10-25 14:58:46.865417 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -brucepei/flasky -https://github.com/brucepei/flasky -Entry file: flasky/TBD.py -Scanned: 2016-10-25 14:58:51.605520 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ihoegen/Flask-Login-App-Tutorial -https://github.com/ihoegen/Flask-Login-App-Tutorial -Entry file: Flask-Login-App-Tutorial/__init__.py -Scanned: 2016-10-25 14:58:53.377568 -No vulnerabilities found. - - -singingwolfboy/flask-dance-slack -https://github.com/singingwolfboy/flask-dance-slack -Entry file: flask-dance-slack/slack.py -Scanned: 2016-10-25 14:58:54.711884 -No vulnerabilities found. - - -schoolofcode-me/web_blog -https://github.com/schoolofcode-me/web_blog -Entry file: web_blog/src/app.py -Scanned: 2016-10-25 14:58:56.093223 -No vulnerabilities found. - - -ciarancourtney/flaskApp -https://github.com/ciarancourtney/flaskApp -Entry file: flaskApp/flaskApp/flaskApp/app.py -Scanned: 2016-10-25 14:59:06.343598 -Vulnerability 1: -File: flaskApp/flaskApp/flaskApp/public/views.py - > User input at line 30, trigger word "get(": - redirect_url = request.args.get('next') or url_for('user.members') -Reassigned in: - File: flaskApp/flaskApp/flaskApp/public/views.py - > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('public/home.html',form=form) -File: flaskApp/flaskApp/flaskApp/public/views.py - > reaches line 30, trigger word "url_for(": - redirect_url = request.args.get('next') or url_for('user.members') - -Vulnerability 2: -File: flaskApp/flaskApp/flaskApp/public/views.py - > User input at line 30, trigger word "get(": - redirect_url = request.args.get('next') or url_for('user.members') -Reassigned in: - File: flaskApp/flaskApp/flaskApp/public/views.py - > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('public/home.html',form=form) -File: flaskApp/flaskApp/flaskApp/public/views.py - > reaches line 31, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(redirect_url) - - - -SunnyYun/flaskBlog -https://github.com/SunnyYun/flaskBlog -Entry file: flaskBlog/src/blog.py -Scanned: 2016-10-25 14:59:07.662769 -No vulnerabilities found. - - -Schwusch/FlaskApp -https://github.com/Schwusch/FlaskApp -Entry file: FlaskApp/__init__.py -Scanned: 2016-10-25 14:59:14.631096 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -JenniferSpry/FlaskVersuch -https://github.com/JenniferSpry/FlaskVersuch -Entry file: FlaskVersuch/hello.py -Scanned: 2016-10-25 14:59:15.936535 -No vulnerabilities found. - - -arpm/FlaskTaskr -https://github.com/arpm/FlaskTaskr -Entry file: None -Scanned: 2016-10-25 14:59:17.276173 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/arpm/FlaskTaskr. - -ottercoder/FlaskTest -https://github.com/ottercoder/FlaskTest -Entry file: FlaskTest/FlaskWebApp/FlaskWebApp/FlaskWebApp/__init__.py -Scanned: 2016-10-25 14:59:25.128446 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -amyguobunny/FlaskHeroku -https://github.com/amyguobunny/FlaskHeroku -Entry file: FlaskHeroku/app5.py -Scanned: 2016-10-25 14:59:26.469946 -No vulnerabilities found. - - -mwang87/FlaskTemplate -https://github.com/mwang87/FlaskTemplate -Entry file: FlaskTemplate/webserver.py -Scanned: 2016-10-25 14:59:27.705664 -No vulnerabilities found. - - -iKalin/flask1 -https://github.com/iKalin/flask1 -Entry file: flask1/routes.py -Scanned: 2016-10-25 14:59:35.257730 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -graphql-python/flask-graphql -https://github.com/graphql-python/flask-graphql -Entry file: flask-graphql/tests/app.py -Scanned: 2016-10-25 14:59:39.641792 -Vulnerability 1: -File: flask-graphql/tests/test_graphiqlview.py - > User input at line 13, trigger word "get(": - response = client.get(url_for('graphql'),headers='Accept''text/html') -File: flask-graphql/tests/test_graphiqlview.py - > reaches line 13, trigger word "url_for(": - response = client.get(url_for('graphql'),headers='Accept''text/html') - - - -hhstore/flask-annotated -https://github.com/hhstore/flask-annotated -Entry file: flask-annotated/flask-0.5/flask/module.py -Scanned: 2016-10-25 14:59:42.354503 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhiliang729/flask -https://github.com/zhiliang729/flask -Entry file: None -Scanned: 2016-10-25 14:59:43.359806 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -suzf/Flask -https://github.com/suzf/Flask -Entry file: None -Scanned: 2016-10-25 14:59:43.876495 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -charanjp/flask -https://github.com/charanjp/flask -Entry file: None -Scanned: 2016-10-25 14:59:44.446550 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yasskh/flask -https://github.com/yasskh/flask -Entry file: None -Scanned: 2016-10-25 14:59:44.970004 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -goodyvn/flask -https://github.com/goodyvn/flask -Entry file: None -Scanned: 2016-10-25 14:59:45.472579 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -prakxys/flask -https://github.com/prakxys/flask -Entry file: None -Scanned: 2016-10-25 14:59:46.026988 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -galacticpy/flask -https://github.com/galacticpy/flask -Entry file: None -Scanned: 2016-10-25 14:59:46.621175 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -buntyke/Flask -https://github.com/buntyke/Flask -Entry file: None -Scanned: 2016-10-25 14:59:47.163521 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -poxstone/flask -https://github.com/poxstone/flask -Entry file: None -Scanned: 2016-10-25 14:59:47.671865 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -FlaskTutorial/Flask -https://github.com/FlaskTutorial/Flask -Entry file: None -Scanned: 2016-10-25 14:59:48.212145 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -OnlySHI/flask -https://github.com/OnlySHI/flask -Entry file: None -Scanned: 2016-10-25 14:59:48.710578 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -iFe1er/flask -https://github.com/iFe1er/flask -Entry file: None -Scanned: 2016-10-25 14:59:49.245717 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -stevebannon/flask -https://github.com/stevebannon/flask -Entry file: None -Scanned: 2016-10-25 14:59:49.750336 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -b-e/flask -https://github.com/b-e/flask -Entry file: None -Scanned: 2016-10-25 14:59:52.247751 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sebkouba/dynamic-flask-form -https://github.com/sebkouba/dynamic-flask-form -Entry file: dynamic-flask-form/multimodel.py -Scanned: 2016-10-25 14:59:53.468216 -No vulnerabilities found. - - -psuong/FlaskWorkshop -https://github.com/psuong/FlaskWorkshop -Entry file: FlaskWorkshop/output-string/app.py -Scanned: 2016-10-25 14:59:55.905495 -No vulnerabilities found. - - -jvuori/flask-uwsgi-nginx-haproxy-docker -https://github.com/jvuori/flask-uwsgi-nginx-haproxy-docker -Entry file: flask-uwsgi-nginx-haproxy-docker/web/app.py -Scanned: 2016-10-25 14:59:57.211760 -No vulnerabilities found. - - -BLKStone/flask_image_search -https://github.com/BLKStone/flask_image_search -Entry file: flask_image_search/app/app.py -Scanned: 2016-10-25 15:00:14.133536 -No vulnerabilities found. - - -yj0914/flask- -https://github.com/yj0914/flask- -Entry file: flask-/num1.py -Scanned: 2016-10-25 15:00:16.483889 -No vulnerabilities found. - - -Bleezworld/flask_skeleton -https://github.com/Bleezworld/flask_skeleton -Entry file: flask_skeleton/serveur/__init__.py -Scanned: 2016-10-25 15:00:20.280691 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -akupara/flask_inspector -https://github.com/akupara/flask_inspector -Entry file: flask_inspector/example/app.py -Scanned: 2016-10-25 15:00:22.748604 -No vulnerabilities found. - - -jarogers095/flask-hello-world -https://github.com/jarogers095/flask-hello-world -Entry file: flask-hello-world/app.py -Scanned: 2016-10-25 15:00:33.993678 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-hello-world/env/lib/python3.4/operator.py - -alex-paterson/Barebones-Flask-and-Caffe-Classifier -https://github.com/alex-paterson/Barebones-Flask-and-Caffe-Classifier -Entry file: Barebones-Flask-and-Caffe-Classifier/app.py -Scanned: 2016-10-25 15:00:39.077357 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -drone-demos/drone-with-python -https://github.com/drone-demos/drone-with-python -Entry file: drone-with-python/dronedemo/main.py -Scanned: 2016-10-25 15:00:40.439133 -No vulnerabilities found. - - -TwilioDevEd/lead-alerts-flask -https://github.com/TwilioDevEd/lead-alerts-flask -Entry file: None -Scanned: 2016-10-25 15:00:45.327763 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/TwilioDevEd/lead-alerts-flask. - -soasme/flask-personal-access-token -https://github.com/soasme/flask-personal-access-token -Entry file: flask-personal-access-token/example.py -Scanned: 2016-10-25 15:00:49.474830 -Vulnerability 1: -File: flask-personal-access-token/flask_personal_access_token/admin.py - > User input at line 18, trigger word "get(": - render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_API_PREFIX')current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_PREFIX')current_app.config.get('DEBUG') -File: flask-personal-access-token/flask_personal_access_token/admin.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/personal_access_token/index.html',render_data) - - - -soasme/flask-perm -https://github.com/soasme/flask-perm -Entry file: flask-perm/example.py -Scanned: 2016-10-25 15:00:54.299054 -Vulnerability 1: -File: flask-perm/tests/test_blueprint.py - > User input at line 68, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permissions')) -File: flask-perm/tests/test_blueprint.py - > reaches line 68, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permissions')) - -Vulnerability 2: -File: flask-perm/tests/test_blueprint.py - > User input at line 73, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}') -File: flask-perm/tests/test_blueprint.py - > reaches line 73, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}') - -Vulnerability 3: -File: flask-perm/tests/test_blueprint.py - > User input at line 80, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 80, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id']) - -Vulnerability 4: -File: flask-perm/tests/test_blueprint.py - > User input at line 87, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) -File: flask-perm/tests/test_blueprint.py - > reaches line 87, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) - -Vulnerability 5: -File: flask-perm/tests/test_blueprint.py - > User input at line 121, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) -File: flask-perm/tests/test_blueprint.py - > reaches line 114, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.delete_permission',permission_id=permission['id'])) - -Vulnerability 6: -File: flask-perm/tests/test_blueprint.py - > User input at line 121, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) -File: flask-perm/tests/test_blueprint.py - > reaches line 121, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) - -Vulnerability 7: -File: flask-perm/tests/test_blueprint.py - > User input at line 172, trigger word ".data": - id = json.loads(resp.data)['data']['id'] -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 171: resp = add_user_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 173, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.revoke_user_permission',user_permission_id=id)) - -Vulnerability 8: -File: flask-perm/tests/test_blueprint.py - > User input at line 188, trigger word ".data": - id = json.loads(resp.data)['data']['id'] -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 187: resp = add_user_group_permission(client, user_group['id'], permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 189, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.revoke_user_group_permission',user_group_permission_id=id)) - -Vulnerability 9: -File: flask-perm/tests/test_blueprint.py - > User input at line 199, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}') -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 198: resp = add_user_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 199, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}') - -Vulnerability 10: -File: flask-perm/tests/test_blueprint.py - > User input at line 210, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 209: resp = add_user_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 210, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) - -Vulnerability 11: -File: flask-perm/tests/test_blueprint.py - > User input at line 221, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}') -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 220: resp = add_user_group_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 221, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}') - -Vulnerability 12: -File: flask-perm/tests/test_blueprint.py - > User input at line 232, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 231: resp = add_user_group_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 232, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) - -Vulnerability 13: -File: flask-perm/tests/test_blueprint.py - > User input at line 245, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_groups')) -File: flask-perm/tests/test_blueprint.py - > reaches line 245, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_groups')) - -Vulnerability 14: -File: flask-perm/tests/test_blueprint.py - > User input at line 280, trigger word ".data": - id = json.loads(resp.data)['data']['id'] -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 279: resp = add_user_group_member(client, 1, user_group['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 281, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.delete_user_from_user_group',user_group_member_id=id)) - -Vulnerability 15: -File: flask-perm/tests/test_blueprint.py - > User input at line 291, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 291, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id']) - -Vulnerability 16: -File: flask-perm/tests/test_blueprint.py - > User input at line 304, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_users')) -File: flask-perm/tests/test_blueprint.py - > reaches line 304, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_users')) - -Vulnerability 17: -File: flask-perm/tests/test_blueprint.py - > User input at line 309, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user',user_id=1)) -File: flask-perm/tests/test_blueprint.py - > reaches line 309, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user',user_id=1)) - -Vulnerability 18: -File: flask-perm/flask_perm/admin.py - > User input at line 12, trigger word "get(": - render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERM_ADMIN_PREFIX') + '/api'current_app.config.get('PERM_ADMIN_PREFIX')current_app.config.get('DEBUG') -Reassigned in: - File: flask-perm/flask_perm/admin.py - > Line 10: ret_MAYBE_FUNCTION_NAME = redirect(url_for('perm-admin.login')) -File: flask-perm/flask_perm/admin.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/perm-admin/index.html',render_data) - - - -amirziai/sklearnflask -https://github.com/amirziai/sklearnflask -Entry file: sklearnflask/main.py -Scanned: 2016-10-25 15:00:55.929335 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -willianribeiro/flaskr -https://github.com/willianribeiro/flaskr -Entry file: None -Scanned: 2016-10-25 15:00:56.471432 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/willianribeiro/flaskr. - -expersso/flaskr -https://github.com/expersso/flaskr -Entry file: None -Scanned: 2016-10-25 15:00:56.990482 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/expersso/flaskr. - -tehasdf/flaskexample -https://github.com/tehasdf/flaskexample -Entry file: flaskexample/flaskexample/app.py -Scanned: 2016-10-25 15:00:58.398896 -No vulnerabilities found. - - -sanghyunjooPurdue/flaskr -https://github.com/sanghyunjooPurdue/flaskr -Entry file: None -Scanned: 2016-10-25 15:00:58.946164 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanghyunjooPurdue/flaskr. - -becsully/flasktest -https://github.com/becsully/flasktest -Entry file: flasktest/mysite/__init__.py -Scanned: 2016-10-25 15:01:10.672556 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Duncodes/flasky -https://github.com/Duncodes/flasky -Entry file: flasky/flaskapp.py -Scanned: 2016-10-25 15:01:12.538418 -Vulnerability 1: -File: flasky/flaskapp.py - > User input at line 97, trigger word ".data": - question = form.question.data -Reassigned in: - File: flasky/flaskapp.py - > Line 99: kamau = Questions(id, title, question, answer) - File: flasky/flaskapp.py - > Line 93: ret_MAYBE_FUNCTION_NAME = render_template('createquestion.html',form=form) -File: flasky/flaskapp.py - > reaches line 102, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('createdquestion.html',question=question) - - - -gileez/flasker -https://github.com/gileez/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-25 15:01:14.146909 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -fengyc/flasky -https://github.com/fengyc/flasky -Entry file: flasky/flasky/__init__.py -Scanned: 2016-10-25 15:01:16.427808 -Vulnerability 1: -File: flasky/flasky/main/views.py - > User input at line 15, trigger word "get(": - user_agent = request.headers.get('User-Agent') -Reassigned in: - File: flasky/flasky/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky/flasky/main/views.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',user_agent=user_agent, current_time=datetime.datetime.utcnow(), form=form, name=session.get('name'), known=session.get('known', False)) - - - -sshimp/flasktaskr -https://github.com/sshimp/flasktaskr -Entry file: flasktaskr/views.py -Scanned: 2016-10-25 15:01:18.272609 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -solutionspecialist/flaskr -https://github.com/solutionspecialist/flaskr -Entry file: None -Scanned: 2016-10-25 15:01:18.810093 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/solutionspecialist/flaskr. - -XingxinLi/flaskr -https://github.com/XingxinLi/flaskr -Entry file: None -Scanned: 2016-10-25 15:01:19.343448 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/XingxinLi/flaskr. - -rishipuri/flasktodo -https://github.com/rishipuri/flasktodo -Entry file: flasktodo/flasktodo.py -Scanned: 2016-10-25 15:01:20.644102 -No vulnerabilities found. - - -shinycoo/flaskmvcsample -https://github.com/shinycoo/flaskmvcsample -Entry file: flaskmvcsample/app.py -Scanned: 2016-10-25 15:01:21.933672 -No vulnerabilities found. - - -Hyvjan/flasktaskr -https://github.com/Hyvjan/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:01:29.823044 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -alexwilkerson/flasktaskr -https://github.com/alexwilkerson/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:01:30.355286 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zachary-russell/Flaskr -https://github.com/zachary-russell/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-25 15:01:31.680424 -No vulnerabilities found. - - -sharma-abhi/flaskr -https://github.com/sharma-abhi/flaskr -Entry file: None -Scanned: 2016-10-25 15:01:32.207089 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sharma-abhi/flaskr. - -kwikiel/flaskr -https://github.com/kwikiel/flaskr -Entry file: None -Scanned: 2016-10-25 15:01:32.731716 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kwikiel/flaskr. - -storress/Flaskserver -https://github.com/storress/Flaskserver -Entry file: Flaskserver/main.py -Scanned: 2016-10-25 15:01:34.031296 -No vulnerabilities found. - - -dadasoz-cuelogic/flaskapp -https://github.com/dadasoz-cuelogic/flaskapp -Entry file: None -Scanned: 2016-10-25 15:01:35.406645 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dadasoz-cuelogic/flaskapp. - -nickaustinlee/flasktaskr -https://github.com/nickaustinlee/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:01:35.940071 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SFurnace/flaskr -https://github.com/SFurnace/flaskr -Entry file: None -Scanned: 2016-10-25 15:01:36.480890 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SFurnace/flaskr. - -diegogslomp/flaskr -https://github.com/diegogslomp/flaskr -Entry file: None -Scanned: 2016-10-25 15:01:36.997678 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/diegogslomp/flaskr. - -wiggitywalt/flasktaskr -https://github.com/wiggitywalt/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:01:37.501945 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -apeete/flasktaskr -https://github.com/apeete/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:01:38.036602 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sindhus/flaskr -https://github.com/sindhus/flaskr -Entry file: None -Scanned: 2016-10-25 15:01:40.548440 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sindhus/flaskr. - -mg6/flaskr -https://github.com/mg6/flaskr -Entry file: None -Scanned: 2016-10-25 15:01:41.068460 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mg6/flaskr. - -sourHobbes/flaskdemo -https://github.com/sourHobbes/flaskdemo -Entry file: flaskdemo/main.py -Scanned: 2016-10-25 15:01:54.217040 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Bayaz/flasktaskr -https://github.com/Bayaz/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:01:54.786796 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -noamoss/flasktaskr -https://github.com/noamoss/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:01:55.308322 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -xavinso/flasktaskr -https://github.com/xavinso/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:01:56.832366 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CharlieWinters/flaskapi -https://github.com/CharlieWinters/flaskapi -Entry file: flaskapi/aydaapi4.py -Scanned: 2016-10-25 15:02:05.766967 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapi/flaskenv/lib/python2.7/sre_compile.py - -kewsie/flasky -https://github.com/kewsie/flasky -Entry file: flasky/venv/Lib/site-packages/flask_sqlalchemy/__init__.py -Scanned: 2016-10-25 15:02:14.452846 -No vulnerabilities found. - - -slippers/flasksec -https://github.com/slippers/flasksec -Entry file: flasksec/main/__init__.py -Scanned: 2016-10-25 15:02:15.854989 -No vulnerabilities found. - - -metakermit/resin-home-automator -https://github.com/metakermit/resin-home-automator -Entry file: resin-home-automator/src/main.py -Scanned: 2016-10-25 15:02:18.503433 -No vulnerabilities found. - - -AxoSal/GAE-Flask-React-skeleton -https://github.com/AxoSal/GAE-Flask-React-skeleton -Entry file: GAE-Flask-React-skeleton/main.py -Scanned: 2016-10-25 15:02:22.963866 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -rui7157/Flask-NvRay-Blog -https://github.com/rui7157/Flask-NvRay-Blog -Entry file: Flask-NvRay-Blog/app/__init__.py -Scanned: 2016-10-25 15:02:30.859244 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Ineeza/FlaskAppBuilder -https://github.com/Ineeza/FlaskAppBuilder -Entry file: FlaskAppBuilder/src/classes/__init__.py -Scanned: 2016-10-25 15:02:32.307551 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -arose13/HerokuCondaScipyFlaskApp -https://github.com/arose13/HerokuCondaScipyFlaskApp -Entry file: HerokuCondaScipyFlaskApp/Web/app.py -Scanned: 2016-10-25 15:02:33.570419 -No vulnerabilities found. - - -junniepat/FlaskApp -https://github.com/junniepat/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-25 15:02:34.837023 -No vulnerabilities found. - - -YoungGer/FlaskApps -https://github.com/YoungGer/FlaskApps -Entry file: FlaskApps/helloWorld/hello.py -Scanned: 2016-10-25 15:02:37.024130 -No vulnerabilities found. - - -jrballot/FlaskTaskr -https://github.com/jrballot/FlaskTaskr -Entry file: None -Scanned: 2016-10-25 15:02:37.535642 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jrballot/FlaskTaskr. - -AnshuOnGit/FlaskServices -https://github.com/AnshuOnGit/FlaskServices -Entry file: FlaskServices/read_file.py -Scanned: 2016-10-25 15:02:44.163462 -Vulnerability 1: -File: FlaskServices/read_file.py - > User input at line 40, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/read_file.py - > Line 44: filename = secure_filename(file.filename) -File: FlaskServices/read_file.py - > reaches line 50, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: FlaskServices/read_file.py - > User input at line 40, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/read_file.py - > Line 44: filename = secure_filename(file.filename) -File: FlaskServices/read_file.py - > reaches line 50, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 3: -File: FlaskServices/uploads/read_file.py - > User input at line 50, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/uploads/read_file.py - > Line 54: filename = secure_filename(file.filename) -File: FlaskServices/uploads/read_file.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 4: -File: FlaskServices/uploads/read_file.py - > User input at line 50, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/uploads/read_file.py - > Line 54: filename = secure_filename(file.filename) -File: FlaskServices/uploads/read_file.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -ftanevski4/FlaskPycharm -https://github.com/ftanevski4/FlaskPycharm -Entry file: FlaskPycharm/FlaskPycharm.py -Scanned: 2016-10-25 15:02:45.482755 -No vulnerabilities found. - - -guiti1/FlaskAp -https://github.com/guiti1/FlaskAp -Entry file: FlaskAp/FlaskApp/__init__.py -Scanned: 2016-10-25 15:02:52.444175 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskAp/FlaskApp/venv/lib/python2.7/sre_compile.py - -yasskh/FlaskProject -https://github.com/yasskh/FlaskProject -Entry file: FlaskProject/views.py -Scanned: 2016-10-25 15:03:02.744268 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zerodaemon/flask1 -https://github.com/zerodaemon/flask1 -Entry file: flask1/flaskr.py -Scanned: 2016-10-25 15:03:04.084414 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -DamithaPerera/FlaskApp -https://github.com/DamithaPerera/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-25 15:03:05.386139 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -dreammis/Flask02 -https://github.com/dreammis/Flask02 -Entry file: Flask02/app/__init__.py -Scanned: 2016-10-25 15:03:06.665386 -No vulnerabilities found. - - -JoshLandry/FlaskBlog -https://github.com/JoshLandry/FlaskBlog -Entry file: FlaskBlog/Flask_Blog/__init__.py -Scanned: 2016-10-25 15:03:10.685240 -Vulnerability 1: -File: FlaskBlog/Flask_Blog/__init__.py - > User input at line 187, trigger word ".data": - title = form.title.data -Reassigned in: - File: FlaskBlog/Flask_Blog/__init__.py - > Line 190: newEntry = BlogEntry(user=current_user, title=title, entry=entry, rating=rating, artist=artist, tags=tags) -File: FlaskBlog/Flask_Blog/__init__.py - > reaches line 193, trigger word "flash(": - flash('Stored entry: '{}''.format(title)) - -Vulnerability 2: -File: FlaskBlog/Flask_Blog/__init__.py - > User input at line 221, trigger word ".data": - user = User.get_by_username(form.username.data) -Reassigned in: - File: FlaskBlog/Flask_Blog/__init__.py - > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: FlaskBlog/Flask_Blog/__init__.py - > reaches line 224, trigger word "flash(": - flash('Logged in successfully as {}.'.format(user.username)) - -Vulnerability 3: -File: FlaskBlog/Flask_Blog/__init__.py - > User input at line 221, trigger word ".data": - user = User.get_by_username(form.username.data) -Reassigned in: - File: FlaskBlog/Flask_Blog/__init__.py - > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: FlaskBlog/Flask_Blog/__init__.py - > reaches line 225, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=user.username)) - -Vulnerability 4: -File: FlaskBlog/Flask_Blog/__init__.py - > User input at line 221, trigger word ".data": - user = User.get_by_username(form.username.data) -Reassigned in: - File: FlaskBlog/Flask_Blog/__init__.py - > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: FlaskBlog/Flask_Blog/__init__.py - > reaches line 225, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=user.username)) - -Vulnerability 5: -File: FlaskBlog/Flask_Blog/__init__.py - > User input at line 238, trigger word ".data": - user = User(email=form.email.data, username=form.username.data, password=form.password.data) -File: FlaskBlog/Flask_Blog/__init__.py - > reaches line 243, trigger word "flash(": - flash('Welcome, {}! Please login.'.format(user.username)) - - - -Bayaz/FlaskBlog -https://github.com/Bayaz/FlaskBlog -Entry file: FlaskBlog/blog.py -Scanned: 2016-10-25 15:03:11.984607 -No vulnerabilities found. - - -apeete/flaskBlog -https://github.com/apeete/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-25 15:03:19.060499 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/sre_compile.py - -land-pack/flaskBlog -https://github.com/land-pack/flaskBlog -Entry file: flaskBlog/flaskr.py -Scanned: 2016-10-25 15:03:20.354814 -No vulnerabilities found. - - -colindjk/flaskTest -https://github.com/colindjk/flaskTest -Entry file: flaskTest/app.py -Scanned: 2016-10-25 15:03:21.826485 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -yukoga/flasksample1 -https://github.com/yukoga/flasksample1 -Entry file: flasksample1/hello.py -Scanned: 2016-10-25 15:03:23.096972 -No vulnerabilities found. - - -deyoppe/FlaskFire -https://github.com/deyoppe/FlaskFire -Entry file: FlaskFire/core/system/app.py -Scanned: 2016-10-25 15:03:24.448058 -No vulnerabilities found. - - -Njsao/FlaskServer -https://github.com/Njsao/FlaskServer -Entry file: FlaskServer/untitled.py -Scanned: 2016-10-25 15:03:25.833325 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Arsh23/random-crossword-generater -https://github.com/Arsh23/random-crossword-generater -Entry file: random-crossword-generater/app.py -Scanned: 2016-10-25 15:03:29.583995 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -OscarMelin/learning-flask-bootstrap -https://github.com/OscarMelin/learning-flask-bootstrap -Entry file: learning-flask-bootstrap/__init__.py -Scanned: 2016-10-25 15:03:38.004615 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/sre_compile.py - -allianRoman/flask-intro -https://github.com/allianRoman/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 15:03:39.810410 -No vulnerabilities found. - - -hunt3ri/temp-flask -https://github.com/hunt3ri/temp-flask -Entry file: temp-flask/app/__init__.py -Scanned: 2016-10-25 15:03:41.299112 -No vulnerabilities found. - - -noamoss/flask-blog -https://github.com/noamoss/flask-blog -Entry file: flask-blog/blog.py -Scanned: 2016-10-25 15:03:42.596054 -No vulnerabilities found. - - -hnb2/flask-customers -https://github.com/hnb2/flask-customers -Entry file: flask-customers/customers/__init__.py -Scanned: 2016-10-25 15:03:44.051128 -Vulnerability 1: -File: flask-customers/customers/back/view.py - > User input at line 71, trigger word ".data": - customer = Customer(email=form.email.data, password=AdminCustomer._generate_password()) -Reassigned in: - File: flask-customers/customers/back/view.py - > Line 69: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors) -File: flask-customers/customers/back/view.py - > reaches line 82, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(customer=customer.json) - -Vulnerability 2: -File: flask-customers/customers/back/view.py - > User input at line 147, trigger word ".data": - page = form.page.data -Reassigned in: - File: flask-customers/customers/back/view.py - > Line 151: start = page * CustomerService.RESULTS_PER_PAGE - File: flask-customers/customers/back/view.py - > Line 152: stop = start + CustomerService.RESULTS_PER_PAGE - File: flask-customers/customers/back/view.py - > Line 154: raw_customers = CustomerService.get_customers(start=start, stop=stop) - File: flask-customers/customers/back/view.py - > Line 145: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors) -File: flask-customers/customers/back/view.py - > reaches line 159, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(current_page=page, total_pages=int(total_pages), customers=[customer.json for customer in raw_customers]) - -Vulnerability 3: -File: flask-customers/customers/front/view.py - > User input at line 32, trigger word ".data": - customer = Customer(email=form.email.data, password=form.password.data) -Reassigned in: - File: flask-customers/customers/front/view.py - > Line 30: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors) -File: flask-customers/customers/front/view.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(id=customer.id) - - - -raindrop4steven/tornadoFlask -https://github.com/raindrop4steven/tornadoFlask -Entry file: tornadoFlask/hello.py -Scanned: 2016-10-25 15:03:45.351303 -No vulnerabilities found. - - -samwuu/flask_demo -https://github.com/samwuu/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-25 15:03:46.805619 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Jiezhi/HelloFlask -https://github.com/Jiezhi/HelloFlask -Entry file: HelloFlask/my_app/__init__.py -Scanned: 2016-10-25 15:03:48.338960 -Vulnerability 1: -File: HelloFlask/my_app/product/views.py - > User input at line 16, trigger word "get(": - product = PRODUCTS.get(key) -File: HelloFlask/my_app/product/views.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('product.html',product=product) - - - -tiangolo/uwsgi-nginx-flask-docker -https://github.com/tiangolo/uwsgi-nginx-flask-docker -Entry file: uwsgi-nginx-flask-docker/example-flask-index-upload/app/main.py -Scanned: 2016-10-25 15:03:51.575502 -No vulnerabilities found. - - -MoodyLyrics/flask -https://github.com/MoodyLyrics/flask -Entry file: None -Scanned: 2016-10-25 15:03:52.604289 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -unikatsieben/flask -https://github.com/unikatsieben/flask -Entry file: None -Scanned: 2016-10-25 15:03:53.129109 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Mei-Lin-Chen/Flask -https://github.com/Mei-Lin-Chen/Flask -Entry file: None -Scanned: 2016-10-25 15:03:53.642609 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rakeshhegishte/Flask -https://github.com/rakeshhegishte/Flask -Entry file: None -Scanned: 2016-10-25 15:03:54.178315 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -billdwalters/Flask -https://github.com/billdwalters/Flask -Entry file: None -Scanned: 2016-10-25 15:03:54.726452 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -damionlowers/flask -https://github.com/damionlowers/flask -Entry file: None -Scanned: 2016-10-25 15:03:55.261052 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bobdorff/flask -https://github.com/bobdorff/flask -Entry file: None -Scanned: 2016-10-25 15:04:03.781978 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chrisvasey/flask -https://github.com/chrisvasey/flask -Entry file: None -Scanned: 2016-10-25 15:04:05.312989 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wildjan/Flask -https://github.com/wildjan/Flask -Entry file: None -Scanned: 2016-10-25 15:04:06.931903 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -smltc/Flask -https://github.com/smltc/Flask -Entry file: None -Scanned: 2016-10-25 15:04:07.458563 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rlsharpton/flask -https://github.com/rlsharpton/flask -Entry file: None -Scanned: 2016-10-25 15:04:11.975008 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -embasa/FLASK -https://github.com/embasa/FLASK -Entry file: FLASK/app.py -Scanned: 2016-10-25 15:04:14.307028 -No vulnerabilities found. - - -ccapudev/flask -https://github.com/ccapudev/flask -Entry file: None -Scanned: 2016-10-25 15:04:21.334490 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hezx/flask -https://github.com/hezx/flask -Entry file: None -Scanned: 2016-10-25 15:04:22.887263 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -RayneHwang/Flask -https://github.com/RayneHwang/Flask -Entry file: None -Scanned: 2016-10-25 15:04:24.414269 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kakshi3242/Flask -https://github.com/kakshi3242/Flask -Entry file: None -Scanned: 2016-10-25 15:04:25.928049 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Abirdcfly/flask-blog -https://github.com/Abirdcfly/flask-blog -Entry file: flask-blog/app/__init__.py -Scanned: 2016-10-25 15:04:38.039321 -Vulnerability 1: -File: flask-blog/app/main/views.py - > User input at line 52, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/app/main/views.py - > Line 53: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['AWOTER_DOC_PER_PAGE'], error_out=False) - File: flask-blog/app/main/views.py - > Line 56: posts = pagination.items -File: flask-blog/app/main/views.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, title=title, posts=posts, pagination=pagination, detail_show=detail_show) - -Vulnerability 2: -File: flask-blog/app/main/views.py - > User input at line 128, trigger word "get(": - show_follwed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask-blog/app/main/views.py - > Line 126: show_follwed = False -File: flask-blog/app/main/views.py - > reaches line 138, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('doc.html',title=title, posts=posts, pagination=pagination, detail_show=detail_show, show_follwed=show_follwed) - -Vulnerability 3: -File: flask-blog/app/main/views.py - > User input at line 133, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/app/main/views.py - > Line 134: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['AWOTER_DOC_PER_PAGE'], error_out=False) - File: flask-blog/app/main/views.py - > Line 137: posts = pagination.items -File: flask-blog/app/main/views.py - > reaches line 138, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('doc.html',title=title, posts=posts, pagination=pagination, detail_show=detail_show, show_follwed=show_follwed) - -Vulnerability 4: -File: flask-blog/app/main/views.py - > User input at line 171, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/app/main/views.py - > Line 173: page = post.comments.count() - 1 / current_app.config['AWOTER_COMMENTS_PER_PAGE'] + 1 - File: flask-blog/app/main/views.py - > Line 175: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['AWOTER_COMMENTS_PER_PAGE'], error_out=False) - File: flask-blog/app/main/views.py - > Line 178: comments = pagination.items - File: flask-blog/app/main/views.py - > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.doc_detail',id=post.id, page=-1)) -File: flask-blog/app/main/views.py - > reaches line 179, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('doc.html',title=title, posts=[post], detail_show=detail_show, form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flask-blog/app/main/views.py - > User input at line 241, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/app/main/views.py - > Line 242: pagination = user.followers.paginate(page,per_page=current_app.config['AWOTER_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-blog/app/main/views.py - > Line 245: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask-blog/app/main/views.py - > Line 240: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-blog/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注者列表', endpoint='main.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flask-blog/app/main/views.py - > User input at line 258, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/app/main/views.py - > Line 259: pagination = user.followed.paginate(page,per_page=current_app.config['AWOTER_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-blog/app/main/views.py - > Line 262: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask-blog/app/main/views.py - > Line 257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-blog/app/main/views.py - > reaches line 264, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='他关注的人', endpoint='main.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flask-blog/app/main/views.py - > User input at line 290, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/app/main/views.py - > Line 291: pagination = Comment.query.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['AWOTER_COMMENTS_PER_PAGE'], error_out=False) - File: flask-blog/app/main/views.py - > Line 294: comments = pagination.items -File: flask-blog/app/main/views.py - > reaches line 295, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, title=title, page=page, pagination=pagination) - - - -RoseOu/flasky -https://github.com/RoseOu/flasky -Entry file: None -Scanned: 2016-10-25 15:05:48.520341 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -its-dirg/Flask-pyoidc -https://github.com/its-dirg/Flask-pyoidc -Entry file: Flask-pyoidc/tests/test_flask_pyoidc.py -Scanned: 2016-10-25 15:05:49.989935 -No vulnerabilities found. - - -materialsvirtuallab/flamyngo -https://github.com/materialsvirtuallab/flamyngo -Entry file: flamyngo/flamyngo/app.py -Scanned: 2016-10-25 15:05:53.428388 -Vulnerability 1: -File: flamyngo/flamyngo/views.py - > User input at line 95, trigger word "get(": - cname = request.args.get('collection') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 96: settings = CSETTINGS[cname] - File: flamyngo/flamyngo/views.py - > Line 98: projection = [t[0] for t in settings['summary']] - File: flamyngo/flamyngo/views.py - > Line 105: criteria = process_search_string(search_string, settings) -File: flamyngo/flamyngo/views.py - > reaches line 130, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message)) - -Vulnerability 2: -File: flamyngo/flamyngo/views.py - > User input at line 97, trigger word "get(": - search_string = request.args.get('search_string') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 105: criteria = process_search_string(search_string, settings) -File: flamyngo/flamyngo/views.py - > reaches line 130, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message)) - -Vulnerability 3: -File: flamyngo/flamyngo/views.py - > User input at line 142, trigger word "get(": - cname = request.args.get('collection') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 4: -File: flamyngo/flamyngo/views.py - > User input at line 145, trigger word "get(": - plot_type = request.args.get('plot_type') or 'scatter' -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 5: -File: flamyngo/flamyngo/views.py - > User input at line 146, trigger word "get(": - search_string = request.args.get('search_string') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 6: -File: flamyngo/flamyngo/views.py - > User input at line 147, trigger word "get(": - xaxis = request.args.get('xaxis') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 7: -File: flamyngo/flamyngo/views.py - > User input at line 148, trigger word "get(": - yaxis = request.args.get('yaxis') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - - - -mikelkl/flasky -https://github.com/mikelkl/flasky -Entry file: None -Scanned: 2016-10-25 15:05:53.949984 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -OneBitSoftware/Office365-SharePoint-Python-Flask-Sample -https://github.com/OneBitSoftware/Office365-SharePoint-Python-Flask-Sample -Entry file: Office365-SharePoint-Python-Flask-Sample/src/Python.Office365.AppAuthentication/app.py -Scanned: 2016-10-25 15:05:55.881889 -No vulnerabilities found. - - -jonafato/Flask-Copilot -https://github.com/jonafato/Flask-Copilot -Entry file: Flask-Copilot/example/app.py -Scanned: 2016-10-25 15:05:57.410130 -No vulnerabilities found. - - -besimaltnok/Flask-Examples -https://github.com/besimaltnok/Flask-Examples -Entry file: Flask-Examples/fileupload.py -Scanned: 2016-10-25 15:05:59.276490 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -luo-jialin/flask- -https://github.com/luo-jialin/flask- -Entry file: flask-/flaskr.py -Scanned: 2016-10-25 15:06:00.665404 -No vulnerabilities found. - - -NJIT-SIG-WEBDEV/flask-intro -https://github.com/NJIT-SIG-WEBDEV/flask-intro -Entry file: flask-intro/Session1/app.py -Scanned: 2016-10-25 15:06:02.524588 -No vulnerabilities found. - - -imperio-wxm/flask-learn -https://github.com/imperio-wxm/flask-learn -Entry file: flask-learn/app/demo/flask_learn.py -Scanned: 2016-10-25 15:06:04.783851 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ptrierweiler/myblog -https://github.com/ptrierweiler/myblog -Entry file: myblog/app/hello.py -Scanned: 2016-10-25 15:06:12.903888 -No vulnerabilities found. - - -Upflask/Upflask -https://github.com/Upflask/Upflask -Entry file: Upflask/server.py -Scanned: 2016-10-25 15:06:15.359714 -Vulnerability 1: -File: Upflask/server.py - > User input at line 161, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Upflask/server.py - > Line 165: filename = secure_filename(file.filename) -File: Upflask/server.py - > reaches line 171, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: Upflask/server.py - > User input at line 161, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Upflask/server.py - > Line 165: filename = secure_filename(file.filename) -File: Upflask/server.py - > reaches line 171, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -PrettyPrinted/flask-wtforms -https://github.com/PrettyPrinted/flask-wtforms -Entry file: flask-wtforms/main.py -Scanned: 2016-10-25 15:06:16.675952 -No vulnerabilities found. - - -rainyear/MathModeBot -https://github.com/rainyear/MathModeBot -Entry file: MathModeBot/main.py -Scanned: 2016-10-25 15:06:18.035895 -No vulnerabilities found. - - -MLH/my-mlh-flask-example -https://github.com/MLH/my-mlh-flask-example -Entry file: my-mlh-flask-example/app.py -Scanned: 2016-10-25 15:06:19.327117 -No vulnerabilities found. - - -ubbochum/hb2_flask -https://github.com/ubbochum/hb2_flask -Entry file: hb2_flask/hb2_flask.py -Scanned: 2016-10-25 15:06:24.171884 -Vulnerability 1: -File: hb2_flask/hb2_flask.py - > User input at line 362, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 369: index_solr = Solr(start=page - 1 * 10, query=current_user.email, facet='false') - File: hb2_flask/hb2_flask.py - > Line 372: records = index_solr.results - File: hb2_flask/hb2_flask.py - > Line 376: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 379: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 361: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 363: records = [] - File: hb2_flask/hb2_flask.py - > Line 365: index_solr = '' - File: hb2_flask/hb2_flask.py - > Line 366: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 380, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',header=lazy_gettext('Home'), site=theme(request.access_route), numFound=num_found, records=records, pagination=pagination, offset=mystart - 1) - -Vulnerability 2: -File: hb2_flask/hb2_flask.py - > User input at line 416, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 417: duplicates_solr = Solr(start=page - 1 * 10, fquery=['dedupid:[* TO *]'], group='true', group_field='dedupid', group_limit=100, facet='false') - File: hb2_flask/hb2_flask.py - > Line 424: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('duplicate groups'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 427: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 415: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 423: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 428, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('duplicates.html',groups=duplicates_solr.results, pagination=pagination, header=lazy_gettext('Duplicates'), site=theme(request.access_route), offset=mystart - 1) - -Vulnerability 3: -File: hb2_flask/hb2_flask.py - > User input at line 433, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons')) - File: hb2_flask/hb2_flask.py - > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 434: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 446, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now()) - -Vulnerability 4: -File: hb2_flask/hb2_flask.py - > User input at line 433, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons')) - File: hb2_flask/hb2_flask.py - > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 434: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 455, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), del_redirect='persons') - -Vulnerability 5: -File: hb2_flask/hb2_flask.py - > User input at line 472, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 471: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 6: -File: hb2_flask/hb2_flask.py - > User input at line 474, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 477: query = '*:*' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 7: -File: hb2_flask/hb2_flask.py - > User input at line 480, trigger word "get(": - sorting = request.args.get('sort', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 482: sorting = '' - File: hb2_flask/hb2_flask.py - > Line 484: sorting = 'fdate desc' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 8: -File: hb2_flask/hb2_flask.py - > User input at line 472, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 471: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 9: -File: hb2_flask/hb2_flask.py - > User input at line 474, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 477: query = '*:*' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 10: -File: hb2_flask/hb2_flask.py - > User input at line 480, trigger word "get(": - sorting = request.args.get('sort', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 482: sorting = '' - File: hb2_flask/hb2_flask.py - > Line 484: sorting = 'fdate desc' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 11: -File: hb2_flask/hb2_flask.py - > User input at line 472, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 471: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 499, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery) - -Vulnerability 12: -File: hb2_flask/hb2_flask.py - > User input at line 474, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 477: query = '*:*' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 499, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery) - -Vulnerability 13: -File: hb2_flask/hb2_flask.py - > User input at line 480, trigger word "get(": - sorting = request.args.get('sort', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 482: sorting = '' - File: hb2_flask/hb2_flask.py - > Line 484: sorting = 'fdate desc' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 499, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery) - -Vulnerability 14: -File: hb2_flask/hb2_flask.py - > User input at line 742, trigger word "get(": - bio = requests.get('https://pub.orcid.org/%s/orcid-bio/' % orcid_id,headers='Accept''application/json').json() -File: hb2_flask/hb2_flask.py - > reaches line 744, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''%s, %s' % (bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('family-name').get('value'), bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('given-names').get('value'))) - -Vulnerability 15: -File: hb2_flask/hb2_flask.py - > User input at line 749, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 787: dashboard_solr = Solr(start=page - 1 * 10, query=query, sort='recordCreationDate asc', json_facet=DASHBOARD_FACETS, fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 795: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 798: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 750: mystart = 0 - File: hb2_flask/hb2_flask.py - > Line 791: pagination = '' -File: hb2_flask/hb2_flask.py - > reaches line 801, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dashboard.html',records=dashboard_solr.results, facet_data=dashboard_solr.facets, header=lazy_gettext('Dashboard'), site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), target='dashboard', del_redirect='dashboard') - -Vulnerability 16: -File: hb2_flask/hb2_flask.py - > User input at line 826, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 827: locked_solr = Solr(core='hb2', fquery=['locked:true', 'recordChangeDate:[* TO NOW-1HOUR]'], sort='recordChangeDate asc', start=page - 1 * 10) - File: hb2_flask/hb2_flask.py - > Line 831: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('records'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 834: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 824: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 841, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('superadmin.html',locked_records=locked_solr.results, header=lazy_gettext('Superadmin Board'), import_records=solr_dumps.results, offset=mystart - 1, pagination=pagination, del_redirect='superadmin', form=form, site=theme(request.access_route)) - -Vulnerability 17: -File: hb2_flask/hb2_flask.py - > User input at line 912, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units')) - File: hb2_flask/hb2_flask.py - > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 913: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 925, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now()) - -Vulnerability 18: -File: hb2_flask/hb2_flask.py - > User input at line 912, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units')) - File: hb2_flask/hb2_flask.py - > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 913: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 933, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now()) - -Vulnerability 19: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1110, trigger word "replace(": - solr_data.setdefault('recordCreationDate', form.data.get(field).strip().replace(' ', 'T') + 'Z') - -Vulnerability 20: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1112, trigger word "replace(": - solr_data.setdefault('recordChangeDate', form.data.get(field).strip().replace(' ', 'T') + 'Z') - -Vulnerability 21: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1141, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), action='https://github.com/create', pubtype=pubtype) - -Vulnerability 22: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1160, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), pubtype=pubtype, action='https://github.com/create', record_id=form.id.data) - -Vulnerability 23: -File: hb2_flask/hb2_flask.py - > User input at line 1167, trigger word "get(": - is_part_of = show_record_solr.results[0].get('is_part_of') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 24: -File: hb2_flask/hb2_flask.py - > User input at line 1168, trigger word "get(": - has_part = show_record_solr.results[0].get('has_part') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 25: -File: hb2_flask/hb2_flask.py - > User input at line 1169, trigger word "get(": - other_version = show_record_solr.results[0].get('other_version') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 26: -File: hb2_flask/hb2_flask.py - > User input at line 1171, trigger word "get(": - thedata = json.loads(show_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1173: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 27: -File: hb2_flask/hb2_flask.py - > User input at line 1172, trigger word "get(": - locked = show_record_solr.results[0].get('locked') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 28: -File: hb2_flask/hb2_flask.py - > User input at line 1173, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 29: -File: hb2_flask/hb2_flask.py - > User input at line 1189, trigger word "get(": - thedata = json.loads(show_person_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1190: form = PersonAdminForm.from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1192, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('name'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=person_id, pubtype='person', del_redirect='persons') - -Vulnerability 30: -File: hb2_flask/hb2_flask.py - > User input at line 1200, trigger word "get(": - thedata = json.loads(show_orga_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1201: form = OrgaAdminForm.from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1203, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('pref_label'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=orga_id, pubtype='organisation', del_redirect='organisations') - -Vulnerability 31: -File: hb2_flask/hb2_flask.py - > User input at line 1213, trigger word "get(": - thedata = json.loads(edit_orga_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1218: form = OrgaAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas')) - File: hb2_flask/hb2_flask.py - > Line 1216: form = OrgaAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1223, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update') - -Vulnerability 32: -File: hb2_flask/hb2_flask.py - > User input at line 1213, trigger word "get(": - thedata = json.loads(edit_orga_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1218: form = OrgaAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas')) - File: hb2_flask/hb2_flask.py - > Line 1216: form = OrgaAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1231, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(orga)s',orga=form.data.get('pref_label')), site=theme(request.access_route), action='https://github.com/update', pubtype='organisation') - -Vulnerability 33: -File: hb2_flask/hb2_flask.py - > User input at line 1242, trigger word "get(": - thedata = json.loads(edit_person_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1247: form = PersonAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons')) - File: hb2_flask/hb2_flask.py - > Line 1245: form = PersonAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1253, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update') - -Vulnerability 34: -File: hb2_flask/hb2_flask.py - > User input at line 1242, trigger word "get(": - thedata = json.loads(edit_person_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1247: form = PersonAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons')) - File: hb2_flask/hb2_flask.py - > Line 1245: form = PersonAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1261, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(person)s',person=form.data.get('name')), site=theme(request.access_route), action='https://github.com/update', pubtype='person') - -Vulnerability 35: -File: hb2_flask/hb2_flask.py - > User input at line 1286, trigger word "get(": - thedata = json.loads(edit_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 36: -File: hb2_flask/hb2_flask.py - > User input at line 1289, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 37: -File: hb2_flask/hb2_flask.py - > User input at line 1291, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 38: -File: hb2_flask/hb2_flask.py - > User input at line 1286, trigger word "get(": - thedata = json.loads(edit_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() -File: hb2_flask/hb2_flask.py - > reaches line 1310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - -Vulnerability 39: -File: hb2_flask/hb2_flask.py - > User input at line 1289, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - -Vulnerability 40: -File: hb2_flask/hb2_flask.py - > User input at line 1291, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - -Vulnerability 41: -File: hb2_flask/hb2_flask.py - > User input at line 1286, trigger word "get(": - thedata = json.loads(edit_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() -File: hb2_flask/hb2_flask.py - > reaches line 1321, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) - -Vulnerability 42: -File: hb2_flask/hb2_flask.py - > User input at line 1289, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1321, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) - -Vulnerability 43: -File: hb2_flask/hb2_flask.py - > User input at line 1291, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1321, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) - -Vulnerability 44: -File: hb2_flask/hb2_flask.py - > User input at line 1491, trigger word "form[": - target = request.form['next'] -File: hb2_flask/hb2_flask.py - > reaches line 1493, trigger word "url_for(": - target = url_for(endpoint,values) - -Vulnerability 45: -File: hb2_flask/hb2_flask.py - > User input at line 1491, trigger word "form[": - target = request.form['next'] -File: hb2_flask/hb2_flask.py - > reaches line 1494, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(target) - -Vulnerability 46: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 47: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 48: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 49: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 50: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 51: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 52: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 53: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 54: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1573, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) - -Vulnerability 55: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1573, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) - -Vulnerability 56: -File: hb2_flask/hb2_flask.py - > User input at line 1627, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1628: solr_dumps = Solr(core='hb2_users', query='id:*.json', facet='false', start=page - 1 * 10) - File: hb2_flask/hb2_flask.py - > Line 1631: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('dumps'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 1634: mystart = 1 + pagination.page - 1 * pagination.per_page -File: hb2_flask/hb2_flask.py - > reaches line 1636, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('solr_dumps.html',records=solr_dumps.results, offset=mystart - 1, pagination=pagination, header=lazy_gettext('Import Dump'), del_redirect='import/solr_dumps', form=form) - -Vulnerability 57: -File: hb2_flask/hb2_flask.py - > User input at line 1652, trigger word "get(": - thedata = json.loads(import_solr.results[0].get('dump')[0]) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1645: thedata = '' - File: hb2_flask/hb2_flask.py - > Line 1656: thedata = json.loads(form.file.data.stream.read()) -File: hb2_flask/hb2_flask.py - > reaches line 1665, trigger word "flash(": - flash('%s records imported!' % len(thedata), 'success') - -Vulnerability 58: -File: hb2_flask/hb2_flask.py - > User input at line 1656, trigger word ".data": - thedata = json.loads(form.file.data.stream.read()) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1645: thedata = '' - File: hb2_flask/hb2_flask.py - > Line 1652: thedata = json.loads(import_solr.results[0].get('dump')[0]) -File: hb2_flask/hb2_flask.py - > reaches line 1665, trigger word "flash(": - flash('%s records imported!' % len(thedata), 'success') - -Vulnerability 59: -File: hb2_flask/processors/mods_parser.py - > User input at line 123, trigger word "get(": - pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '') -Reassigned in: - File: hb2_flask/processors/mods_parser.py - > Line 120: pnd = '' -File: hb2_flask/processors/mods_parser.py - > reaches line 123, trigger word "replace(": - pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '') - - - -Vertabelo/flask-oauth-demo-app -https://github.com/Vertabelo/flask-oauth-demo-app -Entry file: flask-oauth-demo-app/models.py -Scanned: 2016-10-25 15:06:28.705497 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -msopentechcn/aad-graphapi-flask-demo -https://github.com/msopentechcn/aad-graphapi-flask-demo -Entry file: aad-graphapi-flask-demo/app.py -Scanned: 2016-10-25 15:06:29.991011 -Vulnerability 1: -File: aad-graphapi-flask-demo/app.py - > User input at line 100, trigger word "get(": - error_code = messages.get('error_code') -File: aad-graphapi-flask-demo/app.py - > reaches line 102, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message) - -Vulnerability 2: -File: aad-graphapi-flask-demo/app.py - > User input at line 101, trigger word "get(": - error_message = messages.get('error_message') -File: aad-graphapi-flask-demo/app.py - > reaches line 102, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message) - -Vulnerability 3: -File: aad-graphapi-flask-demo/app.py - > User input at line 108, trigger word "get(": - error_code = errors.get('code') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - -Vulnerability 4: -File: aad-graphapi-flask-demo/app.py - > User input at line 109, trigger word "get(": - error_message = errors.get('message').get('value') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - -Vulnerability 5: -File: aad-graphapi-flask-demo/app.py - > User input at line 108, trigger word "get(": - error_code = errors.get('code') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - -Vulnerability 6: -File: aad-graphapi-flask-demo/app.py - > User input at line 109, trigger word "get(": - error_message = errors.get('message').get('value') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - - - -waharnum/inlibraries.com -https://github.com/waharnum/inlibraries.com -Entry file: None -Scanned: 2016-10-25 15:06:35.203103 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/waharnum/inlibraries.com. - -billyfung/flask_shortener -https://github.com/billyfung/flask_shortener -Entry file: flask_shortener/app.py -Scanned: 2016-10-25 15:06:36.503563 -Vulnerability 1: -File: flask_shortener/app.py - > User input at line 41, trigger word "form[": - url_to_parse = request.form['input-url'] -Reassigned in: - File: flask_shortener/app.py - > Line 42: parts = urlparse.urlparse(url_to_parse) - File: flask_shortener/app.py - > Line 47: short_id = shorten(url_to_parse) -File: flask_shortener/app.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',short_id=short_id) - -Vulnerability 2: -File: flask_shortener/app.py - > User input at line 52, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(link_target) - -Vulnerability 3: -File: flask_shortener/app.py - > User input at line 60, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target) - -Vulnerability 4: -File: flask_shortener/app.py - > User input at line 63, trigger word "get(": - click_count = int(redis.get('click-count:' + short_id) or 0) -File: flask_shortener/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target) - - - -jrhuerta/flask-api -https://github.com/jrhuerta/flask-api -Entry file: None -Scanned: 2016-10-25 15:06:37.851467 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jrhuerta/flask-api. - -SticksInHand/flaskr -https://github.com/SticksInHand/flaskr -Entry file: None -Scanned: 2016-10-25 15:06:38.893222 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SticksInHand/flaskr. - -jayShepard/Flasky -https://github.com/jayShepard/Flasky -Entry file: Flasky/Vagrant/hello.py -Scanned: 2016-10-25 15:06:40.182696 -No vulnerabilities found. - - -vineethtw/flaskexamples -https://github.com/vineethtw/flaskexamples -Entry file: flaskexamples/api/simulations.py -Scanned: 2016-10-25 15:06:41.558204 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -kmosho/flaskr -https://github.com/kmosho/flaskr -Entry file: None -Scanned: 2016-10-25 15:06:42.078069 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kmosho/flaskr. - -KDmytro/flasktaskr -https://github.com/KDmytro/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:06:42.596360 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dreamtiger2016/flaskr -https://github.com/dreamtiger2016/flaskr -Entry file: None -Scanned: 2016-10-25 15:06:43.096718 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dreamtiger2016/flaskr. - -jarogers095/flasktaskr -https://github.com/jarogers095/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:06:43.664523 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -msapkota/flasktaskr -https://github.com/msapkota/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:06:49.184843 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Narcissist1/flasktest -https://github.com/Narcissist1/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-25 15:06:51.689863 -No vulnerabilities found. - - -super452/flasky -https://github.com/super452/flasky -Entry file: None -Scanned: 2016-10-25 15:06:54.214288 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -srbhtest/flaskwebsite -https://github.com/srbhtest/flaskwebsite -Entry file: flaskwebsite/__init__.py -Scanned: 2016-10-25 15:06:55.476069 -No vulnerabilities found. - - -Anddor/flaskr -https://github.com/Anddor/flaskr -Entry file: None -Scanned: 2016-10-25 15:06:58.502902 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Anddor/flaskr. - -hammygoonan/Flaskify -https://github.com/hammygoonan/Flaskify -Entry file: Flaskify/project/__init__.py -Scanned: 2016-10-25 15:07:00.120926 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -anujspatel/flaskr -https://github.com/anujspatel/flaskr -Entry file: None -Scanned: 2016-10-25 15:07:00.668079 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/anujspatel/flaskr. - -williamcaban/flaskrcloud -https://github.com/williamcaban/flaskrcloud -Entry file: flaskrcloud/flaskr.py -Scanned: 2016-10-25 15:07:03.327019 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -boydjohnson/flasktwilio -https://github.com/boydjohnson/flasktwilio -Entry file: flasktwilio/app.py -Scanned: 2016-10-25 15:07:04.632911 -Vulnerability 1: -File: flasktwilio/app.py - > User input at line 14, trigger word "form[": - number = request.form['number'] -File: flasktwilio/app.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon) - -Vulnerability 2: -File: flasktwilio/app.py - > User input at line 15, trigger word "form[": - lat = request.form['latitude'] -File: flasktwilio/app.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon) - -Vulnerability 3: -File: flasktwilio/app.py - > User input at line 16, trigger word "form[": - lon = request.form['longitude'] -File: flasktwilio/app.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon) - - - -yizhianiu/flasky -https://github.com/yizhianiu/flasky -Entry file: None -Scanned: 2016-10-25 15:07:06.170378 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -huachen0216/flaskdemo -https://github.com/huachen0216/flaskdemo -Entry file: flaskdemo/app/__init__.py -Scanned: 2016-10-25 15:07:15.108101 -Vulnerability 1: -File: flaskdemo/app/main/views.py - > User input at line 20, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdemo/app/main/views.py - > Line 21: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskdemo/app/main/views.py - > Line 24: posts = pagination.items - File: flaskdemo/app/main/views.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskdemo/app/main/views.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: flaskdemo/app/main/views.py - > User input at line 32, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskdemo/app/main/views.py - > Line 33: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskdemo/app/main/views.py - > Line 36: posts = pagination.items -File: flaskdemo/app/main/views.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - - - -MrLokans/flaskr -https://github.com/MrLokans/flaskr -Entry file: None -Scanned: 2016-10-25 15:07:15.641128 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MrLokans/flaskr. - -citizen-stig/flaskone -https://github.com/citizen-stig/flaskone -Entry file: flaskone/flask_one.py -Scanned: 2016-10-25 15:07:16.943261 -No vulnerabilities found. - - -ifcheung2012/flaskanalysis -https://github.com/ifcheung2012/flaskanalysis -Entry file: flaskanalysis/manage.py -Scanned: 2016-10-25 15:07:18.362004 -No vulnerabilities found. - - -Robotwing/flaskweb -https://github.com/Robotwing/flaskweb -Entry file: flaskweb/app/__init__.py -Scanned: 2016-10-25 15:07:21.584764 -No vulnerabilities found. - - -menglong81/flaskr -https://github.com/menglong81/flaskr -Entry file: None -Scanned: 2016-10-25 15:07:22.111203 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/menglong81/flaskr. - -karanj112294/flasktutorial -https://github.com/karanj112294/flasktutorial -Entry file: None -Scanned: 2016-10-25 15:07:26.448894 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/karanj112294/flasktutorial. - -crazyqipython/flaskdemo -https://github.com/crazyqipython/flaskdemo -Entry file: flaskdemo/hello.py -Scanned: 2016-10-25 15:07:31.089006 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pythondude325/flaskr -https://github.com/pythondude325/flaskr -Entry file: None -Scanned: 2016-10-25 15:07:31.610833 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pythondude325/flaskr. - -chadelder/flasktaskr -https://github.com/chadelder/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:07:36.137146 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jocelynaladin/flaskworkspace -https://github.com/jocelynaladin/flaskworkspace -Entry file: flaskworkspace/__init__.py -Scanned: 2016-10-25 15:07:44.444618 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -fenske/flasky -https://github.com/fenske/flasky -Entry file: None -Scanned: 2016-10-25 15:07:45.017029 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fakegit/flasky -https://github.com/fakegit/flasky -Entry file: None -Scanned: 2016-10-25 15:07:45.531643 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wdxfairy/flaskblog -https://github.com/wdxfairy/flaskblog -Entry file: flaskblog/blog.py -Scanned: 2016-10-25 15:07:46.833657 -No vulnerabilities found. - - -davetromp/flasksqlapi -https://github.com/davetromp/flasksqlapi -Entry file: flasksqlapi/runapi.py -Scanned: 2016-10-25 15:07:49.456441 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Lazyppl/Flaskblog -https://github.com/Lazyppl/Flaskblog -Entry file: Flaskblog/app/__init__.py -Scanned: 2016-10-25 15:07:50.710340 -No vulnerabilities found. - - -playgrdstar/flasktaskr -https://github.com/playgrdstar/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:07:51.250056 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -toricor/flaskr -https://github.com/toricor/flaskr -Entry file: None -Scanned: 2016-10-25 15:07:51.768683 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/toricor/flaskr. - -xu00wei/flasky -https://github.com/xu00wei/flasky -Entry file: None -Scanned: 2016-10-25 15:07:52.279436 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zzclynn/flaskr -https://github.com/zzclynn/flaskr -Entry file: None -Scanned: 2016-10-25 15:07:54.793600 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zzclynn/flaskr. - -wish007/flasktest -https://github.com/wish007/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-25 15:07:56.185731 -No vulnerabilities found. - - -wildjan/Flaskr -https://github.com/wildjan/Flaskr -Entry file: Flaskr/Flaskr/Flaskr/flaskr.py -Scanned: 2016-10-25 15:07:58.606488 -No vulnerabilities found. - - -fhamami/flaskone -https://github.com/fhamami/flaskone -Entry file: flaskone/app/__init__.py -Scanned: 2016-10-25 15:08:00.141795 -No vulnerabilities found. - - -windery/flasky -https://github.com/windery/flasky -Entry file: None -Scanned: 2016-10-25 15:08:00.664802 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pnilan/flaskr -https://github.com/pnilan/flaskr -Entry file: None -Scanned: 2016-10-25 15:08:01.195719 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pnilan/flaskr. - -psykos/flaskloginskeleton -https://github.com/psykos/flaskloginskeleton -Entry file: flaskloginskeleton/app/__init__.py -Scanned: 2016-10-25 15:08:03.542603 -No vulnerabilities found. - - -AndrewGoldstein/flaskapp -https://github.com/AndrewGoldstein/flaskapp -Entry file: None -Scanned: 2016-10-25 15:08:04.060021 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AndrewGoldstein/flaskapp. - -zeratullich/flaskr -https://github.com/zeratullich/flaskr -Entry file: None -Scanned: 2016-10-25 15:08:06.575243 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeratullich/flaskr. - -johnpwillman/flasktest -https://github.com/johnpwillman/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-25 15:08:14.794827 -No vulnerabilities found. - - -scottmarinoff/Flasky -https://github.com/scottmarinoff/Flasky -Entry file: Flasky/Projects/Flasky/app/__init__.py -Scanned: 2016-10-25 15:08:17.167763 -No vulnerabilities found. - - -JamesMilnerUK/Loxo -https://github.com/JamesMilnerUK/Loxo -Entry file: Loxo/loxoapi.py -Scanned: 2016-10-25 15:08:24.627598 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -kcunning/flask-class-c9 -https://github.com/kcunning/flask-class-c9 -Entry file: flask-class-c9/flaskclass/app/__init__.py -Scanned: 2016-10-25 15:08:26.179944 -Vulnerability 1: -File: flask-class-c9/flaskclass/app/views.py - > User input at line 38, trigger word ".data": - numbers = form.numbers.data -Reassigned in: - File: flask-class-c9/flaskclass/app/views.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form) - File: flask-class-c9/flaskclass/app/views.py - > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form) -File: flask-class-c9/flaskclass/app/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('game.html',game_nums=game_nums, player_nums=numbers, wins=wins) - - - -cutedogspark/Flask-SocketIO -https://github.com/cutedogspark/Flask-SocketIO -Entry file: Flask-SocketIO/server/app/__init__.py -Scanned: 2016-10-25 15:08:33.739606 -No vulnerabilities found. - - -nescode/punchstarter -https://github.com/nescode/punchstarter -Entry file: punchstarter/punchstarter/__init__.py -Scanned: 2016-10-25 15:08:35.210807 -Vulnerability 1: -File: punchstarter/punchstarter/__init__.py - > User input at line 31, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 2: -File: punchstarter/punchstarter/__init__.py - > User input at line 36, trigger word "files[": - cover_photo = request.files['cover_photo'] -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550) - File: punchstarter/punchstarter/__init__.py - > Line 43: image_filename = uploaded_image['public_id'] - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 3: -File: punchstarter/punchstarter/__init__.py - > User input at line 45, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 4: -File: punchstarter/punchstarter/__init__.py - > User input at line 31, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 5: -File: punchstarter/punchstarter/__init__.py - > User input at line 36, trigger word "files[": - cover_photo = request.files['cover_photo'] -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550) - File: punchstarter/punchstarter/__init__.py - > Line 43: image_filename = uploaded_image['public_id'] - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 6: -File: punchstarter/punchstarter/__init__.py - > User input at line 45, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 7: -File: punchstarter/punchstarter/__init__.py - > User input at line 64, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project) - -Vulnerability 8: -File: punchstarter/punchstarter/__init__.py - > User input at line 72, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 77, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project) - -Vulnerability 9: -File: punchstarter/punchstarter/__init__.py - > User input at line 72, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 93, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 10: -File: punchstarter/punchstarter/__init__.py - > User input at line 72, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 93, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 11: -File: punchstarter/punchstarter/__init__.py - > User input at line 97, trigger word "get(": - query = request.args.get('q') or '' -File: punchstarter/punchstarter/__init__.py - > reaches line 98, trigger word "filter(": - projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all() - -Vulnerability 12: -File: punchstarter/punchstarter/__init__.py - > User input at line 97, trigger word "get(": - query = request.args.get('q') or '' -File: punchstarter/punchstarter/__init__.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query, projects=projects, project_count=project_count) - - - -arose13/HerokuCondaScipyFlaskApp -https://github.com/arose13/HerokuCondaScipyFlaskApp -Entry file: HerokuCondaScipyFlaskApp/Web/app.py -Scanned: 2016-10-25 15:08:36.486579 -No vulnerabilities found. - - -sd16spring/Toolbox-Flask -https://github.com/sd16spring/Toolbox-Flask -Entry file: Toolbox-Flask/hello.py -Scanned: 2016-10-25 15:08:39.107480 -No vulnerabilities found. - - -zbc/Flask -https://github.com/zbc/Flask -Entry file: None -Scanned: 2016-10-25 15:08:39.630475 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -JadyLiu/flask -https://github.com/JadyLiu/flask -Entry file: None -Scanned: 2016-10-25 15:08:40.247344 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ZhenghaoZhu/Flask -https://github.com/ZhenghaoZhu/Flask -Entry file: None -Scanned: 2016-10-25 15:08:45.792464 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cobra0914/flask -https://github.com/cobra0914/flask -Entry file: None -Scanned: 2016-10-25 15:08:46.345210 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sunshine-sjd/Flask -https://github.com/sunshine-sjd/Flask -Entry file: None -Scanned: 2016-10-25 15:08:46.859391 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -octt/flask -https://github.com/octt/flask -Entry file: None -Scanned: 2016-10-25 15:08:47.421035 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SunchunZhou/flask -https://github.com/SunchunZhou/flask -Entry file: None -Scanned: 2016-10-25 15:08:47.970358 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Bwooklyn/flask -https://github.com/Bwooklyn/flask -Entry file: None -Scanned: 2016-10-25 15:08:48.478702 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -HRKpython/flask -https://github.com/HRKpython/flask -Entry file: None -Scanned: 2016-10-25 15:08:50.021693 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -candyer/Flask -https://github.com/candyer/Flask -Entry file: None -Scanned: 2016-10-25 15:08:51.553342 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bsteinberg/flask -https://github.com/bsteinberg/flask -Entry file: None -Scanned: 2016-10-25 15:08:52.066301 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -susantshrestha/flask -https://github.com/susantshrestha/flask -Entry file: None -Scanned: 2016-10-25 15:08:52.606533 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pavelrib/flask -https://github.com/pavelrib/flask -Entry file: None -Scanned: 2016-10-25 15:08:55.125392 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -scripterkaran/flask -https://github.com/scripterkaran/flask -Entry file: None -Scanned: 2016-10-25 15:08:55.634776 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SeanVaysburd/flask -https://github.com/SeanVaysburd/flask -Entry file: None -Scanned: 2016-10-25 15:08:58.145829 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kartheek3011/Flask -https://github.com/kartheek3011/Flask -Entry file: None -Scanned: 2016-10-25 15:08:59.666260 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dannyec/flask -https://github.com/dannyec/flask -Entry file: None -Scanned: 2016-10-25 15:09:01.210090 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -itsrifat/flask-celery-docker-scale -https://github.com/itsrifat/flask-celery-docker-scale -Entry file: flask-celery-docker-scale/flask-app/app.py -Scanned: 2016-10-25 15:09:02.637569 -No vulnerabilities found. - - -ninadmhatre/zual -https://github.com/ninadmhatre/zual -Entry file: zual/local_mods/flask-blogging/flask_blogging/engine.py -Scanned: 2016-10-25 15:09:08.947290 -Vulnerability 1: -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > User input at line 104, trigger word "get(": - count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10) -Reassigned in: - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 106: meta = _get_meta(storage, count, page) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 107: offset = meta['offset'] - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 111: posts = storage.get_posts(count=count, offset=offset, include_draft=False, tag=None, user_id=None, recent=True) -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > reaches line 115, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config) - -Vulnerability 2: -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > User input at line 141, trigger word "get(": - count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10) -Reassigned in: - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 142: meta = _get_meta(storage, count, page,tag=tag) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 143: offset = meta['offset'] - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 147: posts = storage.get_posts(count=count, offset=offset, tag=tag, include_draft=False, user_id=None, recent=True) -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config) - -Vulnerability 3: -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > User input at line 159, trigger word "get(": - count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10) -Reassigned in: - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 160: meta = _get_meta(storage, count, page,user_id=user_id) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 161: offset = meta['offset'] - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 164: posts = storage.get_posts(count=count, offset=offset, user_id=user_id, include_draft=False, tag=None, recent=True) -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > reaches line 172, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config) - -Vulnerability 4: -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > User input at line 199, trigger word ".data": - slug = post_processor.create_slug(form.title.data) -Reassigned in: - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 204: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 214: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 220: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None)) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 224: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None)) -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > reaches line 200, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.page_by_id',post_id=pid, slug=slug)) - -Vulnerability 5: -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > User input at line 199, trigger word ".data": - slug = post_processor.create_slug(form.title.data) -Reassigned in: - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 204: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 214: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 220: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None)) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 224: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None)) -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > reaches line 200, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.page_by_id',post_id=pid, slug=slug)) - - - -TerbiumLabs/flask-developer-challenge -https://github.com/TerbiumLabs/flask-developer-challenge -Entry file: flask-developer-challenge/gistapi/gistapi.py -Scanned: 2016-10-25 15:09:10.363400 -No vulnerabilities found. - - -w84miracle/flask-sb-admin2 -https://github.com/w84miracle/flask-sb-admin2 -Entry file: flask-sb-admin2/sbadmin.py -Scanned: 2016-10-25 15:09:17.414611 -No vulnerabilities found. - - -k-hung/FlaskApp -https://github.com/k-hung/FlaskApp -Entry file: FlaskApp/FeelsApp/__init__.py -Scanned: 2016-10-25 15:09:24.871370 -No vulnerabilities found. - - -taogeT/flask-celery -https://github.com/taogeT/flask-celery -Entry file: flask-celery/example/app/__init__.py -Scanned: 2016-10-25 15:09:26.306217 -No vulnerabilities found. - - -frankV/flask-sendgrid -https://github.com/frankV/flask-sendgrid -Entry file: flask-sendgrid/setup.py -Scanned: 2016-10-25 15:09:27.603250 -No vulnerabilities found. - - -sunscrapers/flask-boilerplate -https://github.com/sunscrapers/flask-boilerplate -Entry file: flask-boilerplate/app.py -Scanned: 2016-10-25 15:09:35.969922 -No vulnerabilities found. - - -jabbalaci/DigitalOceanFlask -https://github.com/jabbalaci/DigitalOceanFlask -Entry file: DigitalOceanFlask/home/demo/projects/ave_caesar/main.py -Scanned: 2016-10-25 15:09:37.437445 -No vulnerabilities found. - - -pyx/flask-diced -https://github.com/pyx/flask-diced -Entry file: flask-diced/examples/simple/app.py -Scanned: 2016-10-25 15:09:38.852743 -No vulnerabilities found. - - -basco-johnkevin/note-taking-app -https://github.com/basco-johnkevin/note-taking-app -Entry file: note-taking-app/part2/main.py -Scanned: 2016-10-25 15:09:40.147830 -No vulnerabilities found. - - -yoshiya0503/Flask-Best-Practices -https://github.com/yoshiya0503/Flask-Best-Practices -Entry file: Flask-Best-Practices/methodview.py -Scanned: 2016-10-25 15:09:41.433885 -No vulnerabilities found. - - -ThunderousFigs/Genomes -https://github.com/ThunderousFigs/Genomes -Entry file: Genomes/server.py -Scanned: 2016-10-25 15:09:57.486889 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sinscary/Flask-Social-Networking -https://github.com/sinscary/Flask-Social-Networking -Entry file: Flask-Social-Networking/app.py -Scanned: 2016-10-25 15:09:59.865883 -Vulnerability 1: -File: Flask-Social-Networking/app.py - > User input at line 111, trigger word "get(": - user = models.User.select().where(models.User.username ** username).get() -Reassigned in: - File: Flask-Social-Networking/app.py - > Line 118: user = current_user -File: Flask-Social-Networking/app.py - > reaches line 121, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user) - -Vulnerability 2: -File: Flask-Social-Networking/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 146, trigger word "flash(": - flash('You are now following {}'.format(to_user.username), 'success') - -Vulnerability 3: -File: Flask-Social-Networking/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 147, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 4: -File: Flask-Social-Networking/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 147, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 5: -File: Flask-Social-Networking/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 165, trigger word "flash(": - flash('You have unfollowed {}'.format(to_user.username), 'success') - -Vulnerability 6: -File: Flask-Social-Networking/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 166, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 7: -File: Flask-Social-Networking/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 166, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - - - -osuosl/timesync-frontend-flask -https://github.com/osuosl/timesync-frontend-flask -Entry file: None -Scanned: 2016-10-25 15:10:05.045291 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/osuosl/timesync-frontend-flask. - -Miserlou/serverless-imagehost -https://github.com/Miserlou/serverless-imagehost -Entry file: serverless-imagehost/my_app.py -Scanned: 2016-10-25 15:10:06.361106 -No vulnerabilities found. - - -Python-Project-Simple/flask-blog -https://github.com/Python-Project-Simple/flask-blog -Entry file: flask-blog/app/__init__.py -Scanned: 2016-10-25 15:10:07.814695 -No vulnerabilities found. - - -narakai/flaskblog -https://github.com/narakai/flaskblog -Entry file: flaskblog/app/app.py -Scanned: 2016-10-25 15:10:14.884021 -Vulnerability 1: -File: flaskblog/app/helpers.py - > User input at line 5, trigger word "get(": - page = request.args.get('page') -Reassigned in: - File: flaskblog/app/helpers.py - > Line 7: page = int(page) - File: flaskblog/app/helpers.py - > Line 9: page = 1 - File: flaskblog/app/helpers.py - > Line 10: object_list = query.paginate(page, paginate_by) -File: flaskblog/app/helpers.py - > reaches line 11, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template_name,object_list=object_list, context) - -Vulnerability 2: -File: flaskblog/app/entries/blueprint.py - > User input at line 52, trigger word "files[": - image_file = request.files['file'] -Reassigned in: - File: flaskblog/app/entries/blueprint.py - > Line 53: filename = os.path.join(app.config['IMAGES_DIR'], secure_filename(image_file.filename)) -File: flaskblog/app/entries/blueprint.py - > reaches line 55, trigger word "flash(": - flash('Saved %s' % os.path.basename(filename), 'success') - -Vulnerability 3: -File: flaskblog/app/entries/forms.py - > User input at line 71, trigger word ".data": - entry = Entry.query.filter(Entry.status == Entry.STATUS_PUBLIC & Entry.id == self.entry_id.data).first() -File: flaskblog/app/entries/forms.py - > reaches line 71, trigger word "filter(": - entry = Entry.query.filter(Entry.status == Entry.STATUS_PUBLIC & Entry.id == self.entry_id.data).first() - - - -josepablob/flasktaskr -https://github.com/josepablob/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:10:15.424882 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -adrianneperedo/flaskr -https://github.com/adrianneperedo/flaskr -Entry file: None -Scanned: 2016-10-25 15:10:16.450296 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/adrianneperedo/flaskr. - -mirukushake/flaskr -https://github.com/mirukushake/flaskr -Entry file: None -Scanned: 2016-10-25 15:10:16.946740 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mirukushake/flaskr. - -wangduanyang/flasky -https://github.com/wangduanyang/flasky -Entry file: None -Scanned: 2016-10-25 15:10:17.462103 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -darrenhankins/flaskr -https://github.com/darrenhankins/flaskr -Entry file: None -Scanned: 2016-10-25 15:10:17.958546 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/darrenhankins/flaskr. - -tim1978/flasktaskr -https://github.com/tim1978/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:10:18.465595 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DXZ/flaskr -https://github.com/DXZ/flaskr -Entry file: None -Scanned: 2016-10-25 15:10:18.999248 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/DXZ/flaskr. - -zhangyuhaomei/flasky -https://github.com/zhangyuhaomei/flasky -Entry file: None -Scanned: 2016-10-25 15:10:19.509317 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hellohuangjin/flaskblog -https://github.com/hellohuangjin/flaskblog -Entry file: flaskblog/app/__init__.py -Scanned: 2016-10-25 15:10:20.979061 -No vulnerabilities found. - - -Looncall/Flaskr -https://github.com/Looncall/Flaskr -Entry file: Flaskr/flaskr/app.py -Scanned: 2016-10-25 15:10:22.261695 -No vulnerabilities found. - - -schen2011/flaskandazure -https://github.com/schen2011/flaskandazure -Entry file: flaskandazure/FlaskWebProject3/FlaskWebProject3/__init__.py -Scanned: 2016-10-25 15:10:26.248977 -No vulnerabilities found. - - -gyonghua/flasktaskr -https://github.com/gyonghua/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:10:26.761280 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -coolmile23/flaskr -https://github.com/coolmile23/flaskr -Entry file: None -Scanned: 2016-10-25 15:10:27.267046 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/coolmile23/flaskr. - -Rothschild0120/flaskyblog -https://github.com/Rothschild0120/flaskyblog -Entry file: flaskyblog/app/__init__.py -Scanned: 2016-10-25 15:10:30.170181 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -keer2345/flasky -https://github.com/keer2345/flasky -Entry file: None -Scanned: 2016-10-25 15:10:30.697350 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MRamakri/flaskworkshop -https://github.com/MRamakri/flaskworkshop -Entry file: flaskworkshop/app.py -Scanned: 2016-10-25 15:10:32.095352 -No vulnerabilities found. - - -islandev/flaskweb -https://github.com/islandev/flaskweb -Entry file: flaskweb/hello.py -Scanned: 2016-10-25 15:10:42.120015 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -PansFortress/flasktasker -https://github.com/PansFortress/flasktasker -Entry file: flasktasker/views.py -Scanned: 2016-10-25 15:10:43.567514 -No vulnerabilities found. - - -olegzhoglo/flasktaskr -https://github.com/olegzhoglo/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:10:44.079967 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -imhuwq/flasky -https://github.com/imhuwq/flasky -Entry file: None -Scanned: 2016-10-25 15:10:44.594212 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Robotwing/flaskweb -https://github.com/Robotwing/flaskweb -Entry file: flaskweb/app/__init__.py -Scanned: 2016-10-25 15:10:47.766788 -No vulnerabilities found. - - -CBR09/flaskapp -https://github.com/CBR09/flaskapp -Entry file: None -Scanned: 2016-10-25 15:10:48.277927 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/CBR09/flaskapp. - -neo1218/m2m -https://github.com/neo1218/m2m -Entry file: m2m/m2m/app/__init__.py -Scanned: 2016-10-25 15:10:59.738034 -No vulnerabilities found. - - -Kriordan/flasktaskr -https://github.com/Kriordan/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:11:00.248609 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -antonsoroko/flaskapimongo -https://github.com/antonsoroko/flaskapimongo -Entry file: flaskapimongo/flaskapimongo/__init__.py -Scanned: 2016-10-25 15:11:01.839424 -No vulnerabilities found. - - -haoweibo1987/flasker -https://github.com/haoweibo1987/flasker -Entry file: flasker/app/__init__.py -Scanned: 2016-10-25 15:11:12.921409 -No vulnerabilities found. - - -egonvb/flaskplayground -https://github.com/egonvb/flaskplayground -Entry file: flaskplayground/api.py -Scanned: 2016-10-25 15:11:20.094208 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jeffreybergman/flasktaskr -https://github.com/jeffreybergman/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:11:20.670438 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zhkmxx9302013/flaskmysql -https://github.com/zhkmxx9302013/flaskmysql -Entry file: flaskmysql/flaskmysql.py -Scanned: 2016-10-25 15:11:22.000004 -No vulnerabilities found. - - -xiaomao361/flaskr -https://github.com/xiaomao361/flaskr -Entry file: None -Scanned: 2016-10-25 15:11:22.521304 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiaomao361/flaskr. - -zixuzhang/flasky -https://github.com/zixuzhang/flasky -Entry file: None -Scanned: 2016-10-25 15:11:23.077553 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -stalwart201/flaskimgupload -https://github.com/stalwart201/flaskimgupload -Entry file: flaskimgupload/upload.py -Scanned: 2016-10-25 15:11:24.357102 -Vulnerability 1: -File: flaskimgupload/upload.py - > User input at line 19, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flaskimgupload/upload.py - > Line 21: filename = secure_filename(file.filename) - File: flaskimgupload/upload.py - > Line 25: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' -File: flaskimgupload/upload.py - > reaches line 23, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: flaskimgupload/upload.py - > User input at line 19, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flaskimgupload/upload.py - > Line 21: filename = secure_filename(file.filename) - File: flaskimgupload/upload.py - > Line 25: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' -File: flaskimgupload/upload.py - > reaches line 23, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -marcabomb/flasktaskr -https://github.com/marcabomb/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:11:24.870435 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -alvaro893/flaskcinemaapp -https://github.com/alvaro893/flaskcinemaapp -Entry file: flaskcinemaapp/FlaskWebProject/__init__.py -Scanned: 2016-10-25 15:11:27.712105 -No vulnerabilities found. - - -yuyiwei305/flaskr -https://github.com/yuyiwei305/flaskr -Entry file: None -Scanned: 2016-10-25 15:11:28.232010 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yuyiwei305/flaskr. - -czy1238677/flasky -https://github.com/czy1238677/flasky -Entry file: None -Scanned: 2016-10-25 15:11:28.741467 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -liteng123/flaskr -https://github.com/liteng123/flaskr -Entry file: None -Scanned: 2016-10-25 15:11:29.746096 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/liteng123/flaskr. - -Pink-Moon/flaskr -https://github.com/Pink-Moon/flaskr -Entry file: None -Scanned: 2016-10-25 15:11:30.767584 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pink-Moon/flaskr. - -mcmcgonagle/flasktaskr2 -https://github.com/mcmcgonagle/flasktaskr2 -Entry file: flasktaskr2/project/views.py -Scanned: 2016-10-25 15:11:32.578127 -No vulnerabilities found. - - -pchartrand/FlaskTemp -https://github.com/pchartrand/FlaskTemp -Entry file: FlaskTemp/tempreport.py -Scanned: 2016-10-25 15:11:35.175848 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -salazar35/FlaskWeb -https://github.com/salazar35/FlaskWeb -Entry file: FlaskWeb/Flask Web Development.py -Scanned: 2016-10-25 15:11:36.485402 -No vulnerabilities found. - - -uklineale/flaskTut -https://github.com/uklineale/flaskTut -Entry file: None -Scanned: 2016-10-25 15:11:47.164902 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MarHelen/FlaskLogin -https://github.com/MarHelen/FlaskLogin -Entry file: FlaskLogin/sql_declarative.py -Scanned: 2016-10-25 15:11:55.025510 -Vulnerability 1: -File: FlaskLogin/first.py - > User input at line 63, trigger word "get(": - email = request.form.get('email') -Reassigned in: - File: FlaskLogin/first.py - > Line 70: user = User(email, request.form.get('pw')) -File: FlaskLogin/first.py - > reaches line 65, trigger word "filter(": - temp_user_set = User.query.filter(User.email == email).first() - - - -AlexFransis/FlaskyProject -https://github.com/AlexFransis/FlaskyProject -Entry file: FlaskyProject/app/__init__.py -Scanned: 2016-10-25 15:11:56.747366 -No vulnerabilities found. - - -azureappserviceoss/FlaskAzure -https://github.com/azureappserviceoss/FlaskAzure -Entry file: FlaskAzure/FlaskWebProject1/__init__.py -Scanned: 2016-10-25 15:12:03.320710 -No vulnerabilities found. - - -yhappy/FlaskProjects -https://github.com/yhappy/FlaskProjects -Entry file: FlaskProjects/FlaskProjects.py -Scanned: 2016-10-25 15:12:04.628926 -No vulnerabilities found. - - -saurabh1e/FlaskStructure -https://github.com/saurabh1e/FlaskStructure -Entry file: FlaskStructure/src/utils/__init__.py -Scanned: 2016-10-25 15:12:05.973449 -No vulnerabilities found. - - -tangza/FlaskAPP -https://github.com/tangza/FlaskAPP -Entry file: None -Scanned: 2016-10-25 15:12:13.645015 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AlexGrek/FlaskLib -https://github.com/AlexGrek/FlaskLib -Entry file: FlaskLib/FlaskLib/FlaskLib/__init__.py -Scanned: 2016-10-25 15:12:17.614196 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -daveweber/FlaskBar -https://github.com/daveweber/FlaskBar -Entry file: FlaskBar/index.py -Scanned: 2016-10-25 15:12:18.925182 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -retozero/FlaskDemo -https://github.com/retozero/FlaskDemo -Entry file: FlaskDemo/flaskr/flaskr.py -Scanned: 2016-10-25 15:12:20.778896 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -danleyb2/flaskMe -https://github.com/danleyb2/flaskMe -Entry file: flaskMe/flaskREST.py -Scanned: 2016-10-25 15:12:22.165787 -Vulnerability 1: -File: flaskMe/flaskREST.py - > User input at line 73, trigger word "get(": - name = data.get('name') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 76, trigger word "execute(": - db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color]) - -Vulnerability 2: -File: flaskMe/flaskREST.py - > User input at line 74, trigger word "get(": - color = data.get('color') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 76, trigger word "execute(": - db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color]) - -Vulnerability 3: -File: flaskMe/flaskREST.py - > User input at line 73, trigger word "get(": - name = data.get('name') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 78, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color)) - -Vulnerability 4: -File: flaskMe/flaskREST.py - > User input at line 74, trigger word "get(": - color = data.get('color') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 78, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color)) - - - -Rikka-chan/flaskCharts -https://github.com/Rikka-chan/flaskCharts -Entry file: None -Scanned: 2016-10-25 15:12:29.492061 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hattwick/flask2 -https://github.com/hattwick/flask2 -Entry file: flask2/flask2mod-template.py -Scanned: 2016-10-25 15:12:30.817198 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -narakai/FlaskServer -https://github.com/narakai/FlaskServer -Entry file: FlaskServer/flaskServer.py -Scanned: 2016-10-25 15:12:32.192505 -No vulnerabilities found. - - -ljxxcaijing/flask -https://github.com/ljxxcaijing/flask -Entry file: None -Scanned: 2016-10-25 15:12:33.920222 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -PacktPublishing/Mastering-Flask -https://github.com/PacktPublishing/Mastering-Flask -Entry file: Mastering-Flask/Chapter 13_Code/Chapter 13/webapp/__init__.py -Scanned: 2016-10-25 15:12:37.089923 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -migrateup/flaskr -https://github.com/migrateup/flaskr -Entry file: None -Scanned: 2016-10-25 15:12:37.625157 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/migrateup/flaskr. - -reparadocs/Flask-HelloWorldBot -https://github.com/reparadocs/Flask-HelloWorldBot -Entry file: Flask-HelloWorldBot/HelloWorldBot.py -Scanned: 2016-10-25 15:12:39.013549 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -singingwolfboy/flask-sse -https://github.com/singingwolfboy/flask-sse -Entry file: flask-sse/tests/conftest.py -Scanned: 2016-10-25 15:12:40.385259 -No vulnerabilities found. - - -amateurPotato/flask -https://github.com/amateurPotato/flask -Entry file: None -Scanned: 2016-10-25 15:12:40.938186 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ahdrage/flask -https://github.com/ahdrage/flask -Entry file: None -Scanned: 2016-10-25 15:12:41.482897 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -acouderc/flask -https://github.com/acouderc/flask -Entry file: None -Scanned: 2016-10-25 15:12:41.979117 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Goomah/flask -https://github.com/Goomah/flask -Entry file: None -Scanned: 2016-10-25 15:12:42.515962 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pankajpant22/flask -https://github.com/pankajpant22/flask -Entry file: None -Scanned: 2016-10-25 15:12:43.081567 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ultramarine7/flask -https://github.com/ultramarine7/flask -Entry file: None -Scanned: 2016-10-25 15:12:43.598071 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -od210291jpv/flask -https://github.com/od210291jpv/flask -Entry file: None -Scanned: 2016-10-25 15:12:44.104147 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aintmetho/flask -https://github.com/aintmetho/flask -Entry file: None -Scanned: 2016-10-25 15:12:44.610892 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MonPower/Flask -https://github.com/MonPower/Flask -Entry file: None -Scanned: 2016-10-25 15:12:45.159795 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -josephmuli/Flask -https://github.com/josephmuli/Flask -Entry file: None -Scanned: 2016-10-25 15:12:45.674719 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MapEntryManagement/flask -https://github.com/MapEntryManagement/flask -Entry file: None -Scanned: 2016-10-25 15:12:48.204193 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wenzi0595/flask -https://github.com/wenzi0595/flask -Entry file: None -Scanned: 2016-10-25 15:12:55.729481 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -singingwolfboy/build-a-flask-api -https://github.com/singingwolfboy/build-a-flask-api -Entry file: build-a-flask-api/step08/puppy.py -Scanned: 2016-10-25 15:13:01.708826 -Vulnerability 1: -File: build-a-flask-api/step08/puppy.py - > User input at line 25, trigger word "get(": - name = request.form.get('name') -Reassigned in: - File: build-a-flask-api/step08/puppy.py - > Line 31: slug = slugify(name) - File: build-a-flask-api/step08/puppy.py - > Line 34: puppy = Puppy(slug=slug, name=name, image_url=image_url) - File: build-a-flask-api/step08/puppy.py - > Line 43: resp.headers['Location'] = location -File: build-a-flask-api/step08/puppy.py - > reaches line 40, trigger word "url_for(": - location = url_for('get_puppy',slug=slug) - - - -sunary/flask-optimize -https://github.com/sunary/flask-optimize -Entry file: flask-optimize/tests/flask_app.py -Scanned: 2016-10-25 15:13:05.115100 -No vulnerabilities found. - - -klen/flask-pw -https://github.com/klen/flask-pw -Entry file: flask-pw/tests.py -Scanned: 2016-10-25 15:13:08.086750 -No vulnerabilities found. - - -janukobytsch/flask-autofixture -https://github.com/janukobytsch/flask-autofixture -Entry file: flask-autofixture/tests/conftest.py -Scanned: 2016-10-25 15:13:15.651640 -No vulnerabilities found. - - -underdogio/flask-graylog -https://github.com/underdogio/flask-graylog -Entry file: flask-graylog/example/app.py -Scanned: 2016-10-25 15:13:18.977445 -No vulnerabilities found. - - -adyouri/flask-basics -https://github.com/adyouri/flask-basics -Entry file: flask-basics/lesson5/app.py -Scanned: 2016-10-25 15:13:20.364140 -No vulnerabilities found. - - -KujiraProject/Flask-PAM -https://github.com/KujiraProject/Flask-PAM -Entry file: Flask-PAM/example/www.py -Scanned: 2016-10-25 15:13:21.760850 -No vulnerabilities found. - - -colingorrie/flask-boilerplate -https://github.com/colingorrie/flask-boilerplate -Entry file: None -Scanned: 2016-10-25 15:13:23.441057 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/colingorrie/flask-boilerplate. - -TwilioDevEd/automated-survey-flask -https://github.com/TwilioDevEd/automated-survey-flask -Entry file: automated-survey-flask/automated_survey_flask/__init__.py -Scanned: 2016-10-25 15:13:34.999744 -No vulnerabilities found. - - -gucxufangling/flask-- -https://github.com/gucxufangling/flask-- -Entry file: flask--/app/__init__.py -Scanned: 2016-10-25 15:13:43.956247 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -paceko/shopping-site -https://github.com/paceko/shopping-site -Entry file: shopping-site/shoppingsite.py -Scanned: 2016-10-25 15:13:46.204937 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -kashyap32/flask-REST -https://github.com/kashyap32/flask-REST -Entry file: None -Scanned: 2016-10-25 15:13:47.468808 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kashyap32/flask-REST. - -pragmaticcoders/flask-react-seed -https://github.com/pragmaticcoders/flask-react-seed -Entry file: None -Scanned: 2016-10-25 15:13:48.845032 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pragmaticcoders/flask-react-seed. - -danil3d/flaskblog -https://github.com/danil3d/flaskblog -Entry file: None -Scanned: 2016-10-25 15:13:50.761152 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danil3d/flaskblog. - -rahulballal/flasktemplate -https://github.com/rahulballal/flasktemplate -Entry file: flasktemplate/app.py -Scanned: 2016-10-25 15:13:52.038478 -No vulnerabilities found. - - -rsk7/flaskapp -https://github.com/rsk7/flaskapp -Entry file: None -Scanned: 2016-10-25 15:13:52.551127 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rsk7/flaskapp. - -ailtoncsf/flasklearn -https://github.com/ailtoncsf/flasklearn -Entry file: flasklearn/flask-basics/app.py -Scanned: 2016-10-25 15:14:02.704870 -No vulnerabilities found. - - -VimDong/flaskme -https://github.com/VimDong/flaskme -Entry file: flaskme/app/__init__.py -Scanned: 2016-10-25 15:14:04.316346 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -dimdal/flasktutorial -https://github.com/dimdal/flasktutorial -Entry file: None -Scanned: 2016-10-25 15:14:04.837866 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dimdal/flasktutorial. - -axavio/flasky -https://github.com/axavio/flasky -Entry file: None -Scanned: 2016-10-25 15:14:05.340839 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bspaans/flaskal -https://github.com/bspaans/flaskal -Entry file: flaskal/flaskal/imports.py -Scanned: 2016-10-25 15:14:06.917488 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -stoodsteal/flasky -https://github.com/stoodsteal/flasky -Entry file: None -Scanned: 2016-10-25 15:14:07.428651 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -annoys-parrot/flaskbook -https://github.com/annoys-parrot/flaskbook -Entry file: flaskbook/application.py -Scanned: 2016-10-25 15:14:09.098722 -Vulnerability 1: -File: flaskbook/user/views.py - > User input at line 24, trigger word ".data": - user = User.objects.filter(username=form.username.data).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 37: user = None -File: flaskbook/user/views.py - > reaches line 24, trigger word "filter(": - user = User.objects.filter(username=form.username.data).first() - -Vulnerability 2: -File: flaskbook/user/views.py - > User input at line 31, trigger word "get(": - next = session.get('next') -Reassigned in: - File: flaskbook/user/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = 'User logged in' - File: flaskbook/user/views.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('user/login.html',form=form, error=error) -File: flaskbook/user/views.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - -Vulnerability 3: -File: flaskbook/user/views.py - > User input at line 47, trigger word ".data": - hashed_password = bcrypt.hashpw(form.password.data, salt) -Reassigned in: - File: flaskbook/user/views.py - > Line 49: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode) -File: flaskbook/user/views.py - > reaches line 62, trigger word "render_template(": - body_html = render_template('mail/user/register.html',user=user) - -Vulnerability 4: -File: flaskbook/user/views.py - > User input at line 49, trigger word ".data": - user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode) -File: flaskbook/user/views.py - > reaches line 62, trigger word "render_template(": - body_html = render_template('mail/user/register.html',user=user) - -Vulnerability 5: -File: flaskbook/user/views.py - > User input at line 47, trigger word ".data": - hashed_password = bcrypt.hashpw(form.password.data, salt) -Reassigned in: - File: flaskbook/user/views.py - > Line 49: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode) -File: flaskbook/user/views.py - > reaches line 63, trigger word "render_template(": - body_text = render_template('mail/user/register.txt',user=user) - -Vulnerability 6: -File: flaskbook/user/views.py - > User input at line 49, trigger word ".data": - user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode) -File: flaskbook/user/views.py - > reaches line 63, trigger word "render_template(": - body_text = render_template('mail/user/register.txt',user=user) - -Vulnerability 7: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 90, trigger word "filter(": - user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 8: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 106, trigger word "filter(": - if User.objects.filter(username=form.username.data.lower()).first(): - -Vulnerability 9: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 113, trigger word "filter(": - if User.objects.filter(email=form.email.data.lower()).first(): - -Vulnerability 10: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 126, trigger word "render_template(": - body_html = render_template('mail/user/change_email.html',user=user) - -Vulnerability 11: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 127, trigger word "render_template(": - body_text = render_template('mail/user/change_email.txt',user=user) - -Vulnerability 12: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 137, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user/edit.html',form=form, error=error, message=message, user=user) - -Vulnerability 13: -File: flaskbook/user/views.py - > User input at line 160, trigger word ".data": - user = User.objects.filter(email=form.email.data).first() -File: flaskbook/user/views.py - > reaches line 160, trigger word "filter(": - user = User.objects.filter(email=form.email.data).first() - -Vulnerability 14: -File: flaskbook/user/views.py - > User input at line 160, trigger word ".data": - user = User.objects.filter(email=form.email.data).first() -File: flaskbook/user/views.py - > reaches line 168, trigger word "render_template(": - body_html = render_template('mail/user/password_reset.html',user=user) - -Vulnerability 15: -File: flaskbook/user/views.py - > User input at line 160, trigger word ".data": - user = User.objects.filter(email=form.email.data).first() -File: flaskbook/user/views.py - > reaches line 169, trigger word "render_template(": - body_text = render_template('mail/user/password_reset.txt',user=user) - -Vulnerability 16: -File: flaskbook/user/views.py - > User input at line 215, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -File: flaskbook/user/views.py - > reaches line 215, trigger word "filter(": - user = User.objects.filter(username=session.get('username')).first() - - - -gene1wood/flaskoktaapp -https://github.com/gene1wood/flaskoktaapp -Entry file: flaskoktaapp/flaskoktaapp/__init__.py -Scanned: 2016-10-25 15:14:10.543313 -Vulnerability 1: -File: flaskoktaapp/flaskoktaapp/__init__.py - > User input at line 201, trigger word "form[": - url = request.form['RelayState'] -File: flaskoktaapp/flaskoktaapp/__init__.py - > reaches line 196, trigger word "url_for(": - url = url_for('user') - -Vulnerability 2: -File: flaskoktaapp/flaskoktaapp/__init__.py - > User input at line 201, trigger word "form[": - url = request.form['RelayState'] -File: flaskoktaapp/flaskoktaapp/__init__.py - > reaches line 204, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - - - -yu66s/flaskr -https://github.com/yu66s/flaskr -Entry file: None -Scanned: 2016-10-25 15:14:11.051317 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yu66s/flaskr. - -xiaohu2015/Flasky -https://github.com/xiaohu2015/Flasky -Entry file: Flasky/Flasky.py -Scanned: 2016-10-25 15:14:15.593562 -Vulnerability 1: -File: Flasky/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flasky/app/main/views.py - > Line 31: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flasky/app/main/views.py - > Line 34: posts = pagination.items - File: Flasky/app/main/views.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flasky/app/main/views.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Flasky/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Flasky/app/main/views.py - > Line 23: show_followed = False - File: Flasky/app/main/views.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flasky/app/main/views.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Flasky/app/main/views.py - > User input at line 60, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flasky/app/main/views.py - > Line 61: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flasky/app/main/views.py - > Line 64: posts = pagination.items -File: Flasky/app/main/views.py - > reaches line 65, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Flasky/app/main/views.py - > User input at line 121, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flasky/app/main/views.py - > Line 123: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Flasky/app/main/views.py - > Line 124: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flasky/app/main/views.py - > Line 126: comments = pagination.items - File: Flasky/app/main/views.py - > Line 120: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Flasky/app/main/views.py - > reaches line 127, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Flasky/app/main/views.py - > User input at line 186, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flasky/app/main/views.py - > Line 187: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Flasky/app/main/views.py - > Line 189: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Flasky/app/main/views.py - > Line 185: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flasky/app/main/views.py - > reaches line 190, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Flasky/app/main/views.py - > User input at line 200, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flasky/app/main/views.py - > Line 201: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Flasky/app/main/views.py - > Line 204: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Flasky/app/main/views.py - > Line 199: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flasky/app/main/views.py - > reaches line 206, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Flasky/app/main/views.py - > User input at line 215, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flasky/app/main/views.py - > Line 216: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flasky/app/main/views.py - > Line 218: comments = pagination.items -File: Flasky/app/main/views.py - > reaches line 219, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -cwywang/flasky -https://github.com/cwywang/flasky -Entry file: None -Scanned: 2016-10-25 15:14:16.133263 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Sarmacid/flaskr -https://github.com/Sarmacid/flaskr -Entry file: None -Scanned: 2016-10-25 15:14:16.639251 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Sarmacid/flaskr. - -Julzmbugua/flasky -https://github.com/Julzmbugua/flasky -Entry file: None -Scanned: 2016-10-25 15:14:17.181867 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Maxwell-Ying/flaskbook -https://github.com/Maxwell-Ying/flaskbook -Entry file: flaskbook/app/__init__.py -Scanned: 2016-10-25 15:14:18.471289 -Vulnerability 1: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 2: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 3: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 4: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 5: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 6: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 7: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 8: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 9: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 10: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 11: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 12: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 13: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 14: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 15: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 16: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 17: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 18: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 19: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 20: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 21: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 22: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 23: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 24: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 25: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 26: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 27: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 28: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 29: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 30: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 31: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 32: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 33: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 34: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 35: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 36: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 37: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 38: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 39: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 40: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 41: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 42: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 43: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 44: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 45: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 46: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 47: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 48: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 49: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 50: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 51: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 52: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 53: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 54: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 55: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 56: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - - - -skhe/flasky -https://github.com/skhe/flasky -Entry file: None -Scanned: 2016-10-25 15:14:18.989421 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jinxiaoyuan/flaskr -https://github.com/jinxiaoyuan/flaskr -Entry file: None -Scanned: 2016-10-25 15:14:19.524918 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jinxiaoyuan/flaskr. - -baloo98/flasky -https://github.com/baloo98/flasky -Entry file: None -Scanned: 2016-10-25 15:14:20.057958 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sanketg10/flaskapp -https://github.com/sanketg10/flaskapp -Entry file: None -Scanned: 2016-10-25 15:14:20.605899 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanketg10/flaskapp. - -wangxuan007/flasky -https://github.com/wangxuan007/flasky -Entry file: None -Scanned: 2016-10-25 15:14:21.156569 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lambdaplus/flasko -https://github.com/lambdaplus/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-25 15:14:33.495929 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/operator.py - -fkirwin/flaskhelloworld -https://github.com/fkirwin/flaskhelloworld -Entry file: flaskhelloworld/hello_world.py -Scanned: 2016-10-25 15:14:41.406459 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -wang7lu6qiang5/flasky -https://github.com/wang7lu6qiang5/flasky -Entry file: None -Scanned: 2016-10-25 15:14:41.940482 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ak042/flasktaskr -https://github.com/ak042/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:14:42.448024 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -thedrew82/flaskr -https://github.com/thedrew82/flaskr -Entry file: None -Scanned: 2016-10-25 15:14:44.965062 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/thedrew82/flaskr. - -allergier/flaskr -https://github.com/allergier/flaskr -Entry file: None -Scanned: 2016-10-25 15:14:47.474750 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/allergier/flaskr. - -shenmj053/flaskr -https://github.com/shenmj053/flaskr -Entry file: None -Scanned: 2016-10-25 15:14:47.988534 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shenmj053/flaskr. - -neotrinity/flaskavro -https://github.com/neotrinity/flaskavro -Entry file: flaskavro/main.py -Scanned: 2016-10-25 15:14:50.304973 -No vulnerabilities found. - - -SSUHan/flasktutorial -https://github.com/SSUHan/flasktutorial -Entry file: None -Scanned: 2016-10-25 15:14:50.821789 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SSUHan/flasktutorial. - -ma53192190/flaskwork -https://github.com/ma53192190/flaskwork -Entry file: flaskwork/flaskwork.py -Scanned: 2016-10-25 15:14:52.106866 -No vulnerabilities found. - - -zverxw13/flaskr -https://github.com/zverxw13/flaskr -Entry file: None -Scanned: 2016-10-25 15:14:52.652540 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zverxw13/flaskr. - -Mendurim/flasktut -https://github.com/Mendurim/flasktut -Entry file: flasktut/hello.py -Scanned: 2016-10-25 15:14:53.954163 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zeroisme/flaskblog -https://github.com/zeroisme/flaskblog -Entry file: None -Scanned: 2016-10-25 15:15:03.528355 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeroisme/flaskblog. - -hoorn91/flaskproject -https://github.com/hoorn91/flaskproject -Entry file: flaskproject/app/hello.py -Scanned: 2016-10-25 15:15:05.899985 -Vulnerability 1: -File: flaskproject/app/hello.py - > User input at line 70, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flaskproject/app/hello.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -wanghaa/flasky -https://github.com/wanghaa/flasky -Entry file: None -Scanned: 2016-10-25 15:15:06.422856 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -HDking/flasktaskr -https://github.com/HDking/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:15:06.995218 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gjcooper/flaskprac -https://github.com/gjcooper/flaskprac -Entry file: flaskprac/app/__init__.py -Scanned: 2016-10-25 15:15:08.539944 -No vulnerabilities found. - - -liuhuai0217/flasky -https://github.com/liuhuai0217/flasky -Entry file: None -Scanned: 2016-10-25 15:15:09.064317 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -deliveryyyyguy/flaskapp -https://github.com/deliveryyyyguy/flaskapp -Entry file: None -Scanned: 2016-10-25 15:15:10.577129 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/deliveryyyyguy/flaskapp. - -omshankar1/flaskapp -https://github.com/omshankar1/flaskapp -Entry file: None -Scanned: 2016-10-25 15:15:11.090586 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/omshankar1/flaskapp. - -maxwang051/flasktaskr -https://github.com/maxwang051/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:15:11.609428 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aaron077/flaskblog -https://github.com/aaron077/flaskblog -Entry file: None -Scanned: 2016-10-25 15:15:16.155524 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/aaron077/flaskblog. - -hoobalias/Flaskr -https://github.com/hoobalias/Flaskr -Entry file: Flaskr/flaskr_original.py -Scanned: 2016-10-25 15:15:17.469315 -No vulnerabilities found. - - -joanna-solomiewicz/FlaskWorkshop -https://github.com/joanna-solomiewicz/FlaskWorkshop -Entry file: FlaskWorkshop/app.py -Scanned: 2016-10-25 15:15:24.053549 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWorkshop/venv/lib/python3.5/operator.py - -erk52/FlaskDynamics -https://github.com/erk52/FlaskDynamics -Entry file: FlaskDynamics/view.py -Scanned: 2016-10-25 15:15:25.397556 -Vulnerability 1: -File: FlaskDynamics/view.py - > User input at line 18, trigger word ".data": - result = phasePlot(form.XPrime.data, form.YPrime.data) -Reassigned in: - File: FlaskDynamics/view.py - > Line 20: result = None -File: FlaskDynamics/view.py - > reaches line 22, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('new_view.html',form=form, result=result) - - - -KentaYamada/flaskr2 -https://github.com/KentaYamada/flaskr2 -Entry file: flaskr2/__init__.py -Scanned: 2016-10-25 15:15:26.716419 -No vulnerabilities found. - - -NapoleonYoung/FlaskWeb -https://github.com/NapoleonYoung/FlaskWeb -Entry file: FlaskWeb/MyFirstWebServer/app/__init__.py -Scanned: 2016-10-25 15:15:35.049583 -Vulnerability 1: -File: FlaskWeb/MyFirstWebServer/app/main/views.py - > User input at line 15, trigger word ".data": - name = form.name.data -Reassigned in: - File: FlaskWeb/MyFirstWebServer/app/main/views.py - > Line 12: name = None -File: FlaskWeb/MyFirstWebServer/app/main/views.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name) - - - -DaBaiLi/FlaskBlog -https://github.com/DaBaiLi/FlaskBlog -Entry file: FlaskBlog/app/__init__.py -Scanned: 2016-10-25 15:15:36.615396 -Vulnerability 1: -File: FlaskBlog/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 26: posts = pagination.items - File: FlaskBlog/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskBlog/app/main/views.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: FlaskBlog/app/main/views.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 35: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 38: posts = pagination.items -File: FlaskBlog/app/main/views.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 3: -File: FlaskBlog/app/main/views.py - > User input at line 98, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 100: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: FlaskBlog/app/main/views.py - > Line 102: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 105: comments = pagination.items - File: FlaskBlog/app/main/views.py - > Line 97: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: FlaskBlog/app/main/views.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: FlaskBlog/app/main/views.py - > User input at line 131, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 132: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 135: comments = pagination.items -File: FlaskBlog/app/main/views.py - > reaches line 136, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -zhouyang2640/FlaskInit -https://github.com/zhouyang2640/FlaskInit -Entry file: FlaskInit/hello.py -Scanned: 2016-10-25 15:15:37.967707 -No vulnerabilities found. - - -rmGuarachi/flaskTutorial -https://github.com/rmGuarachi/flaskTutorial -Entry file: flaskTutorial/webapp.py -Scanned: 2016-10-25 15:15:39.274791 -No vulnerabilities found. - - -Thetides/FlaskyTut -https://github.com/Thetides/FlaskyTut -Entry file: FlaskyTut/app.py -Scanned: 2016-10-25 15:15:40.515106 -No vulnerabilities found. - - -cs207-project/FlaskAPI -https://github.com/cs207-project/FlaskAPI -Entry file: FlaskAPI/app.py -Scanned: 2016-10-25 15:15:48.367416 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -tajihiro/FlaskBluemix -https://github.com/tajihiro/FlaskBluemix -Entry file: FlaskBluemix/index.py -Scanned: 2016-10-25 15:15:49.658512 -No vulnerabilities found. - - -s3c0nDD/FlaskTutorial -https://github.com/s3c0nDD/FlaskTutorial -Entry file: FlaskTutorial/app/__init__.py -Scanned: 2016-10-25 15:15:50.881826 -No vulnerabilities found. - - -HaarisKhan/FlaskDemos -https://github.com/HaarisKhan/FlaskDemos -Entry file: None -Scanned: 2016-10-25 15:15:57.655914 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hamartia0/FlaskWeb -https://github.com/hamartia0/FlaskWeb -Entry file: FlaskWeb/web3b.py -Scanned: 2016-10-25 15:16:05.250623 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -prrateekk/FlaskTesting -https://github.com/prrateekk/FlaskTesting -Entry file: FlaskTesting/hello.py -Scanned: 2016-10-25 15:16:11.799176 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTesting/venv/lib/python2.7/sre_compile.py - -kolapapa/flasky2 -https://github.com/kolapapa/flasky2 -Entry file: flasky2/app/__init__.py -Scanned: 2016-10-25 15:16:13.244672 -No vulnerabilities found. - - -mion00/flaskSQLAlchemy -https://github.com/mion00/flaskSQLAlchemy -Entry file: flaskSQLAlchemy/app.py -Scanned: 2016-10-25 15:16:14.656427 -Vulnerability 1: -File: flaskSQLAlchemy/app.py - > User input at line 32, trigger word "get(": - service = request.args.get('service') -File: flaskSQLAlchemy/app.py - > reaches line 34, trigger word "filter(": - users = User.query.filter(User.json.has_key(service)).all() - - - -gnu4cn/flaskLearnings -https://github.com/gnu4cn/flaskLearnings -Entry file: flaskLearnings/demos/request_attributes.py -Scanned: 2016-10-25 15:16:25.535869 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -argenis2021/FlaskTutorial -https://github.com/argenis2021/FlaskTutorial -Entry file: FlaskTutorial/app/__init__.py -Scanned: 2016-10-25 15:16:27.284016 -No vulnerabilities found. - - -ZaighumRajput/flaskPractice -https://github.com/ZaighumRajput/flaskPractice -Entry file: flaskPractice/chapter2/hello.py -Scanned: 2016-10-25 15:16:28.771838 -No vulnerabilities found. - - -GriMel/FlaskFirst -https://github.com/GriMel/FlaskFirst -Entry file: FlaskFirst/app/__init__.py -Scanned: 2016-10-25 15:16:30.043183 -No vulnerabilities found. - - -pepemontana7/flaskFinal -https://github.com/pepemontana7/flaskFinal -Entry file: flaskFinal/firstapp/hello.py -Scanned: 2016-10-25 15:16:31.300360 -No vulnerabilities found. - - -KotiyaSenya/FlaskLearn -https://github.com/KotiyaSenya/FlaskLearn -Entry file: FlaskLearn/flask_learn/__init__.py -Scanned: 2016-10-25 15:16:32.845999 -Vulnerability 1: -File: FlaskLearn/flask_learn/main/views/index.py - > User input at line 10, trigger word "get(": - user_agent = request.headers.get('User-Agent') -File: FlaskLearn/flask_learn/main/views/index.py - > reaches line 11, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',user_agent=user_agent, current_time=datetime.utcnow()) - - - -johnwheeler/flask-ask -https://github.com/johnwheeler/flask-ask -Entry file: flask-ask/samples/session/session.py -Scanned: 2016-10-25 15:16:36.367252 -Vulnerability 1: -File: flask-ask/samples/session/session.py - > User input at line 39, trigger word "get(": - color = session.attributes.get(COLOR_KEY) -Reassigned in: - File: flask-ask/samples/session/session.py - > Line 42: ret_MAYBE_FUNCTION_NAME = statement(statement_text).simple_card(card_title, statement_text) - File: flask-ask/samples/session/session.py - > Line 45: ret_MAYBE_FUNCTION_NAME = question(question_text).reprompt(question_text).simple_card(card_title, question_text) -File: flask-ask/samples/session/session.py - > reaches line 41, trigger word "render_template(": - statement_text = render_template('known_color_bye',color=color) - - - -shn7798/FlaskZhihu -https://github.com/shn7798/FlaskZhihu -Entry file: FlaskZhihu/tests/test_orm.py -Scanned: 2016-10-25 15:16:38.118185 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhangsen1992/flask -https://github.com/zhangsen1992/flask -Entry file: None -Scanned: 2016-10-25 15:16:39.116377 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -luojiyin1987/flask -https://github.com/luojiyin1987/flask -Entry file: None -Scanned: 2016-10-25 15:16:39.610964 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chrislinan/flask -https://github.com/chrislinan/flask -Entry file: None -Scanned: 2016-10-25 15:16:40.125537 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lagougou/flask -https://github.com/lagougou/flask -Entry file: None -Scanned: 2016-10-25 15:16:40.629867 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ryanmthompson/flask -https://github.com/ryanmthompson/flask -Entry file: None -Scanned: 2016-10-25 15:16:41.145380 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Mufflerman/Flask -https://github.com/Mufflerman/Flask -Entry file: None -Scanned: 2016-10-25 15:16:41.673546 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tkirkland/Flask -https://github.com/tkirkland/Flask -Entry file: None -Scanned: 2016-10-25 15:16:42.193258 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -glrh111/flask -https://github.com/glrh111/flask -Entry file: None -Scanned: 2016-10-25 15:16:42.706399 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -parampara/flask -https://github.com/parampara/flask -Entry file: None -Scanned: 2016-10-25 15:16:43.249071 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -maxweiber/flask -https://github.com/maxweiber/flask -Entry file: None -Scanned: 2016-10-25 15:16:43.779490 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rakeshkirola/Flask -https://github.com/rakeshkirola/Flask -Entry file: None -Scanned: 2016-10-25 15:16:44.301388 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -caibitim/Flask -https://github.com/caibitim/Flask -Entry file: None -Scanned: 2016-10-25 15:16:44.819122 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -syntaxSizer/flask -https://github.com/syntaxSizer/flask -Entry file: None -Scanned: 2016-10-25 15:16:45.367726 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gabrielecker/Flask -https://github.com/gabrielecker/Flask -Entry file: None -Scanned: 2016-10-25 15:16:49.906554 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Dianalim209/flask -https://github.com/Dianalim209/flask -Entry file: None -Scanned: 2016-10-25 15:16:50.507169 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -moonoroman/flask -https://github.com/moonoroman/flask -Entry file: None -Scanned: 2016-10-25 15:16:52.017605 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ekusy/flask -https://github.com/ekusy/flask -Entry file: None -Scanned: 2016-10-25 15:16:58.569100 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gaurikatyagi/Flask -https://github.com/gaurikatyagi/Flask -Entry file: None -Scanned: 2016-10-25 15:17:06.101130 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mrffrm1234/flask -https://github.com/mrffrm1234/flask -Entry file: None -Scanned: 2016-10-25 15:17:12.621167 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rockaja/flask -https://github.com/rockaja/flask -Entry file: None -Scanned: 2016-10-25 15:17:14.138502 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bhops/flask -https://github.com/bhops/flask -Entry file: None -Scanned: 2016-10-25 15:17:15.654409 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ooohiroyukiooo/flask -https://github.com/ooohiroyukiooo/flask -Entry file: None -Scanned: 2016-10-25 15:17:26.169061 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -miguelgrinberg/flack -https://github.com/miguelgrinberg/flack -Entry file: flack/flack/__init__.py -Scanned: 2016-10-25 15:17:29.861562 -Vulnerability 1: -File: flack/flack/api/messages.py - > User input at line 36, trigger word "get(": - since = int(request.args.get('updated_since', '0')) -Reassigned in: - File: flack/flack/api/messages.py - > Line 40: since = day_ago -File: flack/flack/api/messages.py - > reaches line 41, trigger word "filter(": - msgs = Message.query.filter(Message.updated_at > since).order_by(Message.updated_at) - -Vulnerability 2: -File: flack/flack/api/users.py - > User input at line 38, trigger word "get(": - users = users.filter_by(online=request.args.get('online') != '0') -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) -File: flack/flack/api/users.py - > reaches line 40, trigger word "filter(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) - -Vulnerability 3: -File: flack/flack/api/users.py - > User input at line 40, trigger word "get(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) - File: flack/flack/api/users.py - > Line 38: users = users.filter_by(online=request.args.get('online') != '0') -File: flack/flack/api/users.py - > reaches line 40, trigger word "filter(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) - -Vulnerability 4: -File: flack/flack/api/users.py - > User input at line 38, trigger word "get(": - users = users.filter_by(online=request.args.get('online') != '0') -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) -File: flack/flack/api/users.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()]) - -Vulnerability 5: -File: flack/flack/api/users.py - > User input at line 40, trigger word "get(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) - File: flack/flack/api/users.py - > Line 38: users = users.filter_by(online=request.args.get('online') != '0') -File: flack/flack/api/users.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()]) - - - -enginebai/PyMessager -https://github.com/enginebai/PyMessager -Entry file: PyMessager/api.py -Scanned: 2016-10-25 15:17:31.220108 -No vulnerabilities found. - - -TwilioDevEd/sms2fa-flask -https://github.com/TwilioDevEd/sms2fa-flask -Entry file: sms2fa-flask/sms2fa_flask/__init__.py -Scanned: 2016-10-25 15:17:35.927368 -Vulnerability 1: -File: sms2fa-flask/sms2fa_flask/views.py - > User input at line 51, trigger word "get(": - user = User.query.get(session.get('user_email', '')) or abort(401) -Reassigned in: - File: sms2fa-flask/sms2fa_flask/views.py - > Line 56: ret_MAYBE_FUNCTION_NAME = redirect(url_for('secret_page')) -File: sms2fa-flask/sms2fa_flask/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('confirmation.html',user=user) - - - -RoseOu/Flask-learning -https://github.com/RoseOu/Flask-learning -Entry file: None -Scanned: 2016-10-25 15:17:44.111565 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -YUX-IO/gossl -https://github.com/YUX-IO/gossl -Entry file: gossl/app.py -Scanned: 2016-10-25 15:17:53.143134 -No vulnerabilities found. - - -yetship/the-way-to-flask -https://github.com/yetship/the-way-to-flask -Entry file: the-way-to-flask/code/application/__init__.py -Scanned: 2016-10-25 15:17:56.449644 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -JoshData/parsey-mcparseface-server -https://github.com/JoshData/parsey-mcparseface-server -Entry file: parsey-mcparseface-server/server.py -Scanned: 2016-10-25 15:17:57.833487 -No vulnerabilities found. - - -YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg -https://github.com/YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg -Entry file: uwsgi-nginx-flask-docker-for-sinaimg/flask/app/main.py -Scanned: 2016-10-25 15:18:00.765366 -No vulnerabilities found. - - -patternexon/hello -https://github.com/patternexon/hello -Entry file: hello/hello.py -Scanned: 2016-10-25 15:18:09.224356 -No vulnerabilities found. - - -yassipo/webservice -https://github.com/yassipo/webservice -Entry file: webservice/app.py -Scanned: 2016-10-25 15:18:10.548370 -No vulnerabilities found. - - -tweddielin/flask-imsearch -https://github.com/tweddielin/flask-imsearch -Entry file: None -Scanned: 2016-10-25 15:22:33.344981 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tweddielin/flask-imsearch. - -datademofun/heroku-basic-flask -https://github.com/datademofun/heroku-basic-flask -Entry file: heroku-basic-flask/app.py -Scanned: 2016-10-25 15:22:38.270963 -No vulnerabilities found. - - -simonbilskyrollins/Flask-Workshop -https://github.com/simonbilskyrollins/Flask-Workshop -Entry file: Flask-Workshop/step3.py -Scanned: 2016-10-25 15:22:39.583731 -No vulnerabilities found. - - -amey-sam/Flask-MailGun -https://github.com/amey-sam/Flask-MailGun -Entry file: None -Scanned: 2016-10-25 15:22:41.411921 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/amey-sam/Flask-MailGun. - -hadesong/flask_weather -https://github.com/hadesong/flask_weather -Entry file: flask_weather/app_package/__init__.py -Scanned: 2016-10-25 15:22:43.897356 -No vulnerabilities found. - - -YUX-IO/flask-python351 -https://github.com/YUX-IO/flask-python351 -Entry file: flask-python351/sample-app/app.py -Scanned: 2016-10-25 15:22:45.245749 -No vulnerabilities found. - - -DullSmile/flasky -https://github.com/DullSmile/flasky -Entry file: None -Scanned: 2016-10-25 15:22:45.770694 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -geochilmaru/flaskr -https://github.com/geochilmaru/flaskr -Entry file: None -Scanned: 2016-10-25 15:22:46.326243 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/geochilmaru/flaskr. - -hejiangping/flaskr -https://github.com/hejiangping/flaskr -Entry file: None -Scanned: 2016-10-25 15:22:46.850734 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hejiangping/flaskr. - -ealesid/flaskbook -https://github.com/ealesid/flaskbook -Entry file: flaskbook/app/__init__.py -Scanned: 2016-10-25 15:22:58.574105 -Vulnerability 1: -File: flaskbook/app/main/views.py - > User input at line 19, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskbook/app/main/views.py - > Line 27: pagination = query.order_by('-timestamp').paginate(page,per_page=current_app.config['FLASKBOOK_POSTS_PER_PAGE'], error_out=False) - File: flaskbook/app/main/views.py - > Line 30: posts = pagination.items - File: flaskbook/app/main/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskbook/app/main/views.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskbook/app/main/views.py - > User input at line 22, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskbook/app/main/views.py - > Line 20: show_followed = False - File: flaskbook/app/main/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskbook/app/main/views.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskbook/app/main/views.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskbook/app/main/views.py - > Line 40: pagination = Post.objects(author_id=user).order_by('-timestamp').paginate(page,per_page=current_app.config['FLASKBOOK_POSTS_PER_PAGE'], error_out=False) - File: flaskbook/app/main/views.py - > Line 43: posts = pagination.items -File: flaskbook/app/main/views.py - > reaches line 44, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flaskbook/app/main/views.py - > User input at line 118, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskbook/app/main/views.py - > Line 120: page = Comment.objects(post_id=post).count() - 1 // current_app.config['FLASKBOOK_COMMENTS_PER_PAGE'] + 1 - File: flaskbook/app/main/views.py - > Line 121: pagination = Comment.objects(post_id=post).order_by('-timestamp').paginate(page,per_page=current_app.config['FLASKBOOK_COMMENTS_PER_PAGE'], error_out=False) - File: flaskbook/app/main/views.py - > Line 124: comments = pagination.items - File: flaskbook/app/main/views.py - > Line 117: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=1)) -File: flaskbook/app/main/views.py - > reaches line 125, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flaskbook/app/main/views.py - > User input at line 183, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskbook/app/main/views.py - > Line 184: pagination = Follow.objects(followed=user).paginate(page,per_page=current_app.config['FLASKBOOK_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskbook/app/main/views.py - > Line 187: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskbook/app/main/views.py - > Line 182: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskbook/app/main/views.py - > reaches line 189, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flaskbook/app/main/views.py - > User input at line 199, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskbook/app/main/views.py - > Line 200: pagination = Follow.objects(follower=user).paginate(page,per_page=current_app.config['FLASKBOOK_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskbook/app/main/views.py - > Line 203: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskbook/app/main/views.py - > Line 198: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskbook/app/main/views.py - > reaches line 205, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flaskbook/app/main/views.py - > User input at line 229, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskbook/app/main/views.py - > Line 230: pagination = Comment.objects.order_by('-timestamp').paginate(page,per_page=current_app.config['FLASKBOOK_COMMENTS_PER_PAGE'], error_out=False) - File: flaskbook/app/main/views.py - > Line 233: comments = pagination.items -File: flaskbook/app/main/views.py - > reaches line 234, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -jake-bladt/flasksandbox -https://github.com/jake-bladt/flasksandbox -Entry file: flasksandbox/app/app.py -Scanned: 2016-10-25 15:23:00.114722 -Vulnerability 1: -File: flasksandbox/app/helpers.py - > User input at line 4, trigger word "get(": - page = request.args.get('page') -Reassigned in: - File: flasksandbox/app/helpers.py - > Line 6: page = int(page) - File: flasksandbox/app/helpers.py - > Line 8: page = 1 - File: flasksandbox/app/helpers.py - > Line 9: object_list = query.paginate(page, paginate_by) -File: flasksandbox/app/helpers.py - > reaches line 10, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template_name,object_list=object_list, context) - - - -yoophi/flaskygram -https://github.com/yoophi/flaskygram -Entry file: None -Scanned: 2016-10-25 15:23:02.115586 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yoophi/flaskygram. - -Ifresher/Flaskr -https://github.com/Ifresher/Flaskr -Entry file: Flaskr/Flask.py -Scanned: 2016-10-25 15:23:03.456749 -No vulnerabilities found. - - -andresmguk/flasktaskr -https://github.com/andresmguk/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:23:04.008346 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -minc-yang/flaskdemo -https://github.com/minc-yang/flaskdemo -Entry file: flaskdemo/flask_app2/my_app/__init__.py -Scanned: 2016-10-25 15:23:06.572611 -Vulnerability 1: -File: flaskdemo/flask_app2/my_app/product/views.py - > User input at line 17, trigger word "get(": - product = PRODUCTS.get(key) -File: flaskdemo/flask_app2/my_app/product/views.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('product.html',product=product) - - - -zmrow/flasktaskr -https://github.com/zmrow/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:23:07.098425 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Jpatcourtney/flasktasker -https://github.com/Jpatcourtney/flasktasker -Entry file: flasktasker/views.py -Scanned: 2016-10-25 15:23:08.598119 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -liyocee/flaskr -https://github.com/liyocee/flaskr -Entry file: None -Scanned: 2016-10-25 15:23:09.124422 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/liyocee/flaskr. - -yanni-zhang/flaskweb -https://github.com/yanni-zhang/flaskweb -Entry file: flaskweb/app/__init__.py -Scanned: 2016-10-25 15:23:11.441169 -Vulnerability 1: -File: flaskweb/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: flaskweb/app/api_1_0/posts.py - > Line 15: prev = None - File: flaskweb/app/api_1_0/posts.py - > Line 18: next = None -File: flaskweb/app/api_1_0/posts.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flaskweb/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: flaskweb/app/api_1_0/posts.py - > Line 15: prev = None - File: flaskweb/app/api_1_0/posts.py - > Line 18: next = None -File: flaskweb/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flaskweb/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: flaskweb/app/api_1_0/posts.py - > Line 15: prev = None - File: flaskweb/app/api_1_0/posts.py - > Line 18: next = None -File: flaskweb/app/api_1_0/posts.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flaskweb/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 16: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 17: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 20: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 19, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flaskweb/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 16: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 17: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 20: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flaskweb/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 16: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 17: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 20: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: flaskweb/app/api_1_0/users.py - > User input at line 33, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 36: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 37: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 40: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 39, trigger word "url_for(": - prev = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 8: -File: flaskweb/app/api_1_0/users.py - > User input at line 33, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 36: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 37: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 40: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 42, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flaskweb/app/api_1_0/users.py - > User input at line 33, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 36: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 37: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 40: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 43, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: flaskweb/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 13: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 16: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 15, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flaskweb/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 13: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 16: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 18, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flaskweb/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 13: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 16: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 19, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: flaskweb/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 38: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 41: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 40, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flaskweb/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 38: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 41: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 43, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flaskweb/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 38: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 41: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 44, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: flaskweb/app/main/views.py - > User input at line 24, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 22: show_followed = False - File: flaskweb/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskweb/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flaskweb/app/main/views.py - > User input at line 29, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 33: posts = pagination.items - File: flaskweb/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskweb/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flaskweb/app/main/views.py - > User input at line 56, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 57: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 60: posts = pagination.items -File: flaskweb/app/main/views.py - > reaches line 61, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: flaskweb/app/main/views.py - > User input at line 117, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 119: page = post.comments.count() - 1 / current_app.config['COMMENTS_PER_PAGE'] + 1 - File: flaskweb/app/main/views.py - > Line 120: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 123: comments = pagination.items - File: flaskweb/app/main/views.py - > Line 116: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskweb/app/main/views.py - > reaches line 124, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], comments=comments, form=form, pagination=pagination) - -Vulnerability 20: -File: flaskweb/app/main/views.py - > User input at line 179, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 180: pagination = user.followers.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 183: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskweb/app/main/views.py - > Line 178: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskweb/app/main/views.py - > reaches line 185, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注我的人', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: flaskweb/app/main/views.py - > User input at line 195, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 196: pagination = user.followed.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 199: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskweb/app/main/views.py - > Line 194: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskweb/app/main/views.py - > reaches line 201, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='我关注的人', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: flaskweb/app/main/views.py - > User input at line 209, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 210: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 213: comments = pagination.items -File: flaskweb/app/main/views.py - > reaches line 214, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -googoos/flasktaskr -https://github.com/googoos/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:23:11.984073 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lg31415/flaskr -https://github.com/lg31415/flaskr -Entry file: None -Scanned: 2016-10-25 15:23:12.524116 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lg31415/flaskr. - -AliceLanniste/Flasky -https://github.com/AliceLanniste/Flasky -Entry file: None -Scanned: 2016-10-25 15:23:14.192132 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AliceLanniste/Flasky. - -efrainmunoz/flasktaskr -https://github.com/efrainmunoz/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:23:14.716093 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -HansKramer/flaskr -https://github.com/HansKramer/flaskr -Entry file: None -Scanned: 2016-10-25 15:23:15.238881 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/HansKramer/flaskr. - -shorian/flaskr -https://github.com/shorian/flaskr -Entry file: None -Scanned: 2016-10-25 15:23:15.992354 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shorian/flaskr. - -Jpatcourtney/flasktaskr -https://github.com/Jpatcourtney/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:23:16.523178 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -janejin8829/flaskangular- -https://github.com/janejin8829/flaskangular- -Entry file: None -Scanned: 2016-10-25 15:23:17.793944 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/janejin8829/flaskangular-. - -ljxxcaijing/flaskblog -https://github.com/ljxxcaijing/flaskblog -Entry file: None -Scanned: 2016-10-25 15:23:18.331813 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ljxxcaijing/flaskblog. - -mmoran0032/flaskwork -https://github.com/mmoran0032/flaskwork -Entry file: flaskwork/hello.py -Scanned: 2016-10-25 15:23:35.666066 -No vulnerabilities found. - - -Maxwell-Ying/flaskbook -https://github.com/Maxwell-Ying/flaskbook -Entry file: flaskbook/app/__init__.py -Scanned: 2016-10-25 15:23:37.002436 -Vulnerability 1: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 2: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 3: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 4: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 5: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 6: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 7: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 8: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 9: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 10: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 11: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 12: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 13: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 14: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 15: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 16: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 17: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 18: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 19: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 20: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 21: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 22: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 23: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 24: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 25: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 26: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 27: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 28: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 29: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 30: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 31: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 32: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 33: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 34: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 35: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 36: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 37: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 38: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 39: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 40: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 41: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 42: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 43: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 44: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 45: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 46: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 47: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 48: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 49: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 50: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 51: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 52: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 53: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 54: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 55: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 56: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - - - -bewithgaurav/flaskmap -https://github.com/bewithgaurav/flaskmap -Entry file: flaskmap/__init__.py -Scanned: 2016-10-25 15:23:53.582059 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -ansel333/flaskr -https://github.com/ansel333/flaskr -Entry file: None -Scanned: 2016-10-25 15:23:54.161866 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ansel333/flaskr. - -ojgoyal/flaskr -https://github.com/ojgoyal/flaskr -Entry file: None -Scanned: 2016-10-25 15:23:54.690187 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ojgoyal/flaskr. - -ordenador/flaskrestful -https://github.com/ordenador/flaskrestful -Entry file: flaskrestful/flaskrestful.py -Scanned: 2016-10-25 15:24:05.454671 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -yvonnendutaw/flaskbook -https://github.com/yvonnendutaw/flaskbook -Entry file: flaskbook/app/__init__.py -Scanned: 2016-10-25 15:25:07.541735 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhangjiewang/flasky -https://github.com/zhangjiewang/flasky -Entry file: None -Scanned: 2016-10-25 15:25:08.076559 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kathure/flasky -https://github.com/Kathure/flasky -Entry file: None -Scanned: 2016-10-25 15:25:08.597626 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -maxweiber/flaskr -https://github.com/maxweiber/flaskr -Entry file: None -Scanned: 2016-10-25 15:25:09.119481 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/maxweiber/flaskr. - -zjl1110/flaskdemo -https://github.com/zjl1110/flaskdemo -Entry file: None -Scanned: 2016-10-25 15:25:17.353964 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -EricGarza/flaskbyexample -https://github.com/EricGarza/flaskbyexample -Entry file: flaskbyexample/app.py -Scanned: 2016-10-25 15:25:27.144835 -No vulnerabilities found. - - -hoorn91/flaskproject -https://github.com/hoorn91/flaskproject -Entry file: flaskproject/app/hello.py -Scanned: 2016-10-25 15:25:28.509811 -Vulnerability 1: -File: flaskproject/app/hello.py - > User input at line 70, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flaskproject/app/hello.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -hongmaoxiao/flasky -https://github.com/hongmaoxiao/flasky -Entry file: None -Scanned: 2016-10-25 15:25:29.036716 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jiuhuandao/Flaskr -https://github.com/jiuhuandao/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-25 15:25:30.510178 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -nrugas/flasky -https://github.com/nrugas/flasky -Entry file: None -Scanned: 2016-10-25 15:25:31.049116 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fromzeroedu/flaskbook -https://github.com/fromzeroedu/flaskbook -Entry file: flaskbook/application.py -Scanned: 2016-10-25 15:25:33.651484 -Vulnerability 1: -File: flaskbook/home/views.py - > User input at line 15, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/home/views.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('home/home.html') -File: flaskbook/home/views.py - > reaches line 15, trigger word "filter(": - user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 2: -File: flaskbook/home/views.py - > User input at line 15, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/home/views.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('home/home.html') -File: flaskbook/home/views.py - > reaches line 19, trigger word "filter(": - feed_messages = Feed.objects.filter(user=user).order_by('-create_date')[10] - -Vulnerability 3: -File: flaskbook/home/views.py - > User input at line 15, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/home/views.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('home/home.html') -File: flaskbook/home/views.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home/feed_home.html',user=user, form=form, feed_messages=feed_messages) - -Vulnerability 4: -File: flaskbook/relationship/views.py - > User input at line 14, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 18: rel = Relationship.get_relationship(logged_user, to_user) - File: flaskbook/relationship/views.py - > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user) -File: flaskbook/relationship/views.py - > reaches line 14, trigger word "filter(": - logged_user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 5: -File: flaskbook/relationship/views.py - > User input at line 14, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 18: rel = Relationship.get_relationship(logged_user, to_user) - File: flaskbook/relationship/views.py - > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user) -File: flaskbook/relationship/views.py - > reaches line 41, trigger word "render_template(": - body_html = render_template('mail/relationship/added_friend.html',from_user=logged_user, to_user=to_user) - -Vulnerability 6: -File: flaskbook/relationship/views.py - > User input at line 14, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 18: rel = Relationship.get_relationship(logged_user, to_user) - File: flaskbook/relationship/views.py - > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user) -File: flaskbook/relationship/views.py - > reaches line 46, trigger word "render_template(": - body_text = render_template('mail/relationship/added_friend.txt',from_user=logged_user, to_user=to_user) - -Vulnerability 7: -File: flaskbook/relationship/views.py - > User input at line 67, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 71: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 67, trigger word "filter(": - logged_user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 8: -File: flaskbook/relationship/views.py - > User input at line 67, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 71: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 74, trigger word "filter(": - rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete() - -Vulnerability 9: -File: flaskbook/relationship/views.py - > User input at line 67, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 71: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 77, trigger word "filter(": - reverse_rel = Relationship.objects.filter(from_user=to_user, to_user=logged_user).delete() - -Vulnerability 10: -File: flaskbook/relationship/views.py - > User input at line 91, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 95: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 91, trigger word "filter(": - logged_user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 11: -File: flaskbook/relationship/views.py - > User input at line 91, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 95: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 99, trigger word "filter(": - rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete() - -Vulnerability 12: -File: flaskbook/relationship/views.py - > User input at line 91, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 95: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 102, trigger word "filter(": - reverse_rel = Relationship.objects.filter(from_user=to_user, to_user=logged_user).delete() - -Vulnerability 13: -File: flaskbook/relationship/views.py - > User input at line 123, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 127: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 123, trigger word "filter(": - logged_user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 14: -File: flaskbook/relationship/views.py - > User input at line 123, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 127: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 131, trigger word "filter(": - rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete() - -Vulnerability 15: -File: flaskbook/user/views.py - > User input at line 25, trigger word ".data": - hashed_password = bcrypt.hashpw(form.password.data, salt) -Reassigned in: - File: flaskbook/user/views.py - > Line 27: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code) -File: flaskbook/user/views.py - > reaches line 40, trigger word "render_template(": - body_html = render_template('mail/user/register.html',user=user) - -Vulnerability 16: -File: flaskbook/user/views.py - > User input at line 27, trigger word ".data": - user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code) -File: flaskbook/user/views.py - > reaches line 40, trigger word "render_template(": - body_html = render_template('mail/user/register.html',user=user) - -Vulnerability 17: -File: flaskbook/user/views.py - > User input at line 25, trigger word ".data": - hashed_password = bcrypt.hashpw(form.password.data, salt) -Reassigned in: - File: flaskbook/user/views.py - > Line 27: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code) -File: flaskbook/user/views.py - > reaches line 41, trigger word "render_template(": - body_text = render_template('mail/user/register.txt',user=user) - -Vulnerability 18: -File: flaskbook/user/views.py - > User input at line 27, trigger word ".data": - user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code) -File: flaskbook/user/views.py - > reaches line 41, trigger word "render_template(": - body_text = render_template('mail/user/register.txt',user=user) - -Vulnerability 19: -File: flaskbook/user/views.py - > User input at line 57, trigger word ".data": - user = User.objects.filter(username=form.username.data).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 70: user = None -File: flaskbook/user/views.py - > reaches line 57, trigger word "filter(": - user = User.objects.filter(username=form.username.data).first() - -Vulnerability 20: -File: flaskbook/user/views.py - > User input at line 64, trigger word "get(": - next = session.get('next') -Reassigned in: - File: flaskbook/user/views.py - > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home_app.home')) - File: flaskbook/user/views.py - > Line 73: ret_MAYBE_FUNCTION_NAME = render_template('user/login.html',form=form, error=error) -File: flaskbook/user/views.py - > reaches line 66, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - -Vulnerability 21: -File: flaskbook/user/views.py - > User input at line 92, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 84: logged_user = None - File: flaskbook/user/views.py - > Line 93: rel = Relationship.get_relationship(logged_user, user) - File: flaskbook/user/views.py - > Line 85: rel = None -File: flaskbook/user/views.py - > reaches line 92, trigger word "filter(": - logged_user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 22: -File: flaskbook/user/views.py - > User input at line 92, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 84: logged_user = None - File: flaskbook/user/views.py - > Line 93: rel = Relationship.get_relationship(logged_user, user) - File: flaskbook/user/views.py - > Line 85: rel = None -File: flaskbook/user/views.py - > reaches line 118, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user/profile.html',user=user, logged_user=logged_user, rel=rel, friends=friends, friends_total=friends_total, friends_page=friends_page, form=form, profile_messages=profile_messages) - -Vulnerability 23: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 136, trigger word "filter(": - user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 24: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 148, trigger word "filter(": - if User.objects.filter(username=form.username.data.lower()).first(): - -Vulnerability 25: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 154, trigger word "filter(": - if User.objects.filter(email=form.email.data.lower()).first(): - -Vulnerability 26: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 168, trigger word "render_template(": - body_html = render_template('mail/user/change_email.html',user=user) - -Vulnerability 27: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 169, trigger word "render_template(": - body_text = render_template('mail/user/change_email.txt',user=user) - -Vulnerability 28: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user/edit.html',form=form, error=error, message=message, user=user) - -Vulnerability 29: -File: flaskbook/user/views.py - > User input at line 203, trigger word ".data": - user = User.objects.filter(email=form.email.data.lower()).first() -File: flaskbook/user/views.py - > reaches line 203, trigger word "filter(": - user = User.objects.filter(email=form.email.data.lower()).first() - -Vulnerability 30: -File: flaskbook/user/views.py - > User input at line 203, trigger word ".data": - user = User.objects.filter(email=form.email.data.lower()).first() -File: flaskbook/user/views.py - > reaches line 212, trigger word "render_template(": - body_html = render_template('mail/user/password_reset.html',user=user) - -Vulnerability 31: -File: flaskbook/user/views.py - > User input at line 203, trigger word ".data": - user = User.objects.filter(email=form.email.data.lower()).first() -File: flaskbook/user/views.py - > reaches line 213, trigger word "render_template(": - body_text = render_template('mail/user/password_reset.txt',user=user) - -Vulnerability 32: -File: flaskbook/user/views.py - > User input at line 261, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -File: flaskbook/user/views.py - > reaches line 261, trigger word "filter(": - user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 33: -File: flaskbook/feed/views.py - > User input at line 119, trigger word "get(": - from_user = User.objects.get(username=session.get('username')) -File: flaskbook/feed/views.py - > reaches line 122, trigger word "filter(": - existing_like = Message.objects.filter(parent=message_id, message_type=LIKE, from_user=from_user).count() - - - -yanni-zh/flaskweb -https://github.com/yanni-zh/flaskweb -Entry file: flaskweb/app/__init__.py -Scanned: 2016-10-25 15:25:37.997444 -Vulnerability 1: -File: flaskweb/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: flaskweb/app/api_1_0/posts.py - > Line 15: prev = None - File: flaskweb/app/api_1_0/posts.py - > Line 18: next = None -File: flaskweb/app/api_1_0/posts.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flaskweb/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: flaskweb/app/api_1_0/posts.py - > Line 15: prev = None - File: flaskweb/app/api_1_0/posts.py - > Line 18: next = None -File: flaskweb/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flaskweb/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: flaskweb/app/api_1_0/posts.py - > Line 15: prev = None - File: flaskweb/app/api_1_0/posts.py - > Line 18: next = None -File: flaskweb/app/api_1_0/posts.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flaskweb/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 16: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 17: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 20: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 19, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flaskweb/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 16: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 17: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 20: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flaskweb/app/api_1_0/users.py - > User input at line 13, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 14: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 16: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 17: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 20: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: flaskweb/app/api_1_0/users.py - > User input at line 33, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 36: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 37: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 40: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 39, trigger word "url_for(": - prev = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 8: -File: flaskweb/app/api_1_0/users.py - > User input at line 33, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 36: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 37: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 40: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 42, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flaskweb/app/api_1_0/users.py - > User input at line 33, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 34: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 36: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 37: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 40: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 43, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: flaskweb/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 13: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 16: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 15, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flaskweb/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 13: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 16: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 18, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flaskweb/app/api_1_0/comments.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 10: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 12: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 13: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 16: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 19, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: flaskweb/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 38: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 41: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 40, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flaskweb/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 38: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 41: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 43, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flaskweb/app/api_1_0/comments.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 35: pagination = post.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 37: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 38: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 41: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 44, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: flaskweb/app/main/views.py - > User input at line 41, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 39: show_followed = False -File: flaskweb/app/main/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, Post=Post, amount=amount, comments=comments, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flaskweb/app/main/views.py - > User input at line 46, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 47: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 50: posts = pagination.items -File: flaskweb/app/main/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, Post=Post, amount=amount, comments=comments, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flaskweb/app/main/views.py - > User input at line 81, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 82: posts_pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 85: posts = posts_pagination.items - File: flaskweb/app/main/views.py - > Line 86: comments_pagination = user.comments.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 89: comments = comments_pagination.items -File: flaskweb/app/main/views.py - > reaches line 90, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, Post=Post, posts_pagination=posts_pagination, comments=comments, comments_pagination=comments_pagination) - -Vulnerability 19: -File: flaskweb/app/main/views.py - > User input at line 144, trigger word ".data": - post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object()) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 155: ret_MAYBE_FUNCTION_NAME = render_template('add_post.html',form=form, title='添加文章') -File: flaskweb/app/main/views.py - > reaches line 154, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id)) - -Vulnerability 20: -File: flaskweb/app/main/views.py - > User input at line 144, trigger word ".data": - post = Post(title=form.title.data, body=form.body.data, author=current_user._get_current_object()) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 155: ret_MAYBE_FUNCTION_NAME = render_template('add_post.html',form=form, title='添加文章') -File: flaskweb/app/main/views.py - > reaches line 154, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id)) - -Vulnerability 21: -File: flaskweb/app/main/views.py - > User input at line 200, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 202: page = post.comments.count() - 1 / current_app.config['COMMENTS_PER_PAGE'] + 1 - File: flaskweb/app/main/views.py - > Line 203: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 206: comments = pagination.items - File: flaskweb/app/main/views.py - > Line 199: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskweb/app/main/views.py - > reaches line 207, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',post=post, comments=comments, form=form, pagination=pagination) - -Vulnerability 22: -File: flaskweb/app/main/views.py - > User input at line 248, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 249: pagination = user.followers.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 252: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskweb/app/main/views.py - > Line 247: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskweb/app/main/views.py - > reaches line 254, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注我的人', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 23: -File: flaskweb/app/main/views.py - > User input at line 264, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 265: pagination = user.followed.paginate(page,per_page=current_app.config['FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 268: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskweb/app/main/views.py - > Line 263: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskweb/app/main/views.py - > reaches line 270, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='我关注的人', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 24: -File: flaskweb/app/main/views.py - > User input at line 309, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 310: pagination = category.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 313: posts = pagination.items -File: flaskweb/app/main/views.py - > reaches line 314, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.html',id=id, posts=posts, pagination=pagination, categories=categories, title=category.name) - - - -pcpianobar/flaskr -https://github.com/pcpianobar/flaskr -Entry file: None -Scanned: 2016-10-25 15:25:38.523141 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pcpianobar/flaskr. - -mrdrms/flaskr -https://github.com/mrdrms/flaskr -Entry file: None -Scanned: 2016-10-25 15:25:39.028877 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrdrms/flaskr. - -fburkitt/flasktaskr -https://github.com/fburkitt/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:25:39.539458 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -asimonia/flasktaskr -https://github.com/asimonia/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:25:40.052994 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chestnutme/flaskie -https://github.com/chestnutme/flaskie -Entry file: flaskie/app/__init__.py -Scanned: 2016-10-25 15:25:42.314183 -Vulnerability 1: -File: flaskie/app/main/views.py - > User input at line 18, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 26: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 29: posts = pagination.items - File: flaskie/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskie/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskie/app/main/views.py - > User input at line 21, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskie/app/main/views.py - > Line 19: show_followed = False - File: flaskie/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskie/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskie/app/main/views.py - > User input at line 36, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 37: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 39: posts = pagination.items -File: flaskie/app/main/views.py - > reaches line 40, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flaskie/app/main/views.py - > User input at line 95, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 97: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskie/app/main/views.py - > Line 99: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 102: comments = pagination.items - File: flaskie/app/main/views.py - > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskie/app/main/views.py - > reaches line 103, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flaskie/app/main/views.py - > User input at line 158, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 159: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 162: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskie/app/main/views.py - > Line 157: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flaskie/app/main/views.py - > reaches line 164, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flaskie/app/main/views.py - > User input at line 174, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 175: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE']) - File: flaskie/app/main/views.py - > Line 177: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskie/app/main/views.py - > Line 173: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flaskie/app/main/views.py - > reaches line 179, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - - - -fengyu225/flaskr -https://github.com/fengyu225/flaskr -Entry file: None -Scanned: 2016-10-25 15:25:42.857115 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fengyu225/flaskr. - -jbussdieker/flaskr -https://github.com/jbussdieker/flaskr -Entry file: None -Scanned: 2016-10-25 15:25:43.419094 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jbussdieker/flaskr. - -sisyphus1993/flaskreview -https://github.com/sisyphus1993/flaskreview -Entry file: flaskreview/app/__init__.py -Scanned: 2016-10-25 15:25:45.295532 -Vulnerability 1: -File: flaskreview/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskreview/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskreview/app/api_1_0/posts.py - > Line 19: next = None -File: flaskreview/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flaskreview/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskreview/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskreview/app/api_1_0/posts.py - > Line 19: next = None -File: flaskreview/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flaskreview/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskreview/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskreview/app/api_1_0/posts.py - > Line 19: next = None -File: flaskreview/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flaskreview/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 20: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 23: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flaskreview/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 20: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 23: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flaskreview/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 20: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 23: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: flaskreview/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 42: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 45: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: flaskreview/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 42: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 45: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flaskreview/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskreview/app/api_1_0/users.py - > Line 42: prev = None - File: flaskreview/app/api_1_0/users.py - > Line 45: next = None -File: flaskreview/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: flaskreview/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 18: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flaskreview/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 18: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flaskreview/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 18: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: flaskreview/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 46: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flaskreview/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 46: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flaskreview/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskreview/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskreview/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskreview/app/api_1_0/comments.py - > Line 46: next = None -File: flaskreview/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: flaskreview/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 31: posts = pagination.items - File: flaskreview/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskreview/app/main/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flaskreview/app/main/views.py - > User input at line 24, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 22: show_followed = False - File: flaskreview/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskreview/app/main/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flaskreview/app/main/views.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 40: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 42: posts = pagination.items -File: flaskreview/app/main/views.py - > reaches line 43, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: flaskreview/app/main/views.py - > User input at line 102, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 104: page = post.comments.count() - 1 // 20 + 1 - File: flaskreview/app/main/views.py - > Line 105: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 107: comments = pagination.items - File: flaskreview/app/main/views.py - > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskreview/app/main/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: flaskreview/app/main/views.py - > User input at line 167, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 168: pagination = user.followers.paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 170: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskreview/app/main/views.py - > Line 166: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskreview/app/main/views.py - > reaches line 172, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: flaskreview/app/main/views.py - > User input at line 183, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 184: pagination = user.followed.paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 186: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskreview/app/main/views.py - > Line 182: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskreview/app/main/views.py - > reaches line 188, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: flaskreview/app/main/views.py - > User input at line 213, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskreview/app/main/views.py - > Line 214: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=20, error_out=False) - File: flaskreview/app/main/views.py - > Line 217: comments = pagination.items -File: flaskreview/app/main/views.py - > reaches line 218, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -richardqlin/flaskralchemy -https://github.com/richardqlin/flaskralchemy -Entry file: None -Scanned: 2016-10-25 15:25:46.733171 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flaskralchemy. - -mikomwang/flaskr -https://github.com/mikomwang/flaskr -Entry file: None -Scanned: 2016-10-25 15:25:47.253426 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mikomwang/flaskr. - -anngle/flaskweb -https://github.com/anngle/flaskweb -Entry file: flaskweb/hello2.py -Scanned: 2016-10-25 15:25:48.880202 -Vulnerability 1: -File: flaskweb/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 22: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=3, error_out=False) - File: flaskweb/app/main/views.py - > Line 24: posts = pagination.items - File: flaskweb/app/main/views.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) - File: flaskweb/app/main/views.py - > Line 20: posts = Post.query.order_by(Post.timestamp.desc()).all() -File: flaskweb/app/main/views.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - - - -Aprimus1/flasktaskr -https://github.com/Aprimus1/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:25:49.400350 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cuttlesoft/flask-bitmapist -https://github.com/cuttlesoft/flask-bitmapist -Entry file: flask-bitmapist/tests/conftest.py -Scanned: 2016-10-25 15:25:54.896809 -No vulnerabilities found. - - -Riffstation/flaskutilsexample -https://github.com/Riffstation/flaskutilsexample -Entry file: flaskutilsexample/src/app/__init__.py -Scanned: 2016-10-25 15:25:56.355993 -No vulnerabilities found. - - -meloalright/flask -https://github.com/meloalright/flask -Entry file: None -Scanned: 2016-10-25 15:25:57.390782 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -paulgoblin/flask -https://github.com/paulgoblin/flask -Entry file: None -Scanned: 2016-10-25 15:26:06.924516 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tayan-serna/flask -https://github.com/tayan-serna/flask -Entry file: None -Scanned: 2016-10-25 15:26:08.464569 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dolv/Flask -https://github.com/dolv/Flask -Entry file: None -Scanned: 2016-10-25 15:26:08.995084 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Aslkayn/flask -https://github.com/Aslkayn/flask -Entry file: None -Scanned: 2016-10-25 15:26:09.504204 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Mamun-dueee/flask -https://github.com/Mamun-dueee/flask -Entry file: None -Scanned: 2016-10-25 15:26:10.020122 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gisumwa/Flask -https://github.com/gisumwa/Flask -Entry file: None -Scanned: 2016-10-25 15:26:18.585266 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zhouleian/flask -https://github.com/zhouleian/flask -Entry file: None -Scanned: 2016-10-25 15:26:28.116421 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -virtue1990/flask -https://github.com/virtue1990/flask -Entry file: None -Scanned: 2016-10-25 15:26:29.641280 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dhaval38/Flask -https://github.com/dhaval38/Flask -Entry file: None -Scanned: 2016-10-25 15:26:30.186137 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nppat/Flask -https://github.com/nppat/Flask -Entry file: None -Scanned: 2016-10-25 15:26:31.818793 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dmitry-moroz/flask -https://github.com/dmitry-moroz/flask -Entry file: None -Scanned: 2016-10-25 15:26:32.327809 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -TeamDroneFireman/Flask -https://github.com/TeamDroneFireman/Flask -Entry file: None -Scanned: 2016-10-25 15:26:34.849130 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sushmit86/Flask -https://github.com/sushmit86/Flask -Entry file: None -Scanned: 2016-10-25 15:26:39.394854 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vorkos/flask -https://github.com/vorkos/flask -Entry file: None -Scanned: 2016-10-25 15:26:39.923482 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -timmyreilly/intro-to-flask -https://github.com/timmyreilly/intro-to-flask -Entry file: intro-to-flask/hello.py -Scanned: 2016-10-25 15:26:43.146695 -No vulnerabilities found. - - -Revolution1/Flask-WhooshAlchemyPlus -https://github.com/Revolution1/Flask-WhooshAlchemyPlus -Entry file: Flask-WhooshAlchemyPlus/test/test_all.py -Scanned: 2016-10-25 15:26:44.943717 -No vulnerabilities found. - - -sloria/flask-konch -https://github.com/sloria/flask-konch -Entry file: flask-konch/example_app/hello.py -Scanned: 2016-10-25 15:26:46.241252 -No vulnerabilities found. - - -cloverstd/flask-wechatpy -https://github.com/cloverstd/flask-wechatpy -Entry file: flask-wechatpy/demo.py -Scanned: 2016-10-25 15:26:48.115713 -No vulnerabilities found. - - -postrational/rest_api_demo -https://github.com/postrational/rest_api_demo -Entry file: rest_api_demo/rest_api_demo/app.py -Scanned: 2016-10-25 15:26:50.112747 -Vulnerability 1: -File: rest_api_demo/rest_api_demo/api/blog/business.py - > User input at line 8, trigger word "get(": - category_id = data.get('category_id') -File: rest_api_demo/rest_api_demo/api/blog/business.py - > reaches line 9, trigger word "filter(": - category = Category.query.filter(Category.id == category_id).one() - -Vulnerability 2: -File: rest_api_demo/rest_api_demo/api/blog/business.py - > User input at line 19, trigger word "get(": - category_id = data.get('category_id') -File: rest_api_demo/rest_api_demo/api/blog/business.py - > reaches line 20, trigger word "filter(": - post.category = Category.query.filter(Category.id == category_id).one() - - - -patternexon/hello -https://github.com/patternexon/hello -Entry file: hello/hello.py -Scanned: 2016-10-25 15:26:57.850304 -No vulnerabilities found. - - -QuentinMoss/reimagined-computing-machine -https://github.com/QuentinMoss/reimagined-computing-machine -Entry file: reimagined-computing-machine/app/__init__.py -Scanned: 2016-10-25 15:26:59.195968 -No vulnerabilities found. - - -13923858795/Tutorial -https://github.com/13923858795/Tutorial -Entry file: Tutorial/my/app/__init__.py -Scanned: 2016-10-25 15:27:07.091368 -Vulnerability 1: -File: Tutorial/my/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 33: posts = pagination.items - File: Tutorial/my/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Tutorial/my/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 23: show_followed = False - File: Tutorial/my/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Tutorial/my/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 44: posts = pagination.items -File: Tutorial/my/app/main/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Tutorial/my/app/main/views.py - > User input at line 109, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 111: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Tutorial/my/app/main/views.py - > Line 113: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 116: comments = pagination.items - File: Tutorial/my/app/main/views.py - > Line 108: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Tutorial/my/app/main/views.py - > reaches line 117, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Tutorial/my/app/main/views.py - > User input at line 176, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 177: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 180: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Tutorial/my/app/main/views.py - > Line 175: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 182, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Tutorial/my/app/main/views.py - > User input at line 193, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 194: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 197: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Tutorial/my/app/main/views.py - > Line 192: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Tutorial/my/app/main/views.py - > reaches line 199, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Tutorial/my/app/main/views.py - > User input at line 231, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Tutorial/my/app/main/views.py - > Line 232: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Tutorial/my/app/main/views.py - > Line 235: comments = pagination.items -File: Tutorial/my/app/main/views.py - > reaches line 236, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -szparag3/flask-hello-world -https://github.com/szparag3/flask-hello-world -Entry file: None -Scanned: 2016-10-25 15:27:14.631803 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DanceCats/DanceCat -https://github.com/DanceCats/DanceCat -Entry file: DanceCat/DanceCat/__init__.py -Scanned: 2016-10-25 15:27:21.006936 -Vulnerability 1: -File: DanceCat/DanceCat/Views.py - > User input at line 252, trigger word "form[": - triggered_job = QueryDataJob.query.get_or_404(request.form['id']) -Reassigned in: - File: DanceCat/DanceCat/Views.py - > Line 256: tracker = TrackJobRun(triggered_job.job_id) -File: DanceCat/DanceCat/Views.py - > reaches line 269, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('ack''tracker_id'Truetracker.track_job_run_id) - -Vulnerability 2: -File: DanceCat/DanceCat/Socket.py - > User input at line 45, trigger word "get(": - connection_id = received_data.get('connectionId', 0) -Reassigned in: - File: DanceCat/DanceCat/Socket.py - > Line 55: running_connection = Connection.query.get(connection_id) - File: DanceCat/DanceCat/Socket.py - > Line 58: connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60)) - File: DanceCat/DanceCat/Socket.py - > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime) - File: DanceCat/DanceCat/Socket.py - > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)]) - File: DanceCat/DanceCat/Socket.py - > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!') - File: DanceCat/DanceCat/Socket.py - > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!') - File: DanceCat/DanceCat/Socket.py - > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!') -File: DanceCat/DanceCat/Socket.py - > reaches line 68, trigger word "execute(": - connector.execute(query) - -Vulnerability 3: -File: DanceCat/DanceCat/Socket.py - > User input at line 46, trigger word "get(": - query = received_data.get('query', '') -File: DanceCat/DanceCat/Socket.py - > reaches line 68, trigger word "execute(": - connector.execute(query) - -Vulnerability 4: -File: DanceCat/DanceCat/Socket.py - > User input at line 55, trigger word "get(": - running_connection = Connection.query.get(connection_id) -Reassigned in: - File: DanceCat/DanceCat/Socket.py - > Line 58: connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60)) - File: DanceCat/DanceCat/Socket.py - > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime) - File: DanceCat/DanceCat/Socket.py - > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)]) - File: DanceCat/DanceCat/Socket.py - > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!') - File: DanceCat/DanceCat/Socket.py - > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!') - File: DanceCat/DanceCat/Socket.py - > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!') -File: DanceCat/DanceCat/Socket.py - > reaches line 68, trigger word "execute(": - connector.execute(query) - -Vulnerability 5: -File: DanceCat/DanceCat/Socket.py - > User input at line 58, trigger word "get(": - connector = DatabaseConnector(running_connection.type, running_connection.db_config_generator(),sql_data_style=True, dict_format=True, timeout=config.get('DB_TIMEOUT', 60)) -Reassigned in: - File: DanceCat/DanceCat/Socket.py - > Line 73: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''header''seq'0ret_dataconnector.columns_nameruntime) - File: DanceCat/DanceCat/Socket.py - > Line 81: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''data''seq''error''error_ext'-1'None'runtimestr(exception)[str(exception.trace_back)]) - File: DanceCat/DanceCat/Socket.py - > Line 90: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Connection not found!') - File: DanceCat/DanceCat/Socket.py - > Line 97: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Wrong data received!') - File: DanceCat/DanceCat/Socket.py - > Line 49: ret_MAYBE_FUNCTION_NAME = emit(Constants.WS_QUERY_SEND, 'status''seq''error'-1runtime'Query is required!') -File: DanceCat/DanceCat/Socket.py - > reaches line 68, trigger word "execute(": - connector.execute(query) - -Vulnerability 6: -File: DanceCat/DanceCat/JobWorker.py - > User input at line 91, trigger word "get(": - job = QueryDataJob.query.get(job_id) -Reassigned in: - File: DanceCat/DanceCat/JobWorker.py - > Line 99: db_connector = DatabaseConnector(job.Connection.type, job.Connection.db_config_generator(),sql_data_style=False, dict_format=False, timeout=Constants.JOB_FEATURE_QUERY_TIME_OUT in jobjob[Constants.JOB_FEATURE_QUERY_TIME_OUT]config.get('DB_TIMEOUT', 0)) - File: DanceCat/DanceCat/JobWorker.py - > Line 111: results = 'header''rows'db_connector.columns_namedb_connector.fetch_all() - File: DanceCat/DanceCat/JobWorker.py - > Line 135: ret_MAYBE_FUNCTION_NAME = results - File: DanceCat/DanceCat/JobWorker.py - > Line 153: ret_MAYBE_FUNCTION_NAME = None -File: DanceCat/DanceCat/JobWorker.py - > reaches line 110, trigger word "execute(": - db_connector.execute(job.query_string) - -Vulnerability 7: -File: DanceCat/DanceCat/JobWorker.py - > User input at line 99, trigger word "get(": - db_connector = DatabaseConnector(job.Connection.type, job.Connection.db_config_generator(),sql_data_style=False, dict_format=False, timeout=Constants.JOB_FEATURE_QUERY_TIME_OUT in jobjob[Constants.JOB_FEATURE_QUERY_TIME_OUT]config.get('DB_TIMEOUT', 0)) -Reassigned in: - File: DanceCat/DanceCat/JobWorker.py - > Line 111: results = 'header''rows'db_connector.columns_namedb_connector.fetch_all() - File: DanceCat/DanceCat/JobWorker.py - > Line 135: ret_MAYBE_FUNCTION_NAME = results - File: DanceCat/DanceCat/JobWorker.py - > Line 153: ret_MAYBE_FUNCTION_NAME = None -File: DanceCat/DanceCat/JobWorker.py - > reaches line 110, trigger word "execute(": - db_connector.execute(job.query_string) - - - -menghao2015/flask_blog -https://github.com/menghao2015/flask_blog -Entry file: flask_blog/app/__init__.py -Scanned: 2016-10-25 15:27:24.790851 -Vulnerability 1: -File: flask_blog/app/main/views.py - > User input at line 16, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 17: pagination = Post.query.filter_by(category_id=tag.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 19: posts = pagination.items - File: flask_blog/app/main/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html') -File: flask_blog/app/main/views.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, mark='index') - -Vulnerability 2: -File: flask_blog/app/main/views.py - > User input at line 30, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 31: pagination = Post.query.filter_by(lable_id=lable_id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 33: posts = pagination.items - File: flask_blog/app/main/views.py - > Line 36: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html') -File: flask_blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, lable=lable, mark='lables') - -Vulnerability 3: -File: flask_blog/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 45: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 47: posts = pagination.items - File: flask_blog/app/main/views.py - > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html') -File: flask_blog/app/main/views.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, mark='all') - -Vulnerability 4: -File: flask_blog/app/main/views.py - > User input at line 60, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 61: pagination = Post.query.filter_by(category_id=tag.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 63: posts = pagination.items - File: flask_blog/app/main/views.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html') -File: flask_blog/app/main/views.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, mark='mind_study') - -Vulnerability 5: -File: flask_blog/app/main/views.py - > User input at line 75, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 76: pagination = Post.query.filter_by(category_id=tag.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 78: posts = pagination.items - File: flask_blog/app/main/views.py - > Line 81: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html') -File: flask_blog/app/main/views.py - > reaches line 79, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, mark='others') - -Vulnerability 6: -File: flask_blog/app/main/views.py - > User input at line 90, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 91: pagination = Post.query.filter_by(category_id=tag.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 93: posts = pagination.items - File: flask_blog/app/main/views.py - > Line 96: ret_MAYBE_FUNCTION_NAME = render_template('empty_index.html') -File: flask_blog/app/main/views.py - > reaches line 94, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',index=True, posts=posts, lables=lables, Post=Post, pagination=pagination, mark='bug') - - - -mussaimo/auth-flask -https://github.com/mussaimo/auth-flask -Entry file: auth-flask/app.py -Scanned: 2016-10-25 15:27:30.087897 -No vulnerabilities found. - - -AmarKalabic/Football-Stream-Finder--Flask- -https://github.com/AmarKalabic/Football-Stream-Finder--Flask- -Entry file: Football-Stream-Finder--Flask-/main.py -Scanned: 2016-10-25 15:27:31.550084 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -YUX-IO/flask-python351 -https://github.com/YUX-IO/flask-python351 -Entry file: flask-python351/sample-app/app.py -Scanned: 2016-10-25 15:27:32.889207 -No vulnerabilities found. - - -tuppa/flaskapp -https://github.com/tuppa/flaskapp -Entry file: None -Scanned: 2016-10-25 15:27:33.407109 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tuppa/flaskapp. - -quyip8818/flaskrestful -https://github.com/quyip8818/flaskrestful -Entry file: flaskrestful/server/model_cloudsql.py -Scanned: 2016-10-25 15:27:34.810810 -No vulnerabilities found. - - -dribnet/flaskapp -https://github.com/dribnet/flaskapp -Entry file: None -Scanned: 2016-10-25 15:27:35.333135 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dribnet/flaskapp. - -gzeinieh/flaskr -https://github.com/gzeinieh/flaskr -Entry file: None -Scanned: 2016-10-25 15:27:35.864095 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/gzeinieh/flaskr. - -rhildreth/flaskbook -https://github.com/rhildreth/flaskbook -Entry file: flaskbook/hello.py -Scanned: 2016-10-25 15:27:44.146906 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -gandhk/flasklearn -https://github.com/gandhk/flasklearn -Entry file: flasklearn/main.py -Scanned: 2016-10-25 15:27:45.562343 -No vulnerabilities found. - - -Apophus/flaskdb -https://github.com/Apophus/flaskdb -Entry file: flaskdb/fdb.py -Scanned: 2016-10-25 15:27:46.919675 -No vulnerabilities found. - - -TacticalGoat/flasktest -https://github.com/TacticalGoat/flasktest -Entry file: flasktest/app/__init__.py -Scanned: 2016-10-25 15:27:48.312157 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -WayneChen1987/flasky -https://github.com/WayneChen1987/flasky -Entry file: None -Scanned: 2016-10-25 15:27:48.842048 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bwghughes/flaskdev -https://github.com/bwghughes/flaskdev -Entry file: flaskdev/hello.py -Scanned: 2016-10-25 15:27:50.702913 -Vulnerability 1: -File: flaskdev/tests.py - > User input at line 10, trigger word "get(": - res = client.get(url_for('hello_world')) -File: flaskdev/tests.py - > reaches line 10, trigger word "url_for(": - res = client.get(url_for('hello_world')) - - - -matinde/flasktaskr -https://github.com/matinde/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:27:51.238918 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -William0423/flaskybooklearn -https://github.com/William0423/flaskybooklearn -Entry file: flaskybooklearn/app/__init__.py -Scanned: 2016-10-25 15:27:53.035203 -Vulnerability 1: -File: flaskybooklearn/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskybooklearn/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskybooklearn/app/api_1_0/posts.py - > Line 19: next = None -File: flaskybooklearn/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flaskybooklearn/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskybooklearn/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskybooklearn/app/api_1_0/posts.py - > Line 19: next = None -File: flaskybooklearn/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flaskybooklearn/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskybooklearn/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskybooklearn/app/api_1_0/posts.py - > Line 19: next = None -File: flaskybooklearn/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 20: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 23: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 20: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 23: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 20: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 23: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 42: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 42: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flaskybooklearn/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskybooklearn/app/api_1_0/users.py - > Line 42: prev = None - File: flaskybooklearn/app/api_1_0/users.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/users.py - > reaches line 50, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 18: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 18: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 18: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_post_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_post_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flaskybooklearn/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskybooklearn/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskybooklearn/app/api_1_0/comments.py - > Line 46: next = None -File: flaskybooklearn/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: flaskybooklearn/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 29: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 32: posts = pagination.items - File: flaskybooklearn/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskybooklearn/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flaskybooklearn/app/main/views.py - > User input at line 24, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 22: show_followed = False - File: flaskybooklearn/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskybooklearn/app/main/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flaskybooklearn/app/main/views.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 41: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 44: posts = pagination.items -File: flaskybooklearn/app/main/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: flaskybooklearn/app/main/views.py - > User input at line 104, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 106: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskybooklearn/app/main/views.py - > Line 108: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 111: comments = pagination.items - File: flaskybooklearn/app/main/views.py - > Line 103: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskybooklearn/app/main/views.py - > reaches line 112, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: flaskybooklearn/app/main/views.py - > User input at line 171, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 172: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskybooklearn/app/main/views.py - > Line 170: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskybooklearn/app/main/views.py - > reaches line 177, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: flaskybooklearn/app/main/views.py - > User input at line 188, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 189: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 192: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskybooklearn/app/main/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskybooklearn/app/main/views.py - > reaches line 194, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: flaskybooklearn/app/main/views.py - > User input at line 219, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskybooklearn/app/main/views.py - > Line 220: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskybooklearn/app/main/views.py - > Line 223: comments = pagination.items -File: flaskybooklearn/app/main/views.py - > reaches line 224, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -powerlanguage/flasktaskr -https://github.com/powerlanguage/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:27:53.559808 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cmacro/flaskblog -https://github.com/cmacro/flaskblog -Entry file: None -Scanned: 2016-10-25 15:27:54.090032 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cmacro/flaskblog. - -vrofze/flasky -https://github.com/vrofze/flasky -Entry file: None -Scanned: 2016-10-25 15:27:54.604422 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ccsaber/flasker -https://github.com/ccsaber/flasker -Entry file: flasker/app/__init__.py -Scanned: 2016-10-25 15:27:56.631273 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -IronFist16/flasky -https://github.com/IronFist16/flasky -Entry file: None -Scanned: 2016-10-25 15:27:57.137857 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bsdtux/flaskblog -https://github.com/bsdtux/flaskblog -Entry file: None -Scanned: 2016-10-25 15:27:58.655226 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bsdtux/flaskblog. - -terryllowery/flasktaskr -https://github.com/terryllowery/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:28:00.170405 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -moerekh/flaskyflaskssy -https://github.com/moerekh/flaskyflaskssy -Entry file: flaskyflaskssy/flasky.py -Scanned: 2016-10-25 15:28:06.893048 -No vulnerabilities found. - - -Gre4tWhite/Flasknightmare -https://github.com/Gre4tWhite/Flasknightmare -Entry file: Flasknightmare/app/__init__.py -Scanned: 2016-10-25 15:28:12.700215 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -vinay13/Flaskngular -https://github.com/vinay13/Flaskngular -Entry file: Flaskngular/flask_app.py -Scanned: 2016-10-25 15:28:14.133302 -No vulnerabilities found. - - -enricobacis/flaskey -https://github.com/enricobacis/flaskey -Entry file: flaskey/app.py -Scanned: 2016-10-25 15:28:16.682979 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -nehamarne/flaskdemo -https://github.com/nehamarne/flaskdemo -Entry file: None -Scanned: 2016-10-25 15:28:22.205792 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ejakait/flaskpro -https://github.com/ejakait/flaskpro -Entry file: None -Scanned: 2016-10-25 15:28:36.049118 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wrzto/flasky -https://github.com/wrzto/flasky -Entry file: None -Scanned: 2016-10-25 15:28:36.613452 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -William0423/flaskylearn -https://github.com/William0423/flaskylearn -Entry file: flaskylearn/app/__init__.py -Scanned: 2016-10-25 15:28:38.087103 -No vulnerabilities found. - - -bhsantos11/flaskwebapp -https://github.com/bhsantos11/flaskwebapp -Entry file: flaskwebapp/flaskwebsite/__init__.py -Scanned: 2016-10-25 15:28:39.510087 -No vulnerabilities found. - - -jerodestapa/flasktodo -https://github.com/jerodestapa/flasktodo -Entry file: flasktodo/views.py -Scanned: 2016-10-25 15:28:41.012131 -No vulnerabilities found. - - -uptownjimmy/flasktaskr -https://github.com/uptownjimmy/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:28:41.545948 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kirazz/flaskywebblog -https://github.com/kirazz/flaskywebblog -Entry file: flaskywebblog/git/webblog/app/__init__.py -Scanned: 2016-10-25 15:28:44.832656 -Vulnerability 1: -File: flaskywebblog/git/webblog/app/main/views.py - > User input at line 19, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskywebblog/git/webblog/app/main/views.py - > Line 20: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=5, error_out=False) - File: flaskywebblog/git/webblog/app/main/views.py - > Line 22: posts = pagination.items - File: flaskywebblog/git/webblog/app/main/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskywebblog/git/webblog/app/main/views.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: flaskywebblog/git/webblog/app/main/views.py - > User input at line 91, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskywebblog/git/webblog/app/main/views.py - > Line 93: page = post.comments.count() - 1 // 5 + 1 - File: flaskywebblog/git/webblog/app/main/views.py - > Line 95: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=5, error_out=False) - File: flaskywebblog/git/webblog/app/main/views.py - > Line 97: comments = pagination.items - File: flaskywebblog/git/webblog/app/main/views.py - > Line 90: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskywebblog/git/webblog/app/main/views.py - > reaches line 98, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - - - -vnxichow/flaskapp -https://github.com/vnxichow/flaskapp -Entry file: None -Scanned: 2016-10-25 15:28:45.377337 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vnxichow/flaskapp. - -getser/flaskapiblog -https://github.com/getser/flaskapiblog -Entry file: flaskapiblog/__init__.py -Scanned: 2016-10-25 15:28:46.771879 -Vulnerability 1: -File: flaskapiblog/views.py - > User input at line 112, trigger word "get(": - post = Post.query.get(post_id) -File: flaskapiblog/views.py - > reaches line 115, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('post'post._asdict()) - -Vulnerability 2: -File: flaskapiblog/views.py - > User input at line 187, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: flaskapiblog/views.py - > Line 193: visitor = Visitor(email=email) -File: flaskapiblog/views.py - > reaches line 197, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True)) - -Vulnerability 3: -File: flaskapiblog/views.py - > User input at line 187, trigger word "get(": - email = request.json.get('email') -Reassigned in: - File: flaskapiblog/views.py - > Line 193: visitor = Visitor(email=email) -File: flaskapiblog/views.py - > reaches line 197, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('email'visitor.email), 201, 'Location'url_for('get_visitor',visitor_id=visitor.id, _external=True)) - - - -Paopand1/flasktaskr -https://github.com/Paopand1/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:28:47.312619 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gabrielssilva/flasktasks -https://github.com/gabrielssilva/flasktasks -Entry file: flasktasks/flasktasks/__init__.py -Scanned: 2016-10-25 15:28:49.915174 -Vulnerability 1: -File: flasktasks/flasktasks/views.py - > User input at line 35, trigger word "get(": - mission = Mission.query.get_or_404(request.args.get('mission_id')) -Reassigned in: - File: flasktasks/flasktasks/views.py - > Line 33: mission = None -File: flasktasks/flasktasks/views.py - > reaches line 44, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('task/index.html',tasks=tasks_by_status, mission=mission) - -Vulnerability 2: -File: flasktasks/flasktasks/views.py - > User input at line 96, trigger word "get(": - color = Color(int(request.form.get('color_id'))) -Reassigned in: - File: flasktasks/flasktasks/views.py - > Line 99: tag = Tag(request.form.get('name'), color) - File: flasktasks/flasktasks/views.py - > Line 104: colors = {color.name : color.value for color in Color} - File: flasktasks/flasktasks/views.py - > Line 102: ret_MAYBE_FUNCTION_NAME = redirect(url_for('missions')) -File: flasktasks/flasktasks/views.py - > reaches line 105, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tags/new.html',colors=colors) - - - -playgrdstar/flaskapp -https://github.com/playgrdstar/flaskapp -Entry file: None -Scanned: 2016-10-25 15:28:50.429970 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/playgrdstar/flaskapp. - -caspii/flaskr -https://github.com/caspii/flaskr -Entry file: None -Scanned: 2016-10-25 15:28:50.951876 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/caspii/flaskr. - -tj621/flaskr -https://github.com/tj621/flaskr -Entry file: None -Scanned: 2016-10-25 15:28:51.470014 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/tj621/flaskr. - -LinMingjie/flaskr -https://github.com/LinMingjie/flaskr -Entry file: None -Scanned: 2016-10-25 15:28:51.980795 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/LinMingjie/flaskr. - -mayreeh/Flasky -https://github.com/mayreeh/Flasky -Entry file: None -Scanned: 2016-10-25 15:28:52.535166 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mayreeh/Flasky. - -supor/flaskr -https://github.com/supor/flaskr -Entry file: None -Scanned: 2016-10-25 15:28:53.045470 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/supor/flaskr. - -ridnarong/flasky -https://github.com/ridnarong/flasky -Entry file: None -Scanned: 2016-10-25 15:28:53.570451 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cjfoster10/flasktaskr -https://github.com/cjfoster10/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:28:54.086493 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pkml/flasktaskr -https://github.com/pkml/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:28:54.611787 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -davidwangv5/flasky -https://github.com/davidwangv5/flasky -Entry file: None -Scanned: 2016-10-25 15:28:55.133489 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rahulmkumar/flaskapp -https://github.com/rahulmkumar/flaskapp -Entry file: None -Scanned: 2016-10-25 15:28:55.652680 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rahulmkumar/flaskapp. - -seangilleran/flasko -https://github.com/seangilleran/flasko -Entry file: flasko/flasko/__init__.py -Scanned: 2016-10-25 15:28:58.602601 -Vulnerability 1: -File: flasko/flasko/blueprints/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasko/flasko/blueprints/views.py - > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=10, error_out=False) - File: flasko/flasko/blueprints/views.py - > Line 27: posts = pagination.items - File: flasko/flasko/blueprints/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('views.index')) -File: flasko/flasko/blueprints/views.py - > reaches line 28, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',disable_header=True, hello=random_post_question(), form=form, pagination=pagination, posts=posts, timestamp=datetime.utcnow()) - - - -weisongchen/flaskexercise -https://github.com/weisongchen/flaskexercise -Entry file: flaskexercise/hello.py -Scanned: 2016-10-25 15:29:06.898396 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskexercise/venv/lib/python2.7/sre_compile.py - -weisongchen/flaskapp -https://github.com/weisongchen/flaskapp -Entry file: None -Scanned: 2016-10-25 15:29:07.583642 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/weisongchen/flaskapp. - -chenglinguang/flaskky -https://github.com/chenglinguang/flaskky -Entry file: flaskky/hello1.py -Scanned: 2016-10-25 15:29:09.224331 -No vulnerabilities found. - - -CharlieCheng2014/Flask-micro-flask -https://github.com/CharlieCheng2014/Flask-micro-flask -Entry file: Flask-micro-flask/app/__init__.py -Scanned: 2016-10-25 15:29:10.589498 -No vulnerabilities found. - - -er3456qi/FlaskBlog -https://github.com/er3456qi/FlaskBlog -Entry file: FlaskBlog/app/__init__.py -Scanned: 2016-10-25 15:29:15.834463 -Vulnerability 1: -File: FlaskBlog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['BLOG_POSTS_PER_PAGE']) - File: FlaskBlog/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: FlaskBlog/app/api_1_0/posts.py - > Line 16: prev = None - File: FlaskBlog/app/api_1_0/posts.py - > Line 16: next = None -File: FlaskBlog/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: FlaskBlog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['BLOG_POSTS_PER_PAGE']) - File: FlaskBlog/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: FlaskBlog/app/api_1_0/posts.py - > Line 16: prev = None - File: FlaskBlog/app/api_1_0/posts.py - > Line 16: next = None -File: FlaskBlog/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: FlaskBlog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['BLOG_POSTS_PER_PAGE']) - File: FlaskBlog/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: FlaskBlog/app/api_1_0/posts.py - > Line 16: prev = None - File: FlaskBlog/app/api_1_0/posts.py - > Line 16: next = None -File: FlaskBlog/app/api_1_0/posts.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: FlaskBlog/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: FlaskBlog/app/api_1_0/users.py - > Line 20: prev = None - File: FlaskBlog/app/api_1_0/users.py - > Line 23: next = None -File: FlaskBlog/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: FlaskBlog/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: FlaskBlog/app/api_1_0/users.py - > Line 20: prev = None - File: FlaskBlog/app/api_1_0/users.py - > Line 23: next = None -File: FlaskBlog/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: FlaskBlog/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: FlaskBlog/app/api_1_0/users.py - > Line 20: prev = None - File: FlaskBlog/app/api_1_0/users.py - > Line 23: next = None -File: FlaskBlog/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: FlaskBlog/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: FlaskBlog/app/api_1_0/users.py - > Line 42: prev = None - File: FlaskBlog/app/api_1_0/users.py - > Line 45: next = None -File: FlaskBlog/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: FlaskBlog/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: FlaskBlog/app/api_1_0/users.py - > Line 42: prev = None - File: FlaskBlog/app/api_1_0/users.py - > Line 45: next = None -File: FlaskBlog/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: FlaskBlog/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: FlaskBlog/app/api_1_0/users.py - > Line 42: prev = None - File: FlaskBlog/app/api_1_0/users.py - > Line 45: next = None -File: FlaskBlog/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: FlaskBlog/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: FlaskBlog/app/api_1_0/comments.py - > Line 15: prev = None - File: FlaskBlog/app/api_1_0/comments.py - > Line 18: next = None -File: FlaskBlog/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: FlaskBlog/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: FlaskBlog/app/api_1_0/comments.py - > Line 15: prev = None - File: FlaskBlog/app/api_1_0/comments.py - > Line 18: next = None -File: FlaskBlog/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: FlaskBlog/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: FlaskBlog/app/api_1_0/comments.py - > Line 15: prev = None - File: FlaskBlog/app/api_1_0/comments.py - > Line 18: next = None -File: FlaskBlog/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: FlaskBlog/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: FlaskBlog/app/api_1_0/comments.py - > Line 43: prev = None - File: FlaskBlog/app/api_1_0/comments.py - > Line 46: next = None -File: FlaskBlog/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: FlaskBlog/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: FlaskBlog/app/api_1_0/comments.py - > Line 43: prev = None - File: FlaskBlog/app/api_1_0/comments.py - > Line 46: next = None -File: FlaskBlog/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: FlaskBlog/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: FlaskBlog/app/api_1_0/comments.py - > Line 43: prev = None - File: FlaskBlog/app/api_1_0/comments.py - > Line 46: next = None -File: FlaskBlog/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: FlaskBlog/app/main/views.py - > User input at line 17, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 18: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['BLOG_POSTS_PER_PAGE']) - File: FlaskBlog/app/main/views.py - > Line 20: posts = pagination.items -File: FlaskBlog/app/main/views.py - > reaches line 21, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination) - -Vulnerability 17: -File: FlaskBlog/app/main/views.py - > User input at line 27, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 28: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['BLOG_POSTS_PER_PAGE']) - File: FlaskBlog/app/main/views.py - > Line 30: posts = pagination.items -File: FlaskBlog/app/main/views.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination) - -Vulnerability 18: -File: FlaskBlog/app/main/views.py - > User input at line 109, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 111: page = post.comments.count() - 1 / current_app.config['BLOG_COMMENTS_PER_PAGE'] + 1 - File: FlaskBlog/app/main/views.py - > Line 112: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['BLOG_COMMENTS_PER_PAGE']) - File: FlaskBlog/app/main/views.py - > Line 114: comments = pagination.items - File: FlaskBlog/app/main/views.py - > Line 108: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: FlaskBlog/app/main/views.py - > reaches line 115, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',post=post, form=form, comments=comments, pagination=pagination) - -Vulnerability 19: -File: FlaskBlog/app/main/views.py - > User input at line 173, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 174: pagination = user.followers.paginate(page,per_page=current_app.config['BLOG_FOLLOWERS_PER_PAGE']) - File: FlaskBlog/app/main/views.py - > Line 177: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: FlaskBlog/app/main/views.py - > Line 172: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskBlog/app/main/views.py - > reaches line 179, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 20: -File: FlaskBlog/app/main/views.py - > User input at line 193, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 194: pagination = user.following.paginate(page,per_page=current_app.config['BLOG_FOLLOWERS_PER_PAGE']) - File: FlaskBlog/app/main/views.py - > Line 197: follows = ['user''timestamp'item.followingitem.timestamp for item in pagination.items] - File: FlaskBlog/app/main/views.py - > Line 192: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskBlog/app/main/views.py - > reaches line 199, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.following', pagination=pagination, follows=follows) - -Vulnerability 21: -File: FlaskBlog/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 212: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['BLOG_FOLLOWERS_PER_PAGE']) - File: FlaskBlog/app/main/views.py - > Line 214: comments = pagination.items -File: FlaskBlog/app/main/views.py - > reaches line 215, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -vishwanath79/FlaskURLAPI -https://github.com/vishwanath79/FlaskURLAPI -Entry file: FlaskURLAPI/app.py -Scanned: 2016-10-25 15:29:23.126139 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskURLAPI/hadoopify/lib/python2.7/sre_compile.py - -QMickael/flaskBlog -https://github.com/QMickael/flaskBlog -Entry file: flaskBlog/app/app.py -Scanned: 2016-10-25 15:29:24.742470 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -CircaVictor/flaskTemplate -https://github.com/CircaVictor/flaskTemplate -Entry file: flaskTemplate/flask-app/app/__init__.py -Scanned: 2016-10-25 15:29:27.235459 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -vmotto/FlaskBlog -https://github.com/vmotto/FlaskBlog -Entry file: FlaskBlog/app/app.py -Scanned: 2016-10-25 15:29:38.080855 -No vulnerabilities found. - - -xiangzhuyuan/flaskdemo1 -https://github.com/xiangzhuyuan/flaskdemo1 -Entry file: flaskdemo1/flaskdemo1/flaskr.py -Scanned: 2016-10-25 15:29:40.420921 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -whimian/flaskyKrig -https://github.com/whimian/flaskyKrig -Entry file: flaskyKrig/test.py -Scanned: 2016-10-25 15:29:45.787270 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -keer2345/flaskMega -https://github.com/keer2345/flaskMega -Entry file: flaskMega/app/__init__.py -Scanned: 2016-10-25 15:29:47.171094 -No vulnerabilities found. - - -josh14668/flaskApp -https://github.com/josh14668/flaskApp -Entry file: flaskApp/main.py -Scanned: 2016-10-25 15:29:54.573111 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskApp/venv/lib/python2.7/sre_compile.py - -sh4nks/flask-caching -https://github.com/sh4nks/flask-caching -Entry file: flask-caching/setup.py -Scanned: 2016-10-25 15:29:59.438579 -No vulnerabilities found. - - -Riffstation/flaskutilsexample -https://github.com/Riffstation/flaskutilsexample -Entry file: flaskutilsexample/src/app/__init__.py -Scanned: 2016-10-25 15:30:00.937313 -No vulnerabilities found. - - -themese/flask -https://github.com/themese/flask -Entry file: None -Scanned: 2016-10-25 15:30:01.556349 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -radajin/flask -https://github.com/radajin/flask -Entry file: None -Scanned: 2016-10-25 15:30:02.622395 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -suryadana/Flask -https://github.com/suryadana/Flask -Entry file: None -Scanned: 2016-10-25 15:30:03.152150 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -1131909224/flask -https://github.com/1131909224/flask -Entry file: None -Scanned: 2016-10-25 15:30:03.667949 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -manikandaraj123ster/flask -https://github.com/manikandaraj123ster/flask -Entry file: None -Scanned: 2016-10-25 15:30:04.714568 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -KyleSeem/Flask -https://github.com/KyleSeem/Flask -Entry file: None -Scanned: 2016-10-25 15:30:05.324875 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -crazw/flask -https://github.com/crazw/flask -Entry file: None -Scanned: 2016-10-25 15:30:05.843418 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mwongeraE/Flask -https://github.com/mwongeraE/Flask -Entry file: None -Scanned: 2016-10-25 15:30:06.411141 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Jzengzhan/Flask -https://github.com/Jzengzhan/Flask -Entry file: None -Scanned: 2016-10-25 15:30:06.948720 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mani-python/flask -https://github.com/mani-python/flask -Entry file: None -Scanned: 2016-10-25 15:30:07.485990 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bTanya/flask -https://github.com/bTanya/flask -Entry file: None -Scanned: 2016-10-25 15:30:08.010886 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kirade/Flask -https://github.com/Kirade/Flask -Entry file: None -Scanned: 2016-10-25 15:30:08.548598 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -salhernandez/Flask -https://github.com/salhernandez/Flask -Entry file: None -Scanned: 2016-10-25 15:30:09.083152 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wangrenlearn/flask -https://github.com/wangrenlearn/flask -Entry file: None -Scanned: 2016-10-25 15:30:09.602326 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -TheNixNinja/flask-boilerplate -https://github.com/TheNixNinja/flask-boilerplate -Entry file: None -Scanned: 2016-10-25 15:30:10.141142 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/TheNixNinja/flask-boilerplate. - -murilobsd/zeus -https://github.com/murilobsd/zeus -Entry file: None -Scanned: 2016-10-25 15:30:16.441890 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/murilobsd/zeus. - -xuelangZF/NaHan -https://github.com/xuelangZF/NaHan -Entry file: NaHan/nahan/__init__.py -Scanned: 2016-10-25 15:30:30.574564 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -clef/flask-nameko -https://github.com/clef/flask-nameko -Entry file: flask-nameko/tests/test_flask_pooled_cluster_rpc_proxy.py -Scanned: 2016-10-25 15:30:38.131784 -No vulnerabilities found. - - -rafaelhenrique/flask_tutorial -https://github.com/rafaelhenrique/flask_tutorial -Entry file: flask_tutorial/tvseries/__init__.py -Scanned: 2016-10-25 15:30:44.387074 -No vulnerabilities found. - - -haklabrador/podatci-s-burza -https://github.com/haklabrador/podatci-s-burza -Entry file: podatci-s-burza/webserver.py -Scanned: 2016-10-25 15:30:45.995308 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sousic/flask_study -https://github.com/sousic/flask_study -Entry file: flask_study/flask_study.py -Scanned: 2016-10-25 15:30:49.461297 -Vulnerability 1: -File: flask_study/views/cookies.py - > User input at line 13, trigger word "get(": - username = request.cookies.get('username') -File: flask_study/views/cookies.py - > reaches line 14, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('cookies/readcookie.html',username=username) - -Vulnerability 2: -File: flask_study/views/cookies.py - > User input at line 19, trigger word "form[": - username = request.form['username'] -File: flask_study/views/cookies.py - > reaches line 23, trigger word "set_cookie(": - response.set_cookie('username', username) - -Vulnerability 3: -File: flask_study/views/fileUpload.py - > User input at line 21, trigger word "files[": - f = request.files['file'] -Reassigned in: - File: flask_study/views/fileUpload.py - > Line 23: filename = secure_filename(f.filename) - File: flask_study/views/fileUpload.py - > Line 29: ret_MAYBE_FUNCTION_NAME = response -File: flask_study/views/fileUpload.py - > reaches line 25, trigger word "render_template(": - response = make_response(render_template('fileupload/index.html',filename=filename)) - - - -weinbergdavid/python-flask-security -https://github.com/weinbergdavid/python-flask-security -Entry file: python-flask-security/run.py -Scanned: 2016-10-25 15:31:12.798394 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -opentracing-contrib/python-flask -https://github.com/opentracing-contrib/python-flask -Entry file: python-flask/tests/test_flask_opentracing.py -Scanned: 2016-10-25 15:31:15.348842 -No vulnerabilities found. - - -davidgomes/flask-pygood -https://github.com/davidgomes/flask-pygood -Entry file: flask-pygood/flask_pygood/test/demo.py -Scanned: 2016-10-25 15:31:16.715832 -No vulnerabilities found. - - -aaossa/flask-openshift -https://github.com/aaossa/flask-openshift -Entry file: flask-openshift/flask_openshift_template.py -Scanned: 2016-10-25 15:31:18.363657 -Vulnerability 1: -File: flask-openshift/flask_openshift_template.py - > User input at line 14, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: flask-openshift/flask_openshift_template.py - > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask-openshift/flask_openshift_template.py - > reaches line 15, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=username)) - -Vulnerability 2: -File: flask-openshift/flask_openshift_template.py - > User input at line 14, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: flask-openshift/flask_openshift_template.py - > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flask-openshift/flask_openshift_template.py - > reaches line 15, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=username)) - - - -k0itsu/flasktaskr -https://github.com/k0itsu/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:31:18.903602 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rama16-meet/flasky -https://github.com/rama16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:31:19.430864 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dina16-meet/flasky -https://github.com/dina16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:31:19.970707 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -orr16-meet/flasky -https://github.com/orr16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:31:20.506395 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -roni16-meet/flasky -https://github.com/roni16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:31:21.025345 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -penglee87/flaskblog -https://github.com/penglee87/flaskblog -Entry file: None -Scanned: 2016-10-25 15:31:21.561460 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/penglee87/flaskblog. - -atsk1618/flasko -https://github.com/atsk1618/flasko -Entry file: flasko/flasko.py -Scanned: 2016-10-25 15:31:23.453760 -No vulnerabilities found. - - -nsujan/flaskbot -https://github.com/nsujan/flaskbot -Entry file: flaskbot/wsgi/myflaskapp.py -Scanned: 2016-10-25 15:31:25.160457 -No vulnerabilities found. - - -davbrink/flaskblog -https://github.com/davbrink/flaskblog -Entry file: None -Scanned: 2016-10-25 15:31:26.185209 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/davbrink/flaskblog. - -dongshuiquan/flasky -https://github.com/dongshuiquan/flasky -Entry file: None -Scanned: 2016-10-25 15:31:26.724870 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -caseydunham/flaskr -https://github.com/caseydunham/flaskr -Entry file: None -Scanned: 2016-10-25 15:31:27.250833 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/caseydunham/flaskr. - -francium/flaskr -https://github.com/francium/flaskr -Entry file: None -Scanned: 2016-10-25 15:31:27.771256 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/francium/flaskr. - -Qqlick/Flasktaskr -https://github.com/Qqlick/Flasktaskr -Entry file: Flasktaskr/views.py -Scanned: 2016-10-25 15:31:29.406916 -No vulnerabilities found. - - -ToDolin/flaskgit -https://github.com/ToDolin/flaskgit -Entry file: flaskgit/flasky/app/__init__.py -Scanned: 2016-10-25 15:31:30.944489 -No vulnerabilities found. - - -yolandaz/flaskcars -https://github.com/yolandaz/flaskcars -Entry file: flaskcars/app.py -Scanned: 2016-10-25 15:31:41.103668 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskcars/venv/lib/python2.7/sre_compile.py - -PansFortress/flaskr -https://github.com/PansFortress/flaskr -Entry file: None -Scanned: 2016-10-25 15:31:41.662717 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/PansFortress/flaskr. - -goodman1209/flaskrestserver -https://github.com/goodman1209/flaskrestserver -Entry file: flaskrestserver/hello.py -Scanned: 2016-10-25 15:31:43.068276 -No vulnerabilities found. - - -Ivicel/flasky -https://github.com/Ivicel/flasky -Entry file: None -Scanned: 2016-10-25 15:31:43.588834 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -weihg/flaskr -https://github.com/weihg/flaskr -Entry file: None -Scanned: 2016-10-25 15:31:44.120293 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/weihg/flaskr. - -Dasmemes/flasky -https://github.com/Dasmemes/flasky -Entry file: None -Scanned: 2016-10-25 15:31:44.641280 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -penglee87/flaskweb -https://github.com/penglee87/flaskweb -Entry file: flaskweb/app/__init__.py -Scanned: 2016-10-25 15:31:46.367936 -Vulnerability 1: -File: flaskweb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskweb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskweb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskweb/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flaskweb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskweb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskweb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskweb/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flaskweb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskweb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskweb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskweb/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flaskweb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 23: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flaskweb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 23: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flaskweb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 23: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: flaskweb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 45: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: flaskweb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 45: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flaskweb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskweb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskweb/app/api_1_0/users.py - > Line 45: next = None -File: flaskweb/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: flaskweb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flaskweb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flaskweb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: flaskweb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flaskweb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flaskweb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskweb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskweb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskweb/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: flaskweb/app/main/views.py - > User input at line 25, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 33: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 34: posts = pagination.items -File: flaskweb/app/main/views.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',post_form=post_form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flaskweb/app/main/views.py - > User input at line 28, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 26: show_followed = False -File: flaskweb/app/main/views.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',post_form=post_form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flaskweb/app/main/views.py - > User input at line 52, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 50: show_followed = False - File: flaskweb/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) - File: flaskweb/app/main/views.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.create')) -File: flaskweb/app/main/views.py - > reaches line 58, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('create.html',post_form=post_form, show_followed=show_followed) - -Vulnerability 19: -File: flaskweb/app/main/views.py - > User input at line 64, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 65: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 68: posts = pagination.items -File: flaskweb/app/main/views.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 20: -File: flaskweb/app/main/views.py - > User input at line 128, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 130: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskweb/app/main/views.py - > Line 132: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 135: comments = pagination.items - File: flaskweb/app/main/views.py - > Line 127: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskweb/app/main/views.py - > reaches line 136, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 21: -File: flaskweb/app/main/views.py - > User input at line 221, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 222: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 225: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskweb/app/main/views.py - > Line 220: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskweb/app/main/views.py - > reaches line 227, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 22: -File: flaskweb/app/main/views.py - > User input at line 238, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 239: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 242: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskweb/app/main/views.py - > Line 237: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskweb/app/main/views.py - > reaches line 244, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 23: -File: flaskweb/app/main/views.py - > User input at line 269, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskweb/app/main/views.py - > Line 270: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskweb/app/main/views.py - > Line 273: comments = pagination.items -File: flaskweb/app/main/views.py - > reaches line 274, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -yuyanqiuqiu/flaskr -https://github.com/yuyanqiuqiu/flaskr -Entry file: None -Scanned: 2016-10-25 15:31:46.887549 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yuyanqiuqiu/flaskr. - -marvinmarnold/flasky -https://github.com/marvinmarnold/flasky -Entry file: None -Scanned: 2016-10-25 15:31:47.422164 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bassel-meet/flasky -https://github.com/bassel-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:31:48.974447 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sima16-meet/flasky -https://github.com/sima16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:31:56.489329 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tamar16-meet/flasky -https://github.com/tamar16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:32:14.022584 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -alma16-meet/flasky -https://github.com/alma16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:32:16.553923 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -guy16-meet/flasky -https://github.com/guy16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:32:18.115565 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aixiamomo/flasky -https://github.com/aixiamomo/flasky -Entry file: None -Scanned: 2016-10-25 15:32:19.627024 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yuyanqiuqiu/flaskblog -https://github.com/yuyanqiuqiu/flaskblog -Entry file: None -Scanned: 2016-10-25 15:32:20.158637 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yuyanqiuqiu/flaskblog. - -Halcae/flaskapp -https://github.com/Halcae/flaskapp -Entry file: None -Scanned: 2016-10-25 15:32:20.685236 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Halcae/flaskapp. - -Kermit95/Flaskr -https://github.com/Kermit95/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-25 15:32:27.604335 -No vulnerabilities found. - - -wwpika/flaskww -https://github.com/wwpika/flaskww -Entry file: None -Scanned: 2016-10-25 15:32:34.173652 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yasmeen16-meet/flasky -https://github.com/yasmeen16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:32:34.708360 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -themuppet2/flasktaskr -https://github.com/themuppet2/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:32:35.250814 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -LongstreetSolutions/flaskr -https://github.com/LongstreetSolutions/flaskr -Entry file: None -Scanned: 2016-10-25 15:32:35.800878 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/LongstreetSolutions/flaskr. - -stevehaigh/flasktest -https://github.com/stevehaigh/flasktest -Entry file: flasktest/flasktest.py -Scanned: 2016-10-25 15:32:37.158378 -No vulnerabilities found. - - -juniorkrvl/flasky -https://github.com/juniorkrvl/flasky -Entry file: None -Scanned: 2016-10-25 15:32:37.688930 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -davbrink/flasktaskr -https://github.com/davbrink/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:32:38.216837 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SachinMaharana/flaskblog -https://github.com/SachinMaharana/flaskblog -Entry file: None -Scanned: 2016-10-25 15:32:38.733899 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SachinMaharana/flaskblog. - -dhan12/Flaskblog -https://github.com/dhan12/Flaskblog -Entry file: Flaskblog/run.py -Scanned: 2016-10-25 15:32:43.479801 -Vulnerability 1: -File: Flaskblog/flaskblog/routes.py - > User input at line 42, trigger word "form[": - searchText = request.form['search'] -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 54: searchText = request.args.get('search', '') - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - -Vulnerability 2: -File: Flaskblog/flaskblog/routes.py - > User input at line 54, trigger word "get(": - searchText = request.args.get('search', '') -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 42: searchText = request.form['search'] - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - -Vulnerability 3: -File: Flaskblog/flaskblog/routes.py - > User input at line 42, trigger word "form[": - searchText = request.form['search'] -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 54: searchText = request.args.get('search', '') - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - -Vulnerability 4: -File: Flaskblog/flaskblog/routes.py - > User input at line 54, trigger word "get(": - searchText = request.args.get('search', '') -Reassigned in: - File: Flaskblog/flaskblog/routes.py - > Line 42: searchText = request.form['search'] - File: Flaskblog/flaskblog/routes.py - > Line 56: blog_posts = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 56: maxReached = getPostsForUi(pageNum=page, tag=tag, searchText=searchText) - File: Flaskblog/flaskblog/routes.py - > Line 62: older_page = getPageLink(page + 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 64: newer_page = getPageLink(page - 1, tag, searchText) - File: Flaskblog/flaskblog/routes.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('blog.html',locals()) -File: Flaskblog/flaskblog/routes.py - > reaches line 43, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('flaskblog.blogapp',page='0', tag='', search=searchText)) - - - -amjad16-meet/flasky -https://github.com/amjad16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:32:44.011109 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -elias16-meet/flasky -https://github.com/elias16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:32:44.534834 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bluethon/flasky -https://github.com/bluethon/flasky -Entry file: None -Scanned: 2016-10-25 15:32:45.050199 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -NathanJ4620/flasker -https://github.com/NathanJ4620/flasker -Entry file: flasker/test.py -Scanned: 2016-10-25 15:32:46.386896 -No vulnerabilities found. - - -rahulmkumar/flaskapp -https://github.com/rahulmkumar/flaskapp -Entry file: None -Scanned: 2016-10-25 15:32:46.901223 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rahulmkumar/flaskapp. - -teodorgarzdin/Flaskr -https://github.com/teodorgarzdin/Flaskr -Entry file: Flaskr/Flaskr/flaskr/flaskr.py -Scanned: 2016-10-25 15:32:48.232775 -No vulnerabilities found. - - -linjialongmao/flasky -https://github.com/linjialongmao/flasky -Entry file: None -Scanned: 2016-10-25 15:32:48.778714 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -algalanb/flaskapp -https://github.com/algalanb/flaskapp -Entry file: None -Scanned: 2016-10-25 15:32:49.295767 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/algalanb/flaskapp. - -sinwar/flaskr -https://github.com/sinwar/flaskr -Entry file: None -Scanned: 2016-10-25 15:32:49.808019 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sinwar/flaskr. - -ptrees/flaskr -https://github.com/ptrees/flaskr -Entry file: None -Scanned: 2016-10-25 15:32:50.319578 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ptrees/flaskr. - -jcue/flasktaskr -https://github.com/jcue/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:32:50.836929 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -qhdong/flaskr -https://github.com/qhdong/flaskr -Entry file: None -Scanned: 2016-10-25 15:32:51.350645 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/qhdong/flaskr. - -aksenovpb/flaskproject -https://github.com/aksenovpb/flaskproject -Entry file: flaskproject/main.py -Scanned: 2016-10-25 15:32:52.751739 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pengshiqi/Flaskr -https://github.com/pengshiqi/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-25 15:32:58.143076 -No vulnerabilities found. - - -stylianos-kampakis/flasktaskr -https://github.com/stylianos-kampakis/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:33:14.670124 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yara16-meet/flasky -https://github.com/yara16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:33:17.216994 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nimala16-meet/Flasky- -https://github.com/nimala16-meet/Flasky- -Entry file: None -Scanned: 2016-10-25 15:33:24.735088 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/nimala16-meet/Flasky-. - -shiran16-meet/flasky -https://github.com/shiran16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:33:25.261478 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fadi16-meet/flasky -https://github.com/fadi16-meet/flasky -Entry file: None -Scanned: 2016-10-25 15:33:25.785166 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -igoroppo6/flasky -https://github.com/igoroppo6/flasky -Entry file: None -Scanned: 2016-10-25 15:33:26.300307 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -evanzd/flasky -https://github.com/evanzd/flasky -Entry file: None -Scanned: 2016-10-25 15:33:26.808290 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Dawson-G/flaskwebapp -https://github.com/Dawson-G/flaskwebapp -Entry file: flaskwebapp/main.py -Scanned: 2016-10-25 15:33:29.162126 -No vulnerabilities found. - - -chijie/flaskdemo -https://github.com/chijie/flaskdemo -Entry file: None -Scanned: 2016-10-25 15:33:35.724957 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -diazdeentr/flasktest -https://github.com/diazdeentr/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-25 15:33:37.034913 -No vulnerabilities found. - - -yinqiaoyicjx/flask -https://github.com/yinqiaoyicjx/flask -Entry file: None -Scanned: 2016-10-25 15:33:38.892048 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -krandmm/flask -https://github.com/krandmm/flask -Entry file: None -Scanned: 2016-10-25 15:33:39.432771 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yangliu2/flask -https://github.com/yangliu2/flask -Entry file: None -Scanned: 2016-10-25 15:33:39.947388 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -KeyJia/Flask -https://github.com/KeyJia/Flask -Entry file: None -Scanned: 2016-10-25 15:33:40.463871 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Coolwater7/flask -https://github.com/Coolwater7/flask -Entry file: None -Scanned: 2016-10-25 15:33:40.975173 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sepihere/flask -https://github.com/sepihere/flask -Entry file: None -Scanned: 2016-10-25 15:33:44.494959 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -saiprakashreddymarasani/flask -https://github.com/saiprakashreddymarasani/flask -Entry file: None -Scanned: 2016-10-25 15:33:45.025524 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -deonna/flask -https://github.com/deonna/flask -Entry file: None -Scanned: 2016-10-25 15:33:45.535841 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ksbek/flask -https://github.com/ksbek/flask -Entry file: None -Scanned: 2016-10-25 15:33:46.077058 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tis86/flask -https://github.com/tis86/flask -Entry file: None -Scanned: 2016-10-25 15:33:47.644776 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -theparadoxer02/flask -https://github.com/theparadoxer02/flask -Entry file: None -Scanned: 2016-10-25 15:33:48.187558 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -alazar-gm/flask -https://github.com/alazar-gm/flask -Entry file: None -Scanned: 2016-10-25 15:33:49.731697 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -krasytod/flask -https://github.com/krasytod/flask -Entry file: None -Scanned: 2016-10-25 15:33:50.281781 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -feirendada/Flask -https://github.com/feirendada/Flask -Entry file: None -Scanned: 2016-10-25 15:33:50.817238 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Vaspy/Flask -https://github.com/Vaspy/Flask -Entry file: None -Scanned: 2016-10-25 15:33:51.350559 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vipitsoft/flask -https://github.com/vipitsoft/flask -Entry file: None -Scanned: 2016-10-25 15:33:51.875892 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -reed-chi/flask -https://github.com/reed-chi/flask -Entry file: None -Scanned: 2016-10-25 15:33:52.393148 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -huhjuang/Flask -https://github.com/huhjuang/Flask -Entry file: None -Scanned: 2016-10-25 15:33:52.944771 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sebas095/Flask -https://github.com/sebas095/Flask -Entry file: None -Scanned: 2016-10-25 15:34:15.036006 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SicunStudio/aunet-flask -https://github.com/SicunStudio/aunet-flask -Entry file: None -Scanned: 2016-10-25 15:34:21.466256 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SicunStudio/aunet-flask. - -hit9/flask-docjson -https://github.com/hit9/flask-docjson -Entry file: flask-docjson/flask_docjson.py -Scanned: 2016-10-25 15:34:27.112399 -No vulnerabilities found. - - -codigofacilito/flask_cf -https://github.com/codigofacilito/flask_cf -Entry file: flask_cf/Project/main.py -Scanned: 2016-10-25 15:34:29.040356 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -lizTheDeveloper/__g26_flask -https://github.com/lizTheDeveloper/__g26_flask -Entry file: __g26_flask/app.py -Scanned: 2016-10-25 15:34:30.647535 -Vulnerability 1: -File: __g26_flask/app.py - > User input at line 27, trigger word "get(": - user = load_user(session.get('user_id')) -File: __g26_flask/app.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',title='Pokestraveganzamon', pokemon=pokelist, user=user) - - - -mosquito/flask-example -https://github.com/mosquito/flask-example -Entry file: flask-example/flask_example/app.py -Scanned: 2016-10-25 15:34:34.126359 -No vulnerabilities found. - - -zakzou/flask-weixin-pay -https://github.com/zakzou/flask-weixin-pay -Entry file: flask-weixin-pay/example.py -Scanned: 2016-10-25 15:34:35.568008 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -hitakaken/flask-wechat -https://github.com/hitakaken/flask-wechat -Entry file: flask-wechat/example/run.py -Scanned: 2016-10-25 15:34:37.583457 -No vulnerabilities found. - - -ZakStrassberg/flask_products_group_project -https://github.com/ZakStrassberg/flask_products_group_project -Entry file: flask_products_group_project/server.py -Scanned: 2016-10-25 15:34:39.034422 -No vulnerabilities found. - - -teuton0215/microblog -https://github.com/teuton0215/microblog -Entry file: None -Scanned: 2016-10-25 15:34:40.994018 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/teuton0215/microblog. - -iamrajhans/FlaskBackend -https://github.com/iamrajhans/FlaskBackend -Entry file: FlaskBackend/drone/main.py -Scanned: 2016-10-25 15:34:42.570379 -No vulnerabilities found. - - -afropolymath/papers -https://github.com/afropolymath/papers -Entry file: papers/api/__init__.py -Scanned: 2016-10-25 15:34:44.854725 -Vulnerability 1: -File: papers/api/controllers/files.py - > User input at line 149, trigger word "get(": - parent_id = args.get('parent_id', None) -Reassigned in: - File: papers/api/controllers/files.py - > Line 161: update_fields['tag'] = parent_id == '0'g.file['id']'{}#{}'.format(folder_access['tag'], folder['last_index']) - File: papers/api/controllers/files.py - > Line 166: update_fields['parent_id'] = parent_id - File: papers/api/controllers/files.py - > Line 152: update_fields['name'] = name -File: papers/api/controllers/files.py - > reaches line 156, trigger word "filter(": - folder_access = Folder.filter('id''creator'parent_iduser_id) - - - -on3iro/cookiecutter-flask -https://github.com/on3iro/cookiecutter-flask -Entry file: cookiecutter-flask/{{cookiecutter.app_name}}/{{cookiecutter.app_name}}/app.py -Scanned: 2016-10-25 15:34:46.966186 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -benman1/tensorflow_flask -https://github.com/benman1/tensorflow_flask -Entry file: tensorflow_flask/api.py -Scanned: 2016-10-25 15:34:48.288966 -No vulnerabilities found. - - -remcohaszing/flask-openapi -https://github.com/remcohaszing/flask-openapi -Entry file: flask-openapi/example/app.py -Scanned: 2016-10-25 15:34:50.328285 -No vulnerabilities found. - - -lechain/flaskr -https://github.com/lechain/flaskr -Entry file: None -Scanned: 2016-10-25 15:34:50.848629 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lechain/flaskr. - -penglee87/flaskr -https://github.com/penglee87/flaskr -Entry file: None -Scanned: 2016-10-25 15:34:51.379314 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/penglee87/flaskr. - -asimonia/Flaskbook -https://github.com/asimonia/Flaskbook -Entry file: Flaskbook/application.py -Scanned: 2016-10-25 15:34:52.851476 -Vulnerability 1: -File: Flaskbook/user/views.py - > User input at line 39, trigger word ".data": - user = User.objects.filter(username=form.username.data).first() -File: Flaskbook/user/views.py - > reaches line 39, trigger word "filter(": - user = User.objects.filter(username=form.username.data).first() - -Vulnerability 2: -File: Flaskbook/user/views.py - > User input at line 46, trigger word "get(": - next = session.get('next') -Reassigned in: - File: Flaskbook/user/views.py - > Line 50: ret_MAYBE_FUNCTION_NAME = 'User logged in' - File: Flaskbook/user/views.py - > Line 53: ret_MAYBE_FUNCTION_NAME = render_template('user/login.html',form=form, error=error) -File: Flaskbook/user/views.py - > reaches line 48, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - - - -rouzazari/flaskfirst -https://github.com/rouzazari/flaskfirst -Entry file: flaskfirst/app/__init__.py -Scanned: 2016-10-25 15:34:54.168200 -No vulnerabilities found. - - -smilemlz/flasktest -https://github.com/smilemlz/flasktest -Entry file: flasktest/testem.py -Scanned: 2016-10-25 15:34:55.470460 -No vulnerabilities found. - - -Runningdogs/flasky -https://github.com/Runningdogs/flasky -Entry file: None -Scanned: 2016-10-25 15:34:55.988341 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Markmwaura/Flaskblog -https://github.com/Markmwaura/Flaskblog -Entry file: Flaskblog/app/__init__.py -Scanned: 2016-10-25 15:34:58.252311 -No vulnerabilities found. - - -YaleYeah/flasky -https://github.com/YaleYeah/flasky -Entry file: None -Scanned: 2016-10-25 15:34:58.797599 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -seizans/flasko -https://github.com/seizans/flasko -Entry file: flasko/main.py -Scanned: 2016-10-25 15:35:00.134191 -No vulnerabilities found. - - -faridalrafi/flaskopencv -https://github.com/faridalrafi/flaskopencv -Entry file: flaskopencv/app.py -Scanned: 2016-10-25 15:35:04.042439 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pecone/flaskr -https://github.com/pecone/flaskr -Entry file: None -Scanned: 2016-10-25 15:35:04.585391 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pecone/flaskr. - -bencelder/flaskr -https://github.com/bencelder/flaskr -Entry file: None -Scanned: 2016-10-25 15:35:15.232160 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/bencelder/flaskr. - -vennyk/flasktaskr -https://github.com/vennyk/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:35:17.765391 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -akjanik/flasktutorial -https://github.com/akjanik/flasktutorial -Entry file: None -Scanned: 2016-10-25 15:35:19.333979 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/akjanik/flasktutorial. - -EenTang/flaskdev -https://github.com/EenTang/flaskdev -Entry file: None -Scanned: 2016-10-25 15:35:33.593319 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hyteer/flaskdemo -https://github.com/hyteer/flaskdemo -Entry file: None -Scanned: 2016-10-25 15:35:34.238419 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lxw15337674/flasklearn -https://github.com/lxw15337674/flasklearn -Entry file: flasklearn/flasklearn.py -Scanned: 2016-10-25 15:35:44.282615 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -liangfei2016x/flaskweb -https://github.com/liangfei2016x/flaskweb -Entry file: None -Scanned: 2016-10-25 15:35:54.891929 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mcquam/flasktaskr -https://github.com/mcquam/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:35:55.446914 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Sventenhaaf/flasktries -https://github.com/Sventenhaaf/flasktries -Entry file: flasktries/app.py -Scanned: 2016-10-25 15:36:02.600217 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasktries/env/lib/python2.7/sre_compile.py - -munendrasn/Flaskr -https://github.com/munendrasn/Flaskr -Entry file: Flaskr/flaskr/flaskr.py -Scanned: 2016-10-25 15:36:04.036913 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Eyali1001/flaskcalculator -https://github.com/Eyali1001/flaskcalculator -Entry file: flaskcalculator/calculator.py -Scanned: 2016-10-25 15:36:05.383829 -Vulnerability 1: -File: flaskcalculator/calculator.py - > User input at line 14, trigger word "form[": - result = int(request.form['title']) + int(request.form['text']) -File: flaskcalculator/calculator.py - > reaches line 15, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultpage.html',result=result) - - - -babydeya/flaskr -https://github.com/babydeya/flaskr -Entry file: None -Scanned: 2016-10-25 15:36:05.918624 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/babydeya/flaskr. - -rouzazari/flaskangular -https://github.com/rouzazari/flaskangular -Entry file: flaskangular/app/__init__.py -Scanned: 2016-10-25 15:36:07.323349 -No vulnerabilities found. - - -yantiz/flasktaskr -https://github.com/yantiz/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:36:07.992067 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nocotan/flaski -https://github.com/nocotan/flaski -Entry file: flaski/app.py -Scanned: 2016-10-25 15:36:09.400440 -No vulnerabilities found. - - -berezovskiydenis/flasktaskr -https://github.com/berezovskiydenis/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:36:09.934808 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -freakxx/flaskdemo -https://github.com/freakxx/flaskdemo -Entry file: None -Scanned: 2016-10-25 15:36:10.471366 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Baindaer/flaskr -https://github.com/Baindaer/flaskr -Entry file: None -Scanned: 2016-10-25 15:36:10.983919 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Baindaer/flaskr. - -lindentao/flaskr -https://github.com/lindentao/flaskr -Entry file: None -Scanned: 2016-10-25 15:36:11.538964 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lindentao/flaskr. - -demory191/flasktaskr -https://github.com/demory191/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:36:12.111405 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Daylightmazekun/flaskfollow -https://github.com/Daylightmazekun/flaskfollow -Entry file: flaskfollow/app/__init__.py -Scanned: 2016-10-25 15:36:14.040781 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -0x24a537r9/flasktest -https://github.com/0x24a537r9/flasktest -Entry file: flasktest/polling_monitor.py -Scanned: 2016-10-25 15:36:15.357543 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -trevorwitter/flaskr -https://github.com/trevorwitter/flaskr -Entry file: None -Scanned: 2016-10-25 15:36:15.882874 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/trevorwitter/flaskr. - -caser789/flaskrr -https://github.com/caser789/flaskrr -Entry file: flaskrr/flaskr/flaskr.py -Scanned: 2016-10-25 15:36:17.224644 -No vulnerabilities found. - - -xuxiaoxing/flasky -https://github.com/xuxiaoxing/flasky -Entry file: None -Scanned: 2016-10-25 15:36:17.742779 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tw7613781/flasky -https://github.com/tw7613781/flasky -Entry file: None -Scanned: 2016-10-25 15:36:18.313114 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zhang555/flasky -https://github.com/zhang555/flasky -Entry file: None -Scanned: 2016-10-25 15:36:19.063410 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fiezwang/flasky -https://github.com/fiezwang/flasky -Entry file: None -Scanned: 2016-10-25 15:36:19.708524 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -swdmike/flasky -https://github.com/swdmike/flasky -Entry file: None -Scanned: 2016-10-25 15:36:20.222226 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -manuellah/flaskapp -https://github.com/manuellah/flaskapp -Entry file: None -Scanned: 2016-10-25 15:36:20.749413 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/manuellah/flaskapp. - -musarahm/flaskbook -https://github.com/musarahm/flaskbook -Entry file: flaskbook/application.py -Scanned: 2016-10-25 15:36:22.358044 -Vulnerability 1: -File: flaskbook/home/views.py - > User input at line 15, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/home/views.py - > Line 30: ret_MAYBE_FUNCTION_NAME = 'Welcome to Flaskbook!' -File: flaskbook/home/views.py - > reaches line 15, trigger word "filter(": - user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 2: -File: flaskbook/home/views.py - > User input at line 15, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/home/views.py - > Line 30: ret_MAYBE_FUNCTION_NAME = 'Welcome to Flaskbook!' -File: flaskbook/home/views.py - > reaches line 19, trigger word "filter(": - feed_messages = Feed.objects.filter(user=user).order_by('-create_date')[10] - -Vulnerability 3: -File: flaskbook/home/views.py - > User input at line 15, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/home/views.py - > Line 30: ret_MAYBE_FUNCTION_NAME = 'Welcome to Flaskbook!' -File: flaskbook/home/views.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home/feed_home.html',user=user, form=form, feed_messages=feed_messages) - -Vulnerability 4: -File: flaskbook/relationship/views.py - > User input at line 14, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 18: rel = Relationship.get_relationship(logged_user, to_user) - File: flaskbook/relationship/views.py - > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user) -File: flaskbook/relationship/views.py - > reaches line 14, trigger word "filter(": - logged_user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 5: -File: flaskbook/relationship/views.py - > User input at line 14, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 18: rel = Relationship.get_relationship(logged_user, to_user) - File: flaskbook/relationship/views.py - > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user) -File: flaskbook/relationship/views.py - > reaches line 41, trigger word "render_template(": - body_html = render_template('mail/relationship/added_friend.html',from_user=logged_user, to_user=to_user) - -Vulnerability 6: -File: flaskbook/relationship/views.py - > User input at line 14, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 18: rel = Relationship.get_relationship(logged_user, to_user) - File: flaskbook/relationship/views.py - > Line 27: reverse_rel = Relationship.objects.get(from_user=to_user, to_user=logged_user) -File: flaskbook/relationship/views.py - > reaches line 46, trigger word "render_template(": - body_text = render_template('mail/relationship/added_friend.txt',from_user=logged_user, to_user=to_user) - -Vulnerability 7: -File: flaskbook/relationship/views.py - > User input at line 67, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 71: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 67, trigger word "filter(": - logged_user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 8: -File: flaskbook/relationship/views.py - > User input at line 67, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 71: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 74, trigger word "filter(": - rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete() - -Vulnerability 9: -File: flaskbook/relationship/views.py - > User input at line 67, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 71: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 77, trigger word "filter(": - reverse_rel = Relationship.objects.filter(from_user=to_user, to_user=logged_user).delete() - -Vulnerability 10: -File: flaskbook/relationship/views.py - > User input at line 91, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 95: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 91, trigger word "filter(": - logged_user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 11: -File: flaskbook/relationship/views.py - > User input at line 91, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 95: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 99, trigger word "filter(": - rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete() - -Vulnerability 12: -File: flaskbook/relationship/views.py - > User input at line 91, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 95: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 102, trigger word "filter(": - reverse_rel = Relationship.objects.filter(from_user=to_user, to_user=logged_user).delete() - -Vulnerability 13: -File: flaskbook/relationship/views.py - > User input at line 123, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 127: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 123, trigger word "filter(": - logged_user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 14: -File: flaskbook/relationship/views.py - > User input at line 123, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/relationship/views.py - > Line 127: rel = Relationship.get_relationship(logged_user, to_user) -File: flaskbook/relationship/views.py - > reaches line 131, trigger word "filter(": - rel = Relationship.objects.filter(from_user=logged_user, to_user=to_user).delete() - -Vulnerability 15: -File: flaskbook/user/views.py - > User input at line 25, trigger word ".data": - hashed_password = bcrypt.hashpw(form.password.data, salt) -Reassigned in: - File: flaskbook/user/views.py - > Line 27: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code) -File: flaskbook/user/views.py - > reaches line 40, trigger word "render_template(": - body_html = render_template('mail/user/register.html',user=user) - -Vulnerability 16: -File: flaskbook/user/views.py - > User input at line 27, trigger word ".data": - user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code) -File: flaskbook/user/views.py - > reaches line 40, trigger word "render_template(": - body_html = render_template('mail/user/register.html',user=user) - -Vulnerability 17: -File: flaskbook/user/views.py - > User input at line 25, trigger word ".data": - hashed_password = bcrypt.hashpw(form.password.data, salt) -Reassigned in: - File: flaskbook/user/views.py - > Line 27: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code) -File: flaskbook/user/views.py - > reaches line 41, trigger word "render_template(": - body_text = render_template('mail/user/register.txt',user=user) - -Vulnerability 18: -File: flaskbook/user/views.py - > User input at line 27, trigger word ".data": - user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.data.lower()code) -File: flaskbook/user/views.py - > reaches line 41, trigger word "render_template(": - body_text = render_template('mail/user/register.txt',user=user) - -Vulnerability 19: -File: flaskbook/user/views.py - > User input at line 57, trigger word ".data": - user = User.objects.filter(username=form.username.data).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 70: user = None -File: flaskbook/user/views.py - > reaches line 57, trigger word "filter(": - user = User.objects.filter(username=form.username.data).first() - -Vulnerability 20: -File: flaskbook/user/views.py - > User input at line 64, trigger word "get(": - next = session.get('next') -Reassigned in: - File: flaskbook/user/views.py - > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home_app.home')) - File: flaskbook/user/views.py - > Line 73: ret_MAYBE_FUNCTION_NAME = render_template('user/login.html',form=form, error=error) -File: flaskbook/user/views.py - > reaches line 66, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - -Vulnerability 21: -File: flaskbook/user/views.py - > User input at line 92, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 84: logged_user = None - File: flaskbook/user/views.py - > Line 93: rel = Relationship.get_relationship(logged_user, user) - File: flaskbook/user/views.py - > Line 85: rel = None -File: flaskbook/user/views.py - > reaches line 92, trigger word "filter(": - logged_user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 22: -File: flaskbook/user/views.py - > User input at line 92, trigger word "get(": - logged_user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 84: logged_user = None - File: flaskbook/user/views.py - > Line 93: rel = Relationship.get_relationship(logged_user, user) - File: flaskbook/user/views.py - > Line 85: rel = None -File: flaskbook/user/views.py - > reaches line 118, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user/profile.html',user=user, logged_user=logged_user, rel=rel, friends=friends, friends_total=friends_total, friends_page=friends_page, form=form, profile_messages=profile_messages) - -Vulnerability 23: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 136, trigger word "filter(": - user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 24: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 148, trigger word "filter(": - if User.objects.filter(username=form.username.data.lower()).first(): - -Vulnerability 25: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 154, trigger word "filter(": - if User.objects.filter(email=form.email.data.lower()).first(): - -Vulnerability 26: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 168, trigger word "render_template(": - body_html = render_template('mail/user/change_email.html',user=user) - -Vulnerability 27: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 169, trigger word "render_template(": - body_text = render_template('mail/user/change_email.txt',user=user) - -Vulnerability 28: -File: flaskbook/user/views.py - > User input at line 136, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 138: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 143: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 144: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 146: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 164: form.email.data = user.email - File: flaskbook/user/views.py - > Line 175: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 141: image_ts = None -File: flaskbook/user/views.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user/edit.html',form=form, error=error, message=message, user=user) - -Vulnerability 29: -File: flaskbook/user/views.py - > User input at line 203, trigger word ".data": - user = User.objects.filter(email=form.email.data.lower()).first() -File: flaskbook/user/views.py - > reaches line 203, trigger word "filter(": - user = User.objects.filter(email=form.email.data.lower()).first() - -Vulnerability 30: -File: flaskbook/user/views.py - > User input at line 203, trigger word ".data": - user = User.objects.filter(email=form.email.data.lower()).first() -File: flaskbook/user/views.py - > reaches line 212, trigger word "render_template(": - body_html = render_template('mail/user/password_reset.html',user=user) - -Vulnerability 31: -File: flaskbook/user/views.py - > User input at line 203, trigger word ".data": - user = User.objects.filter(email=form.email.data.lower()).first() -File: flaskbook/user/views.py - > reaches line 213, trigger word "render_template(": - body_text = render_template('mail/user/password_reset.txt',user=user) - -Vulnerability 32: -File: flaskbook/user/views.py - > User input at line 261, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -File: flaskbook/user/views.py - > reaches line 261, trigger word "filter(": - user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 33: -File: flaskbook/feed/views.py - > User input at line 33, trigger word "get(": - from_user = User.objects.get(username=session.get('username')) -Reassigned in: - File: flaskbook/feed/views.py - > Line 73: ret_MAYBE_FUNCTION_NAME = 'Error!' - File: flaskbook/feed/views.py - > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(ref) -File: flaskbook/feed/views.py - > reaches line 70, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_app.profile',username=from_user.username)) - -Vulnerability 34: -File: flaskbook/feed/views.py - > User input at line 33, trigger word "get(": - from_user = User.objects.get(username=session.get('username')) -Reassigned in: - File: flaskbook/feed/views.py - > Line 73: ret_MAYBE_FUNCTION_NAME = 'Error!' - File: flaskbook/feed/views.py - > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(ref) -File: flaskbook/feed/views.py - > reaches line 70, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_app.profile',username=from_user.username)) - -Vulnerability 35: -File: flaskbook/feed/views.py - > User input at line 119, trigger word "get(": - from_user = User.objects.get(username=session.get('username')) -File: flaskbook/feed/views.py - > reaches line 122, trigger word "filter(": - existing_like = Message.objects.filter(parent=message_id, message_type=LIKE, from_user=from_user).count() - - - -HJeongWon/flaskr -https://github.com/HJeongWon/flaskr -Entry file: None -Scanned: 2016-10-25 15:36:23.030946 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/HJeongWon/flaskr. - -ChuckiePae/flaskr -https://github.com/ChuckiePae/flaskr -Entry file: None -Scanned: 2016-10-25 15:36:23.589978 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ChuckiePae/flaskr. - -qhdong/flasky -https://github.com/qhdong/flasky -Entry file: None -Scanned: 2016-10-25 15:36:27.104015 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wuqingwuqingwu/flaskk -https://github.com/wuqingwuqingwu/flaskk -Entry file: flaskk/chapter3a.py -Scanned: 2016-10-25 15:36:42.025078 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskk/venv/lib/python2.7/sre_compile.py - -oscarnyl/flaskpost -https://github.com/oscarnyl/flaskpost -Entry file: flaskpost/flaskpost/__init__.py -Scanned: 2016-10-25 15:36:46.567566 -No vulnerabilities found. - - -linjialongmao/flasky -https://github.com/linjialongmao/flasky -Entry file: None -Scanned: 2016-10-25 15:36:56.106470 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -algalanb/flaskapp -https://github.com/algalanb/flaskapp -Entry file: None -Scanned: 2016-10-25 15:36:56.617738 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/algalanb/flaskapp. - -Unknown22/Flaskr -https://github.com/Unknown22/Flaskr -Entry file: Flaskr/flaskr.py -Scanned: 2016-10-25 15:37:05.054589 -No vulnerabilities found. - - -sinwar/flaskr -https://github.com/sinwar/flaskr -Entry file: None -Scanned: 2016-10-25 15:37:05.597890 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sinwar/flaskr. - -lux600/flasktest -https://github.com/lux600/flasktest -Entry file: flasktest/hello_world.py -Scanned: 2016-10-25 15:37:11.237442 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -AdamWawrow/flasktaskr -https://github.com/AdamWawrow/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:37:11.813926 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -KamiNoSierhej/flaskkk -https://github.com/KamiNoSierhej/flaskkk -Entry file: flaskkk/flaskkk/Polczan.py -Scanned: 2016-10-25 15:37:13.278581 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -reed-chi/flasktaskr -https://github.com/reed-chi/flasktaskr -Entry file: None -Scanned: 2016-10-25 15:37:13.821754 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Katebasoft/Flaskr -https://github.com/Katebasoft/Flaskr -Entry file: None -Scanned: 2016-10-25 15:37:21.746637 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zangree/flaskytest -https://github.com/zangree/flaskytest -Entry file: flaskytest/app_manager.py -Scanned: 2016-10-25 15:37:23.141729 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -he1chenglong/flasktest -https://github.com/he1chenglong/flasktest -Entry file: flasktest/code/02template/flaskapp.py -Scanned: 2016-10-25 15:37:24.998174 -No vulnerabilities found. - - -omegayang/flasklearn -https://github.com/omegayang/flasklearn -Entry file: flasklearn/app/__init__.py -Scanned: 2016-10-25 15:37:26.742959 -Vulnerability 1: -File: flasklearn/app/main/views.py - > User input at line 64, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasklearn/app/main/views.py - > Line 65: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasklearn/app/main/views.py - > Line 68: posts = pagination.items - File: flasklearn/app/main/views.py - > Line 63: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasklearn/app/main/views.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: flasklearn/app/main/views.py - > User input at line 126, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasklearn/app/main/views.py - > Line 127: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasklearn/app/main/views.py - > Line 130: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flasklearn/app/main/views.py - > Line 125: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasklearn/app/main/views.py - > reaches line 132, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 3: -File: flasklearn/app/main/views.py - > User input at line 141, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasklearn/app/main/views.py - > Line 142: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasklearn/app/main/views.py - > Line 145: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flasklearn/app/main/views.py - > Line 140: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasklearn/app/main/views.py - > reaches line 147, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by ', endpoint='.followed_by', pagination=pagination, follows=follows) - - - -ranchow/flaskapp -https://github.com/ranchow/flaskapp -Entry file: None -Scanned: 2016-10-25 15:37:27.304905 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ranchow/flaskapp. - -lassegit/flask-reactjs -https://github.com/lassegit/flask-reactjs -Entry file: None -Scanned: 2016-10-25 15:37:30.490623 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lassegit/flask-reactjs. - -vimalloc/flask-jwt-extended -https://github.com/vimalloc/flask-jwt-extended -Entry file: flask-jwt-extended/tests/test_blacklist.py -Scanned: 2016-10-25 15:37:32.788891 -No vulnerabilities found. - - -timmyreilly/introduction-to-flask -https://github.com/timmyreilly/introduction-to-flask -Entry file: introduction-to-flask/hello.py -Scanned: 2016-10-25 15:37:35.113260 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -cuttlesoft/flask-workshop -https://github.com/cuttlesoft/flask-workshop -Entry file: flask-workshop/app/__init__.py -Scanned: 2016-10-25 15:37:38.698193 -No vulnerabilities found. - - -iamdavidmt/flask -https://github.com/iamdavidmt/flask -Entry file: None -Scanned: 2016-10-25 15:37:39.235601 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DIYer22/flask -https://github.com/DIYer22/flask -Entry file: None -Scanned: 2016-10-25 15:37:39.782257 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -woowooh/flask -https://github.com/woowooh/flask -Entry file: None -Scanned: 2016-10-25 15:37:40.310767 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jacksonyoudi/flask -https://github.com/jacksonyoudi/flask -Entry file: None -Scanned: 2016-10-25 15:37:41.365602 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jamesd3ao/Flask -https://github.com/jamesd3ao/Flask -Entry file: None -Scanned: 2016-10-25 15:37:41.931208 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -YellowGB/Flask -https://github.com/YellowGB/Flask -Entry file: None -Scanned: 2016-10-25 15:37:42.598234 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -konwan/flask -https://github.com/konwan/flask -Entry file: None -Scanned: 2016-10-25 15:37:43.185491 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lsyff210/flask -https://github.com/lsyff210/flask -Entry file: None -Scanned: 2016-10-25 15:37:43.977575 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dalyddaly/flask -https://github.com/dalyddaly/flask -Entry file: None -Scanned: 2016-10-25 15:37:44.566033 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Carryopendoor1/flask -https://github.com/Carryopendoor1/flask -Entry file: None -Scanned: 2016-10-25 15:37:46.145807 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CliveCullen/flask -https://github.com/CliveCullen/flask -Entry file: None -Scanned: 2016-10-25 15:37:56.670646 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jasondebolt/flask -https://github.com/jasondebolt/flask -Entry file: None -Scanned: 2016-10-25 15:37:57.222967 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rdeeds/flask -https://github.com/rdeeds/flask -Entry file: None -Scanned: 2016-10-25 15:38:04.737807 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nsuJolie/flask -https://github.com/nsuJolie/flask -Entry file: None -Scanned: 2016-10-25 15:38:06.271669 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mod2695/flask -https://github.com/mod2695/flask -Entry file: None -Scanned: 2016-10-25 15:38:06.888142 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rionagreally/Flask -https://github.com/rionagreally/Flask -Entry file: None -Scanned: 2016-10-25 15:38:12.413536 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zhaokefei/flask -https://github.com/zhaokefei/flask -Entry file: None -Scanned: 2016-10-25 15:38:12.926238 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -djjjj/flask -https://github.com/djjjj/flask -Entry file: None -Scanned: 2016-10-25 15:38:14.444630 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -xjr7670/flask -https://github.com/xjr7670/flask -Entry file: None -Scanned: 2016-10-25 15:38:15.009614 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -k9imJ/flask -https://github.com/k9imJ/flask -Entry file: None -Scanned: 2016-10-25 15:38:15.540520 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -berstearns/flask -https://github.com/berstearns/flask -Entry file: None -Scanned: 2016-10-25 15:38:23.060845 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fortune599/flask -https://github.com/fortune599/flask -Entry file: None -Scanned: 2016-10-25 15:38:24.611268 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yueqingwang/flask -https://github.com/yueqingwang/flask -Entry file: None -Scanned: 2016-10-25 15:38:26.167163 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -minglan01/flask -https://github.com/minglan01/flask -Entry file: None -Scanned: 2016-10-25 15:38:27.740875 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kkltcjk/flask -https://github.com/kkltcjk/flask -Entry file: None -Scanned: 2016-10-25 15:38:28.288990 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tcyfs/flask -https://github.com/tcyfs/flask -Entry file: None -Scanned: 2016-10-25 15:38:29.810110 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -arcVyas/flask -https://github.com/arcVyas/flask -Entry file: None -Scanned: 2016-10-25 15:38:31.330114 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sakuuat/Flask -https://github.com/sakuuat/Flask -Entry file: None -Scanned: 2016-10-25 15:38:33.852028 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lastone9182/flask -https://github.com/lastone9182/flask -Entry file: None -Scanned: 2016-10-25 15:38:36.376124 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -juliascript/Flask -https://github.com/juliascript/Flask -Entry file: None -Scanned: 2016-10-25 15:38:39.912836 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -larry1994/flask -https://github.com/larry1994/flask -Entry file: None -Scanned: 2016-10-25 15:38:40.481591 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jyntran/flask -https://github.com/jyntran/flask -Entry file: None -Scanned: 2016-10-25 15:38:40.990479 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jience/flask -https://github.com/jience/flask -Entry file: None -Scanned: 2016-10-25 15:38:41.510765 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mayurvaidya09/Flask -https://github.com/mayurvaidya09/Flask -Entry file: None -Scanned: 2016-10-25 15:38:42.055610 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -harryjia/flask -https://github.com/harryjia/flask -Entry file: None -Scanned: 2016-10-25 15:38:42.620298 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -randm-/flask -https://github.com/randm-/flask -Entry file: None -Scanned: 2016-10-25 15:38:43.136224 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -davinbutler/flask -https://github.com/davinbutler/flask -Entry file: None -Scanned: 2016-10-25 15:38:43.651891 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Gershine/Flask -https://github.com/Gershine/Flask -Entry file: None -Scanned: 2016-10-25 15:38:44.176792 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rahulVudutala/flask -https://github.com/rahulVudutala/flask -Entry file: None -Scanned: 2016-10-25 15:38:44.710057 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jesusalatorre/Flask -https://github.com/jesusalatorre/Flask -Entry file: None -Scanned: 2016-10-25 15:38:46.263619 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sanie4eg/Flask -https://github.com/sanie4eg/Flask -Entry file: None -Scanned: 2016-10-25 15:38:56.794846 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -skraiman/flask -https://github.com/skraiman/flask -Entry file: None -Scanned: 2016-10-25 15:38:57.313242 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -g00302826/Flask -https://github.com/g00302826/Flask -Entry file: None -Scanned: 2016-10-25 15:39:04.863705 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ricardonhuang/flask -https://github.com/ricardonhuang/flask -Entry file: None -Scanned: 2016-10-25 15:39:06.435243 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cmeisinger/flask -https://github.com/cmeisinger/flask -Entry file: None -Scanned: 2016-10-25 15:39:07.044457 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -vojtahelle/flask -https://github.com/vojtahelle/flask -Entry file: None -Scanned: 2016-10-25 15:39:12.563003 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Morfyo/Flask -https://github.com/Morfyo/Flask -Entry file: None -Scanned: 2016-10-25 15:39:13.841675 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hamdimuzakkiy/Flask -https://github.com/hamdimuzakkiy/Flask -Entry file: None -Scanned: 2016-10-25 15:39:15.373975 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -VishnuArukat/flask -https://github.com/VishnuArukat/flask -Entry file: None -Scanned: 2016-10-25 15:39:23.887201 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fushouhai/flask -https://github.com/fushouhai/flask -Entry file: None -Scanned: 2016-10-25 15:39:25.401395 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -darylkeane/flask -https://github.com/darylkeane/flask -Entry file: None -Scanned: 2016-10-25 15:39:26.927311 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Tangugo/flask -https://github.com/Tangugo/flask -Entry file: None -Scanned: 2016-10-25 15:39:28.442990 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bharatsush/flask -https://github.com/bharatsush/flask -Entry file: None -Scanned: 2016-10-25 15:39:28.963141 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -LittltZhao/Flask -https://github.com/LittltZhao/Flask -Entry file: None -Scanned: 2016-10-25 15:39:30.494947 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sadscv/flask -https://github.com/sadscv/flask -Entry file: None -Scanned: 2016-10-25 15:39:32.002567 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chenlei28695/flask -https://github.com/chenlei28695/flask -Entry file: None -Scanned: 2016-10-25 15:39:34.584968 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -I-am-Gabi/flask-minicurso -https://github.com/I-am-Gabi/flask-minicurso -Entry file: flask-minicurso/minicurso-flask.py -Scanned: 2016-10-25 15:39:39.553399 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhangheli/flask-google -https://github.com/zhangheli/flask-google -Entry file: flask-google/g.py -Scanned: 2016-10-25 15:39:40.869318 -No vulnerabilities found. - - -arpitbbhayani/flasksr -https://github.com/arpitbbhayani/flasksr -Entry file: flasksr/examples/basicsr.py -Scanned: 2016-10-25 15:39:42.268533 -No vulnerabilities found. - - -bellcodo/fisrt-flask-app -https://github.com/bellcodo/fisrt-flask-app -Entry file: fisrt-flask-app/hello_app.py -Scanned: 2016-10-25 15:39:43.561876 -No vulnerabilities found. - - -lk-geimfari/flask_church -https://github.com/lk-geimfari/flask_church -Entry file: flask_church/example.py -Scanned: 2016-10-25 15:39:45.125775 -No vulnerabilities found. - - -padznich/_flask -https://github.com/padznich/_flask -Entry file: _flask/proj_5_TDD_1/app.py -Scanned: 2016-10-25 15:39:46.585218 -No vulnerabilities found. - - -EverestYAO/flask-blog -https://github.com/EverestYAO/flask-blog -Entry file: flask-blog/flask/Scripts/flask-blog/app/__init__.py -Scanned: 2016-10-25 15:39:48.575573 -Vulnerability 1: -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > User input at line 19, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 20: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 23: posts = pagination.items - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 31: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 33: posts = pagination.items - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > User input at line 26, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 24: show_followed = False - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > User input at line 96, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 98: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 100: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 103: comments = pagination.items - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 95: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > reaches line 104, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > User input at line 160, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 161: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 163: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 159: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > reaches line 164, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of ', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > User input at line 173, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 174: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 177: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 172: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > reaches line 179, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > User input at line 201, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 202: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > Line 204: comments = pagination.items -File: flask-blog/flask/Scripts/flask-blog/app/main/views.py - > reaches line 205, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -pandapan0021/myblog -https://github.com/pandapan0021/myblog -Entry file: None -Scanned: 2016-10-25 15:39:57.133608 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -qwertypomy/flask-example-app -https://github.com/qwertypomy/flask-example-app -Entry file: flask-example-app/app.py -Scanned: 2016-10-25 15:40:02.879970 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -Millyn/uFlask -https://github.com/Millyn/uFlask -Entry file: uFlask/project/__init__.py -Scanned: 2016-10-25 15:40:04.415110 -No vulnerabilities found. - - -hit9/flask-idempotent2 -https://github.com/hit9/flask-idempotent2 -Entry file: flask-idempotent2/example.py -Scanned: 2016-10-25 15:40:05.967900 -No vulnerabilities found. - - -rofrano/nyu-lab-restful-flask -https://github.com/rofrano/nyu-lab-restful-flask -Entry file: nyu-lab-restful-flask/server.py -Scanned: 2016-10-25 15:40:07.362847 -No vulnerabilities found. - - -Sthacks/sthacksWebsite -https://github.com/Sthacks/sthacksWebsite -Entry file: sthacksWebsite/app.py -Scanned: 2016-10-25 15:40:09.461069 -No vulnerabilities found. - - -on3iro/cookiecutter-flask -https://github.com/on3iro/cookiecutter-flask -Entry file: cookiecutter-flask/{{cookiecutter.app_name}}/{{cookiecutter.app_name}}/app.py -Scanned: 2016-10-25 15:40:11.130094 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mmarconm/flask_templates -https://github.com/mmarconm/flask_templates -Entry file: flask_templates/app.py -Scanned: 2016-10-25 15:40:13.451876 -No vulnerabilities found. - - -AminHP/flask-mvc -https://github.com/AminHP/flask-mvc -Entry file: flask-mvc/project/application.py -Scanned: 2016-10-25 15:40:14.889815 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jkaberg/tvhProxy -https://github.com/jkaberg/tvhProxy -Entry file: tvhProxy/tvhProxy.py -Scanned: 2016-10-25 15:40:16.292469 -No vulnerabilities found. - - -DanielTimLee/flask_tutorial -https://github.com/DanielTimLee/flask_tutorial -Entry file: None -Scanned: 2016-10-25 15:40:17.820319 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/DanielTimLee/flask_tutorial. - -atomist-project-templates/flask-service -https://github.com/atomist-project-templates/flask-service -Entry file: flask-service/flask_service/__init__.py -Scanned: 2016-10-25 15:40:19.333442 -Vulnerability 1: -File: flask-service/flask_service/tests/test_main_views.py - > User input at line 10, trigger word "get(": - res = client.get(url_for('main_app.swagger')) -File: flask-service/flask_service/tests/test_main_views.py - > reaches line 10, trigger word "url_for(": - res = client.get(url_for('main_app.swagger')) - -Vulnerability 2: -File: flask-service/flask_service/my_app/tests/test_views.py - > User input at line 6, trigger word "get(": - res = client.get(url_for('my_app_app.index')) -File: flask-service/flask_service/my_app/tests/test_views.py - > reaches line 6, trigger word "url_for(": - res = client.get(url_for('my_app_app.index')) - - - -EenTang/flaskdev -https://github.com/EenTang/flaskdev -Entry file: None -Scanned: 2016-10-25 15:40:19.851994 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -martyni/flaskstrap -https://github.com/martyni/flaskstrap -Entry file: flaskstrap/flaskstrap/app.py -Scanned: 2016-10-25 15:40:25.716084 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ramramu3433/flaskapp -https://github.com/ramramu3433/flaskapp -Entry file: None -Scanned: 2016-10-25 15:40:26.235197 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ramramu3433/flaskapp. - -irritant/flasktory -https://github.com/irritant/flasktory -Entry file: flasktory/template/app/__init__.py -Scanned: 2016-10-25 15:40:28.610347 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -naviplay/flasktutorial -https://github.com/naviplay/flasktutorial -Entry file: None -Scanned: 2016-10-25 15:40:29.140120 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/naviplay/flasktutorial. - -MagicRoc/flaskoc -https://github.com/MagicRoc/flaskoc -Entry file: flaskoc/hello.py -Scanned: 2016-10-25 15:40:30.820739 -Vulnerability 1: -File: flaskoc/app/main/views.py - > User input at line 56, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskoc/app/main/views.py - > Line 57: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskoc/app/main/views.py - > Line 60: posts = pagination.items - File: flaskoc/app/main/views.py - > Line 55: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskoc/app/main/views.py - > reaches line 61, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: flaskoc/app/main/views.py - > User input at line 72, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskoc/app/main/views.py - > Line 73: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskoc/app/main/views.py - > Line 76: posts = pagination.items -File: flaskoc/app/main/views.py - > reaches line 77, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - - - -kaish5536/Flaskr -https://github.com/kaish5536/Flaskr -Entry file: None -Scanned: 2016-10-25 15:40:31.349790 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sanjayankur31/flaskr -https://github.com/sanjayankur31/flaskr -Entry file: None -Scanned: 2016-10-25 15:40:32.902278 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanjayankur31/flaskr. - -shalev67/flasky -https://github.com/shalev67/flasky -Entry file: None -Scanned: 2016-10-25 15:40:35.472456 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -isyippee/flasky -https://github.com/isyippee/flasky -Entry file: None -Scanned: 2016-10-25 15:40:37.986897 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mwoo99/flasktemplate -https://github.com/mwoo99/flasktemplate -Entry file: flasktemplate/flask_template.py -Scanned: 2016-10-25 15:40:41.348043 -No vulnerabilities found. - - -ChrisDBrooks/flaskbyexample -https://github.com/ChrisDBrooks/flaskbyexample -Entry file: flaskbyexample/hello.py -Scanned: 2016-10-25 15:40:42.678284 -No vulnerabilities found. - - -mkykadir/flaskrofficialtut -https://github.com/mkykadir/flaskrofficialtut -Entry file: flaskrofficialtut/flaskr.py -Scanned: 2016-10-25 15:40:44.043829 -No vulnerabilities found. - - -rbunch-dc/flasksql -https://github.com/rbunch-dc/flasksql -Entry file: flasksql/flaskMysql.py -Scanned: 2016-10-25 15:40:47.296219 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -yorolifarg/flasksample -https://github.com/yorolifarg/flasksample -Entry file: flasksample/chapter2/app.py -Scanned: 2016-10-25 15:40:50.960304 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pradyumnac/flasklearn -https://github.com/pradyumnac/flasklearn -Entry file: flasklearn/code/redisdemo.py -Scanned: 2016-10-25 15:40:52.365940 -No vulnerabilities found. - - -gd452/flask -https://github.com/gd452/flask -Entry file: None -Scanned: 2016-10-25 22:52:58.936313 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -llh335/flask -https://github.com/llh335/flask -Entry file: None -Scanned: 2016-10-25 22:52:59.461930 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bh45k4r/flask -https://github.com/bh45k4r/flask -Entry file: None -Scanned: 2016-10-25 22:52:59.983826 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -paulmin55/flask -https://github.com/paulmin55/flask -Entry file: None -Scanned: 2016-10-25 22:53:00.510000 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CarlEkerot/flask-orm -https://github.com/CarlEkerot/flask-orm -Entry file: flask-orm/webapp/__init__.py -Scanned: 2016-10-25 22:53:02.247094 -No vulnerabilities found. - - -ibininja/upload_file_python -https://github.com/ibininja/upload_file_python -Entry file: upload_file_python/src/app_display_multiple_images.py -Scanned: 2016-10-25 22:53:03.552835 -No vulnerabilities found. - - -fraoustin/flaskserver -https://github.com/fraoustin/flaskserver -Entry file: None -Scanned: 2016-10-25 22:53:04.096722 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fraoustin/flaskserver. - -ecerami/hello_flask -https://github.com/ecerami/hello_flask -Entry file: hello_flask/app.py -Scanned: 2016-10-25 22:53:05.376527 -No vulnerabilities found. - - -kai1/flasktest -https://github.com/kai1/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-25 22:53:07.086537 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -willianribeiro/flaskr -https://github.com/willianribeiro/flaskr -Entry file: None -Scanned: 2016-10-25 22:53:07.611841 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/willianribeiro/flaskr. - -StuartChristie/Flasky -https://github.com/StuartChristie/Flasky -Entry file: None -Scanned: 2016-10-25 22:53:08.112348 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/StuartChristie/Flasky. - -milinbhakta/flaskmaterialdesign -https://github.com/milinbhakta/flaskmaterialdesign -Entry file: flaskmaterialdesign/venv/Lib/site-packages/flask/sessions.py -Scanned: 2016-10-25 22:53:13.544515 -No vulnerabilities found. - - -Hellemos/flaskapp -https://github.com/Hellemos/flaskapp -Entry file: None -Scanned: 2016-10-25 22:53:14.610560 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Hellemos/flaskapp. - -ssssergey/flaskengine -https://github.com/ssssergey/flaskengine -Entry file: flaskengine/app/__init__.py -Scanned: 2016-10-25 22:53:15.991679 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -milinbhakta/flaskjinja -https://github.com/milinbhakta/flaskjinja -Entry file: flaskjinja/hello.py -Scanned: 2016-10-25 22:53:22.038783 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -saucecode/flaskcat -https://github.com/saucecode/flaskcat -Entry file: flaskcat/flaskcat.py -Scanned: 2016-10-25 22:53:23.375791 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -wiggitywalt/flasktaskr -https://github.com/wiggitywalt/flasktaskr -Entry file: None -Scanned: 2016-10-25 22:53:23.904316 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ashishkx/Flaskr -https://github.com/ashishkx/Flaskr -Entry file: None -Scanned: 2016-10-25 22:53:24.416388 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jward1/flasktaskr -https://github.com/jward1/flasktaskr -Entry file: None -Scanned: 2016-10-25 22:53:24.931689 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -schoolofcode-me/web_blog -https://github.com/schoolofcode-me/web_blog -Entry file: web_blog/src/app.py -Scanned: 2016-10-25 22:53:26.347500 -No vulnerabilities found. - - -arpm/FlaskTaskr -https://github.com/arpm/FlaskTaskr -Entry file: None -Scanned: 2016-10-25 22:53:26.882383 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/arpm/FlaskTaskr. - -iKalin/flask1 -https://github.com/iKalin/flask1 -Entry file: flask1/routes.py -Scanned: 2016-10-25 22:53:30.342007 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -iamrajhans/FlaskPYDemo -https://github.com/iamrajhans/FlaskPYDemo -Entry file: None -Scanned: 2016-10-25 22:53:31.697268 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/iamrajhans/FlaskPYDemo. - -MortalCatalyst/flaskTR -https://github.com/MortalCatalyst/flaskTR -Entry file: flaskTR/flasktaskr/views.py -Scanned: 2016-10-25 22:53:32.988051 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -QuadPiece/Quad-Devices-Two -https://github.com/QuadPiece/Quad-Devices-Two -Entry file: Quad-Devices-Two/run.py -Scanned: 2016-10-25 22:53:34.279342 -No vulnerabilities found. - - -dbunker/Flask-Tread -https://github.com/dbunker/Flask-Tread -Entry file: Flask-Tread/examples/blog/app/mainapp/__init__.py -Scanned: 2016-10-25 22:53:35.717929 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -martincalvert/GAE-Flask -https://github.com/martincalvert/GAE-Flask -Entry file: GAE-Flask/routes.py -Scanned: 2016-10-25 22:53:38.461088 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -fergyfresh/flask-staysafe -https://github.com/fergyfresh/flask-staysafe -Entry file: flask-staysafe/app/__init__.py -Scanned: 2016-10-25 22:55:02.509582 -No vulnerabilities found. - - -arvelt/hello-flask -https://github.com/arvelt/hello-flask -Entry file: hello-flask/main.py -Scanned: 2016-10-25 22:55:04.187753 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -andrewheekin/flask-metatag -https://github.com/andrewheekin/flask-metatag -Entry file: flask-metatag/app.py -Scanned: 2016-10-25 22:55:05.534757 -No vulnerabilities found. - - -Seneckiy/workwithFlask -https://github.com/Seneckiy/workwithFlask -Entry file: workwithFlask/hello.py -Scanned: 2016-10-25 22:55:07.888469 -No vulnerabilities found. - - -xuefeng-huang/flask_task -https://github.com/xuefeng-huang/flask_task -Entry file: flask_task/__init__.py -Scanned: 2016-10-25 22:55:09.253433 -No vulnerabilities found. - - -ichy-wayland/flask-temp -https://github.com/ichy-wayland/flask-temp -Entry file: flask-temp/main.py -Scanned: 2016-10-25 22:55:10.642719 -No vulnerabilities found. - - -RodrigoVillatoro/flask_blog -https://github.com/RodrigoVillatoro/flask_blog -Entry file: flask_blog/blog_app/my_app.py -Scanned: 2016-10-25 22:55:12.470274 -Vulnerability 1: -File: flask_blog/blog_app/views.py - > User input at line 42, trigger word "get(": - user_email = request.form.get('email') -File: flask_blog/blog_app/views.py - > reaches line 43, trigger word "filter(": - user = User.query.filter(User.email == user_email).first() - -Vulnerability 2: -File: flask_blog/blog_app/helpers.py - > User input at line 5, trigger word "get(": - page = request.args.get('page') -Reassigned in: - File: flask_blog/blog_app/helpers.py - > Line 7: page = int(page) - File: flask_blog/blog_app/helpers.py - > Line 9: page = 1 - File: flask_blog/blog_app/helpers.py - > Line 10: object_list = query.paginate(page, paginate_by) -File: flask_blog/blog_app/helpers.py - > reaches line 11, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template_name,object_list=object_list, context) - -Vulnerability 3: -File: flask_blog/blog_app/entries/blueprint.py - > User input at line 95, trigger word "files[": - image_file = request.files['file'] -Reassigned in: - File: flask_blog/blog_app/entries/blueprint.py - > Line 96: filename = os.path.join(app.config['IMAGES_DIR'], secure_filename(image_file.filename)) -File: flask_blog/blog_app/entries/blueprint.py - > reaches line 101, trigger word "flash(": - flash('Saved {}'.format(os.path.basename(filename)), 'success') - -Vulnerability 4: -File: flask_blog/blog_app/entries/blueprint.py - > User input at line 112, trigger word "Markup(": - markdown_body = Markup(markdown.markdown(entry.body)) -File: flask_blog/blog_app/entries/blueprint.py - > reaches line 114, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('entries/detail.html',entry=entry, form=form, markdown_body=markdown_body) - -Vulnerability 5: -File: flask_blog/blog_app/entries/forms.py - > User input at line 86, trigger word ".data": - entry = Entry.query.filter(Entry.status == Entry.STATUS_PUBLIC & Entry.id == self.entry_id.data).first() -File: flask_blog/blog_app/entries/forms.py - > reaches line 86, trigger word "filter(": - entry = Entry.query.filter(Entry.status == Entry.STATUS_PUBLIC & Entry.id == self.entry_id.data).first() - - - -patrickyoung/simple-flask -https://github.com/patrickyoung/simple-flask -Entry file: simple-flask/hello.py -Scanned: 2016-10-25 22:55:13.775921 -No vulnerabilities found. - - -sancarbar/flask-auth -https://github.com/sancarbar/flask-auth -Entry file: flask-auth/app.py -Scanned: 2016-10-25 22:55:15.056476 -No vulnerabilities found. - - -lifayi2008/my_flask -https://github.com/lifayi2008/my_flask -Entry file: my_flask/app/__init__.py -Scanned: 2016-10-25 22:55:16.491103 -No vulnerabilities found. - - -staticor/learnFlask -https://github.com/staticor/learnFlask -Entry file: None -Scanned: 2016-10-25 22:55:17.820748 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/staticor/learnFlask. - -mehmettaskiner/flask-skeleton -https://github.com/mehmettaskiner/flask-skeleton -Entry file: flask-skeleton/app.py -Scanned: 2016-10-25 22:55:19.107333 -No vulnerabilities found. - - -robin-lee/flask-tutorial -https://github.com/robin-lee/flask-tutorial -Entry file: flask-tutorial/app.py -Scanned: 2016-10-25 22:55:20.517485 -No vulnerabilities found. - - -zonzpoo/blog-flask -https://github.com/zonzpoo/blog-flask -Entry file: blog-flask/tests/hello.py -Scanned: 2016-10-25 22:55:21.943925 -No vulnerabilities found. - - -arpm/flask-blog -https://github.com/arpm/flask-blog -Entry file: None -Scanned: 2016-10-25 22:55:25.314758 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -raejoon/lype-flask -https://github.com/raejoon/lype-flask -Entry file: lype-flask/lyre.py -Scanned: 2016-10-25 22:55:26.786581 -Vulnerability 1: -File: lype-flask/lyre.py - > User input at line 239, trigger word "get(": - splid = request.args.get('spl', None) -Reassigned in: - File: lype-flask/lyre.py - > Line 252: plid = splid - File: lype-flask/lyre.py - > Line 256: videos = serv.get_videos(youtube, plid) - File: lype-flask/lyre.py - > Line 257: session['playq'] = videos - File: lype-flask/lyre.py - > Line 258: session['nowplaying'] = -1 - File: lype-flask/lyre.py - > Line 267: title = serv.get_title_from_plid(playlists, plid) - File: lype-flask/lyre.py - > Line 269: title = serv.get_title_from_plid(searched_playlists, plid) - File: lype-flask/lyre.py - > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback')) - File: lype-flask/lyre.py - > Line 231: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback')) - File: lype-flask/lyre.py - > Line 240: plid = request.args.get('pl', None) - File: lype-flask/lyre.py - > Line 244: videos = None - File: lype-flask/lyre.py - > Line 246: session['shuffle'] = False - File: lype-flask/lyre.py - > Line 249: session['nowplaying'] = -1 -File: lype-flask/lyre.py - > reaches line 271, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show_player.html',isMine=isMine, playlists=playlists, spls=searched_playlists, pltitle=title, videos=videos) - -Vulnerability 2: -File: lype-flask/lyre.py - > User input at line 240, trigger word "get(": - plid = request.args.get('pl', None) -Reassigned in: - File: lype-flask/lyre.py - > Line 252: plid = splid - File: lype-flask/lyre.py - > Line 256: videos = serv.get_videos(youtube, plid) - File: lype-flask/lyre.py - > Line 257: session['playq'] = videos - File: lype-flask/lyre.py - > Line 258: session['nowplaying'] = -1 - File: lype-flask/lyre.py - > Line 267: title = serv.get_title_from_plid(playlists, plid) - File: lype-flask/lyre.py - > Line 269: title = serv.get_title_from_plid(searched_playlists, plid) - File: lype-flask/lyre.py - > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback')) - File: lype-flask/lyre.py - > Line 231: ret_MAYBE_FUNCTION_NAME = redirect(url_for('oauth2callback')) - File: lype-flask/lyre.py - > Line 244: videos = None - File: lype-flask/lyre.py - > Line 246: session['shuffle'] = False - File: lype-flask/lyre.py - > Line 249: session['nowplaying'] = -1 -File: lype-flask/lyre.py - > reaches line 271, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show_player.html',isMine=isMine, playlists=playlists, spls=searched_playlists, pltitle=title, videos=videos) - - - -ayusharma/flask-mysql -https://github.com/ayusharma/flask-mysql -Entry file: flask-mysql/app.py -Scanned: 2016-10-25 22:55:30.027330 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-mysql/venv/lib/python2.7/sre_compile.py - -zolaneta/hello_flask -https://github.com/zolaneta/hello_flask -Entry file: hello_flask/Flask.py -Scanned: 2016-10-25 22:55:31.366209 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mrasband/flask-seed -https://github.com/mrasband/flask-seed -Entry file: None -Scanned: 2016-10-25 22:55:32.674385 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrasband/flask-seed. - -zhaojf85/docker-flask -https://github.com/zhaojf85/docker-flask -Entry file: docker-flask/hello-flask/app.py -Scanned: 2016-10-25 22:55:33.971470 -No vulnerabilities found. - - -higoreduardo/flask-blog -https://github.com/higoreduardo/flask-blog -Entry file: None -Scanned: 2016-10-25 22:55:34.511316 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sholsapp/flask-science -https://github.com/sholsapp/flask-science -Entry file: flask-science/flaskscience/__init__.py -Scanned: 2016-10-25 22:55:35.945297 -No vulnerabilities found. - - -luoluohang/flask_blog -https://github.com/luoluohang/flask_blog -Entry file: flask_blog/app/__init__.py -Scanned: 2016-10-25 22:55:37.436175 -Vulnerability 1: -File: flask_blog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: flask_blog/app/api_1_0/posts.py - > Line 15: prev = None - File: flask_blog/app/api_1_0/posts.py - > Line 18: next = None -File: flask_blog/app/api_1_0/posts.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flask_blog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: flask_blog/app/api_1_0/posts.py - > Line 15: prev = None - File: flask_blog/app/api_1_0/posts.py - > Line 18: next = None -File: flask_blog/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flask_blog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: flask_blog/app/api_1_0/posts.py - > Line 15: prev = None - File: flask_blog/app/api_1_0/posts.py - > Line 18: next = None -File: flask_blog/app/api_1_0/posts.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flask_blog/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 33: posts = pagination.items - File: flask_blog/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 5: -File: flask_blog/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 23: show_followed = False - File: flask_blog/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 6: -File: flask_blog/app/main/views.py - > User input at line 43, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 44: pagination = user.post.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 47: posts = pagination.items -File: flask_blog/app/main/views.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 7: -File: flask_blog/app/main/views.py - > User input at line 102, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 104: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask_blog/app/main/views.py - > Line 105: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 107: comments = pagination.items - File: flask_blog/app/main/views.py - > Line 101: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask_blog/app/main/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, pagination=pagination, comments=comments) - -Vulnerability 8: -File: flask_blog/app/main/views.py - > User input at line 154, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 155: pagination = user.follower.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 157: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask_blog/app/main/views.py - > Line 153: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_blog/app/main/views.py - > reaches line 159, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, pagination=pagination, title='Followers of', endpoint='.followers', follows=follows) - -Vulnerability 9: -File: flask_blog/app/main/views.py - > User input at line 168, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 169: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 171: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_blog/app/main/views.py - > Line 167: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_blog/app/main/views.py - > reaches line 173, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, pagination=pagination, follows=follows, title='Followed by', endpoint='.followed_by') - -Vulnerability 10: -File: flask_blog/app/main/views.py - > User input at line 193, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 194: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 197: comments = pagination.items -File: flask_blog/app/main/views.py - > reaches line 198, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -mnzr/MegaFlask -https://github.com/mnzr/MegaFlask -Entry file: MegaFlask/app/__init__.py -Scanned: 2016-10-25 22:55:38.868789 -No vulnerabilities found. - - -rchibana/MicroBlog -https://github.com/rchibana/MicroBlog -Entry file: MicroBlog/app/__init__.py -Scanned: 2016-10-25 22:55:40.311425 -No vulnerabilities found. - - -damstrom/flask-hello-world -https://github.com/damstrom/flask-hello-world -Entry file: None -Scanned: 2016-10-25 22:55:40.853296 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -atf1999/Flask-Mega-Tutorial -https://github.com/atf1999/Flask-Mega-Tutorial -Entry file: Flask-Mega-Tutorial/server.py -Scanned: 2016-10-25 22:55:42.167166 -No vulnerabilities found. - - -ThukralAman/flaskApp2 -https://github.com/ThukralAman/flaskApp2 -Entry file: flaskApp2/app.py -Scanned: 2016-10-25 22:55:43.647468 -No vulnerabilities found. - - -apeete/flaskHelloWorld -https://github.com/apeete/flaskHelloWorld -Entry file: flaskHelloWorld/app.py -Scanned: 2016-10-25 22:56:01.647510 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -lucidfrontier45/FlaskRethinkDBProject -https://github.com/lucidfrontier45/FlaskRethinkDBProject -Entry file: FlaskRethinkDBProject/webapp/factory.py -Scanned: 2016-10-25 22:56:04.014430 -No vulnerabilities found. - - -jwnwilson/flask_gae_example -https://github.com/jwnwilson/flask_gae_example -Entry file: flask_gae_example/hello_world.py -Scanned: 2016-10-25 22:56:08.399074 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -saichandra286/BlogSpot-using-flask -https://github.com/saichandra286/BlogSpot-using-flask -Entry file: BlogSpot-using-flask/BlogSpot/app/__init__.py -Scanned: 2016-10-25 22:56:09.895689 -No vulnerabilities found. - - -Hyvjan/flask-hello-world -https://github.com/Hyvjan/flask-hello-world -Entry file: None -Scanned: 2016-10-25 22:56:10.461534 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -auslander70/flask_hello_world -https://github.com/auslander70/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-25 22:56:11.770942 -No vulnerabilities found. - - -BugisDev/AppSurvey-Flask -https://github.com/BugisDev/AppSurvey-Flask -Entry file: AppSurvey-Flask/app.py -Scanned: 2016-10-25 22:56:13.208337 -No vulnerabilities found. - - -purpleP/flask_alchemy_rest -https://github.com/purpleP/flask_alchemy_rest -Entry file: flask_alchemy_rest/tests/test_endpoints.py -Scanned: 2016-10-25 22:56:14.910214 -No vulnerabilities found. - - -yueyehm/flask_hello_world -https://github.com/yueyehm/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-25 22:56:16.186736 -No vulnerabilities found. - - -lhr0916/flask_redis_task_q -https://github.com/lhr0916/flask_redis_task_q -Entry file: flask_redis_task_q/web/app.py -Scanned: 2016-10-25 22:56:17.487375 -No vulnerabilities found. - - -PrettyPrinted/flask-request-decorators -https://github.com/PrettyPrinted/flask-request-decorators -Entry file: flask-request-decorators/request_decorators.py -Scanned: 2016-10-25 22:56:18.771571 -No vulnerabilities found. - - -ics/Flask-GnuPG -https://github.com/ics/Flask-GnuPG -Entry file: Flask-GnuPG/test_flask_gnupg.py -Scanned: 2016-10-25 22:56:20.081953 -No vulnerabilities found. - - -johnkabler/flask_dash_learn -https://github.com/johnkabler/flask_dash_learn -Entry file: flask_dash_learn/first_app.py -Scanned: 2016-10-25 22:56:21.376570 -No vulnerabilities found. - - -leitu/netscaler-flask-api -https://github.com/leitu/netscaler-flask-api -Entry file: netscaler-flask-api/netscaler_api/__init__.py -Scanned: 2016-10-25 22:56:22.806756 -No vulnerabilities found. - - -shilpasanthosh/flask-user-login-app -https://github.com/shilpasanthosh/flask-user-login-app -Entry file: flask-user-login-app/loginapp/app.py -Scanned: 2016-10-25 22:56:26.598037 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -rasselpratomo/simple_flask_restful -https://github.com/rasselpratomo/simple_flask_restful -Entry file: simple_flask_restful/app/__init__.py -Scanned: 2016-10-25 22:56:27.936138 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -PrettyPrinted/flask-uploads-intro -https://github.com/PrettyPrinted/flask-uploads-intro -Entry file: flask-uploads-intro/upload.py -Scanned: 2016-10-25 22:56:29.434167 -No vulnerabilities found. - - -kojoidrissa/flask_intro_video -https://github.com/kojoidrissa/flask_intro_video -Entry file: flask_intro_video/5a/hello.py -Scanned: 2016-10-25 22:56:30.972172 -Vulnerability 1: -File: flask_intro_video/5a/hello.py - > User input at line 36, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_intro_video/5a/hello.py - > Line 32: name = None -File: flask_intro_video/5a/hello.py - > reaches line 42, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name, new=new) - - - -joe8767/flask-restful-example -https://github.com/joe8767/flask-restful-example -Entry file: flask-restful-example/api.py -Scanned: 2016-10-25 22:56:32.366072 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mrkewen/flask-hello-world -https://github.com/mrkewen/flask-hello-world -Entry file: None -Scanned: 2016-10-25 22:56:32.880390 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jmsalcido/python-flask-microblog -https://github.com/jmsalcido/python-flask-microblog -Entry file: python-flask-microblog/microblog/app/__init__.py -Scanned: 2016-10-25 22:56:34.424185 -Vulnerability 1: -File: python-flask-microblog/microblog/app/views.py - > User input at line 107, trigger word ".data": - username = form.username.data -Reassigned in: - File: python-flask-microblog/microblog/app/views.py - > Line 108: g.user.username = username - File: python-flask-microblog/microblog/app/views.py - > Line 115: ret_MAYBE_FUNCTION_NAME = render_template('user/edit_user.html',user=user, form=form) -File: python-flask-microblog/microblog/app/views.py - > reaches line 111, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_profile',username=username)) - -Vulnerability 2: -File: python-flask-microblog/microblog/app/views.py - > User input at line 107, trigger word ".data": - username = form.username.data -Reassigned in: - File: python-flask-microblog/microblog/app/views.py - > Line 108: g.user.username = username - File: python-flask-microblog/microblog/app/views.py - > Line 115: ret_MAYBE_FUNCTION_NAME = render_template('user/edit_user.html',user=user, form=form) -File: python-flask-microblog/microblog/app/views.py - > reaches line 111, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user_profile',username=username)) - -Vulnerability 3: -File: python-flask-microblog/microblog/app/forms.py - > User input at line 34, trigger word ".data": - users = User.query.filter(or_(User.username == self.username.data, User.email == self.email.data)).all() -File: python-flask-microblog/microblog/app/forms.py - > reaches line 34, trigger word "filter(": - users = User.query.filter(or_(User.username == self.username.data, User.email == self.email.data)).all() - - - -ettanany/flask-angular-contact-manager -https://github.com/ettanany/flask-angular-contact-manager -Entry file: flask-angular-contact-manager/server/app/__init__.py -Scanned: 2016-10-25 22:56:36.240415 -No vulnerabilities found. - - -nausheenfatma/WebAppWithFlask -https://github.com/nausheenfatma/WebAppWithFlask -Entry file: WebAppWithFlask/model.py -Scanned: 2016-10-25 22:56:37.551302 -Vulnerability 1: -File: WebAppWithFlask/controller.py - > User input at line 21, trigger word "form[": - post = Post(request.form['author'], request.form['title'], request.form['content'], request.form['published']) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 22: post_add = post.add(post) - File: WebAppWithFlask/controller.py - > Line 27: error = post_add -File: WebAppWithFlask/controller.py - > reaches line 28, trigger word "flash(": - flash(error) - -Vulnerability 2: -File: WebAppWithFlask/controller.py - > User input at line 35, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index')) - File: WebAppWithFlask/controller.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index')) -File: WebAppWithFlask/controller.py - > reaches line 52, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('update.html',post=post) - -Vulnerability 3: -File: WebAppWithFlask/controller.py - > User input at line 57, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 62: post_delete = post.delete(post) - File: WebAppWithFlask/controller.py - > Line 66: error = post_delete -File: WebAppWithFlask/controller.py - > reaches line 67, trigger word "flash(": - flash(error) - - - -marcfilba/videoStreamingFlask -https://github.com/marcfilba/videoStreamingFlask -Entry file: videoStreamingFlask/main.py -Scanned: 2016-10-25 22:56:38.818608 -No vulnerabilities found. - - -Jacob234/Flask-hello-world -https://github.com/Jacob234/Flask-hello-world -Entry file: Flask-hello-world/hello_world.py -Scanned: 2016-10-25 22:56:40.115612 -No vulnerabilities found. - - -PrettyPrinted/flask-restless-post -https://github.com/PrettyPrinted/flask-restless-post -Entry file: flask-restless-post/restless.py -Scanned: 2016-10-25 22:56:41.391557 -No vulnerabilities found. - - -alexwilkerson/microblog -https://github.com/alexwilkerson/microblog -Entry file: None -Scanned: 2016-10-25 22:56:41.914873 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/alexwilkerson/microblog. - -austindavid/flasktaskr-cont -https://github.com/austindavid/flasktaskr-cont -Entry file: flasktaskr-cont/project/__init__.py -Scanned: 2016-10-25 22:56:43.347078 -No vulnerabilities found. - - -RicoChou/MyFlasky -https://github.com/RicoChou/MyFlasky -Entry file: MyFlasky/app/__init__.py -Scanned: 2016-10-25 22:56:45.119184 -Vulnerability 1: -File: MyFlasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlasky/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlasky/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlasky/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: MyFlasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlasky/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlasky/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlasky/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: MyFlasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: MyFlasky/app/api_1_0/posts.py - > Line 16: prev = None - File: MyFlasky/app/api_1_0/posts.py - > Line 19: next = None -File: MyFlasky/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: MyFlasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 23: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: MyFlasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 23: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: MyFlasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 20: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 23: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: MyFlasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 45: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: MyFlasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 45: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: MyFlasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: MyFlasky/app/api_1_0/users.py - > Line 42: prev = None - File: MyFlasky/app/api_1_0/users.py - > Line 45: next = None -File: MyFlasky/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 15: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 18: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: MyFlasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: MyFlasky/app/api_1_0/comments.py - > Line 43: prev = None - File: MyFlasky/app/api_1_0/comments.py - > Line 46: next = None -File: MyFlasky/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: MyFlasky/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 55: posts = pagination.items - File: MyFlasky/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlasky/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: MyFlasky/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 45: show_followed = False - File: MyFlasky/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlasky/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: MyFlasky/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 67: posts = pagination.items -File: MyFlasky/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: MyFlasky/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: MyFlasky/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 134: comments = pagination.items - File: MyFlasky/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: MyFlasky/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: MyFlasky/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: MyFlasky/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlasky/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: MyFlasky/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: MyFlasky/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: MyFlasky/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: MyFlasky/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: MyFlasky/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: MyFlasky/app/main/views.py - > Line 246: comments = pagination.items -File: MyFlasky/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -tdvtoan/scorecard-recognition -https://github.com/tdvtoan/scorecard-recognition -Entry file: scorecard-recognition/project/__init__.py -Scanned: 2016-10-25 22:57:03.199318 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -saichandra286/Complete-Angularjs-Flask-Todo-App -https://github.com/saichandra286/Complete-Angularjs-Flask-Todo-App -Entry file: None -Scanned: 2016-10-25 22:57:04.635308 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/saichandra286/Complete-Angularjs-Flask-Todo-App. - -quiqua/docker-flask-celery-redis-example -https://github.com/quiqua/docker-flask-celery-redis-example -Entry file: docker-flask-celery-redis-example/src/myapp/app.py -Scanned: 2016-10-25 22:57:06.960086 -No vulnerabilities found. - - -MakeSchool-17/trip-planner-flask-backend-thetopplayer -https://github.com/MakeSchool-17/trip-planner-flask-backend-thetopplayer -Entry file: trip-planner-flask-backend-thetopplayer/server.py -Scanned: 2016-10-25 22:57:11.779892 -No vulnerabilities found. - - -MacHu-GWU/flask-restless-api-client-project -https://github.com/MacHu-GWU/flask-restless-api-client-project -Entry file: flask-restless-api-client-project/tests/CustomizeSerialization/run_server.py -Scanned: 2016-10-25 22:57:13.199443 -No vulnerabilities found. - - -whiskeyromeo/bucketlist -https://github.com/whiskeyromeo/bucketlist -Entry file: None -Scanned: 2016-10-25 22:57:16.571795 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CHHLeo/foruV1home_flask_pycharm_practice -https://github.com/CHHLeo/foruV1home_flask_pycharm_practice -Entry file: foruV1home_flask_pycharm_practice/flask_pycharm_practice.py -Scanned: 2016-10-25 22:58:02.327129 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -heamon7/learn-restful -https://github.com/heamon7/learn-restful -Entry file: learn-restful/app.py -Scanned: 2016-10-25 22:58:04.196237 -Vulnerability 1: -File: learn-restful/app.py - > User input at line 82, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: learn-restful/app.py - > reaches line 89, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -goodyvn/flask -https://github.com/goodyvn/flask -Entry file: None -Scanned: 2016-10-25 22:58:06.840590 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -stevebannon/flask -https://github.com/stevebannon/flask -Entry file: None -Scanned: 2016-10-25 22:58:07.373781 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sebkouba/dynamic-flask-form -https://github.com/sebkouba/dynamic-flask-form -Entry file: dynamic-flask-form/multimodel.py -Scanned: 2016-10-25 22:58:08.671271 -No vulnerabilities found. - - -willianribeiro/flaskr -https://github.com/willianribeiro/flaskr -Entry file: None -Scanned: 2016-10-25 22:58:09.229833 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/willianribeiro/flaskr. - -solutionspecialist/flaskr -https://github.com/solutionspecialist/flaskr -Entry file: None -Scanned: 2016-10-25 22:58:09.756008 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/solutionspecialist/flaskr. - -XingxinLi/flaskr -https://github.com/XingxinLi/flaskr -Entry file: None -Scanned: 2016-10-25 22:58:10.301521 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/XingxinLi/flaskr. - -wiggitywalt/flasktaskr -https://github.com/wiggitywalt/flasktaskr -Entry file: None -Scanned: 2016-10-25 22:58:10.827083 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mg6/flaskr -https://github.com/mg6/flaskr -Entry file: None -Scanned: 2016-10-25 22:58:11.345424 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mg6/flaskr. - -sourHobbes/flaskdemo -https://github.com/sourHobbes/flaskdemo -Entry file: None -Scanned: 2016-10-25 22:58:11.892680 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Bayaz/flasktaskr -https://github.com/Bayaz/flasktaskr -Entry file: None -Scanned: 2016-10-25 22:58:12.472403 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kewsie/flasky -https://github.com/kewsie/flasky -Entry file: None -Scanned: 2016-10-25 22:58:13.005040 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -metakermit/resin-home-automator -https://github.com/metakermit/resin-home-automator -Entry file: resin-home-automator/src/main.py -Scanned: 2016-10-25 22:58:14.779511 -No vulnerabilities found. - - -guiti1/FlaskAp -https://github.com/guiti1/FlaskAp -Entry file: FlaskAp/FlaskApp/__init__.py -Scanned: 2016-10-25 22:58:18.629201 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskAp/FlaskApp/venv/lib/python2.7/sre_compile.py - -zerodaemon/flask1 -https://github.com/zerodaemon/flask1 -Entry file: flask1/flaskr.py -Scanned: 2016-10-25 22:58:19.952866 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -JoshLandry/FlaskBlog -https://github.com/JoshLandry/FlaskBlog -Entry file: FlaskBlog/Flask_Blog/__init__.py -Scanned: 2016-10-25 22:58:22.016582 -Vulnerability 1: -File: FlaskBlog/Flask_Blog/__init__.py - > User input at line 187, trigger word ".data": - title = form.title.data -Reassigned in: - File: FlaskBlog/Flask_Blog/__init__.py - > Line 190: newEntry = BlogEntry(user=current_user, title=title, entry=entry, rating=rating, artist=artist, tags=tags) -File: FlaskBlog/Flask_Blog/__init__.py - > reaches line 193, trigger word "flash(": - flash('Stored entry: '{}''.format(title)) - -Vulnerability 2: -File: FlaskBlog/Flask_Blog/__init__.py - > User input at line 221, trigger word ".data": - user = User.get_by_username(form.username.data) -Reassigned in: - File: FlaskBlog/Flask_Blog/__init__.py - > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: FlaskBlog/Flask_Blog/__init__.py - > reaches line 224, trigger word "flash(": - flash('Logged in successfully as {}.'.format(user.username)) - -Vulnerability 3: -File: FlaskBlog/Flask_Blog/__init__.py - > User input at line 221, trigger word ".data": - user = User.get_by_username(form.username.data) -Reassigned in: - File: FlaskBlog/Flask_Blog/__init__.py - > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: FlaskBlog/Flask_Blog/__init__.py - > reaches line 225, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=user.username)) - -Vulnerability 4: -File: FlaskBlog/Flask_Blog/__init__.py - > User input at line 221, trigger word ".data": - user = User.get_by_username(form.username.data) -Reassigned in: - File: FlaskBlog/Flask_Blog/__init__.py - > Line 227: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: FlaskBlog/Flask_Blog/__init__.py - > reaches line 225, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('user',username=user.username)) - -Vulnerability 5: -File: FlaskBlog/Flask_Blog/__init__.py - > User input at line 238, trigger word ".data": - user = User(email=form.email.data, username=form.username.data, password=form.password.data) -File: FlaskBlog/Flask_Blog/__init__.py - > reaches line 243, trigger word "flash(": - flash('Welcome, {}! Please login.'.format(user.username)) - - - -Bayaz/FlaskBlog -https://github.com/Bayaz/FlaskBlog -Entry file: FlaskBlog/blog.py -Scanned: 2016-10-25 22:58:23.338010 -No vulnerabilities found. - - -colindjk/flaskTest -https://github.com/colindjk/flaskTest -Entry file: flaskTest/app.py -Scanned: 2016-10-25 22:58:24.760344 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Arsh23/random-crossword-generater -https://github.com/Arsh23/random-crossword-generater -Entry file: random-crossword-generater/app.py -Scanned: 2016-10-25 22:58:26.833117 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -spark0128/flask-intro -https://github.com/spark0128/flask-intro -Entry file: flask-intro/app.py -Scanned: 2016-10-25 22:58:44.917086 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -petrgru/flask-remenarna -https://github.com/petrgru/flask-remenarna -Entry file: flask-remenarna/app/__init__.py -Scanned: 2016-10-25 22:58:47.831306 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -bcb/flask-uploads -https://github.com/bcb/flask-uploads -Entry file: flask-uploads/tests/test-uploads.py -Scanned: 2016-10-25 22:58:49.446425 -No vulnerabilities found. - - -mauriciorey/learning_flask -https://github.com/mauriciorey/learning_flask -Entry file: learning_flask/routes.py -Scanned: 2016-10-25 22:58:51.352444 -Vulnerability 1: -File: learning_flask/routes.py - > User input at line 85, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/routes.py - > Line 89: my_coordinates = p.address_to_latlng(address) - File: learning_flask/routes.py - > Line 90: places = p.query(address) - File: learning_flask/routes.py - > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/routes.py - > Line 77: places = [] - File: learning_flask/routes.py - > Line 78: my_coordinates = (42.335647, -71.07505600000002) - File: learning_flask/routes.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/routes.py - > reaches line 93, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - -Vulnerability 2: -File: learning_flask/routes.py - > User input at line 85, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/routes.py - > Line 89: my_coordinates = p.address_to_latlng(address) - File: learning_flask/routes.py - > Line 90: places = p.query(address) - File: learning_flask/routes.py - > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/routes.py - > Line 77: places = [] - File: learning_flask/routes.py - > Line 78: my_coordinates = (42.335647, -71.07505600000002) - File: learning_flask/routes.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/routes.py - > reaches line 96, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - - - -kumaraswins/flask-angular -https://github.com/kumaraswins/flask-angular -Entry file: flask-angular/app/__init__.py -Scanned: 2016-10-25 22:59:00.589865 -No vulnerabilities found. - - -zengyifa/flask-starter -https://github.com/zengyifa/flask-starter -Entry file: None -Scanned: 2016-10-25 22:59:02.440856 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zengyifa/flask-starter. - -rookiebulls/flask-learn -https://github.com/rookiebulls/flask-learn -Entry file: None -Scanned: 2016-10-25 22:59:18.436892 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -climberwb/flask-blog -https://github.com/climberwb/flask-blog -Entry file: None -Scanned: 2016-10-25 22:59:18.963999 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Hyvjan/flask-blog -https://github.com/Hyvjan/flask-blog -Entry file: None -Scanned: 2016-10-25 22:59:19.504864 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -xingyz/flask_thebutton -https://github.com/xingyz/flask_thebutton -Entry file: flask_thebutton/app/__init__.py -Scanned: 2016-10-25 22:59:21.194920 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -brittanymcgarr/learningFlask -https://github.com/brittanymcgarr/learningFlask -Entry file: learningFlask/FlaskPractice/app/app.py -Scanned: 2016-10-25 22:59:23.807485 -Vulnerability 1: -File: learningFlask/FlaskPractice/app/helpers.py - > User input at line 13, trigger word "get(": - page = request.args.get('page') -Reassigned in: - File: learningFlask/FlaskPractice/app/helpers.py - > Line 16: page = int(page) - File: learningFlask/FlaskPractice/app/helpers.py - > Line 18: page = 1 - File: learningFlask/FlaskPractice/app/helpers.py - > Line 20: object_list = query.paginate(page, paginate_by) -File: learningFlask/FlaskPractice/app/helpers.py - > reaches line 22, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template_name,object_list=object_list, context) - -Vulnerability 2: -File: learningFlask/FlaskPractice/app/entries/blueprint.py - > User input at line 65, trigger word "files[": - image_file = request.files['file'] -Reassigned in: - File: learningFlask/FlaskPractice/app/entries/blueprint.py - > Line 66: filename = os.path.join(app.config['IMAGES_DIR'], secure_filename(image_file.filename)) -File: learningFlask/FlaskPractice/app/entries/blueprint.py - > reaches line 69, trigger word "flash(": - flash('Saved %s' % os.path.basename(filename), 'success') - - - -PrettyPrinted/flask-sessions -https://github.com/PrettyPrinted/flask-sessions -Entry file: flask-sessions/session.py -Scanned: 2016-10-25 22:59:25.092248 -No vulnerabilities found. - - -pfig/flask-elasticsearch -https://github.com/pfig/flask-elasticsearch -Entry file: flask-elasticsearch/flask_elasticsearch.py -Scanned: 2016-10-25 22:59:26.509386 -No vulnerabilities found. - - -nimeshkverma/Ideal_Flask -https://github.com/nimeshkverma/Ideal_Flask -Entry file: Ideal_Flask/LargeApp/app/__init__.py -Scanned: 2016-10-25 22:59:30.372248 -Vulnerability 1: -File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py - > User input at line 31, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py - > Line 35: session['user_id'] = user.id -File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py - > reaches line 37, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -tholsapp/flask_framework -https://github.com/tholsapp/flask_framework -Entry file: flask_framework/app/__init__.py -Scanned: 2016-10-25 22:59:31.750043 -No vulnerabilities found. - - -evansa/flask-sqlalchemy -https://github.com/evansa/flask-sqlalchemy -Entry file: flask-sqlalchemy/flask-sqlalchemy/__init__.py -Scanned: 2016-10-25 22:59:33.191366 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Kajvdh/nao-flask -https://github.com/Kajvdh/nao-flask -Entry file: nao-flask/app.py -Scanned: 2016-10-25 22:59:34.614123 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -anbasile/flask_sample -https://github.com/anbasile/flask_sample -Entry file: flask_sample/app.py -Scanned: 2016-10-25 22:59:38.392646 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_sample/flask/lib/python2.7/sre_compile.py - -androidzhibinw/Flask-reg -https://github.com/androidzhibinw/Flask-reg -Entry file: Flask-reg/app.py -Scanned: 2016-10-25 22:59:40.098682 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mrasband/flask-seed -https://github.com/mrasband/flask-seed -Entry file: None -Scanned: 2016-10-25 22:59:40.649354 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrasband/flask-seed. - -vrokida/demo-flask -https://github.com/vrokida/demo-flask -Entry file: demo-flask/demo-flask.py -Scanned: 2016-10-25 22:59:41.961382 -No vulnerabilities found. - - -Clarity-89/server_flask -https://github.com/Clarity-89/server_flask -Entry file: server_flask/project.py -Scanned: 2016-10-25 22:59:43.889984 -No vulnerabilities found. - - -jcmflenso/flask-udemy -https://github.com/jcmflenso/flask-udemy -Entry file: flask-udemy/hello.py -Scanned: 2016-10-25 22:59:45.196385 -No vulnerabilities found. - - -schakalakka/flask-project -https://github.com/schakalakka/flask-project -Entry file: flask-project/app/__init__.py -Scanned: 2016-10-25 22:59:53.911255 -No vulnerabilities found. - - -simongareste/flask-dummy -https://github.com/simongareste/flask-dummy -Entry file: flask-dummy/flask_dummy/__init__.py -Scanned: 2016-10-25 22:59:55.398065 -No vulnerabilities found. - - -liu1020269358/learn-flask -https://github.com/liu1020269358/learn-flask -Entry file: None -Scanned: 2016-10-25 22:59:59.524116 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -foobaar/flask-expt -https://github.com/foobaar/flask-expt -Entry file: flask-expt/flask-experiment.py -Scanned: 2016-10-25 23:00:00.816662 -No vulnerabilities found. - - -lucafaggianelli/flask-skeleton -https://github.com/lucafaggianelli/flask-skeleton -Entry file: flask-skeleton/app_template/app_name/__init__.py -Scanned: 2016-10-25 23:00:03.535557 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -econne01/flask_blog -https://github.com/econne01/flask_blog -Entry file: flask_blog/app/app.py -Scanned: 2016-10-25 23:00:05.672336 -Vulnerability 1: -File: flask_blog/app/views.py - > User input at line 13, trigger word "get(": - next_url = request.args.get('next') or request.form.get('next') -File: flask_blog/app/views.py - > reaches line 20, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index')) - -Vulnerability 2: -File: flask_blog/app/views.py - > User input at line 13, trigger word "get(": - next_url = request.args.get('next') or request.form.get('next') -File: flask_blog/app/views.py - > reaches line 20, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index')) - -Vulnerability 3: -File: flask_blog/app/views.py - > User input at line 13, trigger word "get(": - next_url = request.args.get('next') or request.form.get('next') -File: flask_blog/app/views.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',next_url=next_url) - -Vulnerability 4: -File: flask_blog/app/views.py - > User input at line 55, trigger word "get(": - entry = Entry.create(title=request.form.get('title'), content=request.form.get('content'), published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/app/views.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/app/views.py - > reaches line 61, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug)) - -Vulnerability 5: -File: flask_blog/app/views.py - > User input at line 55, trigger word "get(": - entry = Entry.create(title=request.form.get('title'), content=request.form.get('content'), published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/app/views.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/app/views.py - > reaches line 61, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug)) - -Vulnerability 6: -File: flask_blog/app/views.py - > User input at line 55, trigger word "get(": - entry = Entry.create(title=request.form.get('title'), content=request.form.get('content'), published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/app/views.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/app/views.py - > reaches line 63, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug)) - -Vulnerability 7: -File: flask_blog/app/views.py - > User input at line 55, trigger word "get(": - entry = Entry.create(title=request.form.get('title'), content=request.form.get('content'), published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/app/views.py - > Line 66: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/app/views.py - > reaches line 63, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug)) - - - -mdeamon/flask_app -https://github.com/mdeamon/flask_app -Entry file: flask_app/app.py -Scanned: 2016-10-25 23:00:07.171417 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -dlrice/hello-flask -https://github.com/dlrice/hello-flask -Entry file: hello-flask/hello.py -Scanned: 2016-10-25 23:00:08.516472 -No vulnerabilities found. - - -euler1337/flask_tutorial -https://github.com/euler1337/flask_tutorial -Entry file: None -Scanned: 2016-10-25 23:00:09.125331 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/euler1337/flask_tutorial. - -devyash/Intelligent-Public-Grievance-System -https://github.com/devyash/Intelligent-Public-Grievance-System -Entry file: Intelligent-Public-Grievance-System/app.py -Scanned: 2016-10-25 23:00:15.905252 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -elphinkuo/ji_python_flask -https://github.com/elphinkuo/ji_python_flask -Entry file: ji_python_flask/app/musicModify.py -Scanned: 2016-10-25 23:00:17.367839 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -afaki077/minitweet -https://github.com/afaki077/minitweet -Entry file: None -Scanned: 2016-10-25 23:00:19.885409 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/afaki077/minitweet. - -ThukralAman/flaskApp2 -https://github.com/ThukralAman/flaskApp2 -Entry file: flaskApp2/app.py -Scanned: 2016-10-25 23:00:21.688297 -No vulnerabilities found. - - -sbm367/flaskTest2 -https://github.com/sbm367/flaskTest2 -Entry file: flaskTest2/flaskTest.py -Scanned: 2016-10-25 23:00:23.002941 -No vulnerabilities found. - - -emil-k/climate-compare_FlaskApp -https://github.com/emil-k/climate-compare_FlaskApp -Entry file: climate-compare_FlaskApp/__init__.py -Scanned: 2016-10-25 23:00:31.642521 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: climate-compare_FlaskApp/venv/lib/python2.7/sre_compile.py - -Cosaquee/flask-weather-app -https://github.com/Cosaquee/flask-weather-app -Entry file: flask-weather-app/main.py -Scanned: 2016-10-25 23:00:35.613840 -No vulnerabilities found. - - -daytonight/Flask-Web-Development-code -https://github.com/daytonight/Flask-Web-Development-code -Entry file: Flask-Web-Development-code/venv/lib/python2.7/site-packages/flask_sqlalchemy/__init__.py -Scanned: 2016-10-25 23:00:41.259627 -No vulnerabilities found. - - -lkpanganiban/flask-mega-tutorial -https://github.com/lkpanganiban/flask-mega-tutorial -Entry file: flask-mega-tutorial/app/__init__.py -Scanned: 2016-10-25 23:00:42.915677 -No vulnerabilities found. - - -saichandra286/BlogSpot-using-flask -https://github.com/saichandra286/BlogSpot-using-flask -Entry file: BlogSpot-using-flask/BlogSpot/app/__init__.py -Scanned: 2016-10-25 23:00:44.503513 -No vulnerabilities found. - - -afborodin/simple-mysql-flask-app -https://github.com/afborodin/simple-mysql-flask-app -Entry file: None -Scanned: 2016-10-25 23:01:32.976816 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dternyak/my-react-flask-blog -https://github.com/dternyak/my-react-flask-blog -Entry file: my-react-flask-blog/index.py -Scanned: 2016-10-25 23:01:48.978051 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -skriems/flask-cherrypy-dockerized -https://github.com/skriems/flask-cherrypy-dockerized -Entry file: flask-cherrypy-dockerized/app.py -Scanned: 2016-10-25 23:01:50.315894 -No vulnerabilities found. - - -johnkabler/flask_dash_learn -https://github.com/johnkabler/flask_dash_learn -Entry file: flask_dash_learn/first_app.py -Scanned: 2016-10-25 23:01:51.604494 -No vulnerabilities found. - - -broak/flask-hello-world -https://github.com/broak/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:01:52.124866 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ABaldwinHunter/flask-clone-classic -https://github.com/ABaldwinHunter/flask-clone-classic -Entry file: flask-clone-classic/setup.py -Scanned: 2016-10-25 23:01:55.994130 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ldrunner100/flask_hello_world -https://github.com/ldrunner100/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-25 23:01:59.137979 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -FinleySmile/flask_blog_demo -https://github.com/FinleySmile/flask_blog_demo -Entry file: flask_blog_demo/flask_blog_demo.py -Scanned: 2016-10-25 23:02:01.475353 -Vulnerability 1: -File: flask_blog_demo/flask_blog_demo.py - > User input at line 63, trigger word "form[": - username = request.form['username'] -Reassigned in: - File: flask_blog_demo/flask_blog_demo.py - > Line 68: ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_entries')) -File: flask_blog_demo/flask_blog_demo.py - > reaches line 71, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',username=username, error=error) - - - -quandrei/godzilla-foxfire-flask -https://github.com/quandrei/godzilla-foxfire-flask -Entry file: godzilla-foxfire-flask/app/__init__.py -Scanned: 2016-10-25 23:02:03.530545 -No vulnerabilities found. - - -ArTrics/Flask_Angular_Project -https://github.com/ArTrics/Flask_Angular_Project -Entry file: Flask_Angular_Project/index.py -Scanned: 2016-10-25 23:02:08.068371 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Angular_Project/venv/lib/python2.7/sre_compile.py - -RodrigoVillatoro/flask_social_network -https://github.com/RodrigoVillatoro/flask_social_network -Entry file: flask_social_network/app/__init__.py -Scanned: 2016-10-25 23:02:10.483382 -Vulnerability 1: -File: flask_social_network/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/posts.py - > Line 17: posts = pagination.items - File: flask_social_network/app/api_1_0/posts.py - > Line 18: prev_page = None - File: flask_social_network/app/api_1_0/posts.py - > Line 21: next_page = None -File: flask_social_network/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - prev_page = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flask_social_network/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/posts.py - > Line 17: posts = pagination.items - File: flask_social_network/app/api_1_0/posts.py - > Line 18: prev_page = None - File: flask_social_network/app/api_1_0/posts.py - > Line 21: next_page = None -File: flask_social_network/app/api_1_0/posts.py - > reaches line 23, trigger word "url_for(": - next_page = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flask_social_network/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/posts.py - > Line 17: posts = pagination.items - File: flask_social_network/app/api_1_0/posts.py - > Line 18: prev_page = None - File: flask_social_network/app/api_1_0/posts.py - > Line 21: next_page = None -File: flask_social_network/app/api_1_0/posts.py - > reaches line 24, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 4: -File: flask_social_network/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 21: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 22: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 25: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 24, trigger word "url_for(": - prev_page = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flask_social_network/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 21: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 22: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 25: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 27, trigger word "url_for(": - next_page = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flask_social_network/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 21: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 22: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 25: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 28, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 7: -File: flask_social_network/app/api_1_0/users.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 46: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 49: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - prev_page = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: flask_social_network/app/api_1_0/users.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 46: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 49: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 51, trigger word "url_for(": - next_page = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flask_social_network/app/api_1_0/users.py - > User input at line 39, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/users.py - > Line 40: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: flask_social_network/app/api_1_0/users.py - > Line 46: prev_page = None - File: flask_social_network/app/api_1_0/users.py - > Line 49: next_page = None -File: flask_social_network/app/api_1_0/users.py - > reaches line 52, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 10: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 16: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 17: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 20: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 19, trigger word "url_for(": - prev_page = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 16: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 17: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 20: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 22, trigger word "url_for(": - next_page = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 16: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 17: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 20: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prev_pagenext_pagepagination.total) - -Vulnerability 13: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 44: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 45: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 48: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 47, trigger word "url_for(": - prev_page = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 44: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 45: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 48: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 50, trigger word "url_for(": - next_page = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flask_social_network/app/api_1_0/comments.py - > User input at line 40, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/api_1_0/comments.py - > Line 41: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/api_1_0/comments.py - > Line 44: comments = pagination.items - File: flask_social_network/app/api_1_0/comments.py - > Line 45: prev_page = None - File: flask_social_network/app/api_1_0/comments.py - > Line 48: next_page = None -File: flask_social_network/app/api_1_0/comments.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prev_pagenext_pagepagination.total) - -Vulnerability 16: -File: flask_social_network/app/main/views.py - > User input at line 47, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 56: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 61: posts = pagination.items - File: flask_social_network/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask_social_network/app/main/views.py - > reaches line 62, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flask_social_network/app/main/views.py - > User input at line 50, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 48: show_followed = False - File: flask_social_network/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask_social_network/app/main/views.py - > reaches line 62, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flask_social_network/app/main/views.py - > User input at line 74, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 75: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['APP_POSTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 80: posts = pagination.items -File: flask_social_network/app/main/views.py - > reaches line 81, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: flask_social_network/app/main/views.py - > User input at line 146, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 148: page = post.comments.count() - 1 // current_app.config['APP_COMMENTS_PER_PAGE'] + 1 - File: flask_social_network/app/main/views.py - > Line 150: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 155: comments = pagination.items - File: flask_social_network/app/main/views.py - > Line 145: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.post',id=post.id, page=-1)) -File: flask_social_network/app/main/views.py - > reaches line 156, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: flask_social_network/app/main/views.py - > User input at line 220, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 221: pagination = user.followers.paginate(page,per_page=current_app.config['APP_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 226: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_social_network/app/main/views.py - > Line 219: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask_social_network/app/main/views.py - > reaches line 228, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='main.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: flask_social_network/app/main/views.py - > User input at line 244, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 245: pagination = user.followed.paginate(page,per_page=current_app.config['APP_FOLLOWING_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 250: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask_social_network/app/main/views.py - > Line 243: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask_social_network/app/main/views.py - > reaches line 252, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='main.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: flask_social_network/app/main/views.py - > User input at line 282, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_social_network/app/main/views.py - > Line 283: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['APP_COMMENTS_PER_PAGE'], error_out=False) - File: flask_social_network/app/main/views.py - > Line 288: comments = pagination.items -File: flask_social_network/app/main/views.py - > reaches line 289, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -mdublin/Flask-CRUD-template -https://github.com/mdublin/Flask-CRUD-template -Entry file: Flask-CRUD-template/blog/__init__.py -Scanned: 2016-10-25 23:02:15.082103 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -p00gz/flask-imdbratings-app-backend -https://github.com/p00gz/flask-imdbratings-app-backend -Entry file: flask-imdbratings-app-backend/imdbRatings/__init__.py -Scanned: 2016-10-25 23:02:19.183152 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -moonlitesolutions/flask_rest_template -https://github.com/moonlitesolutions/flask_rest_template -Entry file: flask_rest_template/flask_rest/api/api.py -Scanned: 2016-10-25 23:02:22.465419 -No vulnerabilities found. - - -mrkewen/flask-hello-world -https://github.com/mrkewen/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:02:22.986028 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wasw100/flask-sqlalchemy-demo2 -https://github.com/wasw100/flask-sqlalchemy-demo2 -Entry file: flask-sqlalchemy-demo2/hello.py -Scanned: 2016-10-25 23:02:24.318950 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -artisanofcode/flask-generic-views -https://github.com/artisanofcode/flask-generic-views -Entry file: flask-generic-views/setup.py -Scanned: 2016-10-25 23:02:26.015080 -Vulnerability 1: -File: flask-generic-views/flask_generic_views/core.py - > User input at line 308, trigger word "get(": - query = request.environ.get('QUERY_STRING', '') -File: flask-generic-views/flask_generic_views/core.py - > reaches line 311, trigger word "replace(": - url = url_parse(url).replace(query=query).to_url() - - - -mekanix/flask-bootstrap-sql-rest -https://github.com/mekanix/flask-bootstrap-sql-rest -Entry file: flask-bootstrap-sql-rest/manage.py -Scanned: 2016-10-25 23:02:27.418324 -No vulnerabilities found. - - -ayesandarmoe/microblog_flask_tutorial -https://github.com/ayesandarmoe/microblog_flask_tutorial -Entry file: microblog_flask_tutorial/app/__init__.py -Scanned: 2016-10-25 23:02:37.316632 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -alexwilkerson/flask-hello-world -https://github.com/alexwilkerson/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:02:37.932265 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nausheenfatma/WebAppWithFlask -https://github.com/nausheenfatma/WebAppWithFlask -Entry file: WebAppWithFlask/model.py -Scanned: 2016-10-25 23:02:39.237421 -Vulnerability 1: -File: WebAppWithFlask/controller.py - > User input at line 21, trigger word "form[": - post = Post(request.form['author'], request.form['title'], request.form['content'], request.form['published']) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 22: post_add = post.add(post) - File: WebAppWithFlask/controller.py - > Line 27: error = post_add -File: WebAppWithFlask/controller.py - > reaches line 28, trigger word "flash(": - flash(error) - -Vulnerability 2: -File: WebAppWithFlask/controller.py - > User input at line 35, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 38: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index')) - File: WebAppWithFlask/controller.py - > Line 48: ret_MAYBE_FUNCTION_NAME = redirect(url_for('post_index')) -File: WebAppWithFlask/controller.py - > reaches line 52, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('update.html',post=post) - -Vulnerability 3: -File: WebAppWithFlask/controller.py - > User input at line 57, trigger word "get(": - post = Post.query.get(id) -Reassigned in: - File: WebAppWithFlask/controller.py - > Line 62: post_delete = post.delete(post) - File: WebAppWithFlask/controller.py - > Line 66: error = post_delete -File: WebAppWithFlask/controller.py - > reaches line 67, trigger word "flash(": - flash(error) - - - -yaoelvon/flask-uwsgi-demo -https://github.com/yaoelvon/flask-uwsgi-demo -Entry file: flask-uwsgi-demo/DeployingFlask/myflaskapp.py -Scanned: 2016-10-25 23:02:40.469692 -No vulnerabilities found. - - -Owen-Gillespie/FeatureLabsFlaskDemo -https://github.com/Owen-Gillespie/FeatureLabsFlaskDemo -Entry file: FeatureLabsFlaskDemo/main.py -Scanned: 2016-10-25 23:02:46.873536 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -richardsop/REST-API -https://github.com/richardsop/REST-API -Entry file: REST-API/app.py -Scanned: 2016-10-25 23:02:58.559083 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -tianxie/my_flasky -https://github.com/tianxie/my_flasky -Entry file: my_flasky/app/__init__.py -Scanned: 2016-10-25 23:03:00.240089 -No vulnerabilities found. - - -sheldonsmickley/flaskemail_app -https://github.com/sheldonsmickley/flaskemail_app -Entry file: flaskemail_app/emails.py -Scanned: 2016-10-25 23:03:01.702086 -Vulnerability 1: -File: flaskemail_app/emails.py - > User input at line 57, trigger word "form[": - url = c.execute('select url from emails where company_name like ?', (request.form['existing_company'])) -Reassigned in: - File: flaskemail_app/emails.py - > Line 58: url = url.fetchall()[0][0] -File: flaskemail_app/emails.py - > reaches line 57, trigger word "execute(": - url = c.execute('select url from emails where company_name like ?', (request.form['existing_company'])) - -Vulnerability 2: -File: flaskemail_app/emails.py - > User input at line 57, trigger word "form[": - url = c.execute('select url from emails where company_name like ?', (request.form['existing_company'])) -Reassigned in: - File: flaskemail_app/emails.py - > Line 58: url = url.fetchall()[0][0] -File: flaskemail_app/emails.py - > reaches line 59, trigger word "execute(": - c.execute('INSERT into emails (company_name, email, url) values (?, ?, ?)', (request.form['existing_company'], request.form['email'], url)) - - - -shas15/Betting-Chips -https://github.com/shas15/Betting-Chips -Entry file: Betting-Chips/test.py -Scanned: 2016-10-25 23:03:03.246985 -Vulnerability 1: -File: Betting-Chips/Models/User.py - > User input at line 20, trigger word "form[": - login_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 22, trigger word "filter(": - found = User.query.filter(User.id == login_id, User.password == login_password).first() - -Vulnerability 2: -File: Betting-Chips/Models/User.py - > User input at line 21, trigger word "form[": - login_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 22, trigger word "filter(": - found = User.query.filter(User.id == login_id, User.password == login_password).first() - -Vulnerability 3: -File: Betting-Chips/Models/User.py - > User input at line 20, trigger word "form[": - login_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 27, trigger word "jsonify(": - print(jsonify('id''password''stats'login_idlogin_password'success').get_data(as_text=True)) - -Vulnerability 4: -File: Betting-Chips/Models/User.py - > User input at line 21, trigger word "form[": - login_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 27, trigger word "jsonify(": - print(jsonify('id''password''stats'login_idlogin_password'success').get_data(as_text=True)) - -Vulnerability 5: -File: Betting-Chips/Models/User.py - > User input at line 20, trigger word "form[": - login_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 32, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats'login_idlogin_password'success') - -Vulnerability 6: -File: Betting-Chips/Models/User.py - > User input at line 21, trigger word "form[": - login_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 38: ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats''''''fail') -File: Betting-Chips/Models/User.py - > reaches line 32, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('id''password''stats'login_idlogin_password'success') - -Vulnerability 7: -File: Betting-Chips/Models/User.py - > User input at line 45, trigger word "form[": - signup_name = request.form['name'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 49: user.name = signup_name -File: Betting-Chips/Models/User.py - > reaches line 54, trigger word "jsonify(": - print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True)) - -Vulnerability 8: -File: Betting-Chips/Models/User.py - > User input at line 46, trigger word "form[": - signup_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 50: user.id = signup_id -File: Betting-Chips/Models/User.py - > reaches line 54, trigger word "jsonify(": - print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True)) - -Vulnerability 9: -File: Betting-Chips/Models/User.py - > User input at line 47, trigger word "form[": - signup_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 51: user.password = signup_password -File: Betting-Chips/Models/User.py - > reaches line 54, trigger word "jsonify(": - print(jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success').get_data(as_text=True)) - -Vulnerability 10: -File: Betting-Chips/Models/User.py - > User input at line 45, trigger word "form[": - signup_name = request.form['name'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 49: user.name = signup_name -File: Betting-Chips/Models/User.py - > reaches line 60, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success') - -Vulnerability 11: -File: Betting-Chips/Models/User.py - > User input at line 46, trigger word "form[": - signup_id = request.form['id'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 50: user.id = signup_id -File: Betting-Chips/Models/User.py - > reaches line 60, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success') - -Vulnerability 12: -File: Betting-Chips/Models/User.py - > User input at line 47, trigger word "form[": - signup_password = request.form['password'] -Reassigned in: - File: Betting-Chips/Models/User.py - > Line 51: user.password = signup_password -File: Betting-Chips/Models/User.py - > reaches line 60, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''id''password''stats'signup_namesignup_idsignup_password'success') - - - -malong5219/SampleBlog -https://github.com/malong5219/SampleBlog -Entry file: None -Scanned: 2016-10-25 23:03:10.675843 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -alexwilkerson/microblog -https://github.com/alexwilkerson/microblog -Entry file: None -Scanned: 2016-10-25 23:03:11.192066 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/alexwilkerson/microblog. - -jyang22/Flasky_blog -https://github.com/jyang22/Flasky_blog -Entry file: None -Scanned: 2016-10-25 23:03:16.844809 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tusharpawar/Agrostar_Flaskr -https://github.com/tusharpawar/Agrostar_Flaskr -Entry file: Agrostar_Flaskr/flaskr/flaskr.py -Scanned: 2016-10-25 23:03:21.529501 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -eunseo9808/fakeArtist -https://github.com/eunseo9808/fakeArtist -Entry file: fakeArtist/test.py -Scanned: 2016-10-25 23:03:23.000337 -No vulnerabilities found. - - -semonalbertyeah/quickflask -https://github.com/semonalbertyeah/quickflask -Entry file: quickflask/app.py -Scanned: 2016-10-25 23:03:24.439249 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -aceokay/microblog -https://github.com/aceokay/microblog -Entry file: None -Scanned: 2016-10-25 23:03:25.028119 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/aceokay/microblog. - -dantin/microblog -https://github.com/dantin/microblog -Entry file: None -Scanned: 2016-10-25 23:03:25.549576 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dantin/microblog. - -buntyke/Flask -https://github.com/buntyke/Flask -Entry file: None -Scanned: 2016-10-25 23:03:28.370288 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -suzf/Flask -https://github.com/suzf/Flask -Entry file: None -Scanned: 2016-10-25 23:03:28.926303 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -b-e/flask -https://github.com/b-e/flask -Entry file: None -Scanned: 2016-10-25 23:03:29.443727 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -psuong/FlaskWorkshop -https://github.com/psuong/FlaskWorkshop -Entry file: FlaskWorkshop/output-string/app.py -Scanned: 2016-10-25 23:03:31.215853 -No vulnerabilities found. - - -BLKStone/flask_image_search -https://github.com/BLKStone/flask_image_search -Entry file: flask_image_search/app/app.py -Scanned: 2016-10-25 23:03:36.345721 -No vulnerabilities found. - - -yj0914/flask- -https://github.com/yj0914/flask- -Entry file: flask-/num1.py -Scanned: 2016-10-25 23:03:37.641919 -No vulnerabilities found. - - -Bleezworld/flask_skeleton -https://github.com/Bleezworld/flask_skeleton -Entry file: flask_skeleton/serveur/__init__.py -Scanned: 2016-10-25 23:03:40.040904 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -TwilioDevEd/lead-alerts-flask -https://github.com/TwilioDevEd/lead-alerts-flask -Entry file: None -Scanned: 2016-10-25 23:03:40.545336 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/TwilioDevEd/lead-alerts-flask. - -soasme/flask-perm -https://github.com/soasme/flask-perm -Entry file: flask-perm/example.py -Scanned: 2016-10-25 23:03:43.023343 -Vulnerability 1: -File: flask-perm/tests/test_blueprint.py - > User input at line 68, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permissions')) -File: flask-perm/tests/test_blueprint.py - > reaches line 68, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permissions')) - -Vulnerability 2: -File: flask-perm/tests/test_blueprint.py - > User input at line 73, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}') -File: flask-perm/tests/test_blueprint.py - > reaches line 73, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": 0}') - -Vulnerability 3: -File: flask-perm/tests/test_blueprint.py - > User input at line 80, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 80, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permissions'),query_string='_filters''{"id": %s}' % permission['id']) - -Vulnerability 4: -File: flask-perm/tests/test_blueprint.py - > User input at line 87, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) -File: flask-perm/tests/test_blueprint.py - > reaches line 87, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) - -Vulnerability 5: -File: flask-perm/tests/test_blueprint.py - > User input at line 121, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) -File: flask-perm/tests/test_blueprint.py - > reaches line 114, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.delete_permission',permission_id=permission['id'])) - -Vulnerability 6: -File: flask-perm/tests/test_blueprint.py - > User input at line 121, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) -File: flask-perm/tests/test_blueprint.py - > reaches line 121, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_permission',permission_id=permission['id'])) - -Vulnerability 7: -File: flask-perm/tests/test_blueprint.py - > User input at line 172, trigger word ".data": - id = json.loads(resp.data)['data']['id'] -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 171: resp = add_user_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 173, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.revoke_user_permission',user_permission_id=id)) - -Vulnerability 8: -File: flask-perm/tests/test_blueprint.py - > User input at line 188, trigger word ".data": - id = json.loads(resp.data)['data']['id'] -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 187: resp = add_user_group_permission(client, user_group['id'], permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 189, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.revoke_user_group_permission',user_group_permission_id=id)) - -Vulnerability 9: -File: flask-perm/tests/test_blueprint.py - > User input at line 199, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}') -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 198: resp = add_user_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 199, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"user_id":1}') - -Vulnerability 10: -File: flask-perm/tests/test_blueprint.py - > User input at line 210, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 209: resp = add_user_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 210, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) - -Vulnerability 11: -File: flask-perm/tests/test_blueprint.py - > User input at line 221, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}') -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 220: resp = add_user_group_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 221, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"user_group_id":1}') - -Vulnerability 12: -File: flask-perm/tests/test_blueprint.py - > User input at line 232, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 231: resp = add_user_group_permission(client, 1, permission['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 232, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_group_permissions'),query_string='_filters''{"permission_id":%s}' % permission['id']) - -Vulnerability 13: -File: flask-perm/tests/test_blueprint.py - > User input at line 245, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_groups')) -File: flask-perm/tests/test_blueprint.py - > reaches line 245, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_groups')) - -Vulnerability 14: -File: flask-perm/tests/test_blueprint.py - > User input at line 280, trigger word ".data": - id = json.loads(resp.data)['data']['id'] -Reassigned in: - File: flask-perm/tests/test_blueprint.py - > Line 279: resp = add_user_group_member(client, 1, user_group['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 281, trigger word "url_for(": - resp = client.delete(url_for('flask_perm_api.delete_user_from_user_group',user_group_member_id=id)) - -Vulnerability 15: -File: flask-perm/tests/test_blueprint.py - > User input at line 291, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id']) -File: flask-perm/tests/test_blueprint.py - > reaches line 291, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user_group_members'),query_string='_filters''{"user_group_id":%s}' % user_group['id']) - -Vulnerability 16: -File: flask-perm/tests/test_blueprint.py - > User input at line 304, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_users')) -File: flask-perm/tests/test_blueprint.py - > reaches line 304, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_users')) - -Vulnerability 17: -File: flask-perm/tests/test_blueprint.py - > User input at line 309, trigger word "get(": - resp = client.get(url_for('flask_perm_api.get_user',user_id=1)) -File: flask-perm/tests/test_blueprint.py - > reaches line 309, trigger word "url_for(": - resp = client.get(url_for('flask_perm_api.get_user',user_id=1)) - -Vulnerability 18: -File: flask-perm/flask_perm/admin.py - > User input at line 12, trigger word "get(": - render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERM_ADMIN_PREFIX') + '/api'current_app.config.get('PERM_ADMIN_PREFIX')current_app.config.get('DEBUG') -Reassigned in: - File: flask-perm/flask_perm/admin.py - > Line 10: ret_MAYBE_FUNCTION_NAME = redirect(url_for('perm-admin.login')) -File: flask-perm/flask_perm/admin.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/perm-admin/index.html',render_data) - - - -expersso/flaskr -https://github.com/expersso/flaskr -Entry file: None -Scanned: 2016-10-25 23:03:43.554238 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/expersso/flaskr. - -gileez/flasker -https://github.com/gileez/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-25 23:03:44.964723 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -rishipuri/flasktodo -https://github.com/rishipuri/flasktodo -Entry file: flasktodo/flasktodo.py -Scanned: 2016-10-25 23:03:46.264306 -No vulnerabilities found. - - -Hyvjan/flasktaskr -https://github.com/Hyvjan/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:03:46.819487 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zachary-russell/Flaskr -https://github.com/zachary-russell/Flaskr -Entry file: None -Scanned: 2016-10-25 23:03:47.340741 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -storress/Flaskserver -https://github.com/storress/Flaskserver -Entry file: Flaskserver/main.py -Scanned: 2016-10-25 23:03:48.639781 -No vulnerabilities found. - - -dadasoz-cuelogic/flaskapp -https://github.com/dadasoz-cuelogic/flaskapp -Entry file: None -Scanned: 2016-10-25 23:03:59.185926 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dadasoz-cuelogic/flaskapp. - -nickaustinlee/flasktaskr -https://github.com/nickaustinlee/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:04:01.758036 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sindhus/flaskr -https://github.com/sindhus/flaskr -Entry file: None -Scanned: 2016-10-25 23:04:02.355909 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sindhus/flaskr. - -Bayaz/flasktaskr -https://github.com/Bayaz/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:04:03.917017 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -xavinso/flasktaskr -https://github.com/xavinso/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:04:11.477618 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CharlieWinters/flaskapi -https://github.com/CharlieWinters/flaskapi -Entry file: flaskapi/aydaapi4.py -Scanned: 2016-10-25 23:04:17.368201 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskapi/flaskenv/lib/python2.7/sre_compile.py - -kewsie/flasky -https://github.com/kewsie/flasky -Entry file: None -Scanned: 2016-10-25 23:04:18.233695 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -apeete/flaskBlog -https://github.com/apeete/flaskBlog -Entry file: flaskBlog/blog.py -Scanned: 2016-10-25 23:04:25.640459 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskBlog/env/lib/python2.7/sre_compile.py - -land-pack/flaskBlog -https://github.com/land-pack/flaskBlog -Entry file: flaskBlog/flaskr.py -Scanned: 2016-10-25 23:04:27.119495 -No vulnerabilities found. - - -OscarMelin/learning-flask-bootstrap -https://github.com/OscarMelin/learning-flask-bootstrap -Entry file: learning-flask-bootstrap/__init__.py -Scanned: 2016-10-25 23:04:32.686418 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/sre_compile.py - -hnb2/flask-customers -https://github.com/hnb2/flask-customers -Entry file: flask-customers/customers/__init__.py -Scanned: 2016-10-25 23:04:34.178433 -Vulnerability 1: -File: flask-customers/customers/back/view.py - > User input at line 71, trigger word ".data": - customer = Customer(email=form.email.data, password=AdminCustomer._generate_password()) -Reassigned in: - File: flask-customers/customers/back/view.py - > Line 69: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors) -File: flask-customers/customers/back/view.py - > reaches line 82, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(customer=customer.json) - -Vulnerability 2: -File: flask-customers/customers/back/view.py - > User input at line 147, trigger word ".data": - page = form.page.data -Reassigned in: - File: flask-customers/customers/back/view.py - > Line 151: start = page * CustomerService.RESULTS_PER_PAGE - File: flask-customers/customers/back/view.py - > Line 152: stop = start + CustomerService.RESULTS_PER_PAGE - File: flask-customers/customers/back/view.py - > Line 154: raw_customers = CustomerService.get_customers(start=start, stop=stop) - File: flask-customers/customers/back/view.py - > Line 145: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors) -File: flask-customers/customers/back/view.py - > reaches line 159, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(current_page=page, total_pages=int(total_pages), customers=[customer.json for customer in raw_customers]) - -Vulnerability 3: -File: flask-customers/customers/front/view.py - > User input at line 32, trigger word ".data": - customer = Customer(email=form.email.data, password=form.password.data) -Reassigned in: - File: flask-customers/customers/front/view.py - > Line 30: ret_MAYBE_FUNCTION_NAME = jsonify(errors=form.errors) -File: flask-customers/customers/front/view.py - > reaches line 39, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(id=customer.id) - - - -raindrop4steven/tornadoFlask -https://github.com/raindrop4steven/tornadoFlask -Entry file: tornadoFlask/hello.py -Scanned: 2016-10-25 23:04:35.575394 -No vulnerabilities found. - - -samwuu/flask_demo -https://github.com/samwuu/flask_demo -Entry file: flask_demo/app/__init__.py -Scanned: 2016-10-25 23:04:37.030368 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zengyifa/flask-starter -https://github.com/zengyifa/flask-starter -Entry file: None -Scanned: 2016-10-25 23:04:37.570546 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zengyifa/flask-starter. - -mauriciorey/learning_flask -https://github.com/mauriciorey/learning_flask -Entry file: learning_flask/routes.py -Scanned: 2016-10-25 23:04:39.463185 -Vulnerability 1: -File: learning_flask/routes.py - > User input at line 85, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/routes.py - > Line 89: my_coordinates = p.address_to_latlng(address) - File: learning_flask/routes.py - > Line 90: places = p.query(address) - File: learning_flask/routes.py - > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/routes.py - > Line 77: places = [] - File: learning_flask/routes.py - > Line 78: my_coordinates = (42.335647, -71.07505600000002) - File: learning_flask/routes.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/routes.py - > reaches line 93, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - -Vulnerability 2: -File: learning_flask/routes.py - > User input at line 85, trigger word ".data": - address = form.address.data -Reassigned in: - File: learning_flask/routes.py - > Line 89: my_coordinates = p.address_to_latlng(address) - File: learning_flask/routes.py - > Line 90: places = p.query(address) - File: learning_flask/routes.py - > Line 73: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: learning_flask/routes.py - > Line 77: places = [] - File: learning_flask/routes.py - > Line 78: my_coordinates = (42.335647, -71.07505600000002) - File: learning_flask/routes.py - > Line 82: ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form) -File: learning_flask/routes.py - > reaches line 96, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('home.html',form=form, my_coordinates=my_coordinates, places=places) - - - -cjmochrie/Flask-Demo -https://github.com/cjmochrie/Flask-Demo -Entry file: None -Scanned: 2016-10-25 23:04:40.867274 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cjmochrie/Flask-Demo. - -cyan-blue/my_flask -https://github.com/cyan-blue/my_flask -Entry file: my_flask/doc/schedular.py -Scanned: 2016-10-25 23:04:42.319689 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zachary-russell/Flask-Microblog -https://github.com/zachary-russell/Flask-Microblog -Entry file: Flask-Microblog/microblog/app/__init__.py -Scanned: 2016-10-25 23:04:43.633954 -No vulnerabilities found. - - -LeonNie52/Learn_Flask -https://github.com/LeonNie52/Learn_Flask -Entry file: Learn_Flask/hello.py -Scanned: 2016-10-25 23:04:45.507986 -Vulnerability 1: -File: Learn_Flask/app/main/views.py - > User input at line 42, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 50: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Learn_Flask/app/main/views.py - > Line 52: posts = pagination.items - File: Learn_Flask/app/main/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.blog')) -File: Learn_Flask/app/main/views.py - > reaches line 53, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Learn_Flask/app/main/views.py - > User input at line 45, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 43: show_followed = False - File: Learn_Flask/app/main/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.blog')) -File: Learn_Flask/app/main/views.py - > reaches line 53, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Learn_Flask/app/main/views.py - > User input at line 68, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 70: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Learn_Flask/app/main/views.py - > Line 72: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Learn_Flask/app/main/views.py - > Line 75: comments = pagination.items - File: Learn_Flask/app/main/views.py - > Line 67: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Learn_Flask/app/main/views.py - > reaches line 76, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: Learn_Flask/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Learn_Flask/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Learn_Flask/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Learn_Flask/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: Learn_Flask/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Learn_Flask/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Learn_Flask/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Learn_Flask/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Learn_Flask/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Learn_Flask/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Learn_Flask/app/main/views.py - > Line 246: comments = pagination.items -File: Learn_Flask/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -penguin-penpen/learnFlask -https://github.com/penguin-penpen/learnFlask -Entry file: None -Scanned: 2016-10-25 23:04:46.042869 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/penguin-penpen/learnFlask. - -pfig/flask-elasticsearch -https://github.com/pfig/flask-elasticsearch -Entry file: flask-elasticsearch/flask_elasticsearch.py -Scanned: 2016-10-25 23:04:47.473030 -No vulnerabilities found. - - -olive42/moz-flask -https://github.com/olive42/moz-flask -Entry file: moz-flask/hello.py -Scanned: 2016-10-25 23:04:48.813971 -No vulnerabilities found. - - -nimeshkverma/Ideal_Flask -https://github.com/nimeshkverma/Ideal_Flask -Entry file: Ideal_Flask/LargeApp/app/__init__.py -Scanned: 2016-10-25 23:04:52.506860 -Vulnerability 1: -File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py - > User input at line 31, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py - > Line 35: session['user_id'] = user.id -File: Ideal_Flask/LargeApp/app/mod_auth/controllers.py - > reaches line 37, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -tholsapp/flask_framework -https://github.com/tholsapp/flask_framework -Entry file: flask_framework/app/__init__.py -Scanned: 2016-10-25 23:04:54.027785 -No vulnerabilities found. - - -nivanko/flask-catalog -https://github.com/nivanko/flask-catalog -Entry file: flask-catalog/application.py -Scanned: 2016-10-25 23:05:02.390874 -Vulnerability 1: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 162, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edit.html',categories=categories, category_id=category.id, item=item, login=login_session.get('username')) - -Vulnerability 2: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 186, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name)) - -Vulnerability 3: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 186, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name)) - - - -jaramago/flask-basic -https://github.com/jaramago/flask-basic -Entry file: flask-basic/app/__init__.py -Scanned: 2016-10-25 23:05:04.125866 -No vulnerabilities found. - - -valdemarpereira/flask_tutorial -https://github.com/valdemarpereira/flask_tutorial -Entry file: None -Scanned: 2016-10-25 23:05:04.678998 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/valdemarpereira/flask_tutorial. - -jit-1/flask-microblog -https://github.com/jit-1/flask-microblog -Entry file: None -Scanned: 2016-10-25 23:05:06.178663 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jit-1/flask-microblog. - -nof4444/Flask-mongodb -https://github.com/nof4444/Flask-mongodb -Entry file: Flask-mongodb/blog.py -Scanned: 2016-10-25 23:05:12.457496 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-mongodb/env/lib/python2.7/sre_compile.py - -VictorDMor/flask-app -https://github.com/VictorDMor/flask-app -Entry file: flask-app/app/__init__.py -Scanned: 2016-10-25 23:05:24.076947 -No vulnerabilities found. - - -setiaji/learn_flask -https://github.com/setiaji/learn_flask -Entry file: learn_flask/__init__.py -Scanned: 2016-10-25 23:05:25.383179 -No vulnerabilities found. - - -sunway1988/MyFlask -https://github.com/sunway1988/MyFlask -Entry file: MyFlask/app/__init__.py -Scanned: 2016-10-25 23:05:27.244613 -No vulnerabilities found. - - -ottoman91/flask_tutorial -https://github.com/ottoman91/flask_tutorial -Entry file: None -Scanned: 2016-10-25 23:05:27.802174 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ottoman91/flask_tutorial. - -anbasile/flask_sample -https://github.com/anbasile/flask_sample -Entry file: flask_sample/app.py -Scanned: 2016-10-25 23:05:36.619681 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_sample/flask/lib/python2.7/sre_compile.py - -HiagoMayk/projetoFlask -https://github.com/HiagoMayk/projetoFlask -Entry file: projetoFlask/routes.py -Scanned: 2016-10-25 23:05:39.226051 -No vulnerabilities found. - - -nimeshkverma/Versioned_Flask -https://github.com/nimeshkverma/Versioned_Flask -Entry file: Versioned_Flask/app/__init__.py -Scanned: 2016-10-25 23:05:41.249014 -No vulnerabilities found. - - -catcoderphp/flask-test -https://github.com/catcoderphp/flask-test -Entry file: flask-test/app.py -Scanned: 2016-10-25 23:05:44.390026 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-test/venv/lib/python2.7/sre_compile.py - -huyquyet/flask-demo -https://github.com/huyquyet/flask-demo -Entry file: flask-demo/flask_demo/__init__.py -Scanned: 2016-10-25 23:05:46.619401 -No vulnerabilities found. - - -seonhyeshin/flask-mysql -https://github.com/seonhyeshin/flask-mysql -Entry file: None -Scanned: 2016-10-25 23:05:57.720936 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -euler1337/flask_tutorial -https://github.com/euler1337/flask_tutorial -Entry file: None -Scanned: 2016-10-25 23:05:58.234416 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/euler1337/flask_tutorial. - -PhilipGough/flask_api -https://github.com/PhilipGough/flask_api -Entry file: flask_api/app/__init__.py -Scanned: 2016-10-25 23:06:02.041726 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -lauradebella/treinamentoFlask -https://github.com/lauradebella/treinamentoFlask -Entry file: treinamentoFlask/tutorialPythonClub/app.py -Scanned: 2016-10-25 23:06:19.121166 -No vulnerabilities found. - - -seanbehan/flask_websockets -https://github.com/seanbehan/flask_websockets -Entry file: flask_websockets/app.py -Scanned: 2016-10-25 23:06:21.041760 -No vulnerabilities found. - - -mburke05/flask_tutorial -https://github.com/mburke05/flask_tutorial -Entry file: None -Scanned: 2016-10-25 23:06:21.570398 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mburke05/flask_tutorial. - -dhruvagarwal/flask_restdemo -https://github.com/dhruvagarwal/flask_restdemo -Entry file: flask_restdemo/example/main.py -Scanned: 2016-10-25 23:06:22.956976 -No vulnerabilities found. - - -elphinkuo/ji_python_flask -https://github.com/elphinkuo/ji_python_flask -Entry file: ji_python_flask/app/musicModify.py -Scanned: 2016-10-25 23:06:24.886857 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -rjuppa/microblog -https://github.com/rjuppa/microblog -Entry file: None -Scanned: 2016-10-25 23:06:25.416125 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rjuppa/microblog. - -depaoli/FlaskAppSample -https://github.com/depaoli/FlaskAppSample -Entry file: FlaskAppSample/flask_app_sample/__init__.py -Scanned: 2016-10-25 23:06:26.803815 -No vulnerabilities found. - - -webon100/ross_flask01 -https://github.com/webon100/ross_flask01 -Entry file: None -Scanned: 2016-10-25 23:06:30.740910 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AlexProv/flaskRestApiSkeleton -https://github.com/AlexProv/flaskRestApiSkeleton -Entry file: flaskRestApiSkeleton/flaskServer.py -Scanned: 2016-10-25 23:06:32.032067 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -tommyblue/flask-react-blog -https://github.com/tommyblue/flask-react-blog -Entry file: flask-react-blog/initializer.py -Scanned: 2016-10-25 23:06:33.750978 -No vulnerabilities found. - - -MikeHannon/python_flask_teams -https://github.com/MikeHannon/python_flask_teams -Entry file: python_flask_teams/server.py -Scanned: 2016-10-25 23:06:35.052364 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Cosaquee/flask-weather-app -https://github.com/Cosaquee/flask-weather-app -Entry file: flask-weather-app/main.py -Scanned: 2016-10-25 23:06:38.808747 -No vulnerabilities found. - - -xavinso/flask_hello_world -https://github.com/xavinso/flask_hello_world -Entry file: flask_hello_world/app.py -Scanned: 2016-10-25 23:06:41.434666 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Ryanglambert/playing_with_flask -https://github.com/Ryanglambert/playing_with_flask -Entry file: playing_with_flask/hello.py -Scanned: 2016-10-25 23:06:43.054984 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -aetherwu/Flask-Docker-Template -https://github.com/aetherwu/Flask-Docker-Template -Entry file: Flask-Docker-Template/flask/web/__init__.py -Scanned: 2016-10-25 23:06:53.195663 -Vulnerability 1: -File: Flask-Docker-Template/flask/web/views.py - > User input at line 234, trigger word ".data": - kw = form.name.data -File: Flask-Docker-Template/flask/web/views.py - > reaches line 236, trigger word "filter(": - user = User.query.filter(User.nickname == kw).first() - -Vulnerability 2: -File: Flask-Docker-Template/flask/web/views.py - > User input at line 562, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Docker-Template/flask/web/views.py - > Line 550: user = User.query.filter_by(email=user_email).first() - File: Flask-Docker-Template/flask/web/views.py - > Line 552: current_user.id = user.id - File: Flask-Docker-Template/flask/web/views.py - > Line 577: current_user.id = user.id -File: Flask-Docker-Template/flask/web/views.py - > reaches line 554, trigger word "set_cookie(": - response.set_cookie('user_email', str(user.email),expires=time.time() + 6000 * 60) - -Vulnerability 3: -File: Flask-Docker-Template/flask/web/views.py - > User input at line 562, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Docker-Template/flask/web/views.py - > Line 550: user = User.query.filter_by(email=user_email).first() - File: Flask-Docker-Template/flask/web/views.py - > Line 552: current_user.id = user.id - File: Flask-Docker-Template/flask/web/views.py - > Line 577: current_user.id = user.id -File: Flask-Docker-Template/flask/web/views.py - > reaches line 587, trigger word "set_cookie(": - response.set_cookie('user_email', str(user.email),expires=time.time() + 6000 * 60) - - - -tomquirk/js-flavoured-flask -https://github.com/tomquirk/js-flavoured-flask -Entry file: js-flavoured-flask/app/__init__.py -Scanned: 2016-10-25 23:06:54.860396 -No vulnerabilities found. - - -gtlambert/first_flask_app -https://github.com/gtlambert/first_flask_app -Entry file: first_flask_app/app.py -Scanned: 2016-10-25 23:06:59.710937 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -AngelMunoz/Flask-Blueprints-Template -https://github.com/AngelMunoz/Flask-Blueprints-Template -Entry file: Flask-Blueprints-Template/app/__init__.py -Scanned: 2016-10-25 23:07:01.163686 -Vulnerability 1: -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > User input at line 15, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > Line 17: session['user_id'] = user.id -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > reaches line 18, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -ArTrics/Flask_Angular_Project -https://github.com/ArTrics/Flask_Angular_Project -Entry file: Flask_Angular_Project/index.py -Scanned: 2016-10-25 23:07:05.061438 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask_Angular_Project/venv/lib/python2.7/sre_compile.py - -orjanv/ESVtoLeetFlaskApp -https://github.com/orjanv/ESVtoLeetFlaskApp -Entry file: ESVtoLeetFlaskApp/app.py -Scanned: 2016-10-25 23:07:06.568172 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ptmccarthy/flask-microblog-tutorial -https://github.com/ptmccarthy/flask-microblog-tutorial -Entry file: flask-microblog-tutorial/app/__init__.py -Scanned: 2016-10-25 23:07:08.020121 -No vulnerabilities found. - - -bronka/flask-hello-world -https://github.com/bronka/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:07:08.556729 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Pensu/flask-ppc64le -https://github.com/Pensu/flask-ppc64le -Entry file: flask-ppc64le/app.py -Scanned: 2016-10-25 23:07:09.905782 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mdublin/Flask-CRUD-template -https://github.com/mdublin/Flask-CRUD-template -Entry file: Flask-CRUD-template/blog/__init__.py -Scanned: 2016-10-25 23:07:14.888270 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -lwjones/flask-hello-world -https://github.com/lwjones/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:07:15.483036 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -renmmotp/Ren_Learns_Flask -https://github.com/renmmotp/Ren_Learns_Flask -Entry file: Ren_Learns_Flask/flaskr/flaskr.py -Scanned: 2016-10-25 23:07:16.909626 -No vulnerabilities found. - - -leonidas/flask-spa-routing-example -https://github.com/leonidas/flask-spa-routing-example -Entry file: None -Scanned: 2016-10-25 23:07:18.212771 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/leonidas/flask-spa-routing-example. - -zxqwerxz/test_flask_deploy -https://github.com/zxqwerxz/test_flask_deploy -Entry file: test_flask_deploy/hello.py -Scanned: 2016-10-25 23:07:19.521810 -No vulnerabilities found. - - -mbreisch/flask-hello-world -https://github.com/mbreisch/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:07:20.064672 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sidthakur/docker-single-nginx-flask -https://github.com/sidthakur/docker-single-nginx-flask -Entry file: docker-single-nginx-flask/app/app.py -Scanned: 2016-10-25 23:07:21.366716 -No vulnerabilities found. - - -posenberg/Flask-Kickstarter-Clone -https://github.com/posenberg/Flask-Kickstarter-Clone -Entry file: Flask-Kickstarter-Clone/punchstarter/__init__.py -Scanned: 2016-10-25 23:07:23.409787 -Vulnerability 1: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 42, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 43: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 2: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 46, trigger word "files[": - cover_photo = request.files['cover_photo'] -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 47: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=600, height=550) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 53: image_filename = uploaded_image['public_id'] - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 3: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 56, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 4: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 42, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 43: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 5: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 46, trigger word "files[": - cover_photo = request.files['cover_photo'] -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 47: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=600, height=550) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 53: image_filename = uploaded_image['public_id'] - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 56: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 6: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 56, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 73, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 7: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 81, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project) - -Vulnerability 8: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 89, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 94, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project) - -Vulnerability 9: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 89, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 111, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 10: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 89, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 102: new_pledge = Pledge(member_id=guest_creator.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 111, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 11: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 115, trigger word "get(": - query = request.args.get('q') or '' -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 124: query_text = query != ''query'all projects' -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 116, trigger word "filter(": - projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all() - -Vulnerability 12: -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > User input at line 115, trigger word "get(": - query = request.args.get('q') or '' -Reassigned in: - File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > Line 124: query_text = query != ''query'all projects' -File: Flask-Kickstarter-Clone/punchstarter/__init__.py - > reaches line 126, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query_text, projects=projects, project_count=project_count) - - - -pythonvietnam/meetup01-flask -https://github.com/pythonvietnam/meetup01-flask -Entry file: meetup01-flask/hello_world.py -Scanned: 2016-10-25 23:07:24.897470 -Vulnerability 1: -File: meetup01-flask/template.py - > User input at line 9, trigger word "get(": - name = request.args.get('name', 'guy') -File: meetup01-flask/template.py - > reaches line 10, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',name=name) - - - -palden/flask-hello-world -https://github.com/palden/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:07:25.435136 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -shane-kercheval/flask-postgresql-template -https://github.com/shane-kercheval/flask-postgresql-template -Entry file: flask-postgresql-template/app_factory.py -Scanned: 2016-10-25 23:07:27.622357 -Vulnerability 1: -File: flask-postgresql-template/app.py - > User input at line 49, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask-postgresql-template/app.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-postgresql-template/app.py - > reaches line 53, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('app_default')) - -Vulnerability 2: -File: flask-postgresql-template/app.py - > User input at line 49, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask-postgresql-template/app.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask-postgresql-template/app.py - > reaches line 53, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('app_default')) - - - -jhh/puka-server-flask -https://github.com/jhh/puka-server-flask -Entry file: None -Scanned: 2016-10-25 23:07:29.038235 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jhh/puka-server-flask. - -zhujian0805/my-website-by-flask -https://github.com/zhujian0805/my-website-by-flask -Entry file: my-website-by-flask/flaskr/flaskr.py -Scanned: 2016-10-25 23:07:30.684906 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -charanjp/flask -https://github.com/charanjp/flask -Entry file: None -Scanned: 2016-10-25 23:07:32.705584 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yasskh/flask -https://github.com/yasskh/flask -Entry file: None -Scanned: 2016-10-25 23:07:33.236794 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -poxstone/flask -https://github.com/poxstone/flask -Entry file: None -Scanned: 2016-10-25 23:07:34.742436 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -FlaskTutorial/Flask -https://github.com/FlaskTutorial/Flask -Entry file: None -Scanned: 2016-10-25 23:07:36.283830 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -OnlySHI/flask -https://github.com/OnlySHI/flask -Entry file: None -Scanned: 2016-10-25 23:07:39.814014 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jvuori/flask-uwsgi-nginx-haproxy-docker -https://github.com/jvuori/flask-uwsgi-nginx-haproxy-docker -Entry file: flask-uwsgi-nginx-haproxy-docker/web/app.py -Scanned: 2016-10-25 23:07:43.131840 -No vulnerabilities found. - - -akupara/flask_inspector -https://github.com/akupara/flask_inspector -Entry file: flask_inspector/example/app.py -Scanned: 2016-10-25 23:07:44.874124 -No vulnerabilities found. - - -soasme/flask-personal-access-token -https://github.com/soasme/flask-personal-access-token -Entry file: flask-personal-access-token/example.py -Scanned: 2016-10-25 23:07:56.027994 -Vulnerability 1: -File: flask-personal-access-token/flask_personal_access_token/admin.py - > User input at line 18, trigger word "get(": - render_data = 'base_api_url''base_web_url''debug'current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_API_PREFIX')current_app.config.get('PERSONAL_ACCESS_TOKEN_ADMIN_PREFIX')current_app.config.get('DEBUG') -File: flask-personal-access-token/flask_personal_access_token/admin.py - > reaches line 23, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('/personal_access_token/index.html',render_data) - - - -gileez/flasker -https://github.com/gileez/flasker -Entry file: flasker/flasker/__init__.py -Scanned: 2016-10-25 23:07:57.411753 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -shinycoo/flaskmvcsample -https://github.com/shinycoo/flaskmvcsample -Entry file: flaskmvcsample/app.py -Scanned: 2016-10-25 23:08:01.953027 -No vulnerabilities found. - - -alexwilkerson/flasktaskr -https://github.com/alexwilkerson/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:08:02.538788 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sindhus/flaskr -https://github.com/sindhus/flaskr -Entry file: None -Scanned: 2016-10-25 23:08:06.053736 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sindhus/flaskr. - -apeete/flasktaskr -https://github.com/apeete/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:08:07.599551 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -slippers/flasksec -https://github.com/slippers/flasksec -Entry file: flasksec/main/__init__.py -Scanned: 2016-10-25 23:08:09.910689 -No vulnerabilities found. - - -rui7157/Flask-NvRay-Blog -https://github.com/rui7157/Flask-NvRay-Blog -Entry file: Flask-NvRay-Blog/app/__init__.py -Scanned: 2016-10-25 23:08:14.345570 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Ineeza/FlaskAppBuilder -https://github.com/Ineeza/FlaskAppBuilder -Entry file: FlaskAppBuilder/src/classes/__init__.py -Scanned: 2016-10-25 23:08:15.807833 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -junniepat/FlaskApp -https://github.com/junniepat/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-25 23:08:17.076305 -No vulnerabilities found. - - -YoungGer/FlaskApps -https://github.com/YoungGer/FlaskApps -Entry file: FlaskApps/helloWorld/hello.py -Scanned: 2016-10-25 23:08:18.664462 -No vulnerabilities found. - - -yasskh/FlaskProject -https://github.com/yasskh/FlaskProject -Entry file: FlaskProject/views.py -Scanned: 2016-10-25 23:08:24.444066 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -DamithaPerera/FlaskApp -https://github.com/DamithaPerera/FlaskApp -Entry file: FlaskApp/app.py -Scanned: 2016-10-25 23:08:25.771465 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -dreammis/Flask02 -https://github.com/dreammis/Flask02 -Entry file: Flask02/app/__init__.py -Scanned: 2016-10-25 23:08:27.051136 -No vulnerabilities found. - - -land-pack/flaskBlog -https://github.com/land-pack/flaskBlog -Entry file: flaskBlog/flaskr.py -Scanned: 2016-10-25 23:08:28.342252 -No vulnerabilities found. - - -deyoppe/FlaskFire -https://github.com/deyoppe/FlaskFire -Entry file: FlaskFire/core/system/app.py -Scanned: 2016-10-25 23:08:29.829343 -No vulnerabilities found. - - -Njsao/FlaskServer -https://github.com/Njsao/FlaskServer -Entry file: FlaskServer/untitled.py -Scanned: 2016-10-25 23:08:31.255944 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -OscarMelin/learning-flask-bootstrap -https://github.com/OscarMelin/learning-flask-bootstrap -Entry file: learning-flask-bootstrap/__init__.py -Scanned: 2016-10-25 23:08:35.718542 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learning-flask-bootstrap/venv/lib/python2.7/sre_compile.py - -allianRoman/flask-intro -https://github.com/allianRoman/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:08:37.067365 -No vulnerabilities found. - - -hunt3ri/temp-flask -https://github.com/hunt3ri/temp-flask -Entry file: temp-flask/app/__init__.py -Scanned: 2016-10-25 23:08:38.492471 -No vulnerabilities found. - - -noamoss/flask-blog -https://github.com/noamoss/flask-blog -Entry file: None -Scanned: 2016-10-25 23:08:39.018661 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Jiezhi/HelloFlask -https://github.com/Jiezhi/HelloFlask -Entry file: HelloFlask/my_app/__init__.py -Scanned: 2016-10-25 23:08:40.420018 -Vulnerability 1: -File: HelloFlask/my_app/product/views.py - > User input at line 16, trigger word "get(": - product = PRODUCTS.get(key) -File: HelloFlask/my_app/product/views.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('product.html',product=product) - - - -szhjia/flask-blog -https://github.com/szhjia/flask-blog -Entry file: None -Scanned: 2016-10-25 23:08:40.964187 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -amybethx/flask-intro -https://github.com/amybethx/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:08:42.283667 -No vulnerabilities found. - - -terriwong/flask-intro -https://github.com/terriwong/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:08:43.593363 -No vulnerabilities found. - - -arkenidar/flask-example -https://github.com/arkenidar/flask-example -Entry file: flask-example/server.py -Scanned: 2016-10-25 23:08:44.961630 -Vulnerability 1: -File: flask-example/server.py - > User input at line 8, trigger word "get(": - query = request.args.get('query', '') -Reassigned in: - File: flask-example/server.py - > Line 9: title = query == '''Search page''Search result for ' + query - File: flask-example/server.py - > Line 17: items = query == ''items[item for item in items] - File: flask-example/server.py - > Line 10: items = ['url''title''http://abc.com/''abc', 'url''title''http://xyz.com/''xyz', 'url''title''http://abcxyz.com/''abcxyz', 'url''title''http://123.com/''123', 'url''title''http://qwerty.com/''qwerty'] -File: flask-example/server.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('form.html',title=title, query=query, items=items) - - - -ztomazin/flask_exp -https://github.com/ztomazin/flask_exp -Entry file: flask_exp/app/__init__.py -Scanned: 2016-10-25 23:08:51.783682 -No vulnerabilities found. - - -ltaziri/Flask-Intro -https://github.com/ltaziri/Flask-Intro -Entry file: Flask-Intro/nice.py -Scanned: 2016-10-25 23:08:53.249892 -No vulnerabilities found. - - -alitsiya/flask-intro -https://github.com/alitsiya/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:08:54.597074 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -taisa007/timeliner-flask -https://github.com/taisa007/timeliner-flask -Entry file: timeliner-flask/timeliner/timeliner/__init__.py -Scanned: 2016-10-25 23:08:56.019066 -No vulnerabilities found. - - -sandiego206/flask_microblog -https://github.com/sandiego206/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-25 23:08:57.690793 -No vulnerabilities found. - - -Odava/flask-jwt -https://github.com/Odava/flask-jwt -Entry file: flask-jwt/tests/conftest.py -Scanned: 2016-10-25 23:08:59.344943 -No vulnerabilities found. - - -nivanko/flask-catalog -https://github.com/nivanko/flask-catalog -Entry file: flask-catalog/application.py -Scanned: 2016-10-25 23:09:05.000957 -Vulnerability 1: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 162, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edit.html',categories=categories, category_id=category.id, item=item, login=login_session.get('username')) - -Vulnerability 2: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 186, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name)) - -Vulnerability 3: -File: flask-catalog/application.py - > User input at line 184, trigger word "form[": - category = db_session.query(Category).filter_by(id=request.form['category_id']).one() -Reassigned in: - File: flask-catalog/application.py - > Line 160: category = db_session.query(Category).filter_by(name=category_name).one() - File: flask-catalog/application.py - > Line 147: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) - File: flask-catalog/application.py - > Line 151: ret_MAYBE_FUNCTION_NAME = ' - ' % url_for('list_categories') -File: flask-catalog/application.py - > reaches line 186, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_items',category_name=category.name)) - - - -ajoshdee/flask-test -https://github.com/ajoshdee/flask-test -Entry file: flask-test/app.py -Scanned: 2016-10-25 23:09:21.100386 -No vulnerabilities found. - - -palden/flask-blog -https://github.com/palden/flask-blog -Entry file: None -Scanned: 2016-10-25 23:09:21.629083 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -humaneu/flask_app -https://github.com/humaneu/flask_app -Entry file: None -Scanned: 2016-10-25 23:09:29.402979 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cclittle13/flask-intro -https://github.com/cclittle13/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:30.701528 -No vulnerabilities found. - - -emlam/flask-intro -https://github.com/emlam/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:31.980637 -No vulnerabilities found. - - -spyapali/Flask-intro -https://github.com/spyapali/Flask-intro -Entry file: Flask-intro/nice.py -Scanned: 2016-10-25 23:09:33.261153 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -celiawaggoner/flask-intro -https://github.com/celiawaggoner/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:34.552919 -No vulnerabilities found. - - -cachar/flask-intro -https://github.com/cachar/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:35.823803 -No vulnerabilities found. - - -KTAtkinson/flask-intro -https://github.com/KTAtkinson/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:37.109719 -No vulnerabilities found. - - -pasysxa/flask-mall -https://github.com/pasysxa/flask-mall -Entry file: flask-mall/myapp/__init__.py -Scanned: 2016-10-25 23:09:38.388285 -No vulnerabilities found. - - -fendouai/venv_flask -https://github.com/fendouai/venv_flask -Entry file: venv_flask/get.py -Scanned: 2016-10-25 23:09:41.851273 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: venv_flask/venv/lib/python2.7/sre_compile.py - -leiyue/learning_flask -https://github.com/leiyue/learning_flask -Entry file: learning_flask/miniblog/miniblog.py -Scanned: 2016-10-25 23:09:43.191097 -No vulnerabilities found. - - -florenceloi/flask-intro -https://github.com/florenceloi/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:44.482518 -No vulnerabilities found. - - -DoriRunyon/flask-intro -https://github.com/DoriRunyon/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:45.776644 -No vulnerabilities found. - - -qistchan/WebhookFlask -https://github.com/qistchan/WebhookFlask -Entry file: WebhookFlask/WebHook_Listener.py -Scanned: 2016-10-25 23:09:47.054154 -No vulnerabilities found. - - -GeetikaBatra/Flask_intro -https://github.com/GeetikaBatra/Flask_intro -Entry file: None -Scanned: 2016-10-25 23:09:52.964524 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kooder18/flask_Ecommerce -https://github.com/kooder18/flask_Ecommerce -Entry file: flask_Ecommerce/project.py -Scanned: 2016-10-25 23:09:54.430191 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -alenakruchkova/flask-intro -https://github.com/alenakruchkova/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:55.696198 -No vulnerabilities found. - - -bekkam/flask-intro -https://github.com/bekkam/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:56.970405 -No vulnerabilities found. - - -anniehe/flask-intro -https://github.com/anniehe/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:58.245114 -No vulnerabilities found. - - -Vianey81/flask-intro -https://github.com/Vianey81/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:09:59.522749 -No vulnerabilities found. - - -mcbishop/flask-intro -https://github.com/mcbishop/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:10:00.816932 -No vulnerabilities found. - - -Bandurin/Test-flask -https://github.com/Bandurin/Test-flask -Entry file: Test-flask/db_app.py -Scanned: 2016-10-25 23:10:03.936507 -No vulnerabilities found. - - -0phelia/flask-app -https://github.com/0phelia/flask-app -Entry file: flask-app/flask_webserver.py -Scanned: 2016-10-25 23:10:05.299727 -No vulnerabilities found. - - -lauradebella/treinamentoFlask -https://github.com/lauradebella/treinamentoFlask -Entry file: treinamentoFlask/tutorialPythonClub/app.py -Scanned: 2016-10-25 23:10:12.913813 -No vulnerabilities found. - - -seanbehan/flask_websockets -https://github.com/seanbehan/flask_websockets -Entry file: flask_websockets/app.py -Scanned: 2016-10-25 23:10:14.254870 -No vulnerabilities found. - - -ssam123/flask-tutorial -https://github.com/ssam123/flask-tutorial -Entry file: flask-tutorial/hello.py -Scanned: 2016-10-25 23:10:15.557254 -No vulnerabilities found. - - -ziyoung/learningFlask -https://github.com/ziyoung/learningFlask -Entry file: learningFlask/hello.py -Scanned: 2016-10-25 23:10:21.053381 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: learningFlask/venv/lib/python2.7/sre_compile.py - -karayount/flask-intro -https://github.com/karayount/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:10:23.386069 -No vulnerabilities found. - - -go-bears/flask-intro -https://github.com/go-bears/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:10:24.689743 -No vulnerabilities found. - - -mlpeters12/flask-intro -https://github.com/mlpeters12/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:10:31.123604 -No vulnerabilities found. - - -arbonap/flask-intro -https://github.com/arbonap/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:10:32.412428 -No vulnerabilities found. - - -nimeshkverma/SolrFlask -https://github.com/nimeshkverma/SolrFlask -Entry file: SolrFlask/app/app_config.py -Scanned: 2016-10-25 23:10:33.818511 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -gaozhidf/flask_websocket -https://github.com/gaozhidf/flask_websocket -Entry file: flask_websocket/websocket_py3_2/app.py -Scanned: 2016-10-25 23:10:42.863977 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -hilyas/flask-blog -https://github.com/hilyas/flask-blog -Entry file: None -Scanned: 2016-10-25 23:10:43.542768 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dimy407/NBC_Flask -https://github.com/dimy407/NBC_Flask -Entry file: NBC_Flask/flask_app.py -Scanned: 2016-10-25 23:10:49.552512 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ltaziri/Flask-Shopping -https://github.com/ltaziri/Flask-Shopping -Entry file: Flask-Shopping/shoppingsite.py -Scanned: 2016-10-25 23:10:51.316485 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jefersondaniel/notebook-api -https://github.com/jefersondaniel/notebook-api -Entry file: notebook-api/app/__init__.py -Scanned: 2016-10-25 23:10:52.785124 -No vulnerabilities found. - - -ddrsmile/flask-hello-world -https://github.com/ddrsmile/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:10:53.319597 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -webon100/ross_flask01 -https://github.com/webon100/ross_flask01 -Entry file: None -Scanned: 2016-10-25 23:10:53.842900 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -saviour123/flaskStudentData -https://github.com/saviour123/flaskStudentData -Entry file: flaskStudentData/app.py -Scanned: 2016-10-25 23:10:55.136276 -Vulnerability 1: -File: flaskStudentData/app.py - > User input at line 29, trigger word "form[": - name = request.form['nm'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - -Vulnerability 2: -File: flaskStudentData/app.py - > User input at line 30, trigger word "form[": - addr = request.form['add'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - -Vulnerability 3: -File: flaskStudentData/app.py - > User input at line 31, trigger word "form[": - city = request.form['city'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - -Vulnerability 4: -File: flaskStudentData/app.py - > User input at line 32, trigger word "form[": - pin = request.form['pin'] -File: flaskStudentData/app.py - > reaches line 35, trigger word "execute(": - cur = con.cursor().execute('INSERT INTO students (name,addr,city,pin) VALUES (?,?,?,?)', (name, addr, city, pin)) - - - -QLGu/flask-zhihu-demo -https://github.com/QLGu/flask-zhihu-demo -Entry file: flask-zhihu-demo/www/__init__.py -Scanned: 2016-10-25 23:10:57.164987 -Vulnerability 1: -File: flask-zhihu-demo/www/main/views.py - > User input at line 35, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 33: show_followed = False - File: flask-zhihu-demo/www/main/views.py - > Line 32: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.signin')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 55, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',show_followed=show_followed, quoras=quoras, users=users) - -Vulnerability 2: -File: flask-zhihu-demo/www/main/views.py - > User input at line 312, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 313: pagination = user.followed.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 314: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 311: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 316, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注的人', endpoint='main.followed_by', pagination=pagination, follows=follows) - -Vulnerability 3: -File: flask-zhihu-demo/www/main/views.py - > User input at line 327, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 328: pagination = user.followers.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 329: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 326: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 331, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='的关注者', endpoint='main.followers', pagination=pagination, follows=follows) - -Vulnerability 4: -File: flask-zhihu-demo/www/main/views.py - > User input at line 430, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 431: pagination = user.tags.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 432: following_tags = ['tag'item.tag_set for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 429: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 433, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('following_topics.html',user=user, title='关注的话题', endpoint='main.following_tag', pagination=pagination, following_tags=following_tags) - -Vulnerability 5: -File: flask-zhihu-demo/www/main/views.py - > User input at line 444, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 445: pagination = topic.users.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 446: tag_followers = ['user'item.user_set for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 443: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 447, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('topic_followers.html',topic=topic, title='人关注了该话题', endpoint='main.tag_followers', pagination=pagination, tag_followers=tag_followers) - -Vulnerability 6: -File: flask-zhihu-demo/www/main/views.py - > User input at line 500, trigger word ".data": - question = Question(title=form.title.data, content=form.content.data) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 523: ret_MAYBE_FUNCTION_NAME = render_template('question_add.html',form=form) -File: flask-zhihu-demo/www/main/views.py - > reaches line 522, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.question',id=question.id)) - -Vulnerability 7: -File: flask-zhihu-demo/www/main/views.py - > User input at line 500, trigger word ".data": - question = Question(title=form.title.data, content=form.content.data) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 523: ret_MAYBE_FUNCTION_NAME = render_template('question_add.html',form=form) -File: flask-zhihu-demo/www/main/views.py - > reaches line 522, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.question',id=question.id)) - -Vulnerability 8: -File: flask-zhihu-demo/www/main/views.py - > User input at line 563, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 564: pagination = user.user_questions.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 565: questions = pagination.items - File: flask-zhihu-demo/www/main/views.py - > Line 569: questions[j] = questions[j + 1] - File: flask-zhihu-demo/www/main/views.py - > Line 569: questions[j + 1] = questions[j] - File: flask-zhihu-demo/www/main/views.py - > Line 562: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 570, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('following_questions.html',user=user, endpoint='main.people_questions', pagination=pagination, questions=questions) - -Vulnerability 9: -File: flask-zhihu-demo/www/main/views.py - > User input at line 617, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 618: pagination = question.users.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 619: question_followers = ['user'item.q_user for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 616: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 620, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('question_followers.html',question=question, endpoint='main.question_followers', pagination=pagination, question_followers=question_followers) - -Vulnerability 10: -File: flask-zhihu-demo/www/main/views.py - > User input at line 705, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 706: pagination = user.user_answers.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 707: answers = pagination.items - File: flask-zhihu-demo/www/main/views.py - > Line 711: answers[j] = answers[j + 1] - File: flask-zhihu-demo/www/main/views.py - > Line 711: answers[j + 1] = answers[j] - File: flask-zhihu-demo/www/main/views.py - > Line 704: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 712, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('following_answers.html',user=user, endpoint='main.people_answers', pagination=pagination, answers=answers) - -Vulnerability 11: -File: flask-zhihu-demo/www/main/views.py - > User input at line 791, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 792: pagination = answer.users.paginate(page,per_page=100, error_out=False) - File: flask-zhihu-demo/www/main/views.py - > Line 793: answer_followers = ['user'item.a_user for item in pagination.items] - File: flask-zhihu-demo/www/main/views.py - > Line 790: ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.index')) -File: flask-zhihu-demo/www/main/views.py - > reaches line 794, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('answer_followers.html',answer=answer, endpoint='main.answer_followers', pagination=pagination, answer_followers=answer_followers) - -Vulnerability 12: -File: flask-zhihu-demo/www/main/views.py - > User input at line 855, trigger word ".data": - collection = Collection(title=form.title.data, desc=form.desc.data) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 865: ret_MAYBE_FUNCTION_NAME = render_template('collection_add.html',form=form) -File: flask-zhihu-demo/www/main/views.py - > reaches line 864, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.collection',id=collection.id)) - -Vulnerability 13: -File: flask-zhihu-demo/www/main/views.py - > User input at line 855, trigger word ".data": - collection = Collection(title=form.title.data, desc=form.desc.data) -Reassigned in: - File: flask-zhihu-demo/www/main/views.py - > Line 865: ret_MAYBE_FUNCTION_NAME = render_template('collection_add.html',form=form) -File: flask-zhihu-demo/www/main/views.py - > reaches line 864, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('main.collection',id=collection.id)) - - - -AndyMcLEOD/PythonFlaskApp -https://github.com/AndyMcLEOD/PythonFlaskApp -Entry file: PythonFlaskApp/app.py -Scanned: 2016-10-25 23:11:01.011310 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mlsh2387/Ex_20160119_Flask-Intro -https://github.com/mlsh2387/Ex_20160119_Flask-Intro -Entry file: Ex_20160119_Flask-Intro/nice.py -Scanned: 2016-10-25 23:11:02.559146 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jkravanja/paypal_flask_payment -https://github.com/jkravanja/paypal_flask_payment -Entry file: paypal_flask_payment/payment.py -Scanned: 2016-10-25 23:11:03.880003 -Vulnerability 1: -File: paypal_flask_payment/payment.py - > User input at line 36, trigger word "get(": - paymentId = request.args.get('paymentId') -Reassigned in: - File: paypal_flask_payment/payment.py - > Line 40: payment = paypalrestsdk.Payment.find(paymentId) - File: paypal_flask_payment/payment.py - > Line 42: ret_MAYBE_FUNCTION_NAME = 'OK
paymentId: {}
PayerID: {}
'.format(paymentId, PayerID) - File: paypal_flask_payment/payment.py - > Line 45: ret_MAYBE_FUNCTION_NAME = payment.error -File: paypal_flask_payment/payment.py - > reaches line 41, trigger word "execute(": - if payment.execute('payer_id'PayerID): - -Vulnerability 2: -File: paypal_flask_payment/payment.py - > User input at line 37, trigger word "get(": - PayerID = request.args.get('PayerID') -Reassigned in: - File: paypal_flask_payment/payment.py - > Line 42: ret_MAYBE_FUNCTION_NAME = 'OK
paymentId: {}
PayerID: {}
'.format(paymentId, PayerID) - File: paypal_flask_payment/payment.py - > Line 45: ret_MAYBE_FUNCTION_NAME = payment.error -File: paypal_flask_payment/payment.py - > reaches line 41, trigger word "execute(": - if payment.execute('payer_id'PayerID): - - - -yalove/flask-nginx-gunicorn -https://github.com/yalove/flask-nginx-gunicorn -Entry file: flask-nginx-gunicorn/app/hello.py -Scanned: 2016-10-25 23:11:05.244104 -No vulnerabilities found. - - -tolmun/flask-ng-sample -https://github.com/tolmun/flask-ng-sample -Entry file: flask-ng-sample/project/__init__.py -Scanned: 2016-10-25 23:11:07.002621 -Vulnerability 1: -File: flask-ng-sample/project/api/views.py - > User input at line 132, trigger word ".data": - users = schema.dump(results,many=True).data -File: flask-ng-sample/project/api/views.py - > reaches line 133, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users'users) - -Vulnerability 2: -File: flask-ng-sample/project/api/views.py - > User input at line 154, trigger word ".data": - user = schema.dump(results).data -File: flask-ng-sample/project/api/views.py - > reaches line 155, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('user'user) - - - -Michotastico/NetworkInformationFlaskServer -https://github.com/Michotastico/NetworkInformationFlaskServer -Entry file: NetworkInformationFlaskServer/main.py -Scanned: 2016-10-25 23:11:08.368114 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -tjhakseth/Nice-Flask-Intro -https://github.com/tjhakseth/Nice-Flask-Intro -Entry file: Nice-Flask-Intro/nice.py -Scanned: 2016-10-25 23:11:09.733666 -No vulnerabilities found. - - -adamphillips/pi-flask-video-streaming -https://github.com/adamphillips/pi-flask-video-streaming -Entry file: pi-flask-video-streaming/app/main.py -Scanned: 2016-10-25 23:11:11.090668 -No vulnerabilities found. - - -AngelMunoz/Flask-Blueprints-Template -https://github.com/AngelMunoz/Flask-Blueprints-Template -Entry file: Flask-Blueprints-Template/app/__init__.py -Scanned: 2016-10-25 23:11:12.377643 -Vulnerability 1: -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > User input at line 15, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > Line 17: session['user_id'] = user.id -File: Flask-Blueprints-Template/app/mod_auth/controllers.py - > reaches line 18, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -SeventhResolve/Flask-Intro-Nice-File -https://github.com/SeventhResolve/Flask-Intro-Nice-File -Entry file: Flask-Intro-Nice-File/nice.py -Scanned: 2016-10-25 23:11:13.662625 -No vulnerabilities found. - - -torykit/docker-flask-console -https://github.com/torykit/docker-flask-console -Entry file: docker-flask-console/start.py -Scanned: 2016-10-25 23:11:15.057235 -No vulnerabilities found. - - -koulanurag/Simple-Flask-Application -https://github.com/koulanurag/Simple-Flask-Application -Entry file: Simple-Flask-Application/app.py -Scanned: 2016-10-25 23:11:16.362743 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -franklingu/flask_start_demo -https://github.com/franklingu/flask_start_demo -Entry file: flask_start_demo/hello.py -Scanned: 2016-10-25 23:11:18.144310 -No vulnerabilities found. - - -graphql-python/flask-graphql -https://github.com/graphql-python/flask-graphql -Entry file: flask-graphql/tests/app.py -Scanned: 2016-10-25 23:11:21.621611 -Vulnerability 1: -File: flask-graphql/tests/test_graphiqlview.py - > User input at line 13, trigger word "get(": - response = client.get(url_for('graphql'),headers='Accept''text/html') -File: flask-graphql/tests/test_graphiqlview.py - > reaches line 13, trigger word "url_for(": - response = client.get(url_for('graphql'),headers='Accept''text/html') - - - -hhstore/flask-annotated -https://github.com/hhstore/flask-annotated -Entry file: flask-annotated/flask-0.5/flask/module.py -Scanned: 2016-10-25 23:11:24.433796 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhiliang729/flask -https://github.com/zhiliang729/flask -Entry file: None -Scanned: 2016-10-25 23:11:24.951086 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -prakxys/flask -https://github.com/prakxys/flask -Entry file: None -Scanned: 2016-10-25 23:11:30.537637 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -galacticpy/flask -https://github.com/galacticpy/flask -Entry file: None -Scanned: 2016-10-25 23:11:32.289348 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -iFe1er/flask -https://github.com/iFe1er/flask -Entry file: None -Scanned: 2016-10-25 23:11:33.827738 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jarogers095/flask-hello-world -https://github.com/jarogers095/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:11:34.357873 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -alex-paterson/Barebones-Flask-and-Caffe-Classifier -https://github.com/alex-paterson/Barebones-Flask-and-Caffe-Classifier -Entry file: Barebones-Flask-and-Caffe-Classifier/app.py -Scanned: 2016-10-25 23:11:46.016748 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -drone-demos/drone-with-python -https://github.com/drone-demos/drone-with-python -Entry file: drone-with-python/dronedemo/main.py -Scanned: 2016-10-25 23:11:47.410750 -No vulnerabilities found. - - -amirziai/sklearnflask -https://github.com/amirziai/sklearnflask -Entry file: sklearnflask/main.py -Scanned: 2016-10-25 23:11:51.979670 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sanghyunjooPurdue/flaskr -https://github.com/sanghyunjooPurdue/flaskr -Entry file: None -Scanned: 2016-10-25 23:11:52.496294 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanghyunjooPurdue/flaskr. - -becsully/flasktest -https://github.com/becsully/flasktest -Entry file: flasktest/mysite/__init__.py -Scanned: 2016-10-25 23:12:11.252164 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -tehasdf/flaskexample -https://github.com/tehasdf/flaskexample -Entry file: flaskexample/flaskexample/app.py -Scanned: 2016-10-25 23:12:12.744795 -No vulnerabilities found. - - -fengyc/flasky -https://github.com/fengyc/flasky -Entry file: None -Scanned: 2016-10-25 23:12:13.261031 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sshimp/flasktaskr -https://github.com/sshimp/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:12:13.797231 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sharma-abhi/flaskr -https://github.com/sharma-abhi/flaskr -Entry file: None -Scanned: 2016-10-25 23:12:14.317717 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sharma-abhi/flaskr. - -kwikiel/flaskr -https://github.com/kwikiel/flaskr -Entry file: None -Scanned: 2016-10-25 23:12:14.825964 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kwikiel/flaskr. - -SFurnace/flaskr -https://github.com/SFurnace/flaskr -Entry file: None -Scanned: 2016-10-25 23:12:15.352589 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SFurnace/flaskr. - -noamoss/flasktaskr -https://github.com/noamoss/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:12:15.864134 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AxoSal/GAE-Flask-React-skeleton -https://github.com/AxoSal/GAE-Flask-React-skeleton -Entry file: GAE-Flask-React-skeleton/main.py -Scanned: 2016-10-25 23:12:18.704599 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -jrballot/FlaskTaskr -https://github.com/jrballot/FlaskTaskr -Entry file: None -Scanned: 2016-10-25 23:12:19.238456 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jrballot/FlaskTaskr. - -AnshuOnGit/FlaskServices -https://github.com/AnshuOnGit/FlaskServices -Entry file: FlaskServices/read_file.py -Scanned: 2016-10-25 23:12:23.731061 -Vulnerability 1: -File: FlaskServices/read_file.py - > User input at line 40, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/read_file.py - > Line 44: filename = secure_filename(file.filename) -File: FlaskServices/read_file.py - > reaches line 50, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: FlaskServices/read_file.py - > User input at line 40, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/read_file.py - > Line 44: filename = secure_filename(file.filename) -File: FlaskServices/read_file.py - > reaches line 50, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 3: -File: FlaskServices/uploads/read_file.py - > User input at line 50, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/uploads/read_file.py - > Line 54: filename = secure_filename(file.filename) -File: FlaskServices/uploads/read_file.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 4: -File: FlaskServices/uploads/read_file.py - > User input at line 50, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: FlaskServices/uploads/read_file.py - > Line 54: filename = secure_filename(file.filename) -File: FlaskServices/uploads/read_file.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -ftanevski4/FlaskPycharm -https://github.com/ftanevski4/FlaskPycharm -Entry file: FlaskPycharm/FlaskPycharm.py -Scanned: 2016-10-25 23:12:25.089683 -No vulnerabilities found. - - -yasskh/FlaskProject -https://github.com/yasskh/FlaskProject -Entry file: FlaskProject/views.py -Scanned: 2016-10-25 23:12:30.297453 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -yukoga/flasksample1 -https://github.com/yukoga/flasksample1 -Entry file: flasksample1/hello.py -Scanned: 2016-10-25 23:12:31.633295 -No vulnerabilities found. - - -Njsao/FlaskServer -https://github.com/Njsao/FlaskServer -Entry file: FlaskServer/untitled.py -Scanned: 2016-10-25 23:12:33.053571 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -feeman1989/backstage_flask -https://github.com/feeman1989/backstage_flask -Entry file: None -Scanned: 2016-10-25 23:12:39.227321 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -charanjp/flask_blog -https://github.com/charanjp/flask_blog -Entry file: flask_blog/venv/Lib/site-packages/flask_sqlalchemy/__init__.py -Scanned: 2016-10-25 23:12:44.597849 -No vulnerabilities found. - - -jaleskinen/PythonFlask -https://github.com/jaleskinen/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:12:52.995457 -Vulnerability 1: -File: PythonFlask/app/routersi.py - > User input at line 30, trigger word "get(": - name = request.args.get('name') -File: PythonFlask/app/routersi.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name) - - - -maukka76/PythonFlask -https://github.com/maukka76/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:13:00.049542 -No vulnerabilities found. - - -Namelessi/PythonFlask -https://github.com/Namelessi/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:13:06.440852 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mhgit1/PythonFlask -https://github.com/mhgit1/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:13:12.349082 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jlents/discover-flask -https://github.com/jlents/discover-flask -Entry file: discover-flask/project/__init__.py -Scanned: 2016-10-25 23:13:13.990767 -No vulnerabilities found. - - -nimeshkverma/BootstrapFlask -https://github.com/nimeshkverma/BootstrapFlask -Entry file: None -Scanned: 2016-10-25 23:13:16.474616 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ddrsmile/flask-blog -https://github.com/ddrsmile/flask-blog -Entry file: None -Scanned: 2016-10-25 23:13:17.052025 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dasdachs/flask-blog -https://github.com/dasdachs/flask-blog -Entry file: None -Scanned: 2016-10-25 23:13:17.595252 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -noamoss/flask-blog -https://github.com/noamoss/flask-blog -Entry file: None -Scanned: 2016-10-25 23:13:18.107229 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hugoren/flask_login -https://github.com/hugoren/flask_login -Entry file: None -Scanned: 2016-10-25 23:13:19.394086 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hugoren/flask_login. - -yuz989/uwsgi-flask -https://github.com/yuz989/uwsgi-flask -Entry file: uwsgi-flask/main.py -Scanned: 2016-10-25 23:13:20.679783 -No vulnerabilities found. - - -taisa007/timeliner-flask -https://github.com/taisa007/timeliner-flask -Entry file: timeliner-flask/timeliner/timeliner/__init__.py -Scanned: 2016-10-25 23:13:22.097726 -No vulnerabilities found. - - -ddrsmile/flask-taskr -https://github.com/ddrsmile/flask-taskr -Entry file: flask-taskr/views.py -Scanned: 2016-10-25 23:13:23.777765 -No vulnerabilities found. - - -Roconda/flask-bootstrap -https://github.com/Roconda/flask-bootstrap -Entry file: flask-bootstrap/src/api/__init__.py -Scanned: 2016-10-25 23:13:25.170434 -No vulnerabilities found. - - -maxcell/flask-workshop -https://github.com/maxcell/flask-workshop -Entry file: flask-workshop/hello_world/hello.py -Scanned: 2016-10-25 23:13:26.974575 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sshimp/flask-blog -https://github.com/sshimp/flask-blog -Entry file: None -Scanned: 2016-10-25 23:13:27.536936 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -PavelMPD/flask_auth -https://github.com/PavelMPD/flask_auth -Entry file: flask_auth/web/server.py -Scanned: 2016-10-25 23:13:29.308983 -No vulnerabilities found. - - -seanwbarry/thinkful_flask -https://github.com/seanwbarry/thinkful_flask -Entry file: thinkful_flask/hello_world.py -Scanned: 2016-10-25 23:13:33.238357 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -OrionsSuspenders/flask-blog -https://github.com/OrionsSuspenders/flask-blog -Entry file: None -Scanned: 2016-10-25 23:13:33.826773 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DaTimsta/flask-test -https://github.com/DaTimsta/flask-test -Entry file: flask-test/flask_app.py -Scanned: 2016-10-25 23:13:35.115047 -No vulnerabilities found. - - -sstriatlon/PyFlask -https://github.com/sstriatlon/PyFlask -Entry file: PyFlask/app.py -Scanned: 2016-10-25 23:13:39.723501 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: PyFlask/venv/lib/python2.7/sre_compile.py - -Vianey81/Flask-sql -https://github.com/Vianey81/Flask-sql -Entry file: Flask-sql/hackbright.py -Scanned: 2016-10-25 23:13:41.548152 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -timoparv65/PythonFlask -https://github.com/timoparv65/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:13:48.091962 -Vulnerability 1: -File: PythonFlask/app/routers.py - > User input at line 38, trigger word ".data": - user = Users.query.filter_by(email=login.email.data) -Reassigned in: - File: PythonFlask/app/routers.py - > Line 44: session['user_id'] = user[0].id - File: PythonFlask/app/routers.py - > Line 45: session['isLogged'] = True - File: PythonFlask/app/routers.py - > Line 49: friends = Friends.query.filter_by(user_id=user[0].id) - File: PythonFlask/app/routers.py - > Line 54: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) - File: PythonFlask/app/routers.py - > Line 58: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) - File: PythonFlask/app/routers.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) -File: PythonFlask/app/routers.py - > reaches line 51, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=friends) - -Vulnerability 2: -File: PythonFlask/app/routers.py - > User input at line 102, trigger word "get(": - name = request.args.get('name') -File: PythonFlask/app/routers.py - > reaches line 103, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name) - - - -JRaisala/PythonFlask -https://github.com/JRaisala/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:13:56.949964 -Vulnerability 1: -File: PythonFlask/app/routers.py - > User input at line 22, trigger word ".data": - user = Users.query.filter_by(email=login.email.data) -Reassigned in: - File: PythonFlask/app/routers.py - > Line 26: session['user_id'] = user[0].id - File: PythonFlask/app/routers.py - > Line 27: session['isLogged'] = True - File: PythonFlask/app/routers.py - > Line 29: friends = Friends.query.filter_by(user_id=user[0].id) - File: PythonFlask/app/routers.py - > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) - File: PythonFlask/app/routers.py - > Line 38: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) - File: PythonFlask/app/routers.py - > Line 17: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) -File: PythonFlask/app/routers.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=friends) - -Vulnerability 2: -File: PythonFlask/app/routers.py - > User input at line 76, trigger word "get(": - user = Users.query.get(session['user_id']) -Reassigned in: - File: PythonFlask/app/routers.py - > Line 81: ret_MAYBE_FUNCTION_NAME = render_template('template_friends.html',form=form, isLogged=True) - File: PythonFlask/app/routers.py - > Line 66: ret_MAYBE_FUNCTION_NAME = redirect('/') - File: PythonFlask/app/routers.py - > Line 69: ret_MAYBE_FUNCTION_NAME = render_template('template_friends.html',form=form, isLogged=True) -File: PythonFlask/app/routers.py - > reaches line 78, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=user.friends) - -Vulnerability 3: -File: PythonFlask/app/routers.py - > User input at line 98, trigger word "get(": - name = request.args.get('name') -File: PythonFlask/app/routers.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name) - - - -jraappan/PythonFlask -https://github.com/jraappan/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:14:04.530431 -Vulnerability 1: -File: PythonFlask/app/routers.py - > User input at line 27, trigger word "get(": - name = request.args.get('name') -File: PythonFlask/app/routers.py - > reaches line 28, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name) - - - -hannu78/PythonFlask -https://github.com/hannu78/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:14:10.951658 -Vulnerability 1: -File: PythonFlask/app/routers.py - > User input at line 46, trigger word "get(": - name = request.args.get('name') -File: PythonFlask/app/routers.py - > reaches line 47, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_name.html',uname=name) - - - -marcosf63/flask_app -https://github.com/marcosf63/flask_app -Entry file: None -Scanned: 2016-10-25 23:14:11.495774 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -maratkanov-a/flask_project -https://github.com/maratkanov-a/flask_project -Entry file: flask_project/flask_project.py -Scanned: 2016-10-25 23:14:12.832351 -No vulnerabilities found. - - -bellcliff/practice-flask -https://github.com/bellcliff/practice-flask -Entry file: practice-flask/hello.py -Scanned: 2016-10-25 23:14:14.680977 -No vulnerabilities found. - - -GeetikaBatra/Flask_intro -https://github.com/GeetikaBatra/Flask_intro -Entry file: None -Scanned: 2016-10-25 23:14:15.215175 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -changddcn/dd-flask -https://github.com/changddcn/dd-flask -Entry file: None -Scanned: 2016-10-25 23:14:16.842314 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/changddcn/dd-flask. - -Decus12/PythonFlask -https://github.com/Decus12/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:14:28.538903 -Vulnerability 1: -File: PythonFlask/app/routers.py - > User input at line 49, trigger word "get(": - name = request.args.get('name') -File: PythonFlask/app/routers.py - > reaches line 50, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name) - - - -thiltunen78/PythonFlask -https://github.com/thiltunen78/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:14:35.688652 -Vulnerability 1: -File: PythonFlask/app/routers.py - > User input at line 22, trigger word ".data": - user = Users.query.filter_by(email=login.email.data) -Reassigned in: - File: PythonFlask/app/routers.py - > Line 26: session['user_id'] = user[0].id - File: PythonFlask/app/routers.py - > Line 27: session['isLogged'] = True - File: PythonFlask/app/routers.py - > Line 29: friends = Friends.query.filter_by(user_id=user[0].id) - File: PythonFlask/app/routers.py - > Line 33: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) - File: PythonFlask/app/routers.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) - File: PythonFlask/app/routers.py - > Line 17: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) -File: PythonFlask/app/routers.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=friends) - -Vulnerability 2: -File: PythonFlask/app/routers.py - > User input at line 75, trigger word "get(": - user = Users.query.get(session['user_id']) -Reassigned in: - File: PythonFlask/app/routers.py - > Line 79: ret_MAYBE_FUNCTION_NAME = render_template('template_friends.html',form=form, isLogged=True) - File: PythonFlask/app/routers.py - > Line 65: ret_MAYBE_FUNCTION_NAME = redirect('/') - File: PythonFlask/app/routers.py - > Line 68: ret_MAYBE_FUNCTION_NAME = render_template('template_friends.html',form=form, isLogged=True) -File: PythonFlask/app/routers.py - > reaches line 76, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=user.friends) - -Vulnerability 3: -File: PythonFlask/app/routers.py - > User input at line 95, trigger word "get(": - name = request.args.get('name') -File: PythonFlask/app/routers.py - > reaches line 96, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name) - - - -tere15/PythonFlask -https://github.com/tere15/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:14:50.136152 -No vulnerabilities found. - - -ttakkula/flask_example -https://github.com/ttakkula/flask_example -Entry file: flask_example/app/__init__.py -Scanned: 2016-10-25 23:15:00.867208 -Vulnerability 1: -File: flask_example/app/routers.py - > User input at line 18, trigger word ".data": - user = Users.query.filter_by(email=login.email.data) -Reassigned in: - File: flask_example/app/routers.py - > Line 20: session['user_id'] = user[0].id - File: flask_example/app/routers.py - > Line 21: session['isLogged'] = True - File: flask_example/app/routers.py - > Line 23: friends = Friends.query.filter_by(user_id=user[0].id) - File: flask_example/app/routers.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=login, isLogged=False) - File: flask_example/app/routers.py - > Line 32: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=login, isLogged=False) - File: flask_example/app/routers.py - > Line 14: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=login, isLogged=False) -File: flask_example/app/routers.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('friends.html',isLogged=True, friends=friends) - -Vulnerability 2: -File: flask_example/app/routers.py - > User input at line 61, trigger word "get(": - friend = Users.query.get(session['user_id']) -Reassigned in: - File: flask_example/app/routers.py - > Line 59: ret_MAYBE_FUNCTION_NAME = redirect('/') -File: flask_example/app/routers.py - > reaches line 62, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('friends.html',isLogged=True, friends=friend.friends) - -Vulnerability 3: -File: flask_example/app/routers.py - > User input at line 79, trigger word "get(": - name = request.args.get('name') -File: flask_example/app/routers.py - > reaches line 82, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name, browser=agent, preflang=preflang) - -Vulnerability 4: -File: flask_example/app/routers.py - > User input at line 80, trigger word "get(": - agent = request.headers.get('User-Agent') -File: flask_example/app/routers.py - > reaches line 82, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name, browser=agent, preflang=preflang) - -Vulnerability 5: -File: flask_example/app/routers.py - > User input at line 81, trigger word "get(": - preflang = request.headers.get('Accept-Language') -File: flask_example/app/routers.py - > reaches line 82, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name, browser=agent, preflang=preflang) - - - -satyadevi-nyros/werckers_flask -https://github.com/satyadevi-nyros/werckers_flask -Entry file: werckers_flask/app.py -Scanned: 2016-10-25 23:15:03.098054 -No vulnerabilities found. - - -ltaziri/SQL-Flask -https://github.com/ltaziri/SQL-Flask -Entry file: SQL-Flask/hackbright.py -Scanned: 2016-10-25 23:15:04.411898 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -psavela/PythonFlask -https://github.com/psavela/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:15:13.417739 -Vulnerability 1: -File: PythonFlask/app/routers.py - > User input at line 21, trigger word ".data": - user = Users.query.filter_by(email=login.email.data) -Reassigned in: - File: PythonFlask/app/routers.py - > Line 25: session['user_id'] = user[0].id - File: PythonFlask/app/routers.py - > Line 26: session['isLogged'] = True - File: PythonFlask/app/routers.py - > Line 28: friends = Friends.query.filter_by(user_id=user[0].id) - File: PythonFlask/app/routers.py - > Line 33: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) - File: PythonFlask/app/routers.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) - File: PythonFlask/app/routers.py - > Line 16: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) -File: PythonFlask/app/routers.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=friends) - -Vulnerability 2: -File: PythonFlask/app/routers.py - > User input at line 70, trigger word "get(": - name = request.args.get('name') -File: PythonFlask/app/routers.py - > reaches line 71, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name) - - - -KariR61/PythonFlask -https://github.com/KariR61/PythonFlask -Entry file: PythonFlask/app/__init__.py -Scanned: 2016-10-25 23:15:19.490401 -Vulnerability 1: -File: PythonFlask/app/routers.py - > User input at line 19, trigger word ".data": - user = Users.query.filter_by(email=login.email.data) -Reassigned in: - File: PythonFlask/app/routers.py - > Line 22: session['user_id'] = user[0].id - File: PythonFlask/app/routers.py - > Line 23: session['isLogged'] = True - File: PythonFlask/app/routers.py - > Line 25: friends = Friends.query.filter_by(user_id=user[0].id) - File: PythonFlask/app/routers.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) - File: PythonFlask/app/routers.py - > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) - File: PythonFlask/app/routers.py - > Line 14: ret_MAYBE_FUNCTION_NAME = render_template('template_index.html',form=login, isLogged=False) -File: PythonFlask/app/routers.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',isLogged=True, friends=friends) - -Vulnerability 2: -File: PythonFlask/app/routers.py - > User input at line 45, trigger word "get(": - name = request.args.get('name') -File: PythonFlask/app/routers.py - > reaches line 46, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('template_user.html',name=name) - - - -dhruvsrivastava/flask-intro -https://github.com/dhruvsrivastava/flask-intro -Entry file: flask-intro/app.py -Scanned: 2016-10-25 23:15:23.742653 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -cjohns38/flask-intro -https://github.com/cjohns38/flask-intro -Entry file: flask-intro/__init__.py -Scanned: 2016-10-25 23:15:25.308002 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -notaweelos/openshift_flask -https://github.com/notaweelos/openshift_flask -Entry file: openshift_flask/helloflask.py -Scanned: 2016-10-25 23:15:26.595207 -No vulnerabilities found. - - -jkeung/flask_microblog -https://github.com/jkeung/flask_microblog -Entry file: flask_microblog/app/__init__.py -Scanned: 2016-10-25 23:15:28.311771 -No vulnerabilities found. - - -shank7485/Flask-APIs -https://github.com/shank7485/Flask-APIs -Entry file: Flask-APIs/APIs/__init__.py -Scanned: 2016-10-25 23:15:29.748537 -Vulnerability 1: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 49, trigger word "get(": - from_address = request.args.get('f_addr') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 52: comp = comparer_address(from_address, to_address, geo_api_key, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 53, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - -Vulnerability 2: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 50, trigger word "get(": - to_address = request.args.get('t_addr') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 52: comp = comparer_address(from_address, to_address, geo_api_key, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 53, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - -Vulnerability 3: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 58, trigger word "get(": - from_latitude = request.args.get('f_lat') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 64, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - -Vulnerability 4: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 59, trigger word "get(": - from_longitude = request.args.get('f_long') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 64, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - -Vulnerability 5: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 60, trigger word "get(": - to_latitude = request.args.get('t_lat') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 64, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - -Vulnerability 6: -File: Flask-APIs/APIs/main_URLs.py - > User input at line 61, trigger word "get(": - to_longitude = request.args.get('t_long') -Reassigned in: - File: Flask-APIs/APIs/main_URLs.py - > Line 63: comp = comparer_coord(from_latitude, from_longitude, to_latitude, to_longitude, uber_api_key) -File: Flask-APIs/APIs/main_URLs.py - > reaches line 64, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(comp.services_prices()) - - - -mattyait/Flask_webapp -https://github.com/mattyait/Flask_webapp -Entry file: Flask_webapp/routes.py -Scanned: 2016-10-25 23:15:31.160467 -Vulnerability 1: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 2: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 3: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 73, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 4: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 78, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 5: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 6: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 89, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 7: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 95, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 8: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - - - -nntndfrk/untitled -https://github.com/nntndfrk/untitled -Entry file: untitled/untitled.py -Scanned: 2016-10-25 23:15:32.463720 -No vulnerabilities found. - - -jrballot/FlaskBlogApp -https://github.com/jrballot/FlaskBlogApp -Entry file: FlaskBlogApp/blog.py -Scanned: 2016-10-25 23:15:33.750716 -No vulnerabilities found. - - -jgabrielfreitas/FlaskAndParse -https://github.com/jgabrielfreitas/FlaskAndParse -Entry file: FlaskAndParse/hello_flask.py -Scanned: 2016-10-25 23:15:35.047731 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -bernaerdik/Flask_on_CF -https://github.com/bernaerdik/Flask_on_CF -Entry file: Flask_on_CF/hello.py -Scanned: 2016-10-25 23:15:36.325185 -No vulnerabilities found. - - -go-bears/sql-with-flask -https://github.com/go-bears/sql-with-flask -Entry file: sql-with-flask/hackbright.py -Scanned: 2016-10-25 23:15:37.630463 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -anniehe/project-tracker-flask -https://github.com/anniehe/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-25 23:15:38.936213 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -knoxilla/web-flask-dockerized -https://github.com/knoxilla/web-flask-dockerized -Entry file: web-flask-dockerized/app.py -Scanned: 2016-10-25 23:15:40.224489 -No vulnerabilities found. - - -julyano/MiniCursoFlaskPETCC -https://github.com/julyano/MiniCursoFlaskPETCC -Entry file: MiniCursoFlaskPETCC/routes.py -Scanned: 2016-10-25 23:15:41.513425 -No vulnerabilities found. - - -neonbadger/project-tracker-flask -https://github.com/neonbadger/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-25 23:15:42.815557 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -DoriRunyon/Project-tracker-flask -https://github.com/DoriRunyon/Project-tracker-flask -Entry file: Project-tracker-flask/hackbright-web.py -Scanned: 2016-10-25 23:15:44.106486 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -emlam/project-tracker-flask -https://github.com/emlam/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-25 23:15:45.450561 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Buuntu/TicTacToe-Flask -https://github.com/Buuntu/TicTacToe-Flask -Entry file: TicTacToe-Flask/tictactoe.py -Scanned: 2016-10-25 23:15:46.875899 -No vulnerabilities found. - - -EdilvoLima/CursoPythonFlask -https://github.com/EdilvoLima/CursoPythonFlask -Entry file: CursoPythonFlask/app.py -Scanned: 2016-10-25 23:15:48.285028 -No vulnerabilities found. - - -dternyak/Flask-Postgres-Docker -https://github.com/dternyak/Flask-Postgres-Docker -Entry file: Flask-Postgres-Docker/web/index.py -Scanned: 2016-10-25 23:15:50.162125 -No vulnerabilities found. - - -info3180/python-flask-example -https://github.com/info3180/python-flask-example -Entry file: python-flask-example/hello.py -Scanned: 2016-10-25 23:15:51.457518 -Vulnerability 1: -File: python-flask-example/hello.py - > User input at line 17, trigger word "get(": - name = request.args.get('name') -File: python-flask-example/hello.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('process.html',name=name) - - - -janeygak/Hackbright--SQL-with-Flask -https://github.com/janeygak/Hackbright--SQL-with-Flask -Entry file: Hackbright--SQL-with-Flask/hackbright-web.py -Scanned: 2016-10-25 23:15:52.860277 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -SeventhResolve/Project-Tracker-Flask -https://github.com/SeventhResolve/Project-Tracker-Flask -Entry file: Project-Tracker-Flask/hackbright-web.py -Scanned: 2016-10-25 23:15:54.292064 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -alitsiya/project-tracker-flask -https://github.com/alitsiya/project-tracker-flask -Entry file: project-tracker-flask/hackbright-web.py -Scanned: 2016-10-25 23:15:55.693501 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ThomasMarcel/gae-tomalcala-flask -https://github.com/ThomasMarcel/gae-tomalcala-flask -Entry file: gae-tomalcala-flask/main.py -Scanned: 2016-10-25 23:15:57.107355 -No vulnerabilities found. - - -ContinuumIO/flask-kerberos-login -https://github.com/ContinuumIO/flask-kerberos-login -Entry file: flask-kerberos-login/examples/simple.py -Scanned: 2016-10-25 23:15:58.514703 -No vulnerabilities found. - - -badspelr/flask-hello-world -https://github.com/badspelr/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:16:02.075095 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yoophi/flask-appointment-peewee -https://github.com/yoophi/flask-appointment-peewee -Entry file: flask-appointment-peewee/sched/app.py -Scanned: 2016-10-25 23:16:05.515634 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -c1rno/Flask_auth_example -https://github.com/c1rno/Flask_auth_example -Entry file: Flask_auth_example/app/__init__.py -Scanned: 2016-10-25 23:16:15.388339 -No vulnerabilities found. - - -billdwalters/Flask -https://github.com/billdwalters/Flask -Entry file: None -Scanned: 2016-10-25 23:16:26.126361 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -prakxys/flask -https://github.com/prakxys/flask -Entry file: None -Scanned: 2016-10-25 23:16:27.705370 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -galacticpy/flask -https://github.com/galacticpy/flask -Entry file: None -Scanned: 2016-10-25 23:16:29.347089 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -OneBitSoftware/Office365-SharePoint-Python-Flask-Sample -https://github.com/OneBitSoftware/Office365-SharePoint-Python-Flask-Sample -Entry file: Office365-SharePoint-Python-Flask-Sample/src/Python.Office365.AppAuthentication/app.py -Scanned: 2016-10-25 23:16:32.020096 -No vulnerabilities found. - - -NJIT-SIG-WEBDEV/flask-intro -https://github.com/NJIT-SIG-WEBDEV/flask-intro -Entry file: flask-intro/Session1/app.py -Scanned: 2016-10-25 23:16:33.425721 -No vulnerabilities found. - - -imperio-wxm/flask-learn -https://github.com/imperio-wxm/flask-learn -Entry file: None -Scanned: 2016-10-25 23:16:33.996220 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ptrierweiler/myblog -https://github.com/ptrierweiler/myblog -Entry file: None -Scanned: 2016-10-25 23:16:34.550119 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -drone-demos/drone-with-python -https://github.com/drone-demos/drone-with-python -Entry file: drone-with-python/dronedemo/main.py -Scanned: 2016-10-25 23:16:36.962684 -No vulnerabilities found. - - -msopentechcn/aad-graphapi-flask-demo -https://github.com/msopentechcn/aad-graphapi-flask-demo -Entry file: aad-graphapi-flask-demo/app.py -Scanned: 2016-10-25 23:16:38.261686 -Vulnerability 1: -File: aad-graphapi-flask-demo/app.py - > User input at line 100, trigger word "get(": - error_code = messages.get('error_code') -File: aad-graphapi-flask-demo/app.py - > reaches line 102, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message) - -Vulnerability 2: -File: aad-graphapi-flask-demo/app.py - > User input at line 101, trigger word "get(": - error_message = messages.get('error_message') -File: aad-graphapi-flask-demo/app.py - > reaches line 102, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('error.html',error_code=error_code, error_message=error_message) - -Vulnerability 3: -File: aad-graphapi-flask-demo/app.py - > User input at line 108, trigger word "get(": - error_code = errors.get('code') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - -Vulnerability 4: -File: aad-graphapi-flask-demo/app.py - > User input at line 109, trigger word "get(": - error_message = errors.get('message').get('value') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - -Vulnerability 5: -File: aad-graphapi-flask-demo/app.py - > User input at line 108, trigger word "get(": - error_code = errors.get('code') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - -Vulnerability 6: -File: aad-graphapi-flask-demo/app.py - > User input at line 109, trigger word "get(": - error_message = errors.get('message').get('value') -Reassigned in: - File: aad-graphapi-flask-demo/app.py - > Line 110: messages = json.dumps('error_code''error_message'error_codeerror_message) - File: aad-graphapi-flask-demo/app.py - > Line 113: ret_MAYBE_FUNCTION_NAME = redirect(url_for('list_user')) -File: aad-graphapi-flask-demo/app.py - > reaches line 111, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('display_error',messages=messages)) - - - -amirziai/sklearnflask -https://github.com/amirziai/sklearnflask -Entry file: sklearnflask/main.py -Scanned: 2016-10-25 23:16:39.770002 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -SticksInHand/flaskr -https://github.com/SticksInHand/flaskr -Entry file: None -Scanned: 2016-10-25 23:16:40.294868 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SticksInHand/flaskr. - -jayShepard/Flasky -https://github.com/jayShepard/Flasky -Entry file: None -Scanned: 2016-10-25 23:16:40.847401 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jayShepard/Flasky. - -vineethtw/flaskexamples -https://github.com/vineethtw/flaskexamples -Entry file: flaskexamples/api/simulations.py -Scanned: 2016-10-25 23:16:43.260017 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -kmosho/flaskr -https://github.com/kmosho/flaskr -Entry file: None -Scanned: 2016-10-25 23:16:43.848093 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kmosho/flaskr. - -Duncodes/flasky -https://github.com/Duncodes/flasky -Entry file: None -Scanned: 2016-10-25 23:16:45.354567 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -menglong81/flaskr -https://github.com/menglong81/flaskr -Entry file: None -Scanned: 2016-10-25 23:16:46.869868 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/menglong81/flaskr. - -chadelder/flasktaskr -https://github.com/chadelder/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:16:48.399265 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -diegogslomp/flaskr -https://github.com/diegogslomp/flaskr -Entry file: None -Scanned: 2016-10-25 23:16:51.457886 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/diegogslomp/flaskr. - -xu00wei/flasky -https://github.com/xu00wei/flasky -Entry file: None -Scanned: 2016-10-25 23:16:52.972011 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -playgrdstar/flasktaskr -https://github.com/playgrdstar/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:16:53.496147 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -toricor/flaskr -https://github.com/toricor/flaskr -Entry file: None -Scanned: 2016-10-25 23:16:55.023518 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/toricor/flaskr. - -Lazyppl/Flaskblog -https://github.com/Lazyppl/Flaskblog -Entry file: Flaskblog/app/__init__.py -Scanned: 2016-10-25 23:16:57.432885 -No vulnerabilities found. - - -zeratullich/flaskr -https://github.com/zeratullich/flaskr -Entry file: None -Scanned: 2016-10-25 23:16:57.949015 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeratullich/flaskr. - -noamoss/flasktaskr -https://github.com/noamoss/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:17:02.469801 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -arose13/HerokuCondaScipyFlaskApp -https://github.com/arose13/HerokuCondaScipyFlaskApp -Entry file: HerokuCondaScipyFlaskApp/Web/app.py -Scanned: 2016-10-25 23:17:05.916123 -No vulnerabilities found. - - -jrballot/FlaskTaskr -https://github.com/jrballot/FlaskTaskr -Entry file: None -Scanned: 2016-10-25 23:17:06.450306 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jrballot/FlaskTaskr. - -awind/FlaskRestful -https://github.com/awind/FlaskRestful -Entry file: FlaskRestful/app/__init__.py -Scanned: 2016-10-25 23:17:15.897907 -Vulnerability 1: -File: FlaskRestful/app/apis.py - > User input at line 48, trigger word "get(": - user = User.query.get(userid) -File: FlaskRestful/app/apis.py - > reaches line 51, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = user_schema.jsonify(user) - - - -jgabrielfreitas/FlaskFirebase -https://github.com/jgabrielfreitas/FlaskFirebase -Entry file: FlaskFirebase/runner.py -Scanned: 2016-10-25 23:17:22.217026 -No vulnerabilities found. - - -scarabcoder/FlaskSite -https://github.com/scarabcoder/FlaskSite -Entry file: FlaskSite/app/__init__.py -Scanned: 2016-10-25 23:17:25.871051 -No vulnerabilities found. - - -aetherwu/FlaskDocker -https://github.com/aetherwu/FlaskDocker -Entry file: FlaskDocker/app/app.py -Scanned: 2016-10-25 23:17:27.497719 -No vulnerabilities found. - - -angeloski/flask-sandbox -https://github.com/angeloski/flask-sandbox -Entry file: flask-sandbox/intro_to_flask/__init__.py -Scanned: 2016-10-25 23:17:28.795512 -No vulnerabilities found. - - -jonnybazookatone/flask-watchman -https://github.com/jonnybazookatone/flask-watchman -Entry file: None -Scanned: 2016-10-25 23:17:30.172554 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jonnybazookatone/flask-watchman. - -Lucky0604/flask-blog -https://github.com/Lucky0604/flask-blog -Entry file: None -Scanned: 2016-10-25 23:17:31.722923 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -arvind-iyer/flask-101 -https://github.com/arvind-iyer/flask-101 -Entry file: flask-101/app/__init__.py -Scanned: 2016-10-25 23:17:34.130589 -No vulnerabilities found. - - -vbalien/flask-skeleton -https://github.com/vbalien/flask-skeleton -Entry file: flask-skeleton/app/__init__.py -Scanned: 2016-10-25 23:17:35.524055 -No vulnerabilities found. - - -anniee/flask-intro -https://github.com/anniee/flask-intro -Entry file: flask-intro/server.py -Scanned: 2016-10-25 23:17:36.861445 -No vulnerabilities found. - - -dritux/flask-spark -https://github.com/dritux/flask-spark -Entry file: flask-spark/spark/__init__.py -Scanned: 2016-10-25 23:17:38.150479 -No vulnerabilities found. - - -robbintt/flask-template -https://github.com/robbintt/flask-template -Entry file: flask-template/controller.py -Scanned: 2016-10-25 23:17:40.040281 -No vulnerabilities found. - - -felipemfp/flask-microblog -https://github.com/felipemfp/flask-microblog -Entry file: None -Scanned: 2016-10-25 23:17:40.569992 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/felipemfp/flask-microblog. - -bronka/flask-blog -https://github.com/bronka/flask-blog -Entry file: None -Scanned: 2016-10-25 23:17:41.112344 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -genagain/learning-flask -https://github.com/genagain/learning-flask -Entry file: learning-flask/app/hello.py -Scanned: 2016-10-25 23:17:47.565510 -No vulnerabilities found. - - -acknowledge/flask-api -https://github.com/acknowledge/flask-api -Entry file: None -Scanned: 2016-10-25 23:17:48.611297 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/acknowledge/flask-api. - -JunQian-Andy/flask_mail -https://github.com/JunQian-Andy/flask_mail -Entry file: flask_mail/app/__init__.py -Scanned: 2016-10-25 23:17:49.915215 -No vulnerabilities found. - - -fabricekwizera/flask_intro -https://github.com/fabricekwizera/flask_intro -Entry file: flask_intro/first_app.py -Scanned: 2016-10-25 23:17:51.307378 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_intro/.#first_app.py - -relman/flask-srv -https://github.com/relman/flask-srv -Entry file: flask-srv/service.py -Scanned: 2016-10-25 23:17:52.856737 -No vulnerabilities found. - - -volgoweb/flask_api -https://github.com/volgoweb/flask_api -Entry file: flask_api/application.py -Scanned: 2016-10-25 23:17:54.167549 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -leiyue/tutorial_flask -https://github.com/leiyue/tutorial_flask -Entry file: tutorial_flask/base/app.py -Scanned: 2016-10-25 23:17:55.596378 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sharma-mohit/flask-mongo -https://github.com/sharma-mohit/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-25 23:17:57.463311 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -samgclarke/flask-starter -https://github.com/samgclarke/flask-starter -Entry file: None -Scanned: 2016-10-25 23:17:58.007689 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/samgclarke/flask-starter. - -hbldh/flask-pybankid -https://github.com/hbldh/flask-pybankid -Entry file: flask-pybankid/flask_pybankid.py -Scanned: 2016-10-25 23:18:03.482201 -Vulnerability 1: -File: flask-pybankid/flask_pybankid.py - > User input at line 130, trigger word "get(": - text_to_sign = request.args.get('userVisibleData', '') -Reassigned in: - File: flask-pybankid/flask_pybankid.py - > Line 132: response = self.client.sign(text_to_sign, personal_number) - File: flask-pybankid/flask_pybankid.py - > Line 134: ret_MAYBE_FUNCTION_NAME = self.handle_exception(FlaskPyBankIDError.create_from_pybankid_exception(e)) - File: flask-pybankid/flask_pybankid.py - > Line 136: ret_MAYBE_FUNCTION_NAME = self.handle_exception(FlaskPyBankIDError(str(e), 500)) -File: flask-pybankid/flask_pybankid.py - > reaches line 138, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(response) - - - -krlex/flask-resume -https://github.com/krlex/flask-resume -Entry file: flask-resume/manage.py -Scanned: 2016-10-25 23:18:05.909073 -No vulnerabilities found. - - -doobeh/flask-lister -https://github.com/doobeh/flask-lister -Entry file: flask-lister/app/core.py -Scanned: 2016-10-25 23:18:08.210911 -No vulnerabilities found. - - -dfitzgerald3/sg_flask -https://github.com/dfitzgerald3/sg_flask -Entry file: sg_flask/__init__.py -Scanned: 2016-10-25 23:18:32.765844 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: sg_flask/venv/lib/python2.7/sre_compile.py - -Tmingh/learn_flask -https://github.com/Tmingh/learn_flask -Entry file: learn_flask/learn_flask/flaskr.py -Scanned: 2016-10-25 23:18:34.164082 -No vulnerabilities found. - - -qiuhaoling/my_flask -https://github.com/qiuhaoling/my_flask -Entry file: my_flask/app/__init__.py -Scanned: 2016-10-25 23:18:35.586790 -No vulnerabilities found. - - -ahsanwtc/flask-project -https://github.com/ahsanwtc/flask-project -Entry file: flask-project/hello.py -Scanned: 2016-10-25 23:18:36.868420 -No vulnerabilities found. - - -chadelder/flask-blog -https://github.com/chadelder/flask-blog -Entry file: None -Scanned: 2016-10-25 23:18:37.410914 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rdrsh/flask-hello -https://github.com/rdrsh/flask-hello -Entry file: flask-hello/main.py -Scanned: 2016-10-25 23:18:39.162433 -No vulnerabilities found. - - -Forumouth/flask-simple -https://github.com/Forumouth/flask-simple -Entry file: flask-simple/tests/data/testapp.py -Scanned: 2016-10-25 23:18:40.571791 -No vulnerabilities found. - - -mattyait/Flask_webapp -https://github.com/mattyait/Flask_webapp -Entry file: Flask_webapp/routes.py -Scanned: 2016-10-25 23:18:41.988579 -Vulnerability 1: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 2: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 69, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 3: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 73, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 4: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 78, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 5: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 85, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 6: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 89, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - -Vulnerability 7: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 95, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',message=message) - -Vulnerability 8: -File: Flask_webapp/routes.py - > User input at line 43, trigger word "form[": - user_name = request.form['username'].strip() -Reassigned in: - File: Flask_webapp/routes.py - > Line 68: message = 'User' + user_name + ' Created successfully with sudo privileges' - File: Flask_webapp/routes.py - > Line 72: errors = 'User ' + user_name + ' already exist.' - File: Flask_webapp/routes.py - > Line 77: message = 'User' + user_name + ' Created successfully without sudo privileges' - File: Flask_webapp/routes.py - > Line 84: message = 'User' + user_name + ' modified successfully' - File: Flask_webapp/routes.py - > Line 88: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 94: message = 'User' + user_name + ' deleted successfully' - File: Flask_webapp/routes.py - > Line 98: errors = 'User ' + user_name + ' not exist.' - File: Flask_webapp/routes.py - > Line 102: ret_MAYBE_FUNCTION_NAME = render_template('index.html') - File: Flask_webapp/routes.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - File: Flask_webapp/routes.py - > Line 57: errors = 'Please enter the fields values.' -File: Flask_webapp/routes.py - > reaches line 99, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',errors=errors) - - - -playgrdstar/flask-blog -https://github.com/playgrdstar/flask-blog -Entry file: None -Scanned: 2016-10-25 23:18:42.538549 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rx3bp/flask-freeze -https://github.com/rx3bp/flask-freeze -Entry file: flask-freeze/app.py -Scanned: 2016-10-25 23:18:44.427567 -No vulnerabilities found. - - -worthlesspenny7/tumblelogFlask -https://github.com/worthlesspenny7/tumblelogFlask -Entry file: tumblelogFlask/__init__.py -Scanned: 2016-10-25 23:18:46.225977 -No vulnerabilities found. - - -NaoYamaguchi/flask_login -https://github.com/NaoYamaguchi/flask_login -Entry file: None -Scanned: 2016-10-25 23:18:46.771175 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/NaoYamaguchi/flask_login. - -njnr/onece -https://github.com/njnr/onece -Entry file: onece/app/__init__.py -Scanned: 2016-10-25 23:18:48.352859 -Vulnerability 1: -File: onece/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: onece/app/main/views.py - > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: onece/app/main/views.py - > Line 26: posts = pagination.items - File: onece/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: onece/app/main/views.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: onece/app/main/views.py - > User input at line 41, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: onece/app/main/views.py - > Line 43: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: onece/app/main/views.py - > Line 45: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: onece/app/main/views.py - > Line 48: comments = pagination.items - File: onece/app/main/views.py - > Line 40: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: onece/app/main/views.py - > reaches line 49, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 3: -File: onece/app/main/views.py - > User input at line 54, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: onece/app/main/views.py - > Line 55: pagination = Location.query.order_by(Location.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: onece/app/main/views.py - > Line 58: locations = pagination.items -File: onece/app/main/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('locations.html',locations=locations, pagination=pagination) - -Vulnerability 4: -File: onece/app/main/views.py - > User input at line 117, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: onece/app/main/views.py - > Line 118: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: onece/app/main/views.py - > Line 121: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: onece/app/main/views.py - > Line 116: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: onece/app/main/views.py - > reaches line 123, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: onece/app/main/views.py - > User input at line 134, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: onece/app/main/views.py - > Line 135: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: onece/app/main/views.py - > Line 138: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: onece/app/main/views.py - > Line 133: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: onece/app/main/views.py - > reaches line 140, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - - - -rmaheshkumarblr/FlaskTestingApp -https://github.com/rmaheshkumarblr/FlaskTestingApp -Entry file: FlaskTestingApp/testingFlaskScript.py -Scanned: 2016-10-25 23:18:52.346343 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jrballot/FlaskBlogApp -https://github.com/jrballot/FlaskBlogApp -Entry file: FlaskBlogApp/blog.py -Scanned: 2016-10-25 23:18:53.647926 -No vulnerabilities found. - - -worthlesspenny7/FlaskYoutubeTutorial -https://github.com/worthlesspenny7/FlaskYoutubeTutorial -Entry file: FlaskYoutubeTutorial/application.py -Scanned: 2016-10-25 23:18:57.569543 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskYoutubeTutorial/lib/python2.7/sre_compile.py - -joyzhaoyang/FlaskDirectUploader -https://github.com/joyzhaoyang/FlaskDirectUploader -Entry file: FlaskDirectUploader/application.py -Scanned: 2016-10-25 23:18:59.266086 -No vulnerabilities found. - - -apiarian/RPi-GPIO-flask -https://github.com/apiarian/RPi-GPIO-flask -Entry file: RPi-GPIO-flask/server.py -Scanned: 2016-10-25 23:19:00.605769 -No vulnerabilities found. - - -IvanBodnar/fromzero_flask_blog -https://github.com/IvanBodnar/fromzero_flask_blog -Entry file: fromzero_flask_blog/__init__.py -Scanned: 2016-10-25 23:19:02.348710 -Vulnerability 1: -File: fromzero_flask_blog/author/views.py - > User input at line 27, trigger word "get(": - next = session.get('next') -Reassigned in: - File: fromzero_flask_blog/author/views.py - > Line 31: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: fromzero_flask_blog/author/views.py - > Line 37: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error) -File: fromzero_flask_blog/author/views.py - > reaches line 29, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - -Vulnerability 2: -File: fromzero_flask_blog/blog/views.py - > User input at line 100, trigger word ".data": - title = form.title.data -Reassigned in: - File: fromzero_flask_blog/blog/views.py - > Line 102: slug = slugify(title) - File: fromzero_flask_blog/blog/views.py - > Line 103: post = Post(blog, author, title, body, category, filename, slug) - File: fromzero_flask_blog/blog/views.py - > Line 110: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new') -File: fromzero_flask_blog/blog/views.py - > reaches line 108, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug)) - -Vulnerability 3: -File: fromzero_flask_blog/blog/views.py - > User input at line 100, trigger word ".data": - title = form.title.data -Reassigned in: - File: fromzero_flask_blog/blog/views.py - > Line 102: slug = slugify(title) - File: fromzero_flask_blog/blog/views.py - > Line 103: post = Post(blog, author, title, body, category, filename, slug) - File: fromzero_flask_blog/blog/views.py - > Line 110: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new') -File: fromzero_flask_blog/blog/views.py - > reaches line 108, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug)) - - - -alexarnautu/simple-flask-blog -https://github.com/alexarnautu/simple-flask-blog -Entry file: simple-flask-blog/blog.py -Scanned: 2016-10-25 23:19:04.078496 -No vulnerabilities found. - - -mhgit1/PythonFlask_oma -https://github.com/mhgit1/PythonFlask_oma -Entry file: PythonFlask_oma/app/__init__.py -Scanned: 2016-10-25 23:19:11.553437 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -MuriloFerraz/intel_edison_flask -https://github.com/MuriloFerraz/intel_edison_flask -Entry file: intel_edison_flask/flask_example/contole.py -Scanned: 2016-10-25 23:19:13.069146 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -bernaerdik/Flask_on_CF -https://github.com/bernaerdik/Flask_on_CF -Entry file: Flask_on_CF/hello.py -Scanned: 2016-10-25 23:19:14.362762 -No vulnerabilities found. - - -astianseb/flask-simple-distributed-applicaiton -https://github.com/astianseb/flask-simple-distributed-applicaiton -Entry file: flask-simple-distributed-applicaiton/Flasktest/__init__.py -Scanned: 2016-10-25 23:19:15.680546 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -tomov/flask-heroku-backend -https://github.com/tomov/flask-heroku-backend -Entry file: flask-heroku-backend/app/__init__.py -Scanned: 2016-10-25 23:19:17.068501 -No vulnerabilities found. - - -knoxilla/web-flask-dockerized -https://github.com/knoxilla/web-flask-dockerized -Entry file: web-flask-dockerized/app.py -Scanned: 2016-10-25 23:19:18.364511 -No vulnerabilities found. - - -akaak/flask-mega-tutorial -https://github.com/akaak/flask-mega-tutorial -Entry file: flask-mega-tutorial/part-iii-forms/app.py -Scanned: 2016-10-25 23:19:20.013795 -No vulnerabilities found. - - -thechad12/Flask-Item-Catalog -https://github.com/thechad12/Flask-Item-Catalog -Entry file: Flask-Item-Catalog/application.py -Scanned: 2016-10-25 23:19:21.829619 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -javicacheiro/rest_api_flask -https://github.com/javicacheiro/rest_api_flask -Entry file: rest_api_flask/rest/app/__init__.py -Scanned: 2016-10-25 23:19:23.740283 -No vulnerabilities found. - - -florenceloi/flask-intro-redo -https://github.com/florenceloi/flask-intro-redo -Entry file: flask-intro-redo/nice.py -Scanned: 2016-10-25 23:19:35.575331 -No vulnerabilities found. - - -eric-boone/python-flask-round1 -https://github.com/eric-boone/python-flask-round1 -Entry file: python-flask-round1/app/__init__.py -Scanned: 2016-10-25 23:19:37.972896 -No vulnerabilities found. - - -playgrdstar/flask-hello-world -https://github.com/playgrdstar/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:19:39.041943 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -iceskel/flask-restful-api -https://github.com/iceskel/flask-restful-api -Entry file: flask-restful-api/api.py -Scanned: 2016-10-25 23:19:41.457333 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -apiaas/gae-flask-base -https://github.com/apiaas/gae-flask-base -Entry file: gae-flask-base/src/main.py -Scanned: 2016-10-25 23:19:44.272487 -No vulnerabilities found. - - -ddrsmile/flask-taskr-with-blueprint -https://github.com/ddrsmile/flask-taskr-with-blueprint -Entry file: flask-taskr-with-blueprint/project/__init__.py -Scanned: 2016-10-25 23:19:45.877655 -No vulnerabilities found. - - -austinbrovick/flask-book_review_website -https://github.com/austinbrovick/flask-book_review_website -Entry file: flask-book_review_website/app/models/User.py -Scanned: 2016-10-25 23:19:47.327127 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -oscarvazquez/flask_mysql_migrations -https://github.com/oscarvazquez/flask_mysql_migrations -Entry file: None -Scanned: 2016-10-25 23:19:50.873158 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bethesdamd/python_flask_pharma -https://github.com/bethesdamd/python_flask_pharma -Entry file: python_flask_pharma/app.py -Scanned: 2016-10-25 23:19:52.853090 -No vulnerabilities found. - - -billdwalters/Flask -https://github.com/billdwalters/Flask -Entry file: None -Scanned: 2016-10-25 23:19:54.884694 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rlsharpton/flask -https://github.com/rlsharpton/flask -Entry file: None -Scanned: 2016-10-25 23:19:55.396725 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ccapudev/flask -https://github.com/ccapudev/flask -Entry file: None -Scanned: 2016-10-25 23:19:58.458974 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hezx/flask -https://github.com/hezx/flask -Entry file: None -Scanned: 2016-10-25 23:19:59.993110 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -its-dirg/Flask-pyoidc -https://github.com/its-dirg/Flask-pyoidc -Entry file: Flask-pyoidc/tests/test_flask_pyoidc.py -Scanned: 2016-10-25 23:20:03.080923 -No vulnerabilities found. - - -NJIT-SIG-WEBDEV/flask-intro -https://github.com/NJIT-SIG-WEBDEV/flask-intro -Entry file: flask-intro/Session1/app.py -Scanned: 2016-10-25 23:20:04.526181 -No vulnerabilities found. - - -KDmytro/flasktaskr -https://github.com/KDmytro/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:20:05.105708 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dreamtiger2016/flaskr -https://github.com/dreamtiger2016/flaskr -Entry file: None -Scanned: 2016-10-25 23:20:12.672105 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dreamtiger2016/flaskr. - -karanj112294/flasktutorial -https://github.com/karanj112294/flasktutorial -Entry file: None -Scanned: 2016-10-25 23:20:14.192597 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/karanj112294/flasktutorial. - -chadelder/flasktaskr -https://github.com/chadelder/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:20:15.704239 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jocelynaladin/flaskworkspace -https://github.com/jocelynaladin/flaskworkspace -Entry file: flaskworkspace/__init__.py -Scanned: 2016-10-25 23:20:21.123720 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -davetromp/flasksqlapi -https://github.com/davetromp/flasksqlapi -Entry file: flasksqlapi/runapi.py -Scanned: 2016-10-25 23:20:22.697295 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -xu00wei/flasky -https://github.com/xu00wei/flasky -Entry file: None -Scanned: 2016-10-25 23:20:23.210569 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zzclynn/flaskr -https://github.com/zzclynn/flaskr -Entry file: None -Scanned: 2016-10-25 23:20:23.724980 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zzclynn/flaskr. - -psykos/flaskloginskeleton -https://github.com/psykos/flaskloginskeleton -Entry file: flaskloginskeleton/app/__init__.py -Scanned: 2016-10-25 23:20:25.079028 -No vulnerabilities found. - - -AndrewGoldstein/flaskapp -https://github.com/AndrewGoldstein/flaskapp -Entry file: None -Scanned: 2016-10-25 23:20:25.590589 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AndrewGoldstein/flaskapp. - -JamesMilnerUK/Loxo -https://github.com/JamesMilnerUK/Loxo -Entry file: Loxo/loxoapi.py -Scanned: 2016-10-25 23:20:42.353657 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -nescode/punchstarter -https://github.com/nescode/punchstarter -Entry file: punchstarter/punchstarter/__init__.py -Scanned: 2016-10-25 23:20:43.789924 -Vulnerability 1: -File: punchstarter/punchstarter/__init__.py - > User input at line 31, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 2: -File: punchstarter/punchstarter/__init__.py - > User input at line 36, trigger word "files[": - cover_photo = request.files['cover_photo'] -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550) - File: punchstarter/punchstarter/__init__.py - > Line 43: image_filename = uploaded_image['public_id'] - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 3: -File: punchstarter/punchstarter/__init__.py - > User input at line 45, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 4: -File: punchstarter/punchstarter/__init__.py - > User input at line 31, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 32: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 5: -File: punchstarter/punchstarter/__init__.py - > User input at line 36, trigger word "files[": - cover_photo = request.files['cover_photo'] -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 37: uploaded_image = cloudinary.uploader.upload(cover_photo,crop='limit', width=680, height=550) - File: punchstarter/punchstarter/__init__.py - > Line 43: image_filename = uploaded_image['public_id'] - File: punchstarter/punchstarter/__init__.py - > Line 45: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 6: -File: punchstarter/punchstarter/__init__.py - > User input at line 45, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), image_filename=image_filename, time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: punchstarter/punchstarter/__init__.py - > Line 27: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: punchstarter/punchstarter/__init__.py - > reaches line 60, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 7: -File: punchstarter/punchstarter/__init__.py - > User input at line 64, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project) - -Vulnerability 8: -File: punchstarter/punchstarter/__init__.py - > User input at line 72, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 77, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project) - -Vulnerability 9: -File: punchstarter/punchstarter/__init__.py - > User input at line 72, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 93, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 10: -File: punchstarter/punchstarter/__init__.py - > User input at line 72, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: punchstarter/punchstarter/__init__.py - > reaches line 93, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 11: -File: punchstarter/punchstarter/__init__.py - > User input at line 97, trigger word "get(": - query = request.args.get('q') or '' -File: punchstarter/punchstarter/__init__.py - > reaches line 98, trigger word "filter(": - projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all() - -Vulnerability 12: -File: punchstarter/punchstarter/__init__.py - > User input at line 97, trigger word "get(": - query = request.args.get('q') or '' -File: punchstarter/punchstarter/__init__.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query, projects=projects, project_count=project_count) - - - -edwardszczepanski/FlaskApplication -https://github.com/edwardszczepanski/FlaskApplication -Entry file: FlaskApplication/app.py -Scanned: 2016-10-25 23:20:47.208035 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskApplication/venv/lib/python2.7/sre_compile.py - -AllyW/flaskyDeb -https://github.com/AllyW/flaskyDeb -Entry file: flaskyDeb/app/__init__.py -Scanned: 2016-10-25 23:20:49.179464 -Vulnerability 1: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: flaskyDeb/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 55: posts = pagination.items - File: flaskyDeb/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flaskyDeb/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 45: show_followed = False - File: flaskyDeb/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flaskyDeb/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 67: posts = pagination.items -File: flaskyDeb/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: flaskyDeb/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskyDeb/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 134: comments = pagination.items - File: flaskyDeb/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskyDeb/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: flaskyDeb/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskyDeb/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: flaskyDeb/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskyDeb/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: flaskyDeb/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 246: comments = pagination.items -File: flaskyDeb/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -chrismontone/flasktaskr2 -https://github.com/chrismontone/flasktaskr2 -Entry file: flasktaskr2/project/__init__.py -Scanned: 2016-10-25 23:20:50.839800 -No vulnerabilities found. - - -jgabrielfreitas/FlaskFirebase -https://github.com/jgabrielfreitas/FlaskFirebase -Entry file: FlaskFirebase/runner.py -Scanned: 2016-10-25 23:20:52.142579 -No vulnerabilities found. - - -scarabcoder/FlaskSite -https://github.com/scarabcoder/FlaskSite -Entry file: FlaskSite/app/__init__.py -Scanned: 2016-10-25 23:20:53.770298 -No vulnerabilities found. - - -musicalfish/FlaskApp -https://github.com/musicalfish/FlaskApp -Entry file: FlaskApp/FlaskApp/__init__.py -Scanned: 2016-10-25 23:20:55.091360 -No vulnerabilities found. - - -oscarmeanwell/FlaskMusic -https://github.com/oscarmeanwell/FlaskMusic -Entry file: FlaskMusic/app/routesun.py -Scanned: 2016-10-25 23:20:57.879253 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -TwilioDevEd/eta-notifications-flask -https://github.com/TwilioDevEd/eta-notifications-flask -Entry file: eta-notifications-flask/eta_notifications_flask/__init__.py -Scanned: 2016-10-25 23:21:00.992912 -Vulnerability 1: -File: eta-notifications-flask/eta_notifications_flask/views.py - > User input at line 29, trigger word "get(": - order = Order.query.get(order_id) -File: eta-notifications-flask/eta_notifications_flask/views.py - > reaches line 31, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show.html',order=order) - -Vulnerability 2: -File: eta-notifications-flask/eta_notifications_flask/views.py - > User input at line 63, trigger word "get(": - order = Order.query.get(order_id) -File: eta-notifications-flask/eta_notifications_flask/views.py - > reaches line 67, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show.html',order=order) - - - -johnsliao/flask-sqlite3-chartjs-toy -https://github.com/johnsliao/flask-sqlite3-chartjs-toy -Entry file: flask-sqlite3-chartjs-toy/flaskr/flaskr.py -Scanned: 2016-10-25 23:21:02.668942 -No vulnerabilities found. - - -QsBBQ/flask_test -https://github.com/QsBBQ/flask_test -Entry file: flask_test/flask_test.py -Scanned: 2016-10-25 23:21:04.024232 -Vulnerability 1: -File: flask_test/flask_test.py - > User input at line 18, trigger word "get(": - age = ages.get(user) -File: flask_test/flask_test.py - > reaches line 19, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users.html',user=user, age=age) - - - -pedrocarvalhodev/flask-intro -https://github.com/pedrocarvalhodev/flask-intro -Entry file: flask-intro/app.py -Scanned: 2016-10-25 23:21:05.578688 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -lawrencexia/flask_notecards -https://github.com/lawrencexia/flask_notecards -Entry file: flask_notecards/app/__init__.py -Scanned: 2016-10-25 23:21:06.931580 -No vulnerabilities found. - - -ameya0909/Flask-Blog -https://github.com/ameya0909/Flask-Blog -Entry file: Flask-Blog/__init__.py -Scanned: 2016-10-25 23:21:08.234087 -No vulnerabilities found. - - -chrismontone/flask-blog -https://github.com/chrismontone/flask-blog -Entry file: None -Scanned: 2016-10-25 23:21:08.762129 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ziggear/wechat-flask -https://github.com/ziggear/wechat-flask -Entry file: wechat-flask/src/myapp.py -Scanned: 2016-10-25 23:21:10.197152 -No vulnerabilities found. - - -yetship/flask-usages -https://github.com/yetship/flask-usages -Entry file: flask-usages/application/__init__.py -Scanned: 2016-10-25 23:21:11.614704 -Vulnerability 1: -File: flask-usages/application/controllers/todo.py - > User input at line 12, trigger word "get(": - todo_id = request.args.get('todo_id') -Reassigned in: - File: flask-usages/application/controllers/todo.py - > Line 17: ret_MAYBE_FUNCTION_NAME = jsonify() -File: flask-usages/application/controllers/todo.py - > reaches line 15, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(todo_idtodo.content) - -Vulnerability 2: -File: flask-usages/application/controllers/todo.py - > User input at line 21, trigger word "get(": - todo = Todo(content=data.get('content')) -File: flask-usages/application/controllers/todo.py - > reaches line 24, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(todo_id=todo.id, content=todo.content) - - - -drmalex07/flask-helloworld -https://github.com/drmalex07/flask-helloworld -Entry file: flask-helloworld/helloworld/app.py -Scanned: 2016-10-25 23:21:13.187911 -No vulnerabilities found. - - -Oracleli/flask-try -https://github.com/Oracleli/flask-try -Entry file: None -Scanned: 2016-10-25 23:21:15.953471 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Oracleli/flask-try. - -al4/flask-tokenauth -https://github.com/al4/flask-tokenauth -Entry file: flask-tokenauth/example.py -Scanned: 2016-10-25 23:21:17.253589 -No vulnerabilities found. - - -marcosomma/first_flask -https://github.com/marcosomma/first_flask -Entry file: first_flask/app/__init__.py -Scanned: 2016-10-25 23:21:19.689501 -No vulnerabilities found. - - -miracleluchen/blog-flask -https://github.com/miracleluchen/blog-flask -Entry file: blog-flask/server.py -Scanned: 2016-10-25 23:21:20.996461 -No vulnerabilities found. - - -meyersj/bootstrap-flask -https://github.com/meyersj/bootstrap-flask -Entry file: bootstrap-flask/app/__init__.py -Scanned: 2016-10-25 23:21:23.286920 -No vulnerabilities found. - - -sharma-mohit/flask-mongo -https://github.com/sharma-mohit/flask-mongo -Entry file: flask-mongo/mainapp/__init__.py -Scanned: 2016-10-25 23:21:25.252249 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jarogers095/flask-blog -https://github.com/jarogers095/flask-blog -Entry file: None -Scanned: 2016-10-25 23:21:25.799380 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Jelly-Yu/learningFlask -https://github.com/Jelly-Yu/learningFlask -Entry file: learningFlask/app/__init__.py -Scanned: 2016-10-25 23:21:27.207361 -No vulnerabilities found. - - -doobeh/flask-lister -https://github.com/doobeh/flask-lister -Entry file: flask-lister/app/core.py -Scanned: 2016-10-25 23:21:36.620643 -No vulnerabilities found. - - -ratherbsurfing/flask-cms -https://github.com/ratherbsurfing/flask-cms -Entry file: None -Scanned: 2016-10-25 23:21:49.359354 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -philtrep/Flask-Skeleton -https://github.com/philtrep/Flask-Skeleton -Entry file: None -Scanned: 2016-10-25 23:21:51.211074 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/philtrep/Flask-Skeleton. - -cynrick/kickstarter-flask -https://github.com/cynrick/kickstarter-flask -Entry file: kickstarter-flask/kickstarter/__init__.py -Scanned: 2016-10-25 23:21:52.629108 -Vulnerability 1: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 29, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 30: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: kickstarter-flask/kickstarter/__init__.py - > Line 32: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now) - File: kickstarter-flask/kickstarter/__init__.py - > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 46, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 2: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 32, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 46, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 3: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 29, trigger word "get(": - time_end = request.form.get('funding_end_date') -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 30: time_end = datetime.datetime.strptime(time_end, '%Y-%m-%d') - File: kickstarter-flask/kickstarter/__init__.py - > Line 32: new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now) - File: kickstarter-flask/kickstarter/__init__.py - > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 46, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 4: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 32, trigger word "get(": - new_project = Project(member_id=1, name=request.form.get('project_name'), short_description=request.form.get('short_description'), long_description=request.form.get('long_description'), goal_amount=request.form.get('funding_goal'), time_start=now, time_end=time_end, time_created=now) -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 26: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 46, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=new_project.id)) - -Vulnerability 5: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 50, trigger word "get(": - project = db.session.query(Project).get(project_id) -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 55, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('project_detail.html',project=project) - -Vulnerability 6: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 59, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 65, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('pledge.html',project=project) - -Vulnerability 7: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 59, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 79, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 8: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 59, trigger word "get(": - project = db.session.query(Project).get(project_id) -Reassigned in: - File: kickstarter-flask/kickstarter/__init__.py - > Line 69: new_pledge = Pledge(member_id=guest_pledgor.id, project_id=project.id, amount=request.form.get('amount'), time_created=datetime.datetime.now()) -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 79, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('project_detail',project_id=project.id)) - -Vulnerability 9: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 83, trigger word "get(": - query = request.args.get('q') or '' -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 84, trigger word "filter(": - projects = db.session.query(Project).filter(Project.name.ilike('%' + query + '%') | Project.short_description.ilike('%' + query + '%') | Project.long_description.ilike('%' + query + '%')).all() - -Vulnerability 10: -File: kickstarter-flask/kickstarter/__init__.py - > User input at line 83, trigger word "get(": - query = request.args.get('q') or '' -File: kickstarter-flask/kickstarter/__init__.py - > reaches line 92, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',query_text=query, projects=projects, project_count=project_count) - - - -kessiacastro/flask-blog -https://github.com/kessiacastro/flask-blog -Entry file: None -Scanned: 2016-10-25 23:21:53.167171 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rjturek/flask-etf -https://github.com/rjturek/flask-etf -Entry file: flask-etf/flask_etf_main.py -Scanned: 2016-10-25 23:21:54.448142 -No vulnerabilities found. - - -worthlesspenny7/tumblelogFlask -https://github.com/worthlesspenny7/tumblelogFlask -Entry file: tumblelogFlask/__init__.py -Scanned: 2016-10-25 23:21:55.756823 -No vulnerabilities found. - - -axontrust/alexa-flask -https://github.com/axontrust/alexa-flask -Entry file: alexa-flask/app/__init__.py -Scanned: 2016-10-25 23:21:57.056707 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -asjedh/flask_tutorial -https://github.com/asjedh/flask_tutorial -Entry file: None -Scanned: 2016-10-25 23:21:57.625126 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/asjedh/flask_tutorial. - -robb216/MyFlask -https://github.com/robb216/MyFlask -Entry file: MyFlask/MyFlask.py -Scanned: 2016-10-25 23:22:00.072074 -No vulnerabilities found. - - -rogerpence/flask-blueprint -https://github.com/rogerpence/flask-blueprint -Entry file: flask-blueprint/application/__init__.py -Scanned: 2016-10-25 23:22:02.794734 -No vulnerabilities found. - - -androidzhibinw/flask-bootstrap -https://github.com/androidzhibinw/flask-bootstrap -Entry file: flask-bootstrap/app/__init__.py -Scanned: 2016-10-25 23:22:04.489653 -No vulnerabilities found. - - -ytanno/PlotFlask -https://github.com/ytanno/PlotFlask -Entry file: PlotFlask/FlaskTest1/FlaskTest1/__init__.py -Scanned: 2016-10-25 23:22:11.161986 -No vulnerabilities found. - - -psykos/psilex-flask -https://github.com/psykos/psilex-flask -Entry file: psilex-flask/app/__init__.py -Scanned: 2016-10-25 23:22:12.600346 -No vulnerabilities found. - - -Hank02/flask_example -https://github.com/Hank02/flask_example -Entry file: flask_example/hello_world.py -Scanned: 2016-10-25 23:22:16.390902 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -VerdigrisReader/flask-workshop -https://github.com/VerdigrisReader/flask-workshop -Entry file: flask-workshop/app/__init__.py -Scanned: 2016-10-25 23:22:18.077424 -No vulnerabilities found. - - -rogerpence/flask-skeleton -https://github.com/rogerpence/flask-skeleton -Entry file: flask-skeleton/application/__init__.py -Scanned: 2016-10-25 23:22:19.514526 -No vulnerabilities found. - - -rodcox89/FlaskDynamoStarterKit -https://github.com/rodcox89/FlaskDynamoStarterKit -Entry file: FlaskDynamoStarterKit/main.py -Scanned: 2016-10-25 23:22:24.564538 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskDynamoStarterKit/venv/lib/python2.7/sre_compile.py - -pulysak/FlaskServer-Tests -https://github.com/pulysak/FlaskServer-Tests -Entry file: FlaskServer-Tests/server.py -Scanned: 2016-10-25 23:22:28.859536 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskServer-Tests/flask_env/lib/python2.7/sre_compile.py - -rbtoner/FlaskWebApp -https://github.com/rbtoner/FlaskWebApp -Entry file: FlaskWebApp/FanGuardFlask/__init__.py -Scanned: 2016-10-25 23:22:30.997707 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -worthlesspenny7/FlaskYoutubeTutorial -https://github.com/worthlesspenny7/FlaskYoutubeTutorial -Entry file: FlaskYoutubeTutorial/application.py -Scanned: 2016-10-25 23:22:34.305130 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskYoutubeTutorial/lib/python2.7/sre_compile.py - -MGago/flaskBasicApp1 -https://github.com/MGago/flaskBasicApp1 -Entry file: flaskBasicApp1/app/__init__.py -Scanned: 2016-10-25 23:22:42.819224 -No vulnerabilities found. - - -skpdvidby0/Flask-Python-App -https://github.com/skpdvidby0/Flask-Python-App -Entry file: Flask-Python-App/flaskapp.py -Scanned: 2016-10-25 23:22:46.054431 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Python-App/virtenv/lib/python2.7/sre_compile.py - -sindhus/flask-mega-tutorial -https://github.com/sindhus/flask-mega-tutorial -Entry file: None -Scanned: 2016-10-25 23:22:48.342250 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sindhus/flask-mega-tutorial. - -mbreisch/real-python-flask-bdd -https://github.com/mbreisch/real-python-flask-bdd -Entry file: real-python-flask-bdd/flaskr.py -Scanned: 2016-10-25 23:22:50.172043 -No vulnerabilities found. - - -MuriloFerraz/intel_edison_flask -https://github.com/MuriloFerraz/intel_edison_flask -Entry file: intel_edison_flask/flask_example/contole.py -Scanned: 2016-10-25 23:22:51.570868 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -PiyushGoyal443/studentLogin_API_Flask -https://github.com/PiyushGoyal443/studentLogin_API_Flask -Entry file: studentLogin_API_Flask/server.py -Scanned: 2016-10-25 23:22:53.480265 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -GertjanvanhetHof/helloworld_with_flask -https://github.com/GertjanvanhetHof/helloworld_with_flask -Entry file: helloworld_with_flask/mypython.py -Scanned: 2016-10-25 23:22:54.806519 -No vulnerabilities found. - - -taromurao/flask-python-logger-experiment -https://github.com/taromurao/flask-python-logger-experiment -Entry file: flask-python-logger-experiment/app.py -Scanned: 2016-10-25 23:22:56.105054 -No vulnerabilities found. - - -mikicaivosevic/flask-simple-todo -https://github.com/mikicaivosevic/flask-simple-todo -Entry file: flask-simple-todo/app.py -Scanned: 2016-10-25 23:22:57.342807 -No vulnerabilities found. - - -KDmytro/flask-hello-world -https://github.com/KDmytro/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:22:57.881971 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bepetersn/flask-permissions-ex -https://github.com/bepetersn/flask-permissions-ex -Entry file: flask-permissions-ex/ex/__init__.py -Scanned: 2016-10-25 23:22:59.844703 -No vulnerabilities found. - - -EricSchles/db_migrations_flask -https://github.com/EricSchles/db_migrations_flask -Entry file: db_migrations_flask/app/__init__.py -Scanned: 2016-10-25 23:23:02.243067 -No vulnerabilities found. - - -yyssjj33/flask-menu-application -https://github.com/yyssjj33/flask-menu-application -Entry file: flask-menu-application/project.py -Scanned: 2016-10-25 23:23:03.708857 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -androidzhibinw/flask-app-builder-example -https://github.com/androidzhibinw/flask-app-builder-example -Entry file: flask-app-builder-example/myapp/app/__init__.py -Scanned: 2016-10-25 23:23:05.597806 -No vulnerabilities found. - - -jmcevoy1984/Flask-Restful-Tutorial -https://github.com/jmcevoy1984/Flask-Restful-Tutorial -Entry file: Flask-Restful-Tutorial/app.py -Scanned: 2016-10-25 23:23:06.924535 -No vulnerabilities found. - - -kessiacastro/flask-hello-world -https://github.com/kessiacastro/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:23:07.529510 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tim1978/flask-hello-world -https://github.com/tim1978/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:23:12.067859 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jigen7/python_flask_tutorial -https://github.com/jigen7/python_flask_tutorial -Entry file: python_flask_tutorial/app/__init__.py -Scanned: 2016-10-25 23:23:20.022458 -No vulnerabilities found. - - -danieltl/python_flask_final -https://github.com/danieltl/python_flask_final -Entry file: python_flask_final/application.py -Scanned: 2016-10-25 23:23:21.462480 -No vulnerabilities found. - - -devizier/flask-hello-world -https://github.com/devizier/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:23:22.003281 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tomov/flask-location-survey-psych -https://github.com/tomov/flask-location-survey-psych -Entry file: flask-location-survey-psych/app/__init__.py -Scanned: 2016-10-25 23:23:23.418045 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -rakou1986/flask-mvt-min -https://github.com/rakou1986/flask-mvt-min -Entry file: flask-mvt-min/webapp/app.py -Scanned: 2016-10-25 23:23:24.698771 -No vulnerabilities found. - - -mbreisch/real-python-reverse-flask -https://github.com/mbreisch/real-python-reverse-flask -Entry file: None -Scanned: 2016-10-25 23:23:26.013491 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mbreisch/real-python-reverse-flask. - -jeet4320/PythonFlask-IBMBluemix -https://github.com/jeet4320/PythonFlask-IBMBluemix -Entry file: PythonFlask-IBMBluemix/welcome.py -Scanned: 2016-10-25 23:23:33.120885 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -junniepat/Python-flask-app -https://github.com/junniepat/Python-flask-app -Entry file: Python-flask-app/app.py -Scanned: 2016-10-25 23:23:34.501674 -No vulnerabilities found. - - -Kwpolska/flask-demo-app -https://github.com/Kwpolska/flask-demo-app -Entry file: flask-demo-app/flaskapp.py -Scanned: 2016-10-25 23:23:35.799200 -No vulnerabilities found. - - -tiangolo/uwsgi-nginx-flask-docker -https://github.com/tiangolo/uwsgi-nginx-flask-docker -Entry file: uwsgi-nginx-flask-docker/example-flask-index-upload/app/main.py -Scanned: 2016-10-25 23:23:48.157201 -No vulnerabilities found. - - -chrisvasey/flask -https://github.com/chrisvasey/flask -Entry file: None -Scanned: 2016-10-25 23:23:49.172727 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bobdorff/flask -https://github.com/bobdorff/flask -Entry file: None -Scanned: 2016-10-25 23:23:49.694584 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rlsharpton/flask -https://github.com/rlsharpton/flask -Entry file: None -Scanned: 2016-10-25 23:23:51.235023 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wildjan/Flask -https://github.com/wildjan/Flask -Entry file: None -Scanned: 2016-10-25 23:23:52.830044 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -smltc/Flask -https://github.com/smltc/Flask -Entry file: None -Scanned: 2016-10-25 23:23:54.350825 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mikelkl/flasky -https://github.com/mikelkl/flasky -Entry file: None -Scanned: 2016-10-25 23:23:55.862088 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -besimaltnok/Flask-Examples -https://github.com/besimaltnok/Flask-Examples -Entry file: Flask-Examples/fileupload.py -Scanned: 2016-10-25 23:23:58.782713 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -luo-jialin/flask- -https://github.com/luo-jialin/flask- -Entry file: flask-/flaskr.py -Scanned: 2016-10-25 23:24:00.198973 -No vulnerabilities found. - - -MLH/my-mlh-flask-example -https://github.com/MLH/my-mlh-flask-example -Entry file: my-mlh-flask-example/app.py -Scanned: 2016-10-25 23:24:02.405295 -No vulnerabilities found. - - -ubbochum/hb2_flask -https://github.com/ubbochum/hb2_flask -Entry file: hb2_flask/hb2_flask.py -Scanned: 2016-10-25 23:24:04.758101 -Vulnerability 1: -File: hb2_flask/hb2_flask.py - > User input at line 362, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 369: index_solr = Solr(start=page - 1 * 10, query=current_user.email, facet='false') - File: hb2_flask/hb2_flask.py - > Line 372: records = index_solr.results - File: hb2_flask/hb2_flask.py - > Line 376: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 379: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 361: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 363: records = [] - File: hb2_flask/hb2_flask.py - > Line 365: index_solr = '' - File: hb2_flask/hb2_flask.py - > Line 366: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 380, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',header=lazy_gettext('Home'), site=theme(request.access_route), numFound=num_found, records=records, pagination=pagination, offset=mystart - 1) - -Vulnerability 2: -File: hb2_flask/hb2_flask.py - > User input at line 416, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 417: duplicates_solr = Solr(start=page - 1 * 10, fquery=['dedupid:[* TO *]'], group='true', group_field='dedupid', group_limit=100, facet='false') - File: hb2_flask/hb2_flask.py - > Line 424: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('duplicate groups'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 427: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 415: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 423: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 428, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('duplicates.html',groups=duplicates_solr.results, pagination=pagination, header=lazy_gettext('Duplicates'), site=theme(request.access_route), offset=mystart - 1) - -Vulnerability 3: -File: hb2_flask/hb2_flask.py - > User input at line 433, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons')) - File: hb2_flask/hb2_flask.py - > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 434: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 446, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now()) - -Vulnerability 4: -File: hb2_flask/hb2_flask.py - > User input at line 433, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 438: persons_solr = Solr(query=query, start=page - 1 * 10, core='person', json_facet='affiliation''type''field''term''affiliation', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 451: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Persons')) - File: hb2_flask/hb2_flask.py - > Line 454: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 434: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 455, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('persons.html',header=lazy_gettext('Persons'), site=theme(request.access_route), facet_data=persons_solr.facets, results=persons_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), del_redirect='persons') - -Vulnerability 5: -File: hb2_flask/hb2_flask.py - > User input at line 472, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 471: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 6: -File: hb2_flask/hb2_flask.py - > User input at line 474, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 477: query = '*:*' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 7: -File: hb2_flask/hb2_flask.py - > User input at line 480, trigger word "get(": - sorting = request.args.get('sort', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 482: sorting = '' - File: hb2_flask/hb2_flask.py - > Line 484: sorting = 'fdate desc' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 8: -File: hb2_flask/hb2_flask.py - > User input at line 472, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 471: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 9: -File: hb2_flask/hb2_flask.py - > User input at line 474, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 477: query = '*:*' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 10: -File: hb2_flask/hb2_flask.py - > User input at line 480, trigger word "get(": - sorting = request.args.get('sort', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 482: sorting = '' - File: hb2_flask/hb2_flask.py - > Line 484: sorting = 'fdate desc' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 490, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('show_record',record_id=search_solr.results[0].get('id'), pubtype=search_solr.results[0].get('pubtype'))) - -Vulnerability 11: -File: hb2_flask/hb2_flask.py - > User input at line 472, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 495: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 496: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 471: pagination = '' - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 499, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery) - -Vulnerability 12: -File: hb2_flask/hb2_flask.py - > User input at line 474, trigger word "get(": - query = request.args.get('q', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 477: query = '*:*' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 499, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery) - -Vulnerability 13: -File: hb2_flask/hb2_flask.py - > User input at line 480, trigger word "get(": - sorting = request.args.get('sort', '') -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 482: sorting = '' - File: hb2_flask/hb2_flask.py - > Line 484: sorting = 'fdate desc' - File: hb2_flask/hb2_flask.py - > Line 486: search_solr = Solr(start=page - 1 * 10, query=query, fquery=filterquery, sort=sorting, json_facet=secrets.SOLR_FACETS) - File: hb2_flask/hb2_flask.py - > Line 493: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 499, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('resultlist.html',records=search_solr.results, pagination=pagination, facet_data=search_solr.facets, header=lazy_gettext('Resultlist'), target='search', site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery) - -Vulnerability 14: -File: hb2_flask/hb2_flask.py - > User input at line 742, trigger word "get(": - bio = requests.get('https://pub.orcid.org/%s/orcid-bio/' % orcid_id,headers='Accept''application/json').json() -File: hb2_flask/hb2_flask.py - > reaches line 744, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('name''%s, %s' % (bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('family-name').get('value'), bio.get('orcid-profile').get('orcid-bio').get('personal-details').get('given-names').get('value'))) - -Vulnerability 15: -File: hb2_flask/hb2_flask.py - > User input at line 749, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 787: dashboard_solr = Solr(start=page - 1 * 10, query=query, sort='recordCreationDate asc', json_facet=DASHBOARD_FACETS, fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 795: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 798: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 750: mystart = 0 - File: hb2_flask/hb2_flask.py - > Line 791: pagination = '' -File: hb2_flask/hb2_flask.py - > reaches line 801, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('dashboard.html',records=dashboard_solr.results, facet_data=dashboard_solr.facets, header=lazy_gettext('Dashboard'), site=theme(request.access_route), offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now(), target='dashboard', del_redirect='dashboard') - -Vulnerability 16: -File: hb2_flask/hb2_flask.py - > User input at line 826, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 827: locked_solr = Solr(core='hb2', fquery=['locked:true', 'recordChangeDate:[* TO NOW-1HOUR]'], sort='recordChangeDate asc', start=page - 1 * 10) - File: hb2_flask/hb2_flask.py - > Line 831: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('records'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 834: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 824: ret_MAYBE_FUNCTION_NAME = redirect(url_for('homepage')) -File: hb2_flask/hb2_flask.py - > reaches line 841, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('superadmin.html',locked_records=locked_solr.results, header=lazy_gettext('Superadmin Board'), import_records=solr_dumps.results, offset=mystart - 1, pagination=pagination, del_redirect='superadmin', form=form, site=theme(request.access_route)) - -Vulnerability 17: -File: hb2_flask/hb2_flask.py - > User input at line 912, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units')) - File: hb2_flask/hb2_flask.py - > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 913: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 925, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, now=datetime.datetime.now()) - -Vulnerability 18: -File: hb2_flask/hb2_flask.py - > User input at line 912, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 917: orgas_solr = Solr(query=query, start=page - 1 * 10, core='organisation', json_facet='destatis_id''type''field''term''destatis_id', fquery=filterquery) - File: hb2_flask/hb2_flask.py - > Line 929: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('titles'), search_msg=lazy_gettext('Showing {start} to {end} of {found} Organisational Units')) - File: hb2_flask/hb2_flask.py - > Line 932: mystart = 1 + pagination.page - 1 * pagination.per_page - File: hb2_flask/hb2_flask.py - > Line 913: mystart = 0 -File: hb2_flask/hb2_flask.py - > reaches line 933, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('orgas.html',header=lazy_gettext('Organisations'), site=theme(request.access_route), facet_data=orgas_solr.facets, results=orgas_solr.results, offset=mystart - 1, query=query, filterquery=filterquery, pagination=pagination, now=datetime.datetime.now()) - -Vulnerability 19: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1110, trigger word "replace(": - solr_data.setdefault('recordCreationDate', form.data.get(field).strip().replace(' ', 'T') + 'Z') - -Vulnerability 20: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1112, trigger word "replace(": - solr_data.setdefault('recordChangeDate', form.data.get(field).strip().replace(' ', 'T') + 'Z') - -Vulnerability 21: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1141, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), action='https://github.com/create', pubtype=pubtype) - -Vulnerability 22: -File: hb2_flask/hb2_flask.py - > User input at line 1095, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1103: wtf = json.dumps(form.data) - File: hb2_flask/hb2_flask.py - > Line 1144: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1125: ret_MAYBE_FUNCTION_NAME = jsonify('status'200) -File: hb2_flask/hb2_flask.py - > reaches line 1160, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('New Record'), site=theme(request.access_route), pubtype=pubtype, action='https://github.com/create', record_id=form.id.data) - -Vulnerability 23: -File: hb2_flask/hb2_flask.py - > User input at line 1167, trigger word "get(": - is_part_of = show_record_solr.results[0].get('is_part_of') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 24: -File: hb2_flask/hb2_flask.py - > User input at line 1168, trigger word "get(": - has_part = show_record_solr.results[0].get('has_part') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 25: -File: hb2_flask/hb2_flask.py - > User input at line 1169, trigger word "get(": - other_version = show_record_solr.results[0].get('other_version') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 26: -File: hb2_flask/hb2_flask.py - > User input at line 1171, trigger word "get(": - thedata = json.loads(show_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1173: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 27: -File: hb2_flask/hb2_flask.py - > User input at line 1172, trigger word "get(": - locked = show_record_solr.results[0].get('locked') -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 28: -File: hb2_flask/hb2_flask.py - > User input at line 1173, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1175, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('title'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=record_id, del_redirect='dashboard', pubtype=pubtype, role_map=ROLE_MAP, lang_map=LANGUAGE_MAP, pubtype_map=PUBTYPE2TEXT, subtype_map=SUBTYPE2TEXT, locked=locked, is_part_of=is_part_of, has_part=has_part, other_version=other_version) - -Vulnerability 29: -File: hb2_flask/hb2_flask.py - > User input at line 1189, trigger word "get(": - thedata = json.loads(show_person_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1190: form = PersonAdminForm.from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1192, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('name'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=person_id, pubtype='person', del_redirect='persons') - -Vulnerability 30: -File: hb2_flask/hb2_flask.py - > User input at line 1200, trigger word "get(": - thedata = json.loads(show_orga_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1201: form = OrgaAdminForm.from_json(thedata) -File: hb2_flask/hb2_flask.py - > reaches line 1203, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('record.html',record=form, header=form.data.get('pref_label'), site=theme(request.access_route), action='https://github.com/retrieve', record_id=orga_id, pubtype='organisation', del_redirect='organisations') - -Vulnerability 31: -File: hb2_flask/hb2_flask.py - > User input at line 1213, trigger word "get(": - thedata = json.loads(edit_orga_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1218: form = OrgaAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas')) - File: hb2_flask/hb2_flask.py - > Line 1216: form = OrgaAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1223, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update') - -Vulnerability 32: -File: hb2_flask/hb2_flask.py - > User input at line 1213, trigger word "get(": - thedata = json.loads(edit_orga_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1218: form = OrgaAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1227: ret_MAYBE_FUNCTION_NAME = redirect(url_for('orgas')) - File: hb2_flask/hb2_flask.py - > Line 1216: form = OrgaAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1231, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('linear_form.html',form=form, header=lazy_gettext('Edit: %(orga)s',orga=form.data.get('pref_label')), site=theme(request.access_route), action='https://github.com/update', pubtype='organisation') - -Vulnerability 33: -File: hb2_flask/hb2_flask.py - > User input at line 1242, trigger word "get(": - thedata = json.loads(edit_person_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1247: form = PersonAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons')) - File: hb2_flask/hb2_flask.py - > Line 1245: form = PersonAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1253, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update') - -Vulnerability 34: -File: hb2_flask/hb2_flask.py - > User input at line 1242, trigger word "get(": - thedata = json.loads(edit_person_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1247: form = PersonAdminForm.from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1257: ret_MAYBE_FUNCTION_NAME = redirect(url_for('persons')) - File: hb2_flask/hb2_flask.py - > Line 1245: form = PersonAdminForm() -File: hb2_flask/hb2_flask.py - > reaches line 1261, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(person)s',person=form.data.get('name')), site=theme(request.access_route), action='https://github.com/update', pubtype='person') - -Vulnerability 35: -File: hb2_flask/hb2_flask.py - > User input at line 1286, trigger word "get(": - thedata = json.loads(edit_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 36: -File: hb2_flask/hb2_flask.py - > User input at line 1289, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 37: -File: hb2_flask/hb2_flask.py - > User input at line 1291, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1299, trigger word "flash(": - flash(Markup(lazy_gettext('

The following data are incompatible with this publication type

')) + _diff_struct(thedata, form.data), 'error') - -Vulnerability 38: -File: hb2_flask/hb2_flask.py - > User input at line 1286, trigger word "get(": - thedata = json.loads(edit_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() -File: hb2_flask/hb2_flask.py - > reaches line 1310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - -Vulnerability 39: -File: hb2_flask/hb2_flask.py - > User input at line 1289, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - -Vulnerability 40: -File: hb2_flask/hb2_flask.py - > User input at line 1291, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1310, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype) - -Vulnerability 41: -File: hb2_flask/hb2_flask.py - > User input at line 1286, trigger word "get(": - thedata = json.loads(edit_record_solr.results[0].get('wtf_json')) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() -File: hb2_flask/hb2_flask.py - > reaches line 1321, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) - -Vulnerability 42: -File: hb2_flask/hb2_flask.py - > User input at line 1289, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype)() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1291: form = PUBTYPE2FORM.get(pubtype).from_json(thedata) - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1321, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) - -Vulnerability 43: -File: hb2_flask/hb2_flask.py - > User input at line 1291, trigger word "get(": - form = PUBTYPE2FORM.get(pubtype).from_json(thedata) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1289: form = PUBTYPE2FORM.get(pubtype)() - File: hb2_flask/hb2_flask.py - > Line 1316: ret_MAYBE_FUNCTION_NAME = redirect(url_for('dashboard')) -File: hb2_flask/hb2_flask.py - > reaches line 1321, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('tabbed_form.html',form=form, header=lazy_gettext('Edit: %(title)s',title=form.data.get('title')), site=theme(request.access_route), action='https://github.com/update', pubtype=pubtype, record_id=record_id) - -Vulnerability 44: -File: hb2_flask/hb2_flask.py - > User input at line 1491, trigger word "form[": - target = request.form['next'] -File: hb2_flask/hb2_flask.py - > reaches line 1493, trigger word "url_for(": - target = url_for(endpoint,values) - -Vulnerability 45: -File: hb2_flask/hb2_flask.py - > User input at line 1491, trigger word "form[": - target = request.form['next'] -File: hb2_flask/hb2_flask.py - > reaches line 1494, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(target) - -Vulnerability 46: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 47: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 48: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 49: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1532, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 50: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 51: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 52: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 53: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1565, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('homepage')) - -Vulnerability 54: -File: hb2_flask/hb2_flask.py - > User input at line 1505, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1571: next = get_redirect_target() -File: hb2_flask/hb2_flask.py - > reaches line 1573, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) - -Vulnerability 55: -File: hb2_flask/hb2_flask.py - > User input at line 1571, trigger word "get(": - next = get_redirect_target() -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1505: next = get_redirect_target() - File: hb2_flask/hb2_flask.py - > Line 1535: ret_MAYBE_FUNCTION_NAME = redirect('login') - File: hb2_flask/hb2_flask.py - > Line 1568: ret_MAYBE_FUNCTION_NAME = redirect('login') -File: hb2_flask/hb2_flask.py - > reaches line 1573, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form, header='Sign In', next=next, site=theme(request.access_route)) - -Vulnerability 56: -File: hb2_flask/hb2_flask.py - > User input at line 1627, trigger word "get(": - page = int(request.args.get('page', 1)) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1628: solr_dumps = Solr(core='hb2_users', query='id:*.json', facet='false', start=page - 1 * 10) - File: hb2_flask/hb2_flask.py - > Line 1631: pagination = Pagination(page=page, total=num_found, found=num_found, bs_version=3, search=True, record_name=lazy_gettext('dumps'), search_msg=lazy_gettext('Showing {start} to {end} of {found} {record_name}')) - File: hb2_flask/hb2_flask.py - > Line 1634: mystart = 1 + pagination.page - 1 * pagination.per_page -File: hb2_flask/hb2_flask.py - > reaches line 1636, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('solr_dumps.html',records=solr_dumps.results, offset=mystart - 1, pagination=pagination, header=lazy_gettext('Import Dump'), del_redirect='import/solr_dumps', form=form) - -Vulnerability 57: -File: hb2_flask/hb2_flask.py - > User input at line 1652, trigger word "get(": - thedata = json.loads(import_solr.results[0].get('dump')[0]) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1645: thedata = '' - File: hb2_flask/hb2_flask.py - > Line 1656: thedata = json.loads(form.file.data.stream.read()) -File: hb2_flask/hb2_flask.py - > reaches line 1665, trigger word "flash(": - flash('%s records imported!' % len(thedata), 'success') - -Vulnerability 58: -File: hb2_flask/hb2_flask.py - > User input at line 1656, trigger word ".data": - thedata = json.loads(form.file.data.stream.read()) -Reassigned in: - File: hb2_flask/hb2_flask.py - > Line 1645: thedata = '' - File: hb2_flask/hb2_flask.py - > Line 1652: thedata = json.loads(import_solr.results[0].get('dump')[0]) -File: hb2_flask/hb2_flask.py - > reaches line 1665, trigger word "flash(": - flash('%s records imported!' % len(thedata), 'success') - -Vulnerability 59: -File: hb2_flask/processors/mods_parser.py - > User input at line 123, trigger word "get(": - pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '') -Reassigned in: - File: hb2_flask/processors/mods_parser.py - > Line 120: pnd = '' -File: hb2_flask/processors/mods_parser.py - > reaches line 123, trigger word "replace(": - pnd = name.attrib.get('valueURI').replace('http://d-nb.info/gnd/', '') - - - -Vertabelo/flask-oauth-demo-app -https://github.com/Vertabelo/flask-oauth-demo-app -Entry file: flask-oauth-demo-app/models.py -Scanned: 2016-10-25 23:24:07.407556 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -waharnum/inlibraries.com -https://github.com/waharnum/inlibraries.com -Entry file: None -Scanned: 2016-10-25 23:24:07.951437 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -billyfung/flask_shortener -https://github.com/billyfung/flask_shortener -Entry file: flask_shortener/app.py -Scanned: 2016-10-25 23:24:09.369681 -Vulnerability 1: -File: flask_shortener/app.py - > User input at line 41, trigger word "form[": - url_to_parse = request.form['input-url'] -Reassigned in: - File: flask_shortener/app.py - > Line 42: parts = urlparse.urlparse(url_to_parse) - File: flask_shortener/app.py - > Line 47: short_id = shorten(url_to_parse) -File: flask_shortener/app.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',short_id=short_id) - -Vulnerability 2: -File: flask_shortener/app.py - > User input at line 52, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(link_target) - -Vulnerability 3: -File: flask_shortener/app.py - > User input at line 60, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target) - -Vulnerability 4: -File: flask_shortener/app.py - > User input at line 63, trigger word "get(": - click_count = int(redis.get('click-count:' + short_id) or 0) -File: flask_shortener/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target) - - - -jarogers095/flasktaskr -https://github.com/jarogers095/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:24:10.415966 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Anddor/flaskr -https://github.com/Anddor/flaskr -Entry file: None -Scanned: 2016-10-25 23:24:14.444205 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Anddor/flaskr. - -hammygoonan/Flaskify -https://github.com/hammygoonan/Flaskify -Entry file: Flaskify/project/__init__.py -Scanned: 2016-10-25 23:24:21.990556 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -anujspatel/flaskr -https://github.com/anujspatel/flaskr -Entry file: None -Scanned: 2016-10-25 23:24:22.523946 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/anujspatel/flaskr. - -williamcaban/flaskrcloud -https://github.com/williamcaban/flaskrcloud -Entry file: flaskrcloud/flaskr.py -Scanned: 2016-10-25 23:24:23.930061 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -crazyqipython/flaskdemo -https://github.com/crazyqipython/flaskdemo -Entry file: None -Scanned: 2016-10-25 23:24:24.471372 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pythondude325/flaskr -https://github.com/pythondude325/flaskr -Entry file: None -Scanned: 2016-10-25 23:24:25.995501 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pythondude325/flaskr. - -fenske/flasky -https://github.com/fenske/flasky -Entry file: None -Scanned: 2016-10-25 23:24:30.507509 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fakegit/flasky -https://github.com/fakegit/flasky -Entry file: None -Scanned: 2016-10-25 23:24:34.019401 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zzclynn/flaskr -https://github.com/zzclynn/flaskr -Entry file: None -Scanned: 2016-10-25 23:24:45.052942 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zzclynn/flaskr. - -johnpwillman/flasktest -https://github.com/johnpwillman/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-25 23:24:48.351511 -No vulnerabilities found. - - -scottmarinoff/Flasky -https://github.com/scottmarinoff/Flasky -Entry file: None -Scanned: 2016-10-25 23:24:48.875448 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/scottmarinoff/Flasky. - -JamesMilnerUK/Loxo -https://github.com/JamesMilnerUK/Loxo -Entry file: Loxo/loxoapi.py -Scanned: 2016-10-25 23:24:52.845371 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhou18520786640/FlaskWeb -https://github.com/zhou18520786640/FlaskWeb -Entry file: FlaskWeb/hello.py -Scanned: 2016-10-25 23:24:56.025219 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWeb/venv/lib/python2.7/sre_compile.py - -LaRueGT/FlaskBlog -https://github.com/LaRueGT/FlaskBlog -Entry file: FlaskBlog/blog.py -Scanned: 2016-10-25 23:24:57.473596 -No vulnerabilities found. - - -ethanphunter/FlaskExperiment -https://github.com/ethanphunter/FlaskExperiment -Entry file: FlaskExperiment/main.py -Scanned: 2016-10-25 23:24:59.090318 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -rkholoniuk/FlaskAPI -https://github.com/rkholoniuk/FlaskAPI -Entry file: None -Scanned: 2016-10-25 23:25:00.395183 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rkholoniuk/FlaskAPI. - -AllyW/flaskyDeb -https://github.com/AllyW/flaskyDeb -Entry file: flaskyDeb/app/__init__.py -Scanned: 2016-10-25 23:25:02.423863 -Vulnerability 1: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flaskyDeb/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flaskyDeb/app/api_1_0/posts.py - > Line 16: prev = None - File: flaskyDeb/app/api_1_0/posts.py - > Line 19: next = None -File: flaskyDeb/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 20: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 23: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flaskyDeb/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flaskyDeb/app/api_1_0/users.py - > Line 42: prev = None - File: flaskyDeb/app/api_1_0/users.py - > Line 45: next = None -File: flaskyDeb/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 15: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 18: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flaskyDeb/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flaskyDeb/app/api_1_0/comments.py - > Line 43: prev = None - File: flaskyDeb/app/api_1_0/comments.py - > Line 46: next = None -File: flaskyDeb/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: flaskyDeb/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 55: posts = pagination.items - File: flaskyDeb/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flaskyDeb/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 45: show_followed = False - File: flaskyDeb/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flaskyDeb/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 67: posts = pagination.items -File: flaskyDeb/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: flaskyDeb/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskyDeb/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 134: comments = pagination.items - File: flaskyDeb/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskyDeb/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: flaskyDeb/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskyDeb/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: flaskyDeb/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskyDeb/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskyDeb/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: flaskyDeb/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskyDeb/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskyDeb/app/main/views.py - > Line 246: comments = pagination.items -File: flaskyDeb/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -jmcerv/FlaskTutorial -https://github.com/jmcerv/FlaskTutorial -Entry file: FlaskTutorial/app/__init__.py -Scanned: 2016-10-25 23:25:13.012865 -No vulnerabilities found. - - -asimonia/FlaskJeopardy -https://github.com/asimonia/FlaskJeopardy -Entry file: FlaskJeopardy/app/__init__.py -Scanned: 2016-10-25 23:25:20.823693 -Vulnerability 1: -File: FlaskJeopardy/app/main/views.py - > User input at line 17, trigger word ".data": - show_number = form.show_number.data -Reassigned in: - File: FlaskJeopardy/app/main/views.py - > Line 32: questions = Questionbank.objects(show_number=show_number, current_round='Jeopardy!') - File: FlaskJeopardy/app/main/views.py - > Line 33: init_game = Game(state='playing', show_number=show_number, current_round='Jeopardy!') - File: FlaskJeopardy/app/main/views.py - > Line 12: ret_MAYBE_FUNCTION_NAME = render_template('questions/index.html',form=form) -File: FlaskJeopardy/app/main/views.py - > reaches line 54, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('questions/game_board.html',game=init_game) - - - -motleytech/flaskPlate -https://github.com/motleytech/flaskPlate -Entry file: flaskPlate/app/app.py -Scanned: 2016-10-25 23:25:22.644251 -No vulnerabilities found. - - -ciricihq/wkhtmltopdf-flask-aas -https://github.com/ciricihq/wkhtmltopdf-flask-aas -Entry file: wkhtmltopdf-flask-aas/app.py -Scanned: 2016-10-25 23:25:24.190998 -No vulnerabilities found. - - -cr8ivecodesmith/save22-flask-course-src -https://github.com/cr8ivecodesmith/save22-flask-course-src -Entry file: save22-flask-course-src/05-combination/app/app.py -Scanned: 2016-10-25 23:25:25.694284 -No vulnerabilities found. - - -johnsliao/flask-sqlite3-chartjs-toy -https://github.com/johnsliao/flask-sqlite3-chartjs-toy -Entry file: flask-sqlite3-chartjs-toy/flaskr/flaskr.py -Scanned: 2016-10-25 23:25:26.991750 -No vulnerabilities found. - - -raticate/flask-tutorial -https://github.com/raticate/flask-tutorial -Entry file: flask-tutorial/app/__init__.py -Scanned: 2016-10-25 23:25:34.230910 -No vulnerabilities found. - - -yetship/flask-usages -https://github.com/yetship/flask-usages -Entry file: flask-usages/application/__init__.py -Scanned: 2016-10-25 23:25:35.666105 -Vulnerability 1: -File: flask-usages/application/controllers/todo.py - > User input at line 12, trigger word "get(": - todo_id = request.args.get('todo_id') -Reassigned in: - File: flask-usages/application/controllers/todo.py - > Line 17: ret_MAYBE_FUNCTION_NAME = jsonify() -File: flask-usages/application/controllers/todo.py - > reaches line 15, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(todo_idtodo.content) - -Vulnerability 2: -File: flask-usages/application/controllers/todo.py - > User input at line 21, trigger word "get(": - todo = Todo(content=data.get('content')) -File: flask-usages/application/controllers/todo.py - > reaches line 24, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(todo_id=todo.id, content=todo.content) - - - -MaximeGir/flask_skeleton -https://github.com/MaximeGir/flask_skeleton -Entry file: None -Scanned: 2016-10-25 23:25:36.992403 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MaximeGir/flask_skeleton. - -josepablob/flask-blog -https://github.com/josepablob/flask-blog -Entry file: None -Scanned: 2016-10-25 23:25:37.531769 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -johnsliao/flask-bp -https://github.com/johnsliao/flask-bp -Entry file: flask-bp/flaskApp.py -Scanned: 2016-10-25 23:25:38.822827 -No vulnerabilities found. - - -devmtnaing/python_flask -https://github.com/devmtnaing/python_flask -Entry file: python_flask/app/__init__.py -Scanned: 2016-10-25 23:25:40.231153 -Vulnerability 1: -File: python_flask/app/mod_auth/controllers.py - > User input at line 30, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: python_flask/app/mod_auth/controllers.py - > Line 34: session['user_id'] = user.id -File: python_flask/app/mod_auth/controllers.py - > reaches line 36, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -faraday-effect/spectacle-flask -https://github.com/faraday-effect/spectacle-flask -Entry file: spectacle-flask/app/__init__.py -Scanned: 2016-10-25 23:25:41.654408 -No vulnerabilities found. - - -swkaen/Flask_LED -https://github.com/swkaen/Flask_LED -Entry file: Flask_LED/hello.py -Scanned: 2016-10-25 23:25:42.972098 -No vulnerabilities found. - - -al4/flask-tokenauth -https://github.com/al4/flask-tokenauth -Entry file: flask-tokenauth/example.py -Scanned: 2016-10-25 23:25:44.368938 -No vulnerabilities found. - - -jgoret/flask-dataset -https://github.com/jgoret/flask-dataset -Entry file: flask-dataset/flask_dataset/__init__.py -Scanned: 2016-10-25 23:25:46.159107 -No vulnerabilities found. - - -cnds/flask_web -https://github.com/cnds/flask_web -Entry file: flask_web/app/__init__.py -Scanned: 2016-10-25 23:25:51.330903 -Vulnerability 1: -File: flask_web/app/api_1_0/posts.py - > User input at line 16, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_web/app/api_1_0/posts.py - > Line 17: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKBLOG_POSTS_PER_PAGE'], error_out=False) - File: flask_web/app/api_1_0/posts.py - > Line 20: posts = pagination.items - File: flask_web/app/api_1_0/posts.py - > Line 21: prev = None - File: flask_web/app/api_1_0/posts.py - > Line 24: next = None -File: flask_web/app/api_1_0/posts.py - > reaches line 23, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flask_web/app/api_1_0/posts.py - > User input at line 16, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_web/app/api_1_0/posts.py - > Line 17: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKBLOG_POSTS_PER_PAGE'], error_out=False) - File: flask_web/app/api_1_0/posts.py - > Line 20: posts = pagination.items - File: flask_web/app/api_1_0/posts.py - > Line 21: prev = None - File: flask_web/app/api_1_0/posts.py - > Line 24: next = None -File: flask_web/app/api_1_0/posts.py - > reaches line 26, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flask_web/app/api_1_0/posts.py - > User input at line 16, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_web/app/api_1_0/posts.py - > Line 17: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKBLOG_POSTS_PER_PAGE'], error_out=False) - File: flask_web/app/api_1_0/posts.py - > Line 20: posts = pagination.items - File: flask_web/app/api_1_0/posts.py - > Line 21: prev = None - File: flask_web/app/api_1_0/posts.py - > Line 24: next = None -File: flask_web/app/api_1_0/posts.py - > reaches line 27, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flask_web/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_web/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKBLOG_POSTS_PER_PAGE'], error_out=False) - File: flask_web/app/main/views.py - > Line 34: posts = pagination.items - File: flask_web/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_web/app/main/views.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 5: -File: flask_web/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', ' ')) -Reassigned in: - File: flask_web/app/main/views.py - > Line 23: show_followed = False - File: flask_web/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_web/app/main/views.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 6: -File: flask_web/app/main/views.py - > User input at line 110, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_web/app/main/views.py - > Line 112: page = (post.comments.count() - 1, current_app.config['FLASKBLOG_COMMENTS_PER_PAGE'] + 1) - File: flask_web/app/main/views.py - > Line 114: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKBLOG_COMMENTS_PER_PAGE'], error_out=False) - File: flask_web/app/main/views.py - > Line 116: comments = pagination.items - File: flask_web/app/main/views.py - > Line 109: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask_web/app/main/views.py - > reaches line 117, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 7: -File: flask_web/app/main/views.py - > User input at line 159, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_web/app/main/views.py - > Line 160: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKBLOG_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_web/app/main/views.py - > Line 162: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_web/app/main/views.py - > Line 158: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_web/app/main/views.py - > reaches line 164, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 8: -File: flask_web/app/main/views.py - > User input at line 190, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_web/app/main/views.py - > Line 191: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKBLOG_COMMENT_PER_PAGE'], error_out=False) - File: flask_web/app/main/views.py - > Line 194: comments = pagination.items -File: flask_web/app/main/views.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -fenfir/flask_test -https://github.com/fenfir/flask_test -Entry file: flask_test/test.py -Scanned: 2016-10-25 23:25:52.636955 -No vulnerabilities found. - - -danjamin/flask-guide -https://github.com/danjamin/flask-guide -Entry file: flask-guide/app/server.py -Scanned: 2016-10-25 23:25:53.945894 -No vulnerabilities found. - - -stevejgoodman/flask-app -https://github.com/stevejgoodman/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-25 23:25:55.245733 -No vulnerabilities found. - - -devizier/flask-blog -https://github.com/devizier/flask-blog -Entry file: None -Scanned: 2016-10-25 23:25:55.771110 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rafaelgotts/flask_rest -https://github.com/rafaelgotts/flask_rest -Entry file: flask_rest/flask_rest/app.py -Scanned: 2016-10-25 23:25:57.054592 -No vulnerabilities found. - - -Orlandohub/flask-tutorial -https://github.com/Orlandohub/flask-tutorial -Entry file: flask-tutorial/hello-world.py -Scanned: 2016-10-25 23:25:58.348179 -No vulnerabilities found. - - -python-0/flask_blog -https://github.com/python-0/flask_blog -Entry file: flask_blog/app/__init__.py -Scanned: 2016-10-25 23:25:59.909674 -No vulnerabilities found. - - -bdero/flask-sleep -https://github.com/bdero/flask-sleep -Entry file: flask-sleep/flasksleep.py -Scanned: 2016-10-25 23:26:01.304697 -No vulnerabilities found. - - -miracleluchen/blog-flask -https://github.com/miracleluchen/blog-flask -Entry file: blog-flask/server.py -Scanned: 2016-10-25 23:26:02.890202 -No vulnerabilities found. - - -IvanBodnar/flask_relevamientos -https://github.com/IvanBodnar/flask_relevamientos -Entry file: flask_relevamientos/app.py -Scanned: 2016-10-25 23:26:04.533997 -No vulnerabilities found. - - -ravivooda/flask-server -https://github.com/ravivooda/flask-server -Entry file: None -Scanned: 2016-10-25 23:26:05.937536 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ravivooda/flask-server. - -wipatrick/flask-restapi -https://github.com/wipatrick/flask-restapi -Entry file: flask-restapi/api.py -Scanned: 2016-10-25 23:26:07.252484 -No vulnerabilities found. - - -yogeshralhan/flask_1 -https://github.com/yogeshralhan/flask_1 -Entry file: flask_1/request.py -Scanned: 2016-10-25 23:26:09.332948 -No vulnerabilities found. - - -YeWang0/Flask_Blog -https://github.com/YeWang0/Flask_Blog -Entry file: Flask_Blog/main_db.py -Scanned: 2016-10-25 23:26:14.833031 -No vulnerabilities found. - - -krol3/python-flask -https://github.com/krol3/python-flask -Entry file: python-flask/app.py -Scanned: 2016-10-25 23:26:22.149589 -No vulnerabilities found. - - -ialamin/flask_hello -https://github.com/ialamin/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-25 23:26:26.415456 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ramhiser/flask-docker -https://github.com/ramhiser/flask-docker -Entry file: flask-docker/app.py -Scanned: 2016-10-25 23:26:27.719776 -No vulnerabilities found. - - -jyameo/Flask-Blog -https://github.com/jyameo/Flask-Blog -Entry file: Flask-Blog/blog.py -Scanned: 2016-10-25 23:26:32.063751 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Blog/env/lib/python2.7/sre_compile.py - -Vasiliy-tech/flask_httpserver -https://github.com/Vasiliy-tech/flask_httpserver -Entry file: flask_httpserver/simple_http.py -Scanned: 2016-10-25 23:26:33.527067 -No vulnerabilities found. - - -chuan137/flask_bess -https://github.com/chuan137/flask_bess -Entry file: flask_bess/main.py -Scanned: 2016-10-25 23:26:36.189616 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -windery/flask-blog -https://github.com/windery/flask-blog -Entry file: None -Scanned: 2016-10-25 23:26:38.761968 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kgandhi37/flask_blog -https://github.com/kgandhi37/flask_blog -Entry file: flask_blog/__init__.py -Scanned: 2016-10-25 23:26:55.544790 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_blog/venv/lib/python3.4/operator.py - -Yuhuishishishi/Flask_toy -https://github.com/Yuhuishishishi/Flask_toy -Entry file: Flask_toy/MenuApp.py -Scanned: 2016-10-25 23:26:56.930602 -No vulnerabilities found. - - -heyericnelson/flask_apps -https://github.com/heyericnelson/flask_apps -Entry file: flask_apps/flaskr/flaskr.py -Scanned: 2016-10-25 23:26:58.327784 -No vulnerabilities found. - - -datakiss/flask-miguel -https://github.com/datakiss/flask-miguel -Entry file: flask-miguel/app/__init__.py -Scanned: 2016-10-25 23:26:59.750878 -No vulnerabilities found. - - -timotk/flask-login -https://github.com/timotk/flask-login -Entry file: flask-login/app/__init__.py -Scanned: 2016-10-25 23:27:01.112652 -No vulnerabilities found. - - -johnsliao/flask-toy -https://github.com/johnsliao/flask-toy -Entry file: flask-toy/flaskr/flaskr.py -Scanned: 2016-10-25 23:27:02.795182 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jan26th/flask_test -https://github.com/jan26th/flask_test -Entry file: None -Scanned: 2016-10-25 23:27:05.790909 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dawran6/flask-blog -https://github.com/dawran6/flask-blog -Entry file: None -Scanned: 2016-10-25 23:27:06.302953 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -msapkota/Flask_Blog -https://github.com/msapkota/Flask_Blog -Entry file: Flask_Blog/blog.py -Scanned: 2016-10-25 23:27:09.433514 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -wish007/MyFlask -https://github.com/wish007/MyFlask -Entry file: MyFlask/app/__init__.py -Scanned: 2016-10-25 23:27:10.766923 -No vulnerabilities found. - - -rogerpence/flask-skeleton -https://github.com/rogerpence/flask-skeleton -Entry file: flask-skeleton/application/__init__.py -Scanned: 2016-10-25 23:27:12.186291 -No vulnerabilities found. - - -chungsquared/flask-introduction -https://github.com/chungsquared/flask-introduction -Entry file: flask-introduction/app.py -Scanned: 2016-10-25 23:27:14.105141 -No vulnerabilities found. - - -zachbpd/microblog -https://github.com/zachbpd/microblog -Entry file: None -Scanned: 2016-10-25 23:27:14.668629 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zachbpd/microblog. - -josepablob/flask-hello-world -https://github.com/josepablob/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:27:15.216213 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Tribe216/microblog -https://github.com/Tribe216/microblog -Entry file: None -Scanned: 2016-10-25 23:27:15.729947 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Tribe216/microblog. - -ipsha21/My-flask-application -https://github.com/ipsha21/My-flask-application -Entry file: My-flask-application/app.py -Scanned: 2016-10-25 23:27:17.039097 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -laaroussiBadr/FlaskWebProject -https://github.com/laaroussiBadr/FlaskWebProject -Entry file: FlaskWebProject/FlaskWebProject2/FlaskWebProject2/__init__.py -Scanned: 2016-10-25 23:27:19.398868 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -DonBeck69/FlaskWebProject2 -https://github.com/DonBeck69/FlaskWebProject2 -Entry file: None -Scanned: 2016-10-25 23:27:21.643518 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sasha-ruby/flask2spark -https://github.com/sasha-ruby/flask2spark -Entry file: flask2spark/flask2spark.py -Scanned: 2016-10-25 23:27:22.934002 -No vulnerabilities found. - - -rjmAmaro/flaskr_flask_tutorial -https://github.com/rjmAmaro/flaskr_flask_tutorial -Entry file: flaskr_flask_tutorial/flaskr/flaskr.py -Scanned: 2016-10-25 23:27:24.328575 -No vulnerabilities found. - - -embasa/FLASK -https://github.com/embasa/FLASK -Entry file: FLASK/app.py -Scanned: 2016-10-25 23:27:27.062945 -No vulnerabilities found. - - -damionlowers/flask -https://github.com/damionlowers/flask -Entry file: None -Scanned: 2016-10-25 23:27:27.605116 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -smltc/Flask -https://github.com/smltc/Flask -Entry file: None -Scanned: 2016-10-25 23:27:29.121712 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rakeshhegishte/Flask -https://github.com/rakeshhegishte/Flask -Entry file: None -Scanned: 2016-10-25 23:27:32.657098 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -RayneHwang/Flask -https://github.com/RayneHwang/Flask -Entry file: None -Scanned: 2016-10-25 23:27:35.173346 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -RoseOu/flasky -https://github.com/RoseOu/flasky -Entry file: None -Scanned: 2016-10-25 23:27:37.720744 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -materialsvirtuallab/flamyngo -https://github.com/materialsvirtuallab/flamyngo -Entry file: flamyngo/flamyngo/app.py -Scanned: 2016-10-25 23:27:40.601063 -Vulnerability 1: -File: flamyngo/flamyngo/views.py - > User input at line 95, trigger word "get(": - cname = request.args.get('collection') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 96: settings = CSETTINGS[cname] - File: flamyngo/flamyngo/views.py - > Line 98: projection = [t[0] for t in settings['summary']] - File: flamyngo/flamyngo/views.py - > Line 105: criteria = process_search_string(search_string, settings) -File: flamyngo/flamyngo/views.py - > reaches line 130, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message)) - -Vulnerability 2: -File: flamyngo/flamyngo/views.py - > User input at line 97, trigger word "get(": - search_string = request.args.get('search_string') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 105: criteria = process_search_string(search_string, settings) -File: flamyngo/flamyngo/views.py - > reaches line 130, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('index.html',collection_name=cname, results=results, fields=fields, search_string=search_string, mapped_names=mapped_names, unique_key=settings['unique_key'], active_collection=cname, collections=CNAMES, error_message=error_message)) - -Vulnerability 3: -File: flamyngo/flamyngo/views.py - > User input at line 142, trigger word "get(": - cname = request.args.get('collection') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 4: -File: flamyngo/flamyngo/views.py - > User input at line 145, trigger word "get(": - plot_type = request.args.get('plot_type') or 'scatter' -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 5: -File: flamyngo/flamyngo/views.py - > User input at line 146, trigger word "get(": - search_string = request.args.get('search_string') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 6: -File: flamyngo/flamyngo/views.py - > User input at line 147, trigger word "get(": - xaxis = request.args.get('xaxis') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - -Vulnerability 7: -File: flamyngo/flamyngo/views.py - > User input at line 148, trigger word "get(": - yaxis = request.args.get('yaxis') -Reassigned in: - File: flamyngo/flamyngo/views.py - > Line 144: ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collections=CNAMES)) -File: flamyngo/flamyngo/views.py - > reaches line 149, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = make_response(render_template('plot.html',collection=cname, search_string=search_string, plot_type=plot_type, xaxis=xaxis, yaxis=yaxis, active_collection=cname, collections=CNAMES, plot=True)) - - - -jonafato/Flask-Copilot -https://github.com/jonafato/Flask-Copilot -Entry file: Flask-Copilot/example/app.py -Scanned: 2016-10-25 23:27:41.998471 -No vulnerabilities found. - - -Upflask/Upflask -https://github.com/Upflask/Upflask -Entry file: Upflask/server.py -Scanned: 2016-10-25 23:27:43.769411 -Vulnerability 1: -File: Upflask/server.py - > User input at line 161, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Upflask/server.py - > Line 165: filename = secure_filename(file.filename) -File: Upflask/server.py - > reaches line 171, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: Upflask/server.py - > User input at line 161, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Upflask/server.py - > Line 165: filename = secure_filename(file.filename) -File: Upflask/server.py - > reaches line 171, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -PrettyPrinted/flask-wtforms -https://github.com/PrettyPrinted/flask-wtforms -Entry file: flask-wtforms/main.py -Scanned: 2016-10-25 23:27:57.098667 -No vulnerabilities found. - - -MLH/my-mlh-flask-example -https://github.com/MLH/my-mlh-flask-example -Entry file: my-mlh-flask-example/app.py -Scanned: 2016-10-25 23:27:58.425076 -No vulnerabilities found. - - -billyfung/flask_shortener -https://github.com/billyfung/flask_shortener -Entry file: flask_shortener/app.py -Scanned: 2016-10-25 23:27:59.830221 -Vulnerability 1: -File: flask_shortener/app.py - > User input at line 41, trigger word "form[": - url_to_parse = request.form['input-url'] -Reassigned in: - File: flask_shortener/app.py - > Line 42: parts = urlparse.urlparse(url_to_parse) - File: flask_shortener/app.py - > Line 47: short_id = shorten(url_to_parse) -File: flask_shortener/app.py - > reaches line 48, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',short_id=short_id) - -Vulnerability 2: -File: flask_shortener/app.py - > User input at line 52, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 56, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(link_target) - -Vulnerability 3: -File: flask_shortener/app.py - > User input at line 60, trigger word "get(": - link_target = redis.get('url-target:' + short_id) -File: flask_shortener/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target) - -Vulnerability 4: -File: flask_shortener/app.py - > User input at line 63, trigger word "get(": - click_count = int(redis.get('click-count:' + short_id) or 0) -File: flask_shortener/app.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('details.html',short_id=short_id, click_count=click_count, link_target=link_target) - - - -msapkota/flasktaskr -https://github.com/msapkota/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:28:00.362808 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Narcissist1/flasktest -https://github.com/Narcissist1/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-25 23:28:03.069747 -No vulnerabilities found. - - -super452/flasky -https://github.com/super452/flasky -Entry file: None -Scanned: 2016-10-25 23:28:03.601626 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -boydjohnson/flasktwilio -https://github.com/boydjohnson/flasktwilio -Entry file: flasktwilio/app.py -Scanned: 2016-10-25 23:28:07.903861 -Vulnerability 1: -File: flasktwilio/app.py - > User input at line 14, trigger word "form[": - number = request.form['number'] -File: flasktwilio/app.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon) - -Vulnerability 2: -File: flasktwilio/app.py - > User input at line 15, trigger word "form[": - lat = request.form['latitude'] -File: flasktwilio/app.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon) - -Vulnerability 3: -File: flasktwilio/app.py - > User input at line 16, trigger word "form[": - lon = request.form['longitude'] -File: flasktwilio/app.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('subscribe_response.html',phone_number=number, lat=lat, lon=lon) - - - -yizhianiu/flasky -https://github.com/yizhianiu/flasky -Entry file: None -Scanned: 2016-10-25 23:28:08.421152 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ifcheung2012/flaskanalysis -https://github.com/ifcheung2012/flaskanalysis -Entry file: flaskanalysis/manage.py -Scanned: 2016-10-25 23:28:11.848350 -No vulnerabilities found. - - -wdxfairy/flaskblog -https://github.com/wdxfairy/flaskblog -Entry file: None -Scanned: 2016-10-25 23:28:12.378502 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wdxfairy/flaskblog. - -wish007/flasktest -https://github.com/wish007/flasktest -Entry file: flasktest/hello.py -Scanned: 2016-10-25 23:28:13.789278 -No vulnerabilities found. - - -wildjan/Flaskr -https://github.com/wildjan/Flaskr -Entry file: None -Scanned: 2016-10-25 23:28:15.306114 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pnilan/flaskr -https://github.com/pnilan/flaskr -Entry file: None -Scanned: 2016-10-25 23:28:15.837393 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pnilan/flaskr. - -scottmarinoff/Flasky -https://github.com/scottmarinoff/Flasky -Entry file: None -Scanned: 2016-10-25 23:28:16.361751 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/scottmarinoff/Flasky. - -cutedogspark/Flask-SocketIO -https://github.com/cutedogspark/Flask-SocketIO -Entry file: Flask-SocketIO/server/app/__init__.py -Scanned: 2016-10-25 23:28:19.719166 -No vulnerabilities found. - - -EvenYan/FlaskTest -https://github.com/EvenYan/FlaskTest -Entry file: FlaskTest/app.py -Scanned: 2016-10-25 23:28:21.541455 -No vulnerabilities found. - - -jll90/flaskAng -https://github.com/jll90/flaskAng -Entry file: flaskAng/app.py -Scanned: 2016-10-25 23:28:25.389330 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskAng/lib/python2.7/sre_compile.py - -rkholoniuk/FlaskAPI -https://github.com/rkholoniuk/FlaskAPI -Entry file: None -Scanned: 2016-10-25 23:28:25.948133 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rkholoniuk/FlaskAPI. - -VitPN/FlaskRPi -https://github.com/VitPN/FlaskRPi -Entry file: FlaskRPi/go.py -Scanned: 2016-10-25 23:28:27.268907 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -edgewood/webfaction-flask0.10-boilerplate -https://github.com/edgewood/webfaction-flask0.10-boilerplate -Entry file: None -Scanned: 2016-10-25 23:28:29.189625 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/edgewood/webfaction-flask0.10-boilerplate. - -shidante/notes-flask -https://github.com/shidante/notes-flask -Entry file: notes-flask/hello.py -Scanned: 2016-10-25 23:28:30.481450 -No vulnerabilities found. - - -maixianyu/flask_tennis -https://github.com/maixianyu/flask_tennis -Entry file: None -Scanned: 2016-10-25 23:28:36.090458 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -s-kovacevic/elearning-flask -https://github.com/s-kovacevic/elearning-flask -Entry file: elearning-flask/main.py -Scanned: 2016-10-25 23:28:37.559247 -Vulnerability 1: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 71, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'user.to_jsonapi()) - -Vulnerability 2: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[user.to_jsonapi() for user in user.get_many()]) - -Vulnerability 3: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 99, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'question.to_jsonapi()) - -Vulnerability 4: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 102, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[question.to_jsonapi() for question in question.get_many()]) - -Vulnerability 5: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 131, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'category.to_jsonapi()) - -Vulnerability 6: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 134, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[category.to_jsonapi() for category in category.get_many()]) - -Vulnerability 7: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 163, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'answer.to_jsonapi()) - -Vulnerability 8: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 166, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[answer.to_jsonapi() for answer in answer.get_many()]) - -Vulnerability 9: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 195, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'score.to_jsonapi()) - -Vulnerability 10: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 198, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[score.to_jsonapi() for score in score.get_many()]) - - - -saalmerol/cds-flask -https://github.com/saalmerol/cds-flask -Entry file: None -Scanned: 2016-10-25 23:28:41.392624 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -trileg/HelloFlask -https://github.com/trileg/HelloFlask -Entry file: HelloFlask/FlaskApp/app.py -Scanned: 2016-10-25 23:28:42.710173 -No vulnerabilities found. - - -M1lan/flask_helloworld -https://github.com/M1lan/flask_helloworld -Entry file: flask_helloworld/flask_helloworld.py -Scanned: 2016-10-25 23:28:44.112940 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -xpleaf/flask_catalog -https://github.com/xpleaf/flask_catalog -Entry file: flask_catalog/my_app/__init__.py -Scanned: 2016-10-25 23:28:46.032698 -Vulnerability 1: -File: flask_catalog/my_app/catalog/views.py - > User input at line 41, trigger word "get(": - products = [redis.get(k) for k in keys_alive] -File: flask_catalog/my_app/catalog/views.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('products'products) - -Vulnerability 2: -File: flask_catalog/my_app/catalog/views.py - > User input at line 66, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 79, trigger word "flash(": - flash('The product %s has been created' % name, 'success') - -Vulnerability 3: -File: flask_catalog/my_app/catalog/views.py - > User input at line 66, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 4: -File: flask_catalog/my_app/catalog/views.py - > User input at line 67, trigger word ".data": - price = form.price.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 5: -File: flask_catalog/my_app/catalog/views.py - > User input at line 68, trigger word ".data": - category = Category.query.get_or_404(form.category.data) -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 6: -File: flask_catalog/my_app/catalog/views.py - > User input at line 71, trigger word "files[": - image = request.files['image'] -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 74: filename = secure_filename(image.filename) - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) - File: flask_catalog/my_app/catalog/views.py - > Line 72: filename = '' -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 7: -File: flask_catalog/my_app/catalog/views.py - > User input at line 66, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 8: -File: flask_catalog/my_app/catalog/views.py - > User input at line 67, trigger word ".data": - price = form.price.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 9: -File: flask_catalog/my_app/catalog/views.py - > User input at line 68, trigger word ".data": - category = Category.query.get_or_404(form.category.data) -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 10: -File: flask_catalog/my_app/catalog/views.py - > User input at line 71, trigger word "files[": - image = request.files['image'] -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 74: filename = secure_filename(image.filename) - File: flask_catalog/my_app/catalog/views.py - > Line 76: product = Product(name, price, category, filename) - File: flask_catalog/my_app/catalog/views.py - > Line 85: ret_MAYBE_FUNCTION_NAME = render_template('product-create.html',form=form) - File: flask_catalog/my_app/catalog/views.py - > Line 72: filename = '' -File: flask_catalog/my_app/catalog/views.py - > reaches line 80, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.product',id=product.id)) - -Vulnerability 11: -File: flask_catalog/my_app/catalog/views.py - > User input at line 93, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 94: category = Category(name) - File: flask_catalog/my_app/catalog/views.py - > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 97, trigger word "flash(": - flash('The category %s has been created' % name, 'success') - -Vulnerability 12: -File: flask_catalog/my_app/catalog/views.py - > User input at line 93, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 94: category = Category(name) - File: flask_catalog/my_app/catalog/views.py - > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 99, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.create_category',id=category.id)) - -Vulnerability 13: -File: flask_catalog/my_app/catalog/views.py - > User input at line 93, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 94: category = Category(name) - File: flask_catalog/my_app/catalog/views.py - > Line 105: ret_MAYBE_FUNCTION_NAME = render_template('category-create.html',form=form) -File: flask_catalog/my_app/catalog/views.py - > reaches line 99, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('catalog.create_category',id=category.id)) - -Vulnerability 14: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 142, trigger word "filter(": - products = products.filter(Product.name.like('%' + name + '%')) - -Vulnerability 15: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 142, trigger word "filter(": - products = products.filter(Product.name.like('%' + name + '%')) - -Vulnerability 16: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 142, trigger word "filter(": - products = products.filter(Product.name.like('%' + name + '%')) - -Vulnerability 17: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 142, trigger word "filter(": - products = products.filter(Product.name.like('%' + name + '%')) - -Vulnerability 18: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 144, trigger word "filter(": - products = products.filter(Product.price == price) - -Vulnerability 19: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 144, trigger word "filter(": - products = products.filter(Product.price == price) - -Vulnerability 20: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 144, trigger word "filter(": - products = products.filter(Product.price == price) - -Vulnerability 21: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 144, trigger word "filter(": - products = products.filter(Product.price == price) - -Vulnerability 22: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 146, trigger word "filter(": - products = products.filter(Product.company.like('%' + company + '%')) - -Vulnerability 23: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 146, trigger word "filter(": - products = products.filter(Product.company.like('%' + company + '%')) - -Vulnerability 24: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 146, trigger word "filter(": - products = products.filter(Product.company.like('%' + company + '%')) - -Vulnerability 25: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 146, trigger word "filter(": - products = products.filter(Product.company.like('%' + company + '%')) - -Vulnerability 26: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 148, trigger word "filter(": - products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - -Vulnerability 27: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 148, trigger word "filter(": - products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - -Vulnerability 28: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 148, trigger word "filter(": - products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - -Vulnerability 29: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 148, trigger word "filter(": - products = products.select_from(join(Product, Category)).filter(Category.name.like('%' + category + '%')) - -Vulnerability 30: -File: flask_catalog/my_app/catalog/views.py - > User input at line 136, trigger word "get(": - name = request.args.get('name') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10)) - -Vulnerability 31: -File: flask_catalog/my_app/catalog/views.py - > User input at line 137, trigger word "get(": - price = request.args.get('price') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10)) - -Vulnerability 32: -File: flask_catalog/my_app/catalog/views.py - > User input at line 138, trigger word "get(": - company = request.args.get('company') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10)) - -Vulnerability 33: -File: flask_catalog/my_app/catalog/views.py - > User input at line 139, trigger word "get(": - category = request.args.get('category') -Reassigned in: - File: flask_catalog/my_app/catalog/views.py - > Line 140: products = Product.query -File: flask_catalog/my_app/catalog/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('products.html',products=products.paginate(page, 10)) - - - -yizhianiu/flask-blog -https://github.com/yizhianiu/flask-blog -Entry file: None -Scanned: 2016-10-25 23:28:46.571657 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -garderobin/HelloFlask -https://github.com/garderobin/HelloFlask -Entry file: HelloFlask/HelloFlask.py -Scanned: 2016-10-25 23:28:57.915961 -No vulnerabilities found. - - -codybousc/flask_practice- -https://github.com/codybousc/flask_practice- -Entry file: flask_practice-/app.py -Scanned: 2016-10-25 23:29:01.005230 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_practice-/venv/lib/python2.7/sre_compile.py - -zhuwei05/flask-blog -https://github.com/zhuwei05/flask-blog -Entry file: None -Scanned: 2016-10-25 23:29:01.540097 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fenfir/flask_test -https://github.com/fenfir/flask_test -Entry file: None -Scanned: 2016-10-25 23:29:02.055815 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tim1978/flask-blog -https://github.com/tim1978/flask-blog -Entry file: None -Scanned: 2016-10-25 23:29:02.592867 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -junhl/Flask_Test -https://github.com/junhl/Flask_Test -Entry file: Flask_Test/app/__init__.py -Scanned: 2016-10-25 23:29:06.788825 -No vulnerabilities found. - - -anupam0601/flask_off -https://github.com/anupam0601/flask_off -Entry file: flask_off/appmongo.py -Scanned: 2016-10-25 23:29:13.250785 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -cdhop/flask_exercises -https://github.com/cdhop/flask_exercises -Entry file: flask_exercises/chapter_5/hello.py -Scanned: 2016-10-25 23:29:14.803133 -No vulnerabilities found. - - -AmeetSM/AngularFlask -https://github.com/AmeetSM/AngularFlask -Entry file: AngularFlask/app.py -Scanned: 2016-10-25 23:29:16.591432 -No vulnerabilities found. - - -zhiweicai/flask-hello -https://github.com/zhiweicai/flask-hello -Entry file: flask-hello/flask-hello.py -Scanned: 2016-10-25 23:29:17.913645 -No vulnerabilities found. - - -slacksec/flask_blog -https://github.com/slacksec/flask_blog -Entry file: flask_blog/__init__.py -Scanned: 2016-10-25 23:29:19.710074 -Vulnerability 1: -File: flask_blog/author/views.py - > User input at line 25, trigger word "get(": - next = session.get('next') -Reassigned in: - File: flask_blog/author/views.py - > Line 29: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: flask_blog/author/views.py - > Line 34: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error) -File: flask_blog/author/views.py - > reaches line 27, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - -Vulnerability 2: -File: flask_blog/blog/views.py - > User input at line 84, trigger word ".data": - title = form.title.data -Reassigned in: - File: flask_blog/blog/views.py - > Line 86: slug = slugify(title) - File: flask_blog/blog/views.py - > Line 87: post = Post(blog, author, title, body, category, filename, slug) - File: flask_blog/blog/views.py - > Line 91: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new') -File: flask_blog/blog/views.py - > reaches line 90, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug)) - -Vulnerability 3: -File: flask_blog/blog/views.py - > User input at line 84, trigger word ".data": - title = form.title.data -Reassigned in: - File: flask_blog/blog/views.py - > Line 86: slug = slugify(title) - File: flask_blog/blog/views.py - > Line 87: post = Post(blog, author, title, body, category, filename, slug) - File: flask_blog/blog/views.py - > Line 91: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new') -File: flask_blog/blog/views.py - > reaches line 90, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug)) - - - -GreenDragonSoft/refundmytrain-flask -https://github.com/GreenDragonSoft/refundmytrain-flask -Entry file: refundmytrain-flask/app.py -Scanned: 2016-10-25 23:29:21.143874 -No vulnerabilities found. - - -Desmonddai583/flask-blog -https://github.com/Desmonddai583/flask-blog -Entry file: None -Scanned: 2016-10-25 23:29:21.666389 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -seabrookmx/flask-demo -https://github.com/seabrookmx/flask-demo -Entry file: flask-demo/flaskdemo.py -Scanned: 2016-10-25 23:29:22.985892 -No vulnerabilities found. - - -a358003542/flask-examples -https://github.com/a358003542/flask-examples -Entry file: flask-examples/session_flash.py -Scanned: 2016-10-25 23:29:24.435829 -Vulnerability 1: -File: flask-examples/session_flash.py - > User input at line 32, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: flask-examples/session_flash.py - > Line 37: session['username'] = username -File: flask-examples/session_flash.py - > reaches line 34, trigger word "filter(": - target = db.session.query(User).filter(User.username == username).first() - -Vulnerability 2: -File: flask-examples/upload.py - > User input at line 34, trigger word "files[": - fileobj = request.files['file'] -Reassigned in: - File: flask-examples/upload.py - > Line 41: filename = fileobj.filename - File: flask-examples/upload.py - > Line 45: ret_MAYBE_FUNCTION_NAME = ' - Upload new file -

Upload new File

-
- - -
- ' - File: flask-examples/upload.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(request.url) - File: flask-examples/upload.py - > Line 39: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: flask-examples/upload.py - > reaches line 43, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 3: -File: flask-examples/upload.py - > User input at line 34, trigger word "files[": - fileobj = request.files['file'] -Reassigned in: - File: flask-examples/upload.py - > Line 41: filename = fileobj.filename - File: flask-examples/upload.py - > Line 45: ret_MAYBE_FUNCTION_NAME = ' - Upload new file -

Upload new File

-
- - -
- ' - File: flask-examples/upload.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(request.url) - File: flask-examples/upload.py - > Line 39: ret_MAYBE_FUNCTION_NAME = redirect(request.url) -File: flask-examples/upload.py - > reaches line 43, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 4: -File: flask-examples/session.py - > User input at line 32, trigger word "get(": - username = request.form.get('username') -Reassigned in: - File: flask-examples/session.py - > Line 37: session['username'] = username -File: flask-examples/session.py - > reaches line 34, trigger word "filter(": - target = db.session.query(User).filter(User.username == username).first() - - - -Yuhuishishishi/Flask_toy -https://github.com/Yuhuishishishi/Flask_toy -Entry file: Flask_toy/MenuApp.py -Scanned: 2016-10-25 23:29:25.731410 -No vulnerabilities found. - - -heyericnelson/flask_apps -https://github.com/heyericnelson/flask_apps -Entry file: flask_apps/flaskr/flaskr.py -Scanned: 2016-10-25 23:29:27.031908 -No vulnerabilities found. - - -abunuwas/flask_experiments -https://github.com/abunuwas/flask_experiments -Entry file: None -Scanned: 2016-10-25 23:29:28.353212 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/abunuwas/flask_experiments. - -ykchat/gundam-flask -https://github.com/ykchat/gundam-flask -Entry file: gundam-flask/server.py -Scanned: 2016-10-25 23:29:29.650250 -No vulnerabilities found. - - -datakiss/flask-miguel -https://github.com/datakiss/flask-miguel -Entry file: flask-miguel/app/__init__.py -Scanned: 2016-10-25 23:29:31.077499 -No vulnerabilities found. - - -eltonto187/learn_flask -https://github.com/eltonto187/learn_flask -Entry file: learn_flask/flaskr.py -Scanned: 2016-10-25 23:29:32.389356 -No vulnerabilities found. - - -NickyThreeNames/flask_blog -https://github.com/NickyThreeNames/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-25 23:29:33.674873 -No vulnerabilities found. - - -netkicorp/flask-jwe -https://github.com/netkicorp/flask-jwe -Entry file: flask-jwe/server.py -Scanned: 2016-10-25 23:29:35.129050 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -chungsquared/flask-introduction -https://github.com/chungsquared/flask-introduction -Entry file: flask-introduction/app.py -Scanned: 2016-10-25 23:29:37.931297 -No vulnerabilities found. - - -dengshilong/flask_example -https://github.com/dengshilong/flask_example -Entry file: flask_example/flaskr.py -Scanned: 2016-10-25 23:29:39.417590 -No vulnerabilities found. - - -nathanielcompton/flask-tutorial -https://github.com/nathanielcompton/flask-tutorial -Entry file: flask-tutorial/flask-tutorial/app.py -Scanned: 2016-10-25 23:29:44.050088 -No vulnerabilities found. - - -JesseLabruyere/flask_api -https://github.com/JesseLabruyere/flask_api -Entry file: flask_api/flask_project/routes.py -Scanned: 2016-10-25 23:29:48.592365 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_api/flask_project/venv/lib/python2.7/sre_compile.py - -leon740gk/flask_quick_start -https://github.com/leon740gk/flask_quick_start -Entry file: flask_quick_start/hello.py -Scanned: 2016-10-25 23:29:49.946465 -No vulnerabilities found. - - -dommert/test.dommert.xyz -https://github.com/dommert/test.dommert.xyz -Entry file: None -Scanned: 2016-10-25 23:29:51.365807 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dommert/test.dommert.xyz. - -poppuyo/FlaskUrlShortener -https://github.com/poppuyo/FlaskUrlShortener -Entry file: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py -Scanned: 2016-10-25 23:30:01.086895 -Vulnerability 1: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 93, trigger word "get(": - requested_shortened = request.args.get('shortened') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 97: cur = g.db.cursor() -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 95, trigger word "replace(": - requested_shortened = requested_shortened.replace(request.url_root, '') - -Vulnerability 2: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 93, trigger word "get(": - requested_shortened = request.args.get('shortened') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 97: cur = g.db.cursor() -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 98, trigger word "execute(": - cur.execute('SELECT url FROM urls where shortened=%s', [requested_shortened]) - -Vulnerability 3: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 93, trigger word "get(": - requested_shortened = request.args.get('shortened') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 97: cur = g.db.cursor() -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 100, trigger word "execute(": - cur = g.db.execute('SELECT url FROM urls where shortened=?', [requested_shortened]) - -Vulnerability 4: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 93, trigger word "get(": - requested_shortened = request.args.get('shortened') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 97: cur = g.db.cursor() -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 104, trigger word "url_for(": - short_url = request.url_root.rstrip('/') + url_for('find_shortened',shortened=requested_shortened) - -Vulnerability 5: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 114, trigger word "form[": - stripped_url = request.form['url'].rstrip(' ').rstrip('/') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 116: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 130: stripped_url = 'http://' + stripped_url - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 131: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 140: untrimmed_shortened = shorten(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length] -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 149, trigger word "execute(": - cur.execute('WITH new_values (url, shortened) as ( values (%s, %s) ), ' + 'upsert as ' + '( update urls u set url = nv.url, shortened = nv.shortened ' + ' FROM new_values nv WHERE u.url = nv.url RETURNING u.* )' + ' INSERT INTO urls (url, shortened) ' + ' SELECT url, shortened FROM new_values WHERE NOT EXISTS ' + ' (SELECT 1 FROM upsert up WHERE up.url = new_values.url)', [stripped_url, untrimmed_shortened[leftstring_length]]) - -Vulnerability 6: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 114, trigger word "form[": - stripped_url = request.form['url'].rstrip(' ').rstrip('/') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 116: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 130: stripped_url = 'http://' + stripped_url - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 131: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 140: untrimmed_shortened = shorten(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length] -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 160, trigger word "execute(": - g.db.execute('UPDATE urls SET url=?, shortened=? WHERE url=?', [stripped_url, untrimmed_shortened[leftstring_length], stripped_url]) - -Vulnerability 7: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 114, trigger word "form[": - stripped_url = request.form['url'].rstrip(' ').rstrip('/') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 116: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 130: stripped_url = 'http://' + stripped_url - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 131: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 140: untrimmed_shortened = shorten(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length] -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 162, trigger word "execute(": - g.db.execute('INSERT OR IGNORE INTO urls (url, shortened) VALUES (?, ?)', [stripped_url, untrimmed_shortened[leftstring_length]]) - -Vulnerability 8: -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > User input at line 114, trigger word "form[": - stripped_url = request.form['url'].rstrip(' ').rstrip('/') -Reassigned in: - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 116: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 130: stripped_url = 'http://' + stripped_url - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 131: parsed_url = urlparse(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 140: untrimmed_shortened = shorten(stripped_url) - File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > Line 165: short_url = request.url_root + untrimmed_shortened[leftstring_length] -File: FlaskUrlShortener/FlaskUrlShortener/urlshortener.py - > reaches line 166, trigger word "flash(": - flash(Markup('' + short_url + '' + ' now redirects to the following URL: ' + '' + stripped_url + '')) - - - -DonBeck69/FlaskWebProject2 -https://github.com/DonBeck69/FlaskWebProject2 -Entry file: None -Scanned: 2016-10-25 23:30:01.637396 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -j1wu/wechat-enterprise-bot -https://github.com/j1wu/wechat-enterprise-bot -Entry file: None -Scanned: 2016-10-25 23:30:03.841450 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/j1wu/wechat-enterprise-bot. - -chamambom/flask_sqlalchemy_crud -https://github.com/chamambom/flask_sqlalchemy_crud -Entry file: flask_sqlalchemy_crud/sqlcrud.py -Scanned: 2016-10-25 23:30:05.293192 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pyd-testing/flask-docker-workflow -https://github.com/pyd-testing/flask-docker-workflow -Entry file: flask-docker-workflow/app/app.py -Scanned: 2016-10-25 23:30:06.978141 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -HYL13/flask_project_0 -https://github.com/HYL13/flask_project_0 -Entry file: flask_project_0/app/__init__.py -Scanned: 2016-10-25 23:30:08.655282 -Vulnerability 1: -File: flask_project_0/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask_project_0/app/api_1_0/posts.py - > Line 16: prev = None - File: flask_project_0/app/api_1_0/posts.py - > Line 19: next = None -File: flask_project_0/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flask_project_0/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask_project_0/app/api_1_0/posts.py - > Line 16: prev = None - File: flask_project_0/app/api_1_0/posts.py - > Line 19: next = None -File: flask_project_0/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flask_project_0/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask_project_0/app/api_1_0/posts.py - > Line 16: prev = None - File: flask_project_0/app/api_1_0/posts.py - > Line 19: next = None -File: flask_project_0/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flask_project_0/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 20: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 23: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flask_project_0/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 20: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 23: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flask_project_0/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 20: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 23: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: flask_project_0/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 42: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 45: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: flask_project_0/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 42: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 45: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flask_project_0/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask_project_0/app/api_1_0/users.py - > Line 42: prev = None - File: flask_project_0/app/api_1_0/users.py - > Line 45: next = None -File: flask_project_0/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 15: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 18: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 15: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 18: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 15: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 18: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 43: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 46: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 43: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 46: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flask_project_0/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask_project_0/app/api_1_0/comments.py - > Line 43: prev = None - File: flask_project_0/app/api_1_0/comments.py - > Line 46: next = None -File: flask_project_0/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: flask_project_0/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 55: posts = pagination.items - File: flask_project_0/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_project_0/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flask_project_0/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 45: show_followed = False - File: flask_project_0/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_project_0/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flask_project_0/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 67: posts = pagination.items -File: flask_project_0/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: flask_project_0/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask_project_0/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 134: comments = pagination.items - File: flask_project_0/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask_project_0/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: flask_project_0/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_project_0/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_project_0/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: flask_project_0/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask_project_0/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_project_0/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: flask_project_0/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_project_0/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_project_0/app/main/views.py - > Line 246: comments = pagination.items -File: flask_project_0/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -EsmondMoe/flask-globalcache-http-api -https://github.com/EsmondMoe/flask-globalcache-http-api -Entry file: flask-globalcache-http-api/app.py -Scanned: 2016-10-25 23:30:15.325226 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pbsugg/flask_testbed_server -https://github.com/pbsugg/flask_testbed_server -Entry file: flask_testbed_server/main.py -Scanned: 2016-10-25 23:30:16.652225 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -gr8shivam/Flask---Handling-File-Uploads -https://github.com/gr8shivam/Flask---Handling-File-Uploads -Entry file: Flask---Handling-File-Uploads/app/__init__.py -Scanned: 2016-10-25 23:30:18.473777 -No vulnerabilities found. - - -anthonybrown/Flask-web-API-demo -https://github.com/anthonybrown/Flask-web-API-demo -Entry file: Flask-web-API-demo/app.py -Scanned: 2016-10-25 23:30:22.638415 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-web-API-demo/venv/lib/python2.7/sre_compile.py - -myCSprojects/PythonFlask-IBMBluemix -https://github.com/myCSprojects/PythonFlask-IBMBluemix -Entry file: PythonFlask-IBMBluemix/welcome.py -Scanned: 2016-10-25 23:30:29.783091 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Kriordan/flask-hello-world -https://github.com/Kriordan/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:30:30.351865 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -mdublin/Flask-SPA-API-Template -https://github.com/mdublin/Flask-SPA-API-Template -Entry file: Flask-SPA-API-Template/posts/__init__.py -Scanned: 2016-10-25 23:30:35.275258 -Vulnerability 1: -File: Flask-SPA-API-Template/posts/api.py - > User input at line 32, trigger word "get(": - title_like = request.args.get('title_like') -Reassigned in: - File: Flask-SPA-API-Template/posts/api.py - > Line 37: posts = posts.order_by(models.Post.id) - File: Flask-SPA-API-Template/posts/api.py - > Line 47: data = json.dumps([post.as_dictionary() for post in posts]) - File: Flask-SPA-API-Template/posts/api.py - > Line 50: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: Flask-SPA-API-Template/posts/api.py - > Line 34: posts = session.query(models.Post) -File: Flask-SPA-API-Template/posts/api.py - > reaches line 36, trigger word "filter(": - posts = posts.filter(models.Post.title.contains(title_like)) - - - -dwisulfahnur/My-flask-app -https://github.com/dwisulfahnur/My-flask-app -Entry file: None -Scanned: 2016-10-25 23:30:36.739470 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dwisulfahnur/My-flask-app. - -andreffs18/flask-template-project -https://github.com/andreffs18/flask-template-project -Entry file: flask-template-project/project/__init__.py -Scanned: 2016-10-25 23:30:38.301437 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -MatthewHodgson/flask-by-example -https://github.com/MatthewHodgson/flask-by-example -Entry file: flask-by-example/app.py -Scanned: 2016-10-25 23:30:45.264813 -No vulnerabilities found. - - -ssam123/flask-blog-tutorial -https://github.com/ssam123/flask-blog-tutorial -Entry file: flask-blog-tutorial/__init__.py -Scanned: 2016-10-25 23:30:46.752792 -Vulnerability 1: -File: flask-blog-tutorial/author/views.py - > User input at line 31, trigger word "get(": - next = session.get('next') -Reassigned in: - File: flask-blog-tutorial/author/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) - File: flask-blog-tutorial/author/views.py - > Line 44: ret_MAYBE_FUNCTION_NAME = render_template('author/login.html',form=form, error=error) -File: flask-blog-tutorial/author/views.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - -Vulnerability 2: -File: flask-blog-tutorial/blog/views.py - > User input at line 127, trigger word ".data": - title = form.title.data -Reassigned in: - File: flask-blog-tutorial/blog/views.py - > Line 129: slug = slugify(title) - File: flask-blog-tutorial/blog/views.py - > Line 130: post = Post(blog, author, title, body, category, filename, slug) - File: flask-blog-tutorial/blog/views.py - > Line 134: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new') -File: flask-blog-tutorial/blog/views.py - > reaches line 133, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug)) - -Vulnerability 3: -File: flask-blog-tutorial/blog/views.py - > User input at line 127, trigger word ".data": - title = form.title.data -Reassigned in: - File: flask-blog-tutorial/blog/views.py - > Line 129: slug = slugify(title) - File: flask-blog-tutorial/blog/views.py - > Line 130: post = Post(blog, author, title, body, category, filename, slug) - File: flask-blog-tutorial/blog/views.py - > Line 134: ret_MAYBE_FUNCTION_NAME = render_template('blog/post.html',form=form, action='https://github.com/new') -File: flask-blog-tutorial/blog/views.py - > reaches line 133, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('article',slug=slug)) - - - -kevinlondon/flask-hello-world -https://github.com/kevinlondon/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:30:47.273320 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yun70/flask-rest-api -https://github.com/yun70/flask-rest-api -Entry file: flask-rest-api/app/__init__.py -Scanned: 2016-10-25 23:30:49.383924 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -valexandersaulys/flask_microblog_tutorial -https://github.com/valexandersaulys/flask_microblog_tutorial -Entry file: flask_microblog_tutorial/app/__init__.py -Scanned: 2016-10-25 23:30:50.820131 -No vulnerabilities found. - - -kfiras/cloudfoundry-flask-webservice -https://github.com/kfiras/cloudfoundry-flask-webservice -Entry file: cloudfoundry-flask-webservice/app.py -Scanned: 2016-10-25 23:30:52.230571 -Vulnerability 1: -File: cloudfoundry-flask-webservice/app.py - > User input at line 80, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: cloudfoundry-flask-webservice/app.py - > reaches line 87, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201) - - - -MrLeeh/flask-mega-tutorial -https://github.com/MrLeeh/flask-mega-tutorial -Entry file: None -Scanned: 2016-10-25 23:30:52.742825 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MrLeeh/flask-mega-tutorial. - -wenzhihong2003/awesome-flask-todo -https://github.com/wenzhihong2003/awesome-flask-todo -Entry file: awesome-flask-todo/app/__init__.py -Scanned: 2016-10-25 23:30:54.030668 -No vulnerabilities found. - - -viney-shih/Flask_App_Template -https://github.com/viney-shih/Flask_App_Template -Entry file: Flask_App_Template/app/__init__.py -Scanned: 2016-10-25 23:30:55.342116 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -davehalladay/openr-flask-api -https://github.com/davehalladay/openr-flask-api -Entry file: openr-flask-api/main.py -Scanned: 2016-10-25 23:30:56.768170 -No vulnerabilities found. - - -momotaro98/flask-for-test -https://github.com/momotaro98/flask-for-test -Entry file: flask-for-test/app.py -Scanned: 2016-10-25 23:30:58.059484 -No vulnerabilities found. - - -andela-mochieng/flask-practice-tutorial -https://github.com/andela-mochieng/flask-practice-tutorial -Entry file: flask-practice-tutorial/app/__init__.py -Scanned: 2016-10-25 23:30:59.349394 -No vulnerabilities found. - - -GreenDragonSoft/flask-heroku-template -https://github.com/GreenDragonSoft/flask-heroku-template -Entry file: flask-heroku-template/app.py -Scanned: 2016-10-25 23:31:00.762990 -No vulnerabilities found. - - -mahfuzsust/flask-heroku-intro -https://github.com/mahfuzsust/flask-heroku-intro -Entry file: flask-heroku-intro/app.py -Scanned: 2016-10-25 23:31:02.637057 -No vulnerabilities found. - - -MoodyLyrics/flask -https://github.com/MoodyLyrics/flask -Entry file: None -Scanned: 2016-10-25 23:31:04.936269 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sunshine-sjd/Flask -https://github.com/sunshine-sjd/Flask -Entry file: None -Scanned: 2016-10-25 23:31:05.464422 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -unikatsieben/flask -https://github.com/unikatsieben/flask -Entry file: None -Scanned: 2016-10-25 23:31:05.998167 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Mei-Lin-Chen/Flask -https://github.com/Mei-Lin-Chen/Flask -Entry file: None -Scanned: 2016-10-25 23:31:06.570573 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kakshi3242/Flask -https://github.com/kakshi3242/Flask -Entry file: None -Scanned: 2016-10-25 23:31:08.094369 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dannyec/flask -https://github.com/dannyec/flask -Entry file: None -Scanned: 2016-10-25 23:31:14.617481 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Abirdcfly/flask-blog -https://github.com/Abirdcfly/flask-blog -Entry file: None -Scanned: 2016-10-25 23:31:17.632692 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rainyear/MathModeBot -https://github.com/rainyear/MathModeBot -Entry file: MathModeBot/main.py -Scanned: 2016-10-25 23:31:19.054659 -No vulnerabilities found. - - -jrhuerta/flask-api -https://github.com/jrhuerta/flask-api -Entry file: None -Scanned: 2016-10-25 23:31:19.579272 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jrhuerta/flask-api. - -josepablob/flasktaskr -https://github.com/josepablob/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:31:24.140381 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wangduanyang/flasky -https://github.com/wangduanyang/flasky -Entry file: None -Scanned: 2016-10-25 23:31:31.154357 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -srbhtest/flaskwebsite -https://github.com/srbhtest/flaskwebsite -Entry file: flaskwebsite/__init__.py -Scanned: 2016-10-25 23:31:37.508478 -No vulnerabilities found. - - -super452/flasky -https://github.com/super452/flasky -Entry file: None -Scanned: 2016-10-25 23:31:38.030668 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -huachen0216/flaskdemo -https://github.com/huachen0216/flaskdemo -Entry file: None -Scanned: 2016-10-25 23:31:39.565847 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MrLokans/flaskr -https://github.com/MrLokans/flaskr -Entry file: None -Scanned: 2016-10-25 23:31:46.084928 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MrLokans/flaskr. - -citizen-stig/flaskone -https://github.com/citizen-stig/flaskone -Entry file: flaskone/flask_one.py -Scanned: 2016-10-25 23:31:48.385644 -No vulnerabilities found. - - -ifcheung2012/flaskanalysis -https://github.com/ifcheung2012/flaskanalysis -Entry file: flaskanalysis/manage.py -Scanned: 2016-10-25 23:31:49.693949 -No vulnerabilities found. - - -Robotwing/flaskweb -https://github.com/Robotwing/flaskweb -Entry file: None -Scanned: 2016-10-25 23:31:50.229193 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -neo1218/m2m -https://github.com/neo1218/m2m -Entry file: m2m/m2m/app/__init__.py -Scanned: 2016-10-25 23:31:52.641496 -No vulnerabilities found. - - -fhamami/flaskone -https://github.com/fhamami/flaskone -Entry file: flaskone/app/__init__.py -Scanned: 2016-10-25 23:31:54.164063 -No vulnerabilities found. - - -windery/flasky -https://github.com/windery/flasky -Entry file: None -Scanned: 2016-10-25 23:31:54.691259 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kcunning/flask-class-c9 -https://github.com/kcunning/flask-class-c9 -Entry file: flask-class-c9/flaskclass/app/__init__.py -Scanned: 2016-10-25 23:31:56.142231 -Vulnerability 1: -File: flask-class-c9/flaskclass/app/views.py - > User input at line 38, trigger word ".data": - numbers = form.numbers.data -Reassigned in: - File: flask-class-c9/flaskclass/app/views.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form) - File: flask-class-c9/flaskclass/app/views.py - > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form) -File: flask-class-c9/flaskclass/app/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('game.html',game_nums=game_nums, player_nums=numbers, wins=wins) - - - -MarHelen/FlaskLogin -https://github.com/MarHelen/FlaskLogin -Entry file: FlaskLogin/sql_declarative.py -Scanned: 2016-10-25 23:32:00.413793 -Vulnerability 1: -File: FlaskLogin/first.py - > User input at line 63, trigger word "get(": - email = request.form.get('email') -Reassigned in: - File: FlaskLogin/first.py - > Line 70: user = User(email, request.form.get('pw')) -File: FlaskLogin/first.py - > reaches line 65, trigger word "filter(": - temp_user_set = User.query.filter(User.email == email).first() - - - -tangza/FlaskAPP -https://github.com/tangza/FlaskAPP -Entry file: None -Scanned: 2016-10-25 23:32:00.980488 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -louiskun/flaskGIT -https://github.com/louiskun/flaskGIT -Entry file: flaskGIT/sessionmail.py -Scanned: 2016-10-25 23:32:05.561376 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flaskGIT/venv/lib/python2.7/sre_compile.py - -narakai/FlaskDemo -https://github.com/narakai/FlaskDemo -Entry file: FlaskDemo/flask_demo.py -Scanned: 2016-10-25 23:32:06.927031 -No vulnerabilities found. - - -sethblack/python-flask-pixel-tracking -https://github.com/sethblack/python-flask-pixel-tracking -Entry file: python-flask-pixel-tracking/pfpt/main.py -Scanned: 2016-10-25 23:32:08.427040 -No vulnerabilities found. - - -kloudsec/py-webkit2png-flask-api -https://github.com/kloudsec/py-webkit2png-flask-api -Entry file: py-webkit2png-flask-api/api/app.py -Scanned: 2016-10-25 23:32:10.367772 -Vulnerability 1: -File: py-webkit2png-flask-api/api/web.py - > User input at line 25, trigger word "get(": - url = request.args.get('url', None) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 2: -File: py-webkit2png-flask-api/api/web.py - > User input at line 26, trigger word "get(": - width = int(request.args.get('width', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 3: -File: py-webkit2png-flask-api/api/web.py - > User input at line 27, trigger word "get(": - height = int(request.args.get('height', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 4: -File: py-webkit2png-flask-api/api/web.py - > User input at line 28, trigger word "get(": - scale = float(request.args.get('scale', 0.5)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 46, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 5: -File: py-webkit2png-flask-api/api/web.py - > User input at line 25, trigger word "get(": - url = request.args.get('url', None) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 6: -File: py-webkit2png-flask-api/api/web.py - > User input at line 26, trigger word "get(": - width = int(request.args.get('width', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 7: -File: py-webkit2png-flask-api/api/web.py - > User input at line 27, trigger word "get(": - height = int(request.args.get('height', 400)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - -Vulnerability 8: -File: py-webkit2png-flask-api/api/web.py - > User input at line 28, trigger word "get(": - scale = float(request.args.get('scale', 0.5)) -Reassigned in: - File: py-webkit2png-flask-api/api/web.py - > Line 33: x_width = int(width / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 34: x_height = int(height / scale) - File: py-webkit2png-flask-api/api/web.py - > Line 36: params = 'url''width''height''scale'urlwidthheightscale - File: py-webkit2png-flask-api/api/web.py - > Line 43: cache_filename = slugify(json.dumps(params)) - File: py-webkit2png-flask-api/api/web.py - > Line 44: cache_filepath = os.path.join(RESOURCES_FOLDER_PATH, '%s.png' % cache_filename) - File: py-webkit2png-flask-api/api/web.py - > Line 72: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 75: ret_MAYBE_FUNCTION_NAME = send_file(DEFAULT_IMAGE_PLACEHOLDER,mimetype='image/png') - File: py-webkit2png-flask-api/api/web.py - > Line 79: worked_image = img.crop((0, 0, x_width, x_height)) - File: py-webkit2png-flask-api/api/web.py - > Line 80: worked_image = worked_image.resize((width, height), Image.ANTIALIAS) -File: py-webkit2png-flask-api/api/web.py - > reaches line 83, trigger word "send_file(": - ret_MAYBE_FUNCTION_NAME = send_file(cache_filepath,mimetype='image/png') - - - -jeffreybergman/flask-blog -https://github.com/jeffreybergman/flask-blog -Entry file: None -Scanned: 2016-10-25 23:32:10.904669 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -s-kovacevic/elearning-flask -https://github.com/s-kovacevic/elearning-flask -Entry file: elearning-flask/main.py -Scanned: 2016-10-25 23:32:12.360126 -Vulnerability 1: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 71, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'user.to_jsonapi()) - -Vulnerability 2: -File: elearning-flask/main.py - > User input at line 84, trigger word ".data": - user = User(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 69: user = User() - File: elearning-flask/main.py - > Line 73: user = User() - File: elearning-flask/main.py - > Line 78: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 80: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 86: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 88: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 74, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[user.to_jsonapi() for user in user.get_many()]) - -Vulnerability 3: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 99, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'question.to_jsonapi()) - -Vulnerability 4: -File: elearning-flask/main.py - > User input at line 116, trigger word ".data": - question = Question(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 97: question = Question() - File: elearning-flask/main.py - > Line 101: question = Question() - File: elearning-flask/main.py - > Line 110: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 112: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 118: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 120: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 102, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[question.to_jsonapi() for question in question.get_many()]) - -Vulnerability 5: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 131, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'category.to_jsonapi()) - -Vulnerability 6: -File: elearning-flask/main.py - > User input at line 148, trigger word ".data": - category = Category(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 129: category = Category() - File: elearning-flask/main.py - > Line 133: category = Category() - File: elearning-flask/main.py - > Line 142: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 144: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 150: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 152: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 134, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[category.to_jsonapi() for category in category.get_many()]) - -Vulnerability 7: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 163, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'answer.to_jsonapi()) - -Vulnerability 8: -File: elearning-flask/main.py - > User input at line 180, trigger word ".data": - answer = Answer(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 161: answer = Answer() - File: elearning-flask/main.py - > Line 165: answer = Answer() - File: elearning-flask/main.py - > Line 174: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 176: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 182: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 184: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 166, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[answer.to_jsonapi() for answer in answer.get_many()]) - -Vulnerability 9: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 195, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'score.to_jsonapi()) - -Vulnerability 10: -File: elearning-flask/main.py - > User input at line 212, trigger word ".data": - score = Score(json_obj=request.data) -Reassigned in: - File: elearning-flask/main.py - > Line 193: score = Score() - File: elearning-flask/main.py - > Line 197: score = Score() - File: elearning-flask/main.py - > Line 206: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 208: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') - File: elearning-flask/main.py - > Line 214: ret_MAYBE_FUNCTION_NAME = jsonify() - File: elearning-flask/main.py - > Line 216: ret_MAYBE_FUNCTION_NAME = jsonify('error''message'400'Api error') -File: elearning-flask/main.py - > reaches line 198, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('data'[score.to_jsonapi() for score in score.get_many()]) - - - -logicalicy/flask_boostrap -https://github.com/logicalicy/flask_boostrap -Entry file: flask_boostrap/app/__init__.py -Scanned: 2016-10-25 23:32:13.773549 -No vulnerabilities found. - - -MrLokans/discover_flask -https://github.com/MrLokans/discover_flask -Entry file: discover_flask/app.py -Scanned: 2016-10-25 23:32:15.447476 -No vulnerabilities found. - - -Karambir-K/Flask-Intro -https://github.com/Karambir-K/Flask-Intro -Entry file: Flask-Intro/app.py -Scanned: 2016-10-25 23:32:16.887925 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -xiazhe/flask-demo -https://github.com/xiazhe/flask-demo -Entry file: flask-demo/app/__init__.py -Scanned: 2016-10-25 23:32:18.313791 -No vulnerabilities found. - - -nikoheikkila/flask-blog -https://github.com/nikoheikkila/flask-blog -Entry file: None -Scanned: 2016-10-25 23:32:18.842352 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Vatsalgame/flask-try -https://github.com/Vatsalgame/flask-try -Entry file: None -Scanned: 2016-10-25 23:32:19.378933 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Vatsalgame/flask-try. - -bbozhev/flask-test -https://github.com/bbozhev/flask-test -Entry file: flask-test/app/__init__.py -Scanned: 2016-10-25 23:32:26.566102 -No vulnerabilities found. - - -tim1978/flask-blog -https://github.com/tim1978/flask-blog -Entry file: None -Scanned: 2016-10-25 23:32:30.708451 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -danielcodes/flask-practice -https://github.com/danielcodes/flask-practice -Entry file: flask-practice/flask-file-upload/app.py -Scanned: 2016-10-25 23:32:32.455430 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhiweicai/flask-hello -https://github.com/zhiweicai/flask-hello -Entry file: flask-hello/flask-hello.py -Scanned: 2016-10-25 23:32:37.745232 -No vulnerabilities found. - - -GreenDragonSoft/refundmytrain-flask -https://github.com/GreenDragonSoft/refundmytrain-flask -Entry file: refundmytrain-flask/app.py -Scanned: 2016-10-25 23:32:39.156938 -No vulnerabilities found. - - -keithleit/flask-demo -https://github.com/keithleit/flask-demo -Entry file: flask-demo/app.py -Scanned: 2016-10-25 23:32:40.522616 -Vulnerability 1: -File: flask-demo/app.py - > User input at line 17, trigger word "get(": - stocks = request.args.get('stock') -Reassigned in: - File: flask-demo/app.py - > Line 19: stocks = 'goog, fb' -File: flask-demo/app.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',script=script, div=div, code=stocks, checks=checks, error=error) - - - -wstcpyt/flask-demo -https://github.com/wstcpyt/flask-demo -Entry file: flask-demo/app.py -Scanned: 2016-10-25 23:32:47.856101 -Vulnerability 1: -File: flask-demo/app.py - > User input at line 36, trigger word "form[": - stock_sticker = 'WIKI/' + request.form['stocksticker'] -Reassigned in: - File: flask-demo/app.py - > Line 47: stockdata = Quandl.get(stock_sticker,returns='numpy', trim_start=firstdaystr, trim_end=lastdaystr) - File: flask-demo/app.py - > Line 60: ret_MAYBE_FUNCTION_NAME = render_template('index.html',errormessage=errormessage) -File: flask-demo/app.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('graph.html',script=script, div=div, text=stock_sticker) - - - -geraldmc/flask-template -https://github.com/geraldmc/flask-template -Entry file: flask-template/app/__init__.py -Scanned: 2016-10-25 23:32:50.068624 -No vulnerabilities found. - - -jordo1ken/flask-fibonacci -https://github.com/jordo1ken/flask-fibonacci -Entry file: flask-fibonacci/Fibonacci.py -Scanned: 2016-10-25 23:32:51.462270 -No vulnerabilities found. - - -bodzio2k/flask-blueprint -https://github.com/bodzio2k/flask-blueprint -Entry file: flask-blueprint/run.py -Scanned: 2016-10-25 23:32:52.751492 -No vulnerabilities found. - - -PeachDew/flask_tutorialwebapp -https://github.com/PeachDew/flask_tutorialwebapp -Entry file: flask_tutorialwebapp/app.py -Scanned: 2016-10-25 23:32:57.853991 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -ktomlee/flask_init -https://github.com/ktomlee/flask_init -Entry file: flask_init/hello.py -Scanned: 2016-10-25 23:32:59.173678 -No vulnerabilities found. - - -abunuwas/flask_experiments -https://github.com/abunuwas/flask_experiments -Entry file: None -Scanned: 2016-10-25 23:33:00.198289 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/abunuwas/flask_experiments. - -Joryang/flask_videos -https://github.com/Joryang/flask_videos -Entry file: flask_videos/videos.py -Scanned: 2016-10-25 23:33:02.295813 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -AvijitGhosh82/appengine_flask -https://github.com/AvijitGhosh82/appengine_flask -Entry file: appengine_flask/main.py -Scanned: 2016-10-25 23:33:05.244295 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -sadev1/flask-demo -https://github.com/sadev1/flask-demo -Entry file: flask-demo/app.py -Scanned: 2016-10-25 23:33:06.604904 -No vulnerabilities found. - - -markleung1969/flask-base -https://github.com/markleung1969/flask-base -Entry file: flask-base/init.py -Scanned: 2016-10-25 23:33:07.940756 -Vulnerability 1: -File: flask-base/apps/auth/views.py - > User input at line 112, trigger word "get(": - user_id = session.get('user_id') -Reassigned in: - File: flask-base/apps/auth/views.py - > Line 118: resp = 'c''m''d'0'登陆成功''user_id''email''username''group''status'user_idemailusernamegroupstatus -File: flask-base/apps/auth/views.py - > reaches line 129, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(resp) - -Vulnerability 2: -File: flask-base/apps/auth/views.py - > User input at line 113, trigger word "get(": - username = session.get('username') -Reassigned in: - File: flask-base/apps/auth/views.py - > Line 118: resp = 'c''m''d'0'登陆成功''user_id''email''username''group''status'user_idemailusernamegroupstatus -File: flask-base/apps/auth/views.py - > reaches line 129, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(resp) - -Vulnerability 3: -File: flask-base/apps/auth/views.py - > User input at line 114, trigger word "get(": - email = session.get('email') -Reassigned in: - File: flask-base/apps/auth/views.py - > Line 118: resp = 'c''m''d'0'登陆成功''user_id''email''username''group''status'user_idemailusernamegroupstatus -File: flask-base/apps/auth/views.py - > reaches line 129, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(resp) - -Vulnerability 4: -File: flask-base/apps/auth/views.py - > User input at line 115, trigger word "get(": - status = session.get('status') -Reassigned in: - File: flask-base/apps/auth/views.py - > Line 118: resp = 'c''m''d'0'登陆成功''user_id''email''username''group''status'user_idemailusernamegroupstatus -File: flask-base/apps/auth/views.py - > reaches line 129, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(resp) - -Vulnerability 5: -File: flask-base/apps/auth/views.py - > User input at line 116, trigger word "get(": - group = session.get('group') -Reassigned in: - File: flask-base/apps/auth/views.py - > Line 118: resp = 'c''m''d'0'登陆成功''user_id''email''username''group''status'user_idemailusernamegroupstatus -File: flask-base/apps/auth/views.py - > reaches line 129, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(resp) - - - -NickyThreeNames/flask_blog -https://github.com/NickyThreeNames/flask_blog -Entry file: flask_blog/blog.py -Scanned: 2016-10-25 23:33:09.225633 -No vulnerabilities found. - - -zmrfzn/Flask_Sample -https://github.com/zmrfzn/Flask_Sample -Entry file: Flask_Sample/app.py -Scanned: 2016-10-25 23:33:12.403893 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -JesseLabruyere/flask_api -https://github.com/JesseLabruyere/flask_api -Entry file: flask_api/flask_project/routes.py -Scanned: 2016-10-25 23:33:16.825883 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_api/flask_project/venv/lib/python2.7/sre_compile.py - -butovichev/flask-blog -https://github.com/butovichev/flask-blog -Entry file: None -Scanned: 2016-10-25 23:33:17.407059 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pyx/flask-simplemde -https://github.com/pyx/flask-simplemde -Entry file: flask-simplemde/examples/simple/app.py -Scanned: 2016-10-25 23:33:19.119751 -No vulnerabilities found. - - -rholmes69/flasky2_1 -https://github.com/rholmes69/flasky2_1 -Entry file: flasky2_1/app/__init__.py -Scanned: 2016-10-25 23:33:20.740463 -Vulnerability 1: -File: flasky2_1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky2_1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky2_1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky2_1/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flasky2_1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky2_1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky2_1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky2_1/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flasky2_1/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flasky2_1/app/api_1_0/posts.py - > Line 16: prev = None - File: flasky2_1/app/api_1_0/posts.py - > Line 19: next = None -File: flasky2_1/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flasky2_1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 23: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flasky2_1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 23: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flasky2_1/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 20: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 23: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: flasky2_1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 45: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: flasky2_1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 45: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flasky2_1/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flasky2_1/app/api_1_0/users.py - > Line 42: prev = None - File: flasky2_1/app/api_1_0/users.py - > Line 45: next = None -File: flasky2_1/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 15: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 18: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flasky2_1/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flasky2_1/app/api_1_0/comments.py - > Line 43: prev = None - File: flasky2_1/app/api_1_0/comments.py - > Line 46: next = None -File: flasky2_1/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: flasky2_1/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 55: posts = pagination.items - File: flasky2_1/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2_1/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flasky2_1/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 45: show_followed = False - File: flasky2_1/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2_1/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flasky2_1/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 67: posts = pagination.items -File: flasky2_1/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: flasky2_1/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flasky2_1/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 134: comments = pagination.items - File: flasky2_1/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flasky2_1/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: flasky2_1/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flasky2_1/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2_1/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: flasky2_1/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flasky2_1/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flasky2_1/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: flasky2_1/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flasky2_1/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flasky2_1/app/main/views.py - > Line 246: comments = pagination.items -File: flasky2_1/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -ChellsChen/FlaskSocketIOChart -https://github.com/ChellsChen/FlaskSocketIOChart -Entry file: FlaskSocketIOChart/app/__init__.py -Scanned: 2016-10-25 23:33:22.885009 -Vulnerability 1: -File: FlaskSocketIOChart/app/main/routes.py - > User input at line 31, trigger word "get(": - name = session.get('name', '') -Reassigned in: - File: FlaskSocketIOChart/app/main/routes.py - > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskSocketIOChart/app/main/routes.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room) - -Vulnerability 2: -File: FlaskSocketIOChart/app/main/routes.py - > User input at line 32, trigger word "get(": - room = session.get('room', '') -Reassigned in: - File: FlaskSocketIOChart/app/main/routes.py - > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskSocketIOChart/app/main/routes.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room) - - - -jcerise/openspacesboard-python -https://github.com/jcerise/openspacesboard-python -Entry file: openspacesboard-python/osbp_app/openspacesboard.py -Scanned: 2016-10-25 23:33:25.348027 -Vulnerability 1: -File: openspacesboard-python/osbp_app/openspacesboard.py - > User input at line 44, trigger word "get(": - me = github.get('user') -Reassigned in: - File: openspacesboard-python/osbp_app/openspacesboard.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: openspacesboard-python/osbp_app/openspacesboard.py - > reaches line 45, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(me.data) - -Vulnerability 2: -File: openspacesboard-python/osbp_app/openspacesboard.py - > User input at line 69, trigger word "get(": - me = github.get('user') -Reassigned in: - File: openspacesboard-python/osbp_app/openspacesboard.py - > Line 64: ret_MAYBE_FUNCTION_NAME = 'Access denied: reason=%s error=%s' % (request.args['error'], request.args['error_description']) -File: openspacesboard-python/osbp_app/openspacesboard.py - > reaches line 70, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(me.data) - -Vulnerability 3: -File: openspacesboard-python/osbp_app/mod_spaces/controllers.py - > User input at line 29, trigger word "get(": - space = ConferenceSpace.query.get(space_id) -Reassigned in: - File: openspacesboard-python/osbp_app/mod_spaces/controllers.py - > Line 32: space = dict(id=space.id, space_name=space.space_name, location_id=space.location_id, event_date=space.event_date, start_time=space.start_time, end_time=space.end_time) -File: openspacesboard-python/osbp_app/mod_spaces/controllers.py - > reaches line 34, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('space'space) - -Vulnerability 4: -File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > User input at line 39, trigger word "get(": - session = ConferenceSession.query.get(session_id) -Reassigned in: - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 42: session_space = session.space - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 43: session_location = session_space.location - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 44: timespan = 'start_time''end_time'session_space.start_timesession_space.end_time - File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > Line 45: session = dict(id=session.id, title=session.title, description=session.description, convener=session.convener, space_name=session_space.space_name, location=session_location.name, date=session_space.event_date, timespan=timespan) -File: openspacesboard-python/osbp_app/mod_conference_sessions/controllers.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('session'session) - -Vulnerability 5: -File: openspacesboard-python/osbp_app/mod_locations/controllers.py - > User input at line 27, trigger word "get(": - location = ConferenceLocation.query.get(location_id) -Reassigned in: - File: openspacesboard-python/osbp_app/mod_locations/controllers.py - > Line 30: location = dict(id=location.id, name=location.name) -File: openspacesboard-python/osbp_app/mod_locations/controllers.py - > reaches line 31, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('location'location) - - - -icecraft/ZhiHuDaemon -https://github.com/icecraft/ZhiHuDaemon -Entry file: ZhiHuDaemon/app/__init__.py -Scanned: 2016-10-25 23:33:26.954768 -Vulnerability 1: -File: ZhiHuDaemon/app/main/views.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 16: pagination = Question.query.order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False) - File: ZhiHuDaemon/app/main/views.py - > Line 19: questions = pagination.items -File: ZhiHuDaemon/app/main/views.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',questions=questions, pagination=pagination) - -Vulnerability 2: -File: ZhiHuDaemon/app/main/views.py - > User input at line 26, trigger word "form[": - keyword = '%' + request.form['search'] + '%' -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html') - File: ZhiHuDaemon/app/main/views.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html') -File: ZhiHuDaemon/app/main/views.py - > reaches line 30, trigger word "filter(": - pagination = Question.query.filter(Question.title.like(keyword)).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False) - -Vulnerability 3: -File: ZhiHuDaemon/app/main/views.py - > User input at line 29, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 33: questions = pagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html') - File: ZhiHuDaemon/app/main/views.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html') -File: ZhiHuDaemon/app/main/views.py - > reaches line 30, trigger word "filter(": - pagination = Question.query.filter(Question.title.like(keyword)).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['INDEX_QUESTIONS_PER_PAGE'], error_out=False) - -Vulnerability 4: -File: ZhiHuDaemon/app/main/views.py - > User input at line 26, trigger word "form[": - keyword = '%' + request.form['search'] + '%' -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html') - File: ZhiHuDaemon/app/main/views.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html') -File: ZhiHuDaemon/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',questions=questions, pagination=pagination, keyword=keyword[1-1]) - -Vulnerability 5: -File: ZhiHuDaemon/app/main/views.py - > User input at line 29, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 33: questions = pagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = render_template('search.html') - File: ZhiHuDaemon/app/main/views.py - > Line 28: ret_MAYBE_FUNCTION_NAME = render_template('search.html') -File: ZhiHuDaemon/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search.html',questions=questions, pagination=pagination, keyword=keyword[1-1]) - -Vulnerability 6: -File: ZhiHuDaemon/app/main/views.py - > User input at line 100, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 101: askpagination = Question.query.filter_by(author_id=user.id).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False) - File: ZhiHuDaemon/app/main/views.py - > Line 104: questions = askpagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 105: page = request.args.get('page', 1,type=int) - File: ZhiHuDaemon/app/main/views.py - > Line 106: anspagination = Answer.query.filter_by(author_id=user.id).order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False) - File: ZhiHuDaemon/app/main/views.py - > Line 109: questions = askpagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 110: answers = anspagination.items -File: ZhiHuDaemon/app/main/views.py - > reaches line 111, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, questions=questions, answers=answers, askpagination=askpagination, anspagination=anspagination) - -Vulnerability 7: -File: ZhiHuDaemon/app/main/views.py - > User input at line 105, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 100: page = request.args.get('page', 1,type=int) - File: ZhiHuDaemon/app/main/views.py - > Line 101: askpagination = Question.query.filter_by(author_id=user.id).order_by(Question.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False) - File: ZhiHuDaemon/app/main/views.py - > Line 104: questions = askpagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 106: anspagination = Answer.query.filter_by(author_id=user.id).order_by(Answer.timestamp.desc()).paginate(page,per_page=current_app.config['PROFILE_QUESTIONS_PER_PAGE'], error_out=False) - File: ZhiHuDaemon/app/main/views.py - > Line 109: questions = askpagination.items - File: ZhiHuDaemon/app/main/views.py - > Line 110: answers = anspagination.items -File: ZhiHuDaemon/app/main/views.py - > reaches line 111, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, questions=questions, answers=answers, askpagination=askpagination, anspagination=anspagination) - -Vulnerability 8: -File: ZhiHuDaemon/app/main/views.py - > User input at line 145, trigger word "get(": - answer_id = request.args.get('answer_id', -1,type=int) -Reassigned in: - File: ZhiHuDaemon/app/main/views.py - > Line 147: answer = Answer.query.filter_by(id=answer_id) - File: ZhiHuDaemon/app/main/views.py - > Line 150: answer = Answer(answer=answerForm.body.data, author=current_user._get_current_object(), authorname=current_user.username, question=question) - File: ZhiHuDaemon/app/main/views.py - > Line 159: comment = Comment(comment=commentForm.body.data, author=current_user._get_current_object(), authorname=current_user.username, answer=answer) - File: ZhiHuDaemon/app/main/views.py - > Line 155: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.question',id=id)) - File: ZhiHuDaemon/app/main/views.py - > Line 164: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.question',id=id)) -File: ZhiHuDaemon/app/main/views.py - > reaches line 168, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('question.html',question=question, asker=asker, answerForm=answerForm, answers=answers, comments=comments, commentForm=commentForm, answer_id=answer_id) - - - -AntonisFK/Login_registration_Flask -https://github.com/AntonisFK/Login_registration_Flask -Entry file: None -Scanned: 2016-10-25 23:33:28.233102 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AntonisFK/Login_registration_Flask. - -liuenyan/micro-flask-blog -https://github.com/liuenyan/micro-flask-blog -Entry file: micro-flask-blog/app/__init__.py -Scanned: 2016-10-25 23:33:31.699963 -Vulnerability 1: -File: micro-flask-blog/app/main/views.py - > User input at line 17, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: micro-flask-blog/app/main/views.py - > Line 18: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: micro-flask-blog/app/main/views.py - > Line 19: posts = pagination.items -File: micro-flask-blog/app/main/views.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination) - -Vulnerability 2: -File: micro-flask-blog/app/main/views.py - > User input at line 124, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: micro-flask-blog/app/main/views.py - > Line 125: pagination = Post.query.filter_by(category_id=category_id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: micro-flask-blog/app/main/views.py - > Line 126: posts = pagination.items -File: micro-flask-blog/app/main/views.py - > reaches line 127, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.html',posts=posts, pagination=pagination, username=username, category_id=category_id) - - - -jeseon/flask-by-example -https://github.com/jeseon/flask-by-example -Entry file: None -Scanned: 2016-10-25 23:33:33.090980 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jeseon/flask-by-example. - -maxidrum/Flask_and_Mongo -https://github.com/maxidrum/Flask_and_Mongo -Entry file: Flask_and_Mongo/application/__init__.py -Scanned: 2016-10-25 23:33:41.442168 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mdublin/Flask-SPA-API-Template -https://github.com/mdublin/Flask-SPA-API-Template -Entry file: Flask-SPA-API-Template/posts/__init__.py -Scanned: 2016-10-25 23:33:51.577406 -Vulnerability 1: -File: Flask-SPA-API-Template/posts/api.py - > User input at line 32, trigger word "get(": - title_like = request.args.get('title_like') -Reassigned in: - File: Flask-SPA-API-Template/posts/api.py - > Line 37: posts = posts.order_by(models.Post.id) - File: Flask-SPA-API-Template/posts/api.py - > Line 47: data = json.dumps([post.as_dictionary() for post in posts]) - File: Flask-SPA-API-Template/posts/api.py - > Line 50: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: Flask-SPA-API-Template/posts/api.py - > Line 34: posts = session.query(models.Post) -File: Flask-SPA-API-Template/posts/api.py - > reaches line 36, trigger word "filter(": - posts = posts.filter(models.Post.title.contains(title_like)) - - - -keimos/flask-rest-sql -https://github.com/keimos/flask-rest-sql -Entry file: flask-rest-sql/app.py -Scanned: 2016-10-25 23:33:52.942154 -No vulnerabilities found. - - -jeffreybergman/flask-hello-world -https://github.com/jeffreybergman/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:33:53.460965 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zolaneta/todo_flask_application -https://github.com/zolaneta/todo_flask_application -Entry file: None -Scanned: 2016-10-25 23:33:55.235529 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zolaneta/todo_flask_application. - -baskervilski/flask-hello-world -https://github.com/baskervilski/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:33:55.804687 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Bbouley/flask-by-example -https://github.com/Bbouley/flask-by-example -Entry file: None -Scanned: 2016-10-25 23:33:59.336547 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Bbouley/flask-by-example. - -wilbert-abreu/realtime_slack_flask_app -https://github.com/wilbert-abreu/realtime_slack_flask_app -Entry file: None -Scanned: 2016-10-25 23:34:05.596249 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ellachao/Flask_GmailAPI_Example -https://github.com/ellachao/Flask_GmailAPI_Example -Entry file: Flask_GmailAPI_Example/main.py -Scanned: 2016-10-25 23:34:06.918626 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -NJIT-SIG-WEBDEV/Flask-URL-Shortner -https://github.com/NJIT-SIG-WEBDEV/Flask-URL-Shortner -Entry file: Flask-URL-Shortner/app.py -Scanned: 2016-10-25 23:34:08.474827 -Vulnerability 1: -File: Flask-URL-Shortner/app.py - > User input at line 30, trigger word ".data": - site_id = mongo.db.links.find_one_or_404('url'form.url.data)['site_id'] -Reassigned in: - File: Flask-URL-Shortner/app.py - > Line 33: site_id = '' - File: Flask-URL-Shortner/app.py - > Line 35: site_id += random.choice(string.ascii_letters) - File: Flask-URL-Shortner/app.py - > Line 37: data = 'site_id''url'site_idform.url.data -File: Flask-URL-Shortner/app.py - > reaches line 43, trigger word "url_for(": - flash('URL created! {0} redirects to {1}.'.format(url_for('homepage',_external=True) + site_id, form.url.data)) - -Vulnerability 2: -File: Flask-URL-Shortner/app.py - > User input at line 30, trigger word ".data": - site_id = mongo.db.links.find_one_or_404('url'form.url.data)['site_id'] -Reassigned in: - File: Flask-URL-Shortner/app.py - > Line 33: site_id = '' - File: Flask-URL-Shortner/app.py - > Line 35: site_id += random.choice(string.ascii_letters) - File: Flask-URL-Shortner/app.py - > Line 37: data = 'site_id''url'site_idform.url.data -File: Flask-URL-Shortner/app.py - > reaches line 43, trigger word "flash(": - flash('URL created! {0} redirects to {1}.'.format(url_for('homepage',_external=True) + site_id, form.url.data)) - - - -hilmarh/island-python-flask-example -https://github.com/hilmarh/island-python-flask-example -Entry file: island-python-flask-example/app/__init__.py -Scanned: 2016-10-25 23:34:09.908854 -No vulnerabilities found. - - -dv3/sample-Flask-Application -https://github.com/dv3/sample-Flask-Application -Entry file: None -Scanned: 2016-10-25 23:34:11.220611 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dv3/sample-Flask-Application. - -mml1/flask_multiple_forms -https://github.com/mml1/flask_multiple_forms -Entry file: flask_multiple_forms/server.py -Scanned: 2016-10-25 23:34:12.532676 -No vulnerabilities found. - - -jideobs/flask-gae-ndb-starter -https://github.com/jideobs/flask-gae-ndb-starter -Entry file: flask-gae-ndb-starter/server/main.py -Scanned: 2016-10-25 23:34:14.101622 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -marcabomb/flask_hello_world -https://github.com/marcabomb/flask_hello_world -Entry file: flask_hello_world/app.py -Scanned: 2016-10-25 23:34:18.260453 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -kevin-js/azure-flask-tutorial -https://github.com/kevin-js/azure-flask-tutorial -Entry file: azure-flask-tutorial/run.py -Scanned: 2016-10-25 23:34:19.610496 -No vulnerabilities found. - - -ShawnPengxy/Flask-madeBlog -https://github.com/ShawnPengxy/Flask-madeBlog -Entry file: Flask-madeBlog/app/__init__.py -Scanned: 2016-10-25 23:34:25.275745 -Vulnerability 1: -File: Flask-madeBlog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 16: prev = None - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 19: next = None -File: Flask-madeBlog/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: Flask-madeBlog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 16: prev = None - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 19: next = None -File: Flask-madeBlog/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: Flask-madeBlog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 16: prev = None - File: Flask-madeBlog/app/api_1_0/posts.py - > Line 19: next = None -File: Flask-madeBlog/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: Flask-madeBlog/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-madeBlog/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-madeBlog/app/api_1_0/users.py - > Line 23: next = None -File: Flask-madeBlog/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: Flask-madeBlog/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-madeBlog/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-madeBlog/app/api_1_0/users.py - > Line 23: next = None -File: Flask-madeBlog/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: Flask-madeBlog/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-madeBlog/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-madeBlog/app/api_1_0/users.py - > Line 23: next = None -File: Flask-madeBlog/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: Flask-madeBlog/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: Flask-madeBlog/app/api_1_0/users.py - > Line 42: prev = None - File: Flask-madeBlog/app/api_1_0/users.py - > Line 45: next = None -File: Flask-madeBlog/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: Flask-madeBlog/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: Flask-madeBlog/app/api_1_0/users.py - > Line 42: prev = None - File: Flask-madeBlog/app/api_1_0/users.py - > Line 45: next = None -File: Flask-madeBlog/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: Flask-madeBlog/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: Flask-madeBlog/app/api_1_0/users.py - > Line 42: prev = None - File: Flask-madeBlog/app/api_1_0/users.py - > Line 45: next = None -File: Flask-madeBlog/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: Flask-madeBlog/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-madeBlog/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: Flask-madeBlog/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-madeBlog/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: Flask-madeBlog/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-madeBlog/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: Flask-madeBlog/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 43: prev = None - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 46: next = None -File: Flask-madeBlog/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: Flask-madeBlog/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 43: prev = None - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 46: next = None -File: Flask-madeBlog/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: Flask-madeBlog/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 43: prev = None - File: Flask-madeBlog/app/api_1_0/comments.py - > Line 46: next = None -File: Flask-madeBlog/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: Flask-madeBlog/app/main/views.py - > User input at line 48, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/main/views.py - > Line 56: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/main/views.py - > Line 59: posts = pagination.items - File: Flask-madeBlog/app/main/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-madeBlog/app/main/views.py - > reaches line 60, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: Flask-madeBlog/app/main/views.py - > User input at line 51, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Flask-madeBlog/app/main/views.py - > Line 49: show_followed = False - File: Flask-madeBlog/app/main/views.py - > Line 47: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-madeBlog/app/main/views.py - > reaches line 60, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: Flask-madeBlog/app/main/views.py - > User input at line 67, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/main/views.py - > Line 68: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/main/views.py - > Line 71: posts = pagination.items -File: Flask-madeBlog/app/main/views.py - > reaches line 72, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: Flask-madeBlog/app/main/views.py - > User input at line 131, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/main/views.py - > Line 133: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Flask-madeBlog/app/main/views.py - > Line 135: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/main/views.py - > Line 138: comments = pagination.items - File: Flask-madeBlog/app/main/views.py - > Line 130: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Flask-madeBlog/app/main/views.py - > reaches line 139, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: Flask-madeBlog/app/main/views.py - > User input at line 198, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/main/views.py - > Line 199: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/main/views.py - > Line 202: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Flask-madeBlog/app/main/views.py - > Line 197: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-madeBlog/app/main/views.py - > reaches line 204, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: Flask-madeBlog/app/main/views.py - > User input at line 215, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/main/views.py - > Line 216: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/main/views.py - > Line 219: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Flask-madeBlog/app/main/views.py - > Line 214: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-madeBlog/app/main/views.py - > reaches line 221, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: Flask-madeBlog/app/main/views.py - > User input at line 246, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-madeBlog/app/main/views.py - > Line 247: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Flask-madeBlog/app/main/views.py - > Line 250: comments = pagination.items -File: Flask-madeBlog/app/main/views.py - > reaches line 251, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -vinayraghavan/pyacacemy-flask-workshop -https://github.com/vinayraghavan/pyacacemy-flask-workshop -Entry file: pyacacemy-flask-workshop/bookmarks.py -Scanned: 2016-10-25 23:34:26.677815 -No vulnerabilities found. - - -drbrightside/first-flask-app -https://github.com/drbrightside/first-flask-app -Entry file: first-flask-app/flaskclass/app/__init__.py -Scanned: 2016-10-25 23:34:28.087854 -Vulnerability 1: -File: first-flask-app/flaskclass/app/views.py - > User input at line 38, trigger word ".data": - numbers = form.numbers.data -Reassigned in: - File: first-flask-app/flaskclass/app/views.py - > Line 48: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form) - File: first-flask-app/flaskclass/app/views.py - > Line 50: ret_MAYBE_FUNCTION_NAME = render_template('get_lucky.html',form=form) -File: first-flask-app/flaskclass/app/views.py - > reaches line 45, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('game.html',game_nums=game_nums, player_nums=numbers, wins=wins) - - - -D10221/gae_flask_ndb_test -https://github.com/D10221/gae_flask_ndb_test -Entry file: gae_flask_ndb_test/main.py -Scanned: 2016-10-25 23:34:29.421872 -No vulnerabilities found. - - -micahcourey/FirstFlaskApp -https://github.com/micahcourey/FirstFlaskApp -Entry file: FirstFlaskApp/flask_app.py -Scanned: 2016-10-25 23:34:30.692394 -No vulnerabilities found. - - -commandknight/cs125-fooddy-flask -https://github.com/commandknight/cs125-fooddy-flask -Entry file: cs125-fooddy-flask/fooddy2.py -Scanned: 2016-10-25 23:34:33.093528 -Vulnerability 1: -File: cs125-fooddy-flask/fooddy2.py - > User input at line 177, trigger word "get(": - long = request.form.get('current_location_longitude') -Reassigned in: - File: cs125-fooddy-flask/fooddy2.py - > Line 195: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address)) - File: cs125-fooddy-flask/fooddy2.py - > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location) -File: cs125-fooddy-flask/fooddy2.py - > reaches line 185, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)])) - -Vulnerability 2: -File: cs125-fooddy-flask/fooddy2.py - > User input at line 178, trigger word "get(": - lat = request.form.get('current_location_latitude') -Reassigned in: - File: cs125-fooddy-flask/fooddy2.py - > Line 195: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address)) - File: cs125-fooddy-flask/fooddy2.py - > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location) -File: cs125-fooddy-flask/fooddy2.py - > reaches line 185, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)])) - -Vulnerability 3: -File: cs125-fooddy-flask/fooddy2.py - > User input at line 191, trigger word "form[": - a1 = request.form['addressline1'] -Reassigned in: - File: cs125-fooddy-flask/fooddy2.py - > Line 194: address = a1 + ' ' + city + ' ' + state - File: cs125-fooddy-flask/fooddy2.py - > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location) - File: cs125-fooddy-flask/fooddy2.py - > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)])) -File: cs125-fooddy-flask/fooddy2.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address)) - -Vulnerability 4: -File: cs125-fooddy-flask/fooddy2.py - > User input at line 192, trigger word "form[": - city = request.form['addresscity'] -Reassigned in: - File: cs125-fooddy-flask/fooddy2.py - > Line 194: address = a1 + ' ' + city + ' ' + state - File: cs125-fooddy-flask/fooddy2.py - > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location) - File: cs125-fooddy-flask/fooddy2.py - > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)])) -File: cs125-fooddy-flask/fooddy2.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address)) - -Vulnerability 5: -File: cs125-fooddy-flask/fooddy2.py - > User input at line 193, trigger word "form[": - state = request.form['addressstate'] -Reassigned in: - File: cs125-fooddy-flask/fooddy2.py - > Line 194: address = a1 + ' ' + city + ' ' + state - File: cs125-fooddy-flask/fooddy2.py - > Line 206: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(session['lat'], session['long'])]), next_location=location) - File: cs125-fooddy-flask/fooddy2.py - > Line 185: ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine(current_user.get_id(),coords=[(lat, long)])) -File: cs125-fooddy-flask/fooddy2.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('recommended.html',list_results=ranker.get_ranking_by_probabilistic_cosine_by_address(current_user.get_id(),address=address)) - - - -GreenDragonSoft/flask-heroku-template -https://github.com/GreenDragonSoft/flask-heroku-template -Entry file: flask-heroku-template/app.py -Scanned: 2016-10-25 23:34:34.487981 -No vulnerabilities found. - - -rfmapp/TheFlaskMegaTutorial -https://github.com/rfmapp/TheFlaskMegaTutorial -Entry file: TheFlaskMegaTutorial/app/__init__.py -Scanned: 2016-10-25 23:34:42.899789 -No vulnerabilities found. - - -JadyLiu/flask -https://github.com/JadyLiu/flask -Entry file: None -Scanned: 2016-10-25 23:34:45.139914 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -candyer/Flask -https://github.com/candyer/Flask -Entry file: None -Scanned: 2016-10-25 23:34:45.668659 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -scripterkaran/flask -https://github.com/scripterkaran/flask -Entry file: None -Scanned: 2016-10-25 23:34:46.188953 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -itsrifat/flask-celery-docker-scale -https://github.com/itsrifat/flask-celery-docker-scale -Entry file: flask-celery-docker-scale/flask-app/app.py -Scanned: 2016-10-25 23:34:47.516138 -No vulnerabilities found. - - -sinscary/Flask-Social-Networking -https://github.com/sinscary/Flask-Social-Networking -Entry file: Flask-Social-Networking/app.py -Scanned: 2016-10-25 23:34:49.453598 -Vulnerability 1: -File: Flask-Social-Networking/app.py - > User input at line 111, trigger word "get(": - user = models.User.select().where(models.User.username ** username).get() -Reassigned in: - File: Flask-Social-Networking/app.py - > Line 118: user = current_user -File: Flask-Social-Networking/app.py - > reaches line 121, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template(template,stream=stream, user=user) - -Vulnerability 2: -File: Flask-Social-Networking/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 146, trigger word "flash(": - flash('You are now following {}'.format(to_user.username), 'success') - -Vulnerability 3: -File: Flask-Social-Networking/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 147, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 4: -File: Flask-Social-Networking/app.py - > User input at line 134, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 147, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 5: -File: Flask-Social-Networking/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 165, trigger word "flash(": - flash('You have unfollowed {}'.format(to_user.username), 'success') - -Vulnerability 6: -File: Flask-Social-Networking/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 166, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - -Vulnerability 7: -File: Flask-Social-Networking/app.py - > User input at line 153, trigger word "get(": - to_user = models.User.get(models.User.username ** username) -File: Flask-Social-Networking/app.py - > reaches line 166, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('stream',username=to_user.username)) - - - -osuosl/timesync-frontend-flask -https://github.com/osuosl/timesync-frontend-flask -Entry file: None -Scanned: 2016-10-25 23:34:53.025441 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/osuosl/timesync-frontend-flask. - -narakai/flaskblog -https://github.com/narakai/flaskblog -Entry file: None -Scanned: 2016-10-25 23:34:53.544711 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/narakai/flaskblog. - -josepablob/flasktaskr -https://github.com/josepablob/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:34:54.080532 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -adrianneperedo/flaskr -https://github.com/adrianneperedo/flaskr -Entry file: None -Scanned: 2016-10-25 23:34:56.610239 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/adrianneperedo/flaskr. - -mirukushake/flaskr -https://github.com/mirukushake/flaskr -Entry file: None -Scanned: 2016-10-25 23:35:00.128268 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mirukushake/flaskr. - -wangduanyang/flasky -https://github.com/wangduanyang/flasky -Entry file: None -Scanned: 2016-10-25 23:35:00.656921 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -darrenhankins/flaskr -https://github.com/darrenhankins/flaskr -Entry file: None -Scanned: 2016-10-25 23:35:06.179211 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/darrenhankins/flaskr. - -Looncall/Flaskr -https://github.com/Looncall/Flaskr -Entry file: None -Scanned: 2016-10-25 23:35:07.729775 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -CBR09/flaskapp -https://github.com/CBR09/flaskapp -Entry file: None -Scanned: 2016-10-25 23:35:09.234873 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/CBR09/flaskapp. - -czy1238677/flasky -https://github.com/czy1238677/flasky -Entry file: None -Scanned: 2016-10-25 23:35:10.826726 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -marcabomb/flasktaskr -https://github.com/marcabomb/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:35:12.378619 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jeffreybergman/flasktaskr -https://github.com/jeffreybergman/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:35:13.915078 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Pink-Moon/flaskr -https://github.com/Pink-Moon/flaskr -Entry file: None -Scanned: 2016-10-25 23:35:15.434102 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Pink-Moon/flaskr. - -mcmcgonagle/flasktaskr2 -https://github.com/mcmcgonagle/flasktaskr2 -Entry file: flasktaskr2/project/views.py -Scanned: 2016-10-25 23:35:16.791659 -No vulnerabilities found. - - -AlexFransis/FlaskyProject -https://github.com/AlexFransis/FlaskyProject -Entry file: FlaskyProject/app/__init__.py -Scanned: 2016-10-25 23:35:20.429513 -No vulnerabilities found. - - -AlexGrek/FlaskLib -https://github.com/AlexGrek/FlaskLib -Entry file: FlaskLib/FlaskLib/FlaskLib/__init__.py -Scanned: 2016-10-25 23:35:22.958483 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -daveweber/FlaskBar -https://github.com/daveweber/FlaskBar -Entry file: FlaskBar/index.py -Scanned: 2016-10-25 23:35:27.312679 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -danleyb2/flaskMe -https://github.com/danleyb2/flaskMe -Entry file: flaskMe/flaskREST.py -Scanned: 2016-10-25 23:35:28.621591 -Vulnerability 1: -File: flaskMe/flaskREST.py - > User input at line 73, trigger word "get(": - name = data.get('name') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 76, trigger word "execute(": - db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color]) - -Vulnerability 2: -File: flaskMe/flaskREST.py - > User input at line 74, trigger word "get(": - color = data.get('color') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 76, trigger word "execute(": - db.execute('INSERT INTO cars (name, color) VALUES (?,?)', [name, color]) - -Vulnerability 3: -File: flaskMe/flaskREST.py - > User input at line 73, trigger word "get(": - name = data.get('name') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 78, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color)) - -Vulnerability 4: -File: flaskMe/flaskREST.py - > User input at line 74, trigger word "get(": - color = data.get('color') -Reassigned in: - File: flaskMe/flaskREST.py - > Line 87: ret_MAYBE_FUNCTION_NAME = jsonify(entries) -File: flaskMe/flaskREST.py - > reaches line 78, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(dict(name=name, color=color)) - - - -Rikka-chan/flaskCharts -https://github.com/Rikka-chan/flaskCharts -Entry file: None -Scanned: 2016-10-25 23:35:29.150473 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bunkdeath/FlaskTemplate -https://github.com/bunkdeath/FlaskTemplate -Entry file: FlaskTemplate/application.py -Scanned: 2016-10-25 23:35:31.474827 -No vulnerabilities found. - - -zding5/FlaskDemo -https://github.com/zding5/FlaskDemo -Entry file: FlaskDemo/app/__init__.py -Scanned: 2016-10-25 23:36:03.730452 -No vulnerabilities found. - - -diggzhang/flaskMaze -https://github.com/diggzhang/flaskMaze -Entry file: None -Scanned: 2016-10-25 23:36:05.869240 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/diggzhang/flaskMaze. - -narakai/FlaskDemo -https://github.com/narakai/FlaskDemo -Entry file: FlaskDemo/flask_demo.py -Scanned: 2016-10-25 23:36:07.243514 -No vulnerabilities found. - - -deanmax/FlaskAPP -https://github.com/deanmax/FlaskAPP -Entry file: None -Scanned: 2016-10-25 23:36:07.826941 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hugoantunes/base-flask -https://github.com/hugoantunes/base-flask -Entry file: base-flask/service/__init__.py -Scanned: 2016-10-25 23:36:09.646435 -No vulnerabilities found. - - -haburibe/docker-flask -https://github.com/haburibe/docker-flask -Entry file: docker-flask/main.py -Scanned: 2016-10-25 23:36:10.973671 -No vulnerabilities found. - - -krisekenes/flask_deployment -https://github.com/krisekenes/flask_deployment -Entry file: flask_deployment/server.py -Scanned: 2016-10-25 23:36:12.381464 -No vulnerabilities found. - - -namickey/hello-flask -https://github.com/namickey/hello-flask -Entry file: hello-flask/main.py -Scanned: 2016-10-25 23:36:13.675637 -No vulnerabilities found. - - -mmingle/flask-blog -https://github.com/mmingle/flask-blog -Entry file: None -Scanned: 2016-10-25 23:36:14.199781 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -justinwp/flask-urs -https://github.com/justinwp/flask-urs -Entry file: flask-urs/tests/conftest.py -Scanned: 2016-10-25 23:36:15.739367 -No vulnerabilities found. - - -timyi1212/flask-demo -https://github.com/timyi1212/flask-demo -Entry file: flask-demo/app.py -Scanned: 2016-10-25 23:36:17.076763 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -SawHigh/flask_cdn -https://github.com/SawHigh/flask_cdn -Entry file: flask_cdn/cdn.py -Scanned: 2016-10-25 23:36:18.881025 -No vulnerabilities found. - - -crq/flask-scaffold -https://github.com/crq/flask-scaffold -Entry file: None -Scanned: 2016-10-25 23:36:20.311999 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/crq/flask-scaffold. - -asielen/Woodles_Flask -https://github.com/asielen/Woodles_Flask -Entry file: Woodles_Flask/app/__init__.py -Scanned: 2016-10-25 23:36:21.877496 -Vulnerability 1: -File: Woodles_Flask/app/views/app_views.py - > User input at line 22, trigger word "get(": - current_card = Card.query.get(card_id) -File: Woodles_Flask/app/views/app_views.py - > reaches line 23, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string)) - -Vulnerability 2: -File: Woodles_Flask/app/views/app_views.py - > User input at line 22, trigger word "get(": - current_card = Card.query.get(card_id) -File: Woodles_Flask/app/views/app_views.py - > reaches line 23, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string)) - - - -honmaple/flask-word -https://github.com/honmaple/flask-word -Entry file: flask-word/app/__init__.py -Scanned: 2016-10-25 23:36:23.690350 -Vulnerability 1: -File: flask-word/app/count/views.py - > User input at line 17, trigger word "cookies[": - count = int(request.cookies['count']) + 1 -Reassigned in: - File: flask-word/app/count/views.py - > Line 19: count = 0 - File: flask-word/app/count/views.py - > Line 20: response = make_response(str(count)) - File: flask-word/app/count/views.py - > Line 22: ret_MAYBE_FUNCTION_NAME = response -File: flask-word/app/count/views.py - > reaches line 21, trigger word "set_cookie(": - response.set_cookie('count',value=str(count), max_age=1800) - -Vulnerability 2: -File: flask-word/app/chat/views.py - > User input at line 38, trigger word "get(": - username = session.get('username', '') -Reassigned in: - File: flask-word/app/chat/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-word/app/chat/views.py - > reaches line 42, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat/chat.html',username=username, room=room) - -Vulnerability 3: -File: flask-word/app/chat/views.py - > User input at line 39, trigger word "get(": - room = session.get('room', '') -Reassigned in: - File: flask-word/app/chat/views.py - > Line 41: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-word/app/chat/views.py - > reaches line 42, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat/chat.html',username=username, room=room) - -Vulnerability 4: -File: flask-word/app/paginate/views.py - > User input at line 42, trigger word "get(": - page = is_num(request.args.get('page')) -Reassigned in: - File: flask-word/app/paginate/views.py - > Line 43: topics = Topic.query.paginate(page, app.config['PER_PAGE'],error_out=True) -File: flask-word/app/paginate/views.py - > reaches line 44, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('page/page.html',topics=topics) - - - -marcabomb/flask-blog -https://github.com/marcabomb/flask-blog -Entry file: None -Scanned: 2016-10-25 23:36:24.233420 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -studiomezklador/flask_api -https://github.com/studiomezklador/flask_api -Entry file: flask_api/boot.py -Scanned: 2016-10-25 23:36:25.560351 -No vulnerabilities found. - - -rinechran/flask-tutorial -https://github.com/rinechran/flask-tutorial -Entry file: None -Scanned: 2016-10-25 23:36:27.393352 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rinechran/flask-tutorial. - -bodzio2k/flask-blueprint -https://github.com/bodzio2k/flask-blueprint -Entry file: flask-blueprint/run.py -Scanned: 2016-10-25 23:36:29.237559 -No vulnerabilities found. - - -PeachDew/flask_tutorialwebapp -https://github.com/PeachDew/flask_tutorialwebapp -Entry file: flask_tutorialwebapp/app.py -Scanned: 2016-10-25 23:36:34.279626 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -jordo1ken/flask-fibonacci -https://github.com/jordo1ken/flask-fibonacci -Entry file: flask-fibonacci/Fibonacci.py -Scanned: 2016-10-25 23:36:35.639263 -No vulnerabilities found. - - -Kriordan/flask-blog -https://github.com/Kriordan/flask-blog -Entry file: None -Scanned: 2016-10-25 23:36:36.204314 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -a-r-g-v/flask-template -https://github.com/a-r-g-v/flask-template -Entry file: flask-template/app/__init__.py -Scanned: 2016-10-25 23:36:37.617034 -No vulnerabilities found. - - -Savvis/flask-phonebook -https://github.com/Savvis/flask-phonebook -Entry file: flask-phonebook/app/__init__.py -Scanned: 2016-10-25 23:36:39.098770 -No vulnerabilities found. - - -aksareen/Flask-learn -https://github.com/aksareen/Flask-learn -Entry file: Flask-learn/app.py -Scanned: 2016-10-25 23:36:40.885485 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -aqisnotliquid/flask_rpg -https://github.com/aqisnotliquid/flask_rpg -Entry file: flask_rpg/app/__init__.py -Scanned: 2016-10-25 23:36:42.326805 -No vulnerabilities found. - - -textbook/flask-forecaster -https://github.com/textbook/flask-forecaster -Entry file: flask-forecaster/flask_forecaster/flask_app.py -Scanned: 2016-10-25 23:36:43.878191 -Vulnerability 1: -File: flask-forecaster/flask_forecaster/flask_app.py - > User input at line 34, trigger word ".data": - token = form.token.data -Reassigned in: - File: flask-forecaster/flask_forecaster/flask_app.py - > Line 36: projects = Tracker.validate_token(token) - File: flask-forecaster/flask_forecaster/flask_app.py - > Line 38: session['token'] = token - File: flask-forecaster/flask_forecaster/flask_app.py - > Line 46: ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, version=__version__) -File: flask-forecaster/flask_forecaster/flask_app.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, projects=projects, version=__version__) - -Vulnerability 2: -File: flask-forecaster/flask_forecaster/flask_app.py - > User input at line 52, trigger word "get(": - token = session.get('token') -Reassigned in: - File: flask-forecaster/flask_forecaster/flask_app.py - > Line 55: api = Tracker(token) -File: flask-forecaster/flask_forecaster/flask_app.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('project.html',project=api.get_project(project_id)) - - - -nava45/flask-routelogger -https://github.com/nava45/flask-routelogger -Entry file: flask-routelogger/flask_app_example.py -Scanned: 2016-10-25 23:36:45.309945 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -MattHealy/flask-skeleton -https://github.com/MattHealy/flask-skeleton -Entry file: flask-skeleton/app/__init__.py -Scanned: 2016-10-25 23:37:05.655557 -No vulnerabilities found. - - -Xavier-Lam/flask-wechat -https://github.com/Xavier-Lam/flask-wechat -Entry file: flask-wechat/demo.py -Scanned: 2016-10-25 23:37:08.420004 -No vulnerabilities found. - - -Ty-WDFW/Flask-Tickets -https://github.com/Ty-WDFW/Flask-Tickets -Entry file: Flask-Tickets/main.py -Scanned: 2016-10-25 23:37:09.749956 -Vulnerability 1: -File: Flask-Tickets/main.py - > User input at line 15, trigger word "form[": - fishticket = request.form['text'] -Reassigned in: - File: Flask-Tickets/main.py - > Line 16: response = get_fish_ticket(fishticket) -File: Flask-Tickets/main.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('bioinfo.html',entries=response, ticket=fishticket) - - - -makudesu/flask-thesis -https://github.com/makudesu/flask-thesis -Entry file: flask-thesis/bnhs.py -Scanned: 2016-10-25 23:37:11.673170 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ivanenko/flask-webcrawler -https://github.com/ivanenko/flask-webcrawler -Entry file: flask-webcrawler/ww2.py -Scanned: 2016-10-25 23:37:13.210278 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pyx/flask-simplemde -https://github.com/pyx/flask-simplemde -Entry file: flask-simplemde/examples/simple/app.py -Scanned: 2016-10-25 23:37:14.862723 -No vulnerabilities found. - - -kubabu/flask_blog -https://github.com/kubabu/flask_blog -Entry file: flask_blog/app.py -Scanned: 2016-10-25 23:37:17.073967 -Vulnerability 1: -File: flask_blog/views.py - > User input at line 50, trigger word "get(": - next_url = request.args.get('next') or request.form.get('next') -Reassigned in: - File: flask_blog/views.py - > Line 52: next_url = '/drafts' - File: flask_blog/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=RegisterForm(), error=error) - File: flask_blog/views.py - > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_blog/views.py - > reaches line 66, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index')) - -Vulnerability 2: -File: flask_blog/views.py - > User input at line 50, trigger word "get(": - next_url = request.args.get('next') or request.form.get('next') -Reassigned in: - File: flask_blog/views.py - > Line 52: next_url = '/drafts' - File: flask_blog/views.py - > Line 78: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=RegisterForm(), error=error) - File: flask_blog/views.py - > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('login')) -File: flask_blog/views.py - > reaches line 66, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index')) - -Vulnerability 3: -File: flask_blog/views.py - > User input at line 99, trigger word "get(": - next_url = request.args.get('next') or request.form.get('next') -Reassigned in: - File: flask_blog/views.py - > Line 101: next_url = '/drafts' - File: flask_blog/views.py - > Line 118: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=LoginForm()) - File: flask_blog/views.py - > Line 89: ret_MAYBE_FUNCTION_NAME = redirect(url_for('register')) - File: flask_blog/views.py - > Line 93: ret_MAYBE_FUNCTION_NAME = redirect(url_for('drafts')) -File: flask_blog/views.py - > reaches line 112, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index')) - -Vulnerability 4: -File: flask_blog/views.py - > User input at line 99, trigger word "get(": - next_url = request.args.get('next') or request.form.get('next') -Reassigned in: - File: flask_blog/views.py - > Line 101: next_url = '/drafts' - File: flask_blog/views.py - > Line 118: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=LoginForm()) - File: flask_blog/views.py - > Line 89: ret_MAYBE_FUNCTION_NAME = redirect(url_for('register')) - File: flask_blog/views.py - > Line 93: ret_MAYBE_FUNCTION_NAME = redirect(url_for('drafts')) -File: flask_blog/views.py - > reaches line 112, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next_url or url_for('index')) - -Vulnerability 5: -File: flask_blog/views.py - > User input at line 151, trigger word "get(": - entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/views.py - > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/views.py - > reaches line 157, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug)) - -Vulnerability 6: -File: flask_blog/views.py - > User input at line 151, trigger word "form[": - entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/views.py - > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/views.py - > reaches line 157, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug)) - -Vulnerability 7: -File: flask_blog/views.py - > User input at line 151, trigger word "get(": - entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/views.py - > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/views.py - > reaches line 157, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug)) - -Vulnerability 8: -File: flask_blog/views.py - > User input at line 151, trigger word "form[": - entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/views.py - > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/views.py - > reaches line 157, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('detail',slug=entry.slug)) - -Vulnerability 9: -File: flask_blog/views.py - > User input at line 151, trigger word "get(": - entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/views.py - > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/views.py - > reaches line 159, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug)) - -Vulnerability 10: -File: flask_blog/views.py - > User input at line 151, trigger word "form[": - entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/views.py - > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/views.py - > reaches line 159, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug)) - -Vulnerability 11: -File: flask_blog/views.py - > User input at line 151, trigger word "get(": - entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/views.py - > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/views.py - > reaches line 159, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug)) - -Vulnerability 12: -File: flask_blog/views.py - > User input at line 151, trigger word "form[": - entry = Entry.create(title=request.form['title'], content=request.form['content'], published=request.form.get('published') or False) -Reassigned in: - File: flask_blog/views.py - > Line 162: ret_MAYBE_FUNCTION_NAME = render_template('create.html') -File: flask_blog/views.py - > reaches line 159, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('edit',slug=entry.slug)) - - - -MichaelDaniello/LearnFlask -https://github.com/MichaelDaniello/LearnFlask -Entry file: LearnFlask/cyoa/lib/python2.7/site-packages/flask/sessions.py -Scanned: 2016-10-25 23:37:22.008365 -No vulnerabilities found. - - -bplabombarda/fdr -https://github.com/bplabombarda/fdr -Entry file: fdr/server/__init__.py -Scanned: 2016-10-25 23:37:23.934689 -No vulnerabilities found. - - -metajemo/testapp -https://github.com/metajemo/testapp -Entry file: testapp/testapp.py -Scanned: 2016-10-25 23:37:25.256699 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -gzxultra/FlaskLoginManagement -https://github.com/gzxultra/FlaskLoginManagement -Entry file: FlaskLoginManagement/app/__init__.py -Scanned: 2016-10-25 23:37:27.188084 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -victorcuervo/FlaskMongoDB -https://github.com/victorcuervo/FlaskMongoDB -Entry file: FlaskMongoDB/welcome.py -Scanned: 2016-10-25 23:37:28.603431 -No vulnerabilities found. - - -ChellsChen/FlaskSocketIOChart -https://github.com/ChellsChen/FlaskSocketIOChart -Entry file: FlaskSocketIOChart/app/__init__.py -Scanned: 2016-10-25 23:37:30.234168 -Vulnerability 1: -File: FlaskSocketIOChart/app/main/routes.py - > User input at line 31, trigger word "get(": - name = session.get('name', '') -Reassigned in: - File: FlaskSocketIOChart/app/main/routes.py - > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskSocketIOChart/app/main/routes.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room) - -Vulnerability 2: -File: FlaskSocketIOChart/app/main/routes.py - > User input at line 32, trigger word "get(": - room = session.get('room', '') -Reassigned in: - File: FlaskSocketIOChart/app/main/routes.py - > Line 34: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskSocketIOChart/app/main/routes.py - > reaches line 35, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('chat.html',name=name, room=room) - - - -sasha42/Mailchimp-utility -https://github.com/sasha42/Mailchimp-utility -Entry file: None -Scanned: 2016-10-25 23:37:31.528054 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sasha42/Mailchimp-utility. - -auliude/flask_hello_world -https://github.com/auliude/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-25 23:37:35.160033 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -yogeshdixit41/PyFlaskWebApp -https://github.com/yogeshdixit41/PyFlaskWebApp -Entry file: PyFlaskWebApp/hello.py -Scanned: 2016-10-25 23:37:38.948655 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: PyFlaskWebApp/venv/lib/python2.7/sre_compile.py - -znss1989/flask_blog_ex -https://github.com/znss1989/flask_blog_ex -Entry file: flask_blog_ex/blog.py -Scanned: 2016-10-25 23:37:40.289174 -No vulnerabilities found. - - -liuenyan/micro-flask-blog -https://github.com/liuenyan/micro-flask-blog -Entry file: micro-flask-blog/app/__init__.py -Scanned: 2016-10-25 23:37:41.748837 -Vulnerability 1: -File: micro-flask-blog/app/main/views.py - > User input at line 17, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: micro-flask-blog/app/main/views.py - > Line 18: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: micro-flask-blog/app/main/views.py - > Line 19: posts = pagination.items -File: micro-flask-blog/app/main/views.py - > reaches line 20, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',posts=posts, pagination=pagination) - -Vulnerability 2: -File: micro-flask-blog/app/main/views.py - > User input at line 124, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: micro-flask-blog/app/main/views.py - > Line 125: pagination = Post.query.filter_by(category_id=category_id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: micro-flask-blog/app/main/views.py - > Line 126: posts = pagination.items -File: micro-flask-blog/app/main/views.py - > reaches line 127, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('category.html',posts=posts, pagination=pagination, username=username, category_id=category_id) - - - -rtorres90/rest-flask-tutorial -https://github.com/rtorres90/rest-flask-tutorial -Entry file: rest-flask-tutorial/rest_flask/endpointsproject3.py -Scanned: 2016-10-25 23:37:46.101684 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jz314/flask-demo-copy -https://github.com/jz314/flask-demo-copy -Entry file: None -Scanned: 2016-10-25 23:37:47.567003 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jz314/flask-demo-copy. - -willelson/flask-app-template -https://github.com/willelson/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-25 23:37:52.024156 -No vulnerabilities found. - - -acbart/lti-flask-skeleton -https://github.com/acbart/lti-flask-skeleton -Entry file: lti-flask-skeleton/main.py -Scanned: 2016-10-25 23:37:53.516094 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -GreatBedAwake/flask_lab_web -https://github.com/GreatBedAwake/flask_lab_web -Entry file: flask_lab_web/app/__init__.py -Scanned: 2016-10-25 23:37:54.949158 -Vulnerability 1: -File: flask_lab_web/app/views.py - > User input at line 46, trigger word "form[": - find_component = request.form['find_component'] -Reassigned in: - File: flask_lab_web/app/views.py - > Line 47: dates = select_where_db(find_component) - File: flask_lab_web/app/views.py - > Line 54: dates = select_data() - File: flask_lab_web/app/views.py - > Line 56: dates = select_data() -File: flask_lab_web/app/views.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show.html',component=dates) - - - -Derfirm/hello-docker-flask -https://github.com/Derfirm/hello-docker-flask -Entry file: hello-docker-flask/app.py -Scanned: 2016-10-25 23:37:56.262321 -No vulnerabilities found. - - -arvvvs/Flask-Practice-Metis-Delivery -https://github.com/arvvvs/Flask-Practice-Metis-Delivery -Entry file: Flask-Practice-Metis-Delivery/app.py -Scanned: 2016-10-25 23:37:58.355550 -Vulnerability 1: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 30, trigger word "form(": - form = request_phone_form() -Reassigned in: - File: Flask-Practice-Metis-Delivery/app.py - > Line 32: session['phone'] = form.phone.data - File: Flask-Practice-Metis-Delivery/app.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('lookup')) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form) - -Vulnerability 2: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 57, trigger word "get(": - address = request.args.get('address', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 65, trigger word "execute(": - cur.execute('INSERT INTO tbl_deliveries (customer_name, delivery_status, customer_address, delivery_person) VALUES("' + name + '", "' + status + '","' + address + '","' + driver + '");') - -Vulnerability 3: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 59, trigger word "get(": - name = request.args.get('name', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 65, trigger word "execute(": - cur.execute('INSERT INTO tbl_deliveries (customer_name, delivery_status, customer_address, delivery_person) VALUES("' + name + '", "' + status + '","' + address + '","' + driver + '");') - -Vulnerability 4: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 127, trigger word "form[": - _phone = request.form['submitPhone'] -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 128, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('lookup.html',phone=_phone) - -Vulnerability 5: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 148, trigger word "get(": - phone = request.args.get('phone', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - -Vulnerability 6: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 149, trigger word "get(": - name = request.args.get('name', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - -Vulnerability 7: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 150, trigger word "get(": - address = request.args.get('address', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - -Vulnerability 8: -File: Flask-Practice-Metis-Delivery/app.py - > User input at line 151, trigger word "get(": - phone_value = request.args.get('phone_value', 0,type=str) -File: Flask-Practice-Metis-Delivery/app.py - > reaches line 154, trigger word "execute(": - cur.execute('UPDATE tbl_customer_info SET name="' + name + '", address="' + address + '",phone_number = "' + phone + '" WHERE phone_number = "' + phone_value + '"') - - - -jideobs/flask-gae-ndb-starter -https://github.com/jideobs/flask-gae-ndb-starter -Entry file: flask-gae-ndb-starter/server/main.py -Scanned: 2016-10-25 23:38:00.037804 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mml1/flask_multiple_forms -https://github.com/mml1/flask_multiple_forms -Entry file: flask_multiple_forms/server.py -Scanned: 2016-10-25 23:38:01.438306 -No vulnerabilities found. - - -dv3/sample-Flask-Application -https://github.com/dv3/sample-Flask-Application -Entry file: None -Scanned: 2016-10-25 23:38:01.983433 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dv3/sample-Flask-Application. - -blackmad/flask-google-login-example -https://github.com/blackmad/flask-google-login-example -Entry file: flask-google-login-example/main.py -Scanned: 2016-10-25 23:38:06.414134 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Tim9Liu9/Flask_Bootstrap_Blog -https://github.com/Tim9Liu9/Flask_Bootstrap_Blog -Entry file: Flask_Bootstrap_Blog/doc/app.py -Scanned: 2016-10-25 23:38:09.109493 -No vulnerabilities found. - - -knight-zhou/Web.py_Flask -https://github.com/knight-zhou/Web.py_Flask -Entry file: None -Scanned: 2016-10-25 23:38:11.253045 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/knight-zhou/Web.py_Flask. - -DEV3L/openshift-python-flask-example -https://github.com/DEV3L/openshift-python-flask-example -Entry file: openshift-python-flask-example/wsgi/run.py -Scanned: 2016-10-25 23:38:12.697688 -No vulnerabilities found. - - -nosuchip/flask-video-streaming -https://github.com/nosuchip/flask-video-streaming -Entry file: flask-video-streaming/main.py -Scanned: 2016-10-25 23:38:14.588338 -No vulnerabilities found. - - -cerealcake/flask-ldap3 -https://github.com/cerealcake/flask-ldap3 -Entry file: flask-ldap3/app.py -Scanned: 2016-10-25 23:38:15.892656 -No vulnerabilities found. - - -VistaarJ/REST-API-Using-Flask- -https://github.com/VistaarJ/REST-API-Using-Flask- -Entry file: REST-API-Using-Flask-/app.py -Scanned: 2016-10-25 23:38:20.251310 -No vulnerabilities found. - - -n-batalha/flask-api-template -https://github.com/n-batalha/flask-api-template -Entry file: flask-api-template/web/journey_predict/__init__.py -Scanned: 2016-10-25 23:38:21.671449 -No vulnerabilities found. - - -willelson/flask-login-template -https://github.com/willelson/flask-login-template -Entry file: flask-login-template/app/__init__.py -Scanned: 2016-10-25 23:38:27.019436 -No vulnerabilities found. - - -zolaneta/books_flask_app -https://github.com/zolaneta/books_flask_app -Entry file: None -Scanned: 2016-10-25 23:38:28.900405 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zolaneta/books_flask_app. - -Anivarth/quiz-python-flask -https://github.com/Anivarth/quiz-python-flask -Entry file: quiz-python-flask/quiz.py -Scanned: 2016-10-25 23:38:30.214591 -No vulnerabilities found. - - -richyvk/flask-url-shortener -https://github.com/richyvk/flask-url-shortener -Entry file: flask-url-shortener/app.py -Scanned: 2016-10-25 23:38:31.872255 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zbc/Flask -https://github.com/zbc/Flask -Entry file: None -Scanned: 2016-10-25 23:38:34.366536 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -cobra0914/flask -https://github.com/cobra0914/flask -Entry file: None -Scanned: 2016-10-25 23:38:34.869945 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -susantshrestha/flask -https://github.com/susantshrestha/flask -Entry file: None -Scanned: 2016-10-25 23:38:36.403247 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SunchunZhou/flask -https://github.com/SunchunZhou/flask -Entry file: None -Scanned: 2016-10-25 23:38:40.008830 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -w84miracle/flask-sb-admin2 -https://github.com/w84miracle/flask-sb-admin2 -Entry file: flask-sb-admin2/sbadmin.py -Scanned: 2016-10-25 23:38:44.442809 -No vulnerabilities found. - - -k-hung/FlaskApp -https://github.com/k-hung/FlaskApp -Entry file: FlaskApp/FeelsApp/__init__.py -Scanned: 2016-10-25 23:38:49.579341 -No vulnerabilities found. - - -yoshiya0503/Flask-Best-Practices -https://github.com/yoshiya0503/Flask-Best-Practices -Entry file: Flask-Best-Practices/methodview.py -Scanned: 2016-10-25 23:38:50.904651 -No vulnerabilities found. - - -ThunderousFigs/Genomes -https://github.com/ThunderousFigs/Genomes -Entry file: Genomes/server.py -Scanned: 2016-10-25 23:39:03.881296 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Python-Project-Simple/flask-blog -https://github.com/Python-Project-Simple/flask-blog -Entry file: None -Scanned: 2016-10-25 23:39:05.428143 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -adrianneperedo/flaskr -https://github.com/adrianneperedo/flaskr -Entry file: None -Scanned: 2016-10-25 23:39:05.944521 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/adrianneperedo/flaskr. - -mirukushake/flaskr -https://github.com/mirukushake/flaskr -Entry file: None -Scanned: 2016-10-25 23:39:06.454136 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mirukushake/flaskr. - -schen2011/flaskandazure -https://github.com/schen2011/flaskandazure -Entry file: flaskandazure/FlaskWebProject3/FlaskWebProject3/__init__.py -Scanned: 2016-10-25 23:39:08.605681 -No vulnerabilities found. - - -DXZ/flaskr -https://github.com/DXZ/flaskr -Entry file: None -Scanned: 2016-10-25 23:39:09.139123 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/DXZ/flaskr. - -tim1978/flasktaskr -https://github.com/tim1978/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:39:09.678210 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -keer2345/flasky -https://github.com/keer2345/flasky -Entry file: None -Scanned: 2016-10-25 23:39:10.195297 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -PansFortress/flasktasker -https://github.com/PansFortress/flasktasker -Entry file: flasktasker/views.py -Scanned: 2016-10-25 23:39:11.658058 -No vulnerabilities found. - - -olegzhoglo/flasktaskr -https://github.com/olegzhoglo/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:39:12.171829 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Kriordan/flasktaskr -https://github.com/Kriordan/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:39:13.678748 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -haoweibo1987/flasker -https://github.com/haoweibo1987/flasker -Entry file: flasker/app/__init__.py -Scanned: 2016-10-25 23:39:21.416440 -No vulnerabilities found. - - -egonvb/flaskplayground -https://github.com/egonvb/flaskplayground -Entry file: flaskplayground/api.py -Scanned: 2016-10-25 23:39:24.830268 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -liteng123/flaskr -https://github.com/liteng123/flaskr -Entry file: None -Scanned: 2016-10-25 23:39:25.398094 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/liteng123/flaskr. - -salazar35/FlaskWeb -https://github.com/salazar35/FlaskWeb -Entry file: FlaskWeb/Flask Web Development.py -Scanned: 2016-10-25 23:39:26.686224 -No vulnerabilities found. - - -pchartrand/FlaskTemp -https://github.com/pchartrand/FlaskTemp -Entry file: FlaskTemp/tempreport.py -Scanned: 2016-10-25 23:39:29.460548 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -hattwick/flask2 -https://github.com/hattwick/flask2 -Entry file: flask2/flask2mod-template.py -Scanned: 2016-10-25 23:39:32.371182 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -narakai/FlaskServer -https://github.com/narakai/FlaskServer -Entry file: FlaskServer/flaskServer.py -Scanned: 2016-10-25 23:39:33.764558 -No vulnerabilities found. - - -paoloo1995/FlaskBlog -https://github.com/paoloo1995/FlaskBlog -Entry file: FlaskBlog/app/__init__.py -Scanned: 2016-10-25 23:39:35.284808 -Vulnerability 1: -File: FlaskBlog/app/main/views.py - > User input at line 20, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 21: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 24: posts = pagination.items - File: FlaskBlog/app/main/views.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskBlog/app/main/views.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: FlaskBlog/app/main/views.py - > User input at line 32, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 33: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 36: posts = pagination.items -File: FlaskBlog/app/main/views.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - - - -julywoo/flaskWeb -https://github.com/julywoo/flaskWeb -Entry file: flaskWeb/flaskWeb.py -Scanned: 2016-10-25 23:39:37.164342 -No vulnerabilities found. - - -tmlima/flask-intro -https://github.com/tmlima/flask-intro -Entry file: flask-intro/project/__init__.py -Scanned: 2016-10-25 23:39:41.250489 -No vulnerabilities found. - - -sourcelair-blueprints/flask-mongo -https://github.com/sourcelair-blueprints/flask-mongo -Entry file: flask-mongo/flask_mongo/server.py -Scanned: 2016-10-25 23:39:42.559125 -No vulnerabilities found. - - -mmingle/flask-blog -https://github.com/mmingle/flask-blog -Entry file: None -Scanned: 2016-10-25 23:39:43.072217 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -justinwp/flask-urs -https://github.com/justinwp/flask-urs -Entry file: flask-urs/tests/conftest.py -Scanned: 2016-10-25 23:39:44.591753 -No vulnerabilities found. - - -SawHigh/flask_cdn -https://github.com/SawHigh/flask_cdn -Entry file: flask_cdn/cdn.py -Scanned: 2016-10-25 23:39:45.874521 -No vulnerabilities found. - - -crq/flask-scaffold -https://github.com/crq/flask-scaffold -Entry file: None -Scanned: 2016-10-25 23:39:47.426715 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/crq/flask-scaffold. - -asielen/Woodles_Flask -https://github.com/asielen/Woodles_Flask -Entry file: Woodles_Flask/app/__init__.py -Scanned: 2016-10-25 23:39:51.985714 -Vulnerability 1: -File: Woodles_Flask/app/views/app_views.py - > User input at line 22, trigger word "get(": - current_card = Card.query.get(card_id) -File: Woodles_Flask/app/views/app_views.py - > reaches line 23, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string)) - -Vulnerability 2: -File: Woodles_Flask/app/views/app_views.py - > User input at line 22, trigger word "get(": - current_card = Card.query.get(card_id) -File: Woodles_Flask/app/views/app_views.py - > reaches line 23, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('card',card_id=current_card.id_string)) - - - -amitbn/flask-docker -https://github.com/amitbn/flask-docker -Entry file: flask-docker/app.py -Scanned: 2016-10-25 23:40:05.855696 -No vulnerabilities found. - - -julywoo/flask_login -https://github.com/julywoo/flask_login -Entry file: None -Scanned: 2016-10-25 23:40:06.894315 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/julywoo/flask_login. - -LovroM/Flask-test -https://github.com/LovroM/Flask-test -Entry file: Flask-test/webserver.py -Scanned: 2016-10-25 23:40:08.732177 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -danleyb2/flask-cloudinary -https://github.com/danleyb2/flask-cloudinary -Entry file: None -Scanned: 2016-10-25 23:40:10.028498 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danleyb2/flask-cloudinary. - -OpenTrons/labsuite_flask -https://github.com/OpenTrons/labsuite_flask -Entry file: labsuite_flask/app.py -Scanned: 2016-10-25 23:40:12.057944 -No vulnerabilities found. - - -YaGiNA/study-flask -https://github.com/YaGiNA/study-flask -Entry file: study-flask/flaskr/__init__.py -Scanned: 2016-10-25 23:40:14.850987 -No vulnerabilities found. - - -seanhelm/flask-test -https://github.com/seanhelm/flask-test -Entry file: flask-test/app/__init__.py -Scanned: 2016-10-25 23:40:16.140327 -No vulnerabilities found. - - -Viredery/python_flask -https://github.com/Viredery/python_flask -Entry file: python_flask/hello.py -Scanned: 2016-10-25 23:40:17.861728 -No vulnerabilities found. - - -josanabr/flask-vbox -https://github.com/josanabr/flask-vbox -Entry file: flask-vbox/flask-vbox.py -Scanned: 2016-10-25 23:40:19.164406 -No vulnerabilities found. - - -simeon-xx/simeon-flask -https://github.com/simeon-xx/simeon-flask -Entry file: simeon-flask/app/init.py -Scanned: 2016-10-25 23:40:20.495908 -No vulnerabilities found. - - -cherry-hyx/flask_t -https://github.com/cherry-hyx/flask_t -Entry file: None -Scanned: 2016-10-25 23:40:21.908130 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cherry-hyx/flask_t. - -abcsds/flask-tests -https://github.com/abcsds/flask-tests -Entry file: flask-tests/flaskr/flaskr.py -Scanned: 2016-10-25 23:40:23.458250 -No vulnerabilities found. - - -tanzhixu/Flask-oauth -https://github.com/tanzhixu/Flask-oauth -Entry file: Flask-oauth/app/__init__.py -Scanned: 2016-10-25 23:40:27.316197 -Vulnerability 1: -File: Flask-oauth/app/user_manager_views.py - > User input at line 32, trigger word "get(": - password = request.json.get('password', None) -Reassigned in: - File: Flask-oauth/app/user_manager_views.py - > Line 38: newpasswd = pwd_context.encrypt(password) -File: Flask-oauth/app/user_manager_views.py - > reaches line 41, trigger word "filter(": - query.filter(User.id == userid).update(User.password_hashnewpasswd) - - - -brandonfujii/flask-microblog -https://github.com/brandonfujii/flask-microblog -Entry file: None -Scanned: 2016-10-25 23:40:27.840553 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/brandonfujii/flask-microblog. - -dylannnnn/flask_study -https://github.com/dylannnnn/flask_study -Entry file: flask_study/views.py -Scanned: 2016-10-25 23:40:29.293667 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -huasu/InstantFlask -https://github.com/huasu/InstantFlask -Entry file: InstantFlask/app_return_values.py -Scanned: 2016-10-25 23:40:31.865496 -No vulnerabilities found. - - -maricante/flask-blog -https://github.com/maricante/flask-blog -Entry file: None -Scanned: 2016-10-25 23:40:32.406762 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -christopherL91/pythonflask -https://github.com/christopherL91/pythonflask -Entry file: pythonflask/app/main.py -Scanned: 2016-10-25 23:40:33.691394 -No vulnerabilities found. - - -ysicing/Pangu -https://github.com/ysicing/Pangu -Entry file: Pangu/Pangu.py -Scanned: 2016-10-25 23:40:49.728954 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -rbcolson9/flask4kids -https://github.com/rbcolson9/flask4kids -Entry file: flask4kids/hello.py -Scanned: 2016-10-25 23:40:51.072244 -No vulnerabilities found. - - -charlestondance/FlaskStartUp -https://github.com/charlestondance/FlaskStartUp -Entry file: FlaskStartUp/app/__init__.py -Scanned: 2016-10-25 23:40:52.521911 -No vulnerabilities found. - - -erik-farmer/flask-auth-wysiwyg-blog -https://github.com/erik-farmer/flask-auth-wysiwyg-blog -Entry file: flask-auth-wysiwyg-blog/app.py -Scanned: 2016-10-25 23:40:53.909175 -No vulnerabilities found. - - -guilleJB/flask-web-book -https://github.com/guilleJB/flask-web-book -Entry file: flask-web-book/hello.py -Scanned: 2016-10-25 23:40:55.330972 -Vulnerability 1: -File: flask-web-book/hello.py - > User input at line 120, trigger word ".data": - name = form.name.data -Reassigned in: - File: flask-web-book/hello.py - > Line 117: name = None -File: flask-web-book/hello.py - > reaches line 122, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('boots.html',name=name, form=form) - - - -dongheelee1/simple_flask_wall -https://github.com/dongheelee1/simple_flask_wall -Entry file: simple_flask_wall/server.py -Scanned: 2016-10-25 23:40:56.740665 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ynifamily3/CRUD-with-Flask-MVC -https://github.com/ynifamily3/CRUD-with-Flask-MVC -Entry file: CRUD-with-Flask-MVC/set_table.py -Scanned: 2016-10-25 23:40:58.218021 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -duncan60/flask-github-api -https://github.com/duncan60/flask-github-api -Entry file: flask-github-api/app/__init__.py -Scanned: 2016-10-25 23:40:59.530834 -No vulnerabilities found. - - -mnzr/Flask-Blueprint-test -https://github.com/mnzr/Flask-Blueprint-test -Entry file: Flask-Blueprint-test/app/__init__.py -Scanned: 2016-10-25 23:41:00.848876 -Vulnerability 1: -File: Flask-Blueprint-test/app/users/views.py - > User input at line 33, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: Flask-Blueprint-test/app/users/views.py - > Line 38: session['user_id'] = user.id -File: Flask-Blueprint-test/app/users/views.py - > reaches line 39, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -znss1989/flask_blog_ex -https://github.com/znss1989/flask_blog_ex -Entry file: flask_blog_ex/blog.py -Scanned: 2016-10-25 23:41:02.407922 -No vulnerabilities found. - - -aquang9124/flask_semi_restful_routes -https://github.com/aquang9124/flask_semi_restful_routes -Entry file: flask_semi_restful_routes/server.py -Scanned: 2016-10-25 23:41:06.748247 -No vulnerabilities found. - - -PeggyZWY/blog-with-flask -https://github.com/PeggyZWY/blog-with-flask -Entry file: blog-with-flask/app/__init__.py -Scanned: 2016-10-25 23:41:08.755738 -Vulnerability 1: -File: blog-with-flask/app/main/views.py - > User input at line 186, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 189: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: blog-with-flask/app/main/views.py - > Line 192: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 195: comments = pagination.items - File: blog-with-flask/app/main/views.py - > Line 184: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id)) -File: blog-with-flask/app/main/views.py - > reaches line 204, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, categories=category, comments=comments, pagination=pagination) - -Vulnerability 2: -File: blog-with-flask/app/main/views.py - > User input at line 293, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 294: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 298: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: blog-with-flask/app/main/views.py - > Line 291: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: blog-with-flask/app/main/views.py - > reaches line 301, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='他们关注了', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 3: -File: blog-with-flask/app/main/views.py - > User input at line 311, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 312: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 315: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: blog-with-flask/app/main/views.py - > Line 310: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: blog-with-flask/app/main/views.py - > reaches line 317, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='关注了他们', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 4: -File: blog-with-flask/app/main/views.py - > User input at line 349, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 350: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 353: comments = pagination.items -File: blog-with-flask/app/main/views.py - > reaches line 354, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - -Vulnerability 5: -File: blog-with-flask/app/main/views.py - > User input at line 431, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 452: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 456: posts = pagination.items -File: blog-with-flask/app/main/views.py - > reaches line 460, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('article.html',posts=posts, categories=category, show_followed=show_followed, pagination=pagination) - -Vulnerability 6: -File: blog-with-flask/app/main/views.py - > User input at line 471, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: blog-with-flask/app/main/views.py - > Line 475: pagination = Post.query.filter_by(category_id=_category.id).order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: blog-with-flask/app/main/views.py - > Line 478: posts = pagination.items -File: blog-with-flask/app/main/views.py - > reaches line 482, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('article.html',posts=posts, categories=category, show_followed=show_followed, pagination=pagination) - - - -TwilioDevEd/browser-calls-flask -https://github.com/TwilioDevEd/browser-calls-flask -Entry file: browser-calls-flask/browser_calls_flask/__init__.py -Scanned: 2016-10-25 23:41:11.177937 -No vulnerabilities found. - - -terryllowery/flask-hello-world -https://github.com/terryllowery/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:41:12.221270 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aquang9124/flask_wall_test -https://github.com/aquang9124/flask_wall_test -Entry file: flask_wall_test/server.py -Scanned: 2016-10-25 23:41:13.543876 -No vulnerabilities found. - - -ynejati/MyFlaskApp -https://github.com/ynejati/MyFlaskApp -Entry file: MyFlaskApp/MyFlaskWebApp.py -Scanned: 2016-10-25 23:41:14.954289 -No vulnerabilities found. - - -TheCypher/flask-boiler-plate -https://github.com/TheCypher/flask-boiler-plate -Entry file: flask-boiler-plate/app/__init__.py -Scanned: 2016-10-25 23:41:16.348550 -Vulnerability 1: -File: flask-boiler-plate/app/module_one/views.py - > User input at line 30, trigger word ".data": - user = User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: flask-boiler-plate/app/module_one/views.py - > Line 34: session['user_id'] = user.id -File: flask-boiler-plate/app/module_one/views.py - > reaches line 36, trigger word "flash(": - flash('Welcome %s' % user.name) - - - -TheCypher/flask-api-test -https://github.com/TheCypher/flask-api-test -Entry file: flask-api-test/api.py -Scanned: 2016-10-25 23:41:20.114275 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-api-test/lib/python2.7/sre_compile.py - -vstanev1/heroku-flask-app -https://github.com/vstanev1/heroku-flask-app -Entry file: heroku-flask-app/app.py -Scanned: 2016-10-25 23:41:22.027918 -No vulnerabilities found. - - -bellcodo/bellcodo-flask-microblog -https://github.com/bellcodo/bellcodo-flask-microblog -Entry file: bellcodo-flask-microblog/app/__init__.py -Scanned: 2016-10-25 23:41:23.864442 -No vulnerabilities found. - - -megrela/python-flask-skeleton -https://github.com/megrela/python-flask-skeleton -Entry file: None -Scanned: 2016-10-25 23:41:25.170257 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/megrela/python-flask-skeleton. - -plablo09/minimal-flask-dev -https://github.com/plablo09/minimal-flask-dev -Entry file: minimal-flask-dev/hello.py -Scanned: 2016-10-25 23:41:26.460475 -No vulnerabilities found. - - -knight-zhou/Web.py_Flask -https://github.com/knight-zhou/Web.py_Flask -Entry file: None -Scanned: 2016-10-25 23:41:27.543176 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -shyba/browser-calls-flask -https://github.com/shyba/browser-calls-flask -Entry file: browser-calls-flask/browser_calls_flask/__init__.py -Scanned: 2016-10-25 23:41:28.834959 -No vulnerabilities found. - - -jdgramajo/LearningFlaskFramework -https://github.com/jdgramajo/LearningFlaskFramework -Entry file: LearningFlaskFramework/blog/app/app.py -Scanned: 2016-10-25 23:41:30.141717 -No vulnerabilities found. - - -liuer99cn/awesome-flask-todo -https://github.com/liuer99cn/awesome-flask-todo -Entry file: awesome-flask-todo/app.py -Scanned: 2016-10-25 23:41:32.438078 -No vulnerabilities found. - - -seiya-tsukada/instant_flask_server -https://github.com/seiya-tsukada/instant_flask_server -Entry file: instant_flask_server/main.py -Scanned: 2016-10-25 23:41:33.746580 -No vulnerabilities found. - - -Journo-App/flask-by-example -https://github.com/Journo-App/flask-by-example -Entry file: None -Scanned: 2016-10-25 23:41:34.315104 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Journo-App/flask-by-example. - -bobquest33/testRestFlask -https://github.com/bobquest33/testRestFlask -Entry file: testRestFlask/testRestFlask/testRestFlask/apps/testRest/models.py -Scanned: 2016-10-25 23:41:36.740895 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jjapp/flask-hello-world -https://github.com/jjapp/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:41:51.266993 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -snehasankavaram/donorRegistryFlask -https://github.com/snehasankavaram/donorRegistryFlask -Entry file: donorRegistryFlask/run.py -Scanned: 2016-10-25 23:41:52.581513 -No vulnerabilities found. - - -ayusharma/Drug-discovery-flask -https://github.com/ayusharma/Drug-discovery-flask -Entry file: Drug-discovery-flask/app.py -Scanned: 2016-10-25 23:41:53.897898 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -vishaljain3991/flask_oauth_example_template -https://github.com/vishaljain3991/flask_oauth_example_template -Entry file: flask_oauth_example_template/app/__init__.py -Scanned: 2016-10-25 23:41:57.874968 -No vulnerabilities found. - - -F483/flask-data-migration-example -https://github.com/F483/flask-data-migration-example -Entry file: flask-data-migration-example/app.py -Scanned: 2016-10-25 23:41:59.208025 -No vulnerabilities found. - - -studiomezklador/flask_api_2 -https://github.com/studiomezklador/flask_api_2 -Entry file: flask_api_2/__init__.py -Scanned: 2016-10-25 23:42:00.664601 -No vulnerabilities found. - - -SarthakS93/Flask-WebApp -https://github.com/SarthakS93/Flask-WebApp -Entry file: Flask-WebApp/app/__init__.py -Scanned: 2016-10-25 23:42:02.365033 -No vulnerabilities found. - - -dorneanu/flask-app-template -https://github.com/dorneanu/flask-app-template -Entry file: flask-app-template/app/__init__.py -Scanned: 2016-10-25 23:42:03.677410 -No vulnerabilities found. - - -aquang9124/flask_friends_full -https://github.com/aquang9124/flask_friends_full -Entry file: flask_friends_full/server.py -Scanned: 2016-10-25 23:42:04.986020 -No vulnerabilities found. - - -huasu/LearningFlaskFramework -https://github.com/huasu/LearningFlaskFramework -Entry file: LearningFlaskFramework/hello.py -Scanned: 2016-10-25 23:42:07.286545 -No vulnerabilities found. - - -sd16spring/Toolbox-Flask -https://github.com/sd16spring/Toolbox-Flask -Entry file: Toolbox-Flask/hello.py -Scanned: 2016-10-25 23:42:10.183442 -No vulnerabilities found. - - -ZhenghaoZhu/Flask -https://github.com/ZhenghaoZhu/Flask -Entry file: None -Scanned: 2016-10-25 23:42:11.710102 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -octt/flask -https://github.com/octt/flask -Entry file: None -Scanned: 2016-10-25 23:42:12.251612 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Bwooklyn/flask -https://github.com/Bwooklyn/flask -Entry file: None -Scanned: 2016-10-25 23:42:12.764850 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -HRKpython/flask -https://github.com/HRKpython/flask -Entry file: None -Scanned: 2016-10-25 23:42:14.303283 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pavelrib/flask -https://github.com/pavelrib/flask -Entry file: None -Scanned: 2016-10-25 23:42:15.864361 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -SeanVaysburd/flask -https://github.com/SeanVaysburd/flask -Entry file: None -Scanned: 2016-10-25 23:42:17.404072 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kartheek3011/Flask -https://github.com/kartheek3011/Flask -Entry file: None -Scanned: 2016-10-25 23:42:20.931408 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -TerbiumLabs/flask-developer-challenge -https://github.com/TerbiumLabs/flask-developer-challenge -Entry file: flask-developer-challenge/gistapi/gistapi.py -Scanned: 2016-10-25 23:42:24.339711 -No vulnerabilities found. - - -w84miracle/flask-sb-admin2 -https://github.com/w84miracle/flask-sb-admin2 -Entry file: flask-sb-admin2/sbadmin.py -Scanned: 2016-10-25 23:42:26.376555 -No vulnerabilities found. - - -sunscrapers/flask-boilerplate -https://github.com/sunscrapers/flask-boilerplate -Entry file: None -Scanned: 2016-10-25 23:42:26.925242 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sunscrapers/flask-boilerplate. - -jabbalaci/DigitalOceanFlask -https://github.com/jabbalaci/DigitalOceanFlask -Entry file: DigitalOceanFlask/home/demo/projects/ave_caesar/main.py -Scanned: 2016-10-25 23:42:28.330175 -No vulnerabilities found. - - -pyx/flask-diced -https://github.com/pyx/flask-diced -Entry file: flask-diced/examples/simple/app.py -Scanned: 2016-10-25 23:42:29.737793 -No vulnerabilities found. - - -basco-johnkevin/note-taking-app -https://github.com/basco-johnkevin/note-taking-app -Entry file: note-taking-app/part2/main.py -Scanned: 2016-10-25 23:42:31.051648 -No vulnerabilities found. - - -Miserlou/serverless-imagehost -https://github.com/Miserlou/serverless-imagehost -Entry file: serverless-imagehost/my_app.py -Scanned: 2016-10-25 23:42:32.347536 -No vulnerabilities found. - - -zhangyuhaomei/flasky -https://github.com/zhangyuhaomei/flasky -Entry file: None -Scanned: 2016-10-25 23:42:32.878855 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hellohuangjin/flaskblog -https://github.com/hellohuangjin/flaskblog -Entry file: None -Scanned: 2016-10-25 23:42:33.388905 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hellohuangjin/flaskblog. - -coolmile23/flaskr -https://github.com/coolmile23/flaskr -Entry file: None -Scanned: 2016-10-25 23:42:34.906373 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/coolmile23/flaskr. - -MRamakri/flaskworkshop -https://github.com/MRamakri/flaskworkshop -Entry file: flaskworkshop/app.py -Scanned: 2016-10-25 23:42:37.214616 -No vulnerabilities found. - - -imhuwq/flasky -https://github.com/imhuwq/flasky -Entry file: None -Scanned: 2016-10-25 23:42:51.761861 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -antonsoroko/flaskapimongo -https://github.com/antonsoroko/flaskapimongo -Entry file: flaskapimongo/flaskapimongo/__init__.py -Scanned: 2016-10-25 23:42:53.206251 -No vulnerabilities found. - - -haoweibo1987/flasker -https://github.com/haoweibo1987/flasker -Entry file: flasker/app/__init__.py -Scanned: 2016-10-25 23:43:02.253845 -No vulnerabilities found. - - -egonvb/flaskplayground -https://github.com/egonvb/flaskplayground -Entry file: flaskplayground/api.py -Scanned: 2016-10-25 23:43:08.140634 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhkmxx9302013/flaskmysql -https://github.com/zhkmxx9302013/flaskmysql -Entry file: flaskmysql/flaskmysql.py -Scanned: 2016-10-25 23:43:09.513149 -No vulnerabilities found. - - -xiaomao361/flaskr -https://github.com/xiaomao361/flaskr -Entry file: None -Scanned: 2016-10-25 23:43:10.028724 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiaomao361/flaskr. - -alvaro893/flaskcinemaapp -https://github.com/alvaro893/flaskcinemaapp -Entry file: flaskcinemaapp/FlaskWebProject/__init__.py -Scanned: 2016-10-25 23:43:11.902610 -No vulnerabilities found. - - -yuyiwei305/flaskr -https://github.com/yuyiwei305/flaskr -Entry file: None -Scanned: 2016-10-25 23:43:12.414459 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yuyiwei305/flaskr. - -uklineale/flaskTut -https://github.com/uklineale/flaskTut -Entry file: None -Scanned: 2016-10-25 23:43:13.952897 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -saurabh1e/FlaskStructure -https://github.com/saurabh1e/FlaskStructure -Entry file: FlaskStructure/src/utils/__init__.py -Scanned: 2016-10-25 23:43:15.383674 -No vulnerabilities found. - - -retozero/FlaskDemo -https://github.com/retozero/FlaskDemo -Entry file: FlaskDemo/flaskr/flaskr.py -Scanned: 2016-10-25 23:43:16.790604 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zupeiza/FlaskTaskr -https://github.com/zupeiza/FlaskTaskr -Entry file: None -Scanned: 2016-10-25 23:43:17.363784 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zupeiza/FlaskTaskr. - -yxun/FlaskSample -https://github.com/yxun/FlaskSample -Entry file: FlaskSample/url_building.py -Scanned: 2016-10-25 23:43:18.668471 -No vulnerabilities found. - - -paoloo1995/FlaskBlog -https://github.com/paoloo1995/FlaskBlog -Entry file: FlaskBlog/app/__init__.py -Scanned: 2016-10-25 23:43:20.149380 -Vulnerability 1: -File: FlaskBlog/app/main/views.py - > User input at line 20, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 21: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 24: posts = pagination.items - File: FlaskBlog/app/main/views.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskBlog/app/main/views.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: FlaskBlog/app/main/views.py - > User input at line 32, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 33: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 36: posts = pagination.items -File: FlaskBlog/app/main/views.py - > reaches line 37, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - - - -DearX-dlx/FlaskBlog -https://github.com/DearX-dlx/FlaskBlog -Entry file: FlaskBlog/FlaskBlog.py -Scanned: 2016-10-25 23:43:21.475497 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sourcelair-blueprints/flask-mongo -https://github.com/sourcelair-blueprints/flask-mongo -Entry file: flask-mongo/flask_mongo/server.py -Scanned: 2016-10-25 23:43:22.749764 -No vulnerabilities found. - - -sohje/__flask_psgr -https://github.com/sohje/__flask_psgr -Entry file: __flask_psgr/app.py -Scanned: 2016-10-25 23:43:24.054859 -No vulnerabilities found. - - -farridav/flask_friends -https://github.com/farridav/flask_friends -Entry file: flask_friends/src/friends/__init__.py -Scanned: 2016-10-25 23:43:25.598591 -No vulnerabilities found. - - -gh-tcbd/flask-test -https://github.com/gh-tcbd/flask-test -Entry file: flask-test/hello.py -Scanned: 2016-10-25 23:43:26.944897 -No vulnerabilities found. - - -doubtingben/flask-jobs -https://github.com/doubtingben/flask-jobs -Entry file: flask-jobs/code/web.py -Scanned: 2016-10-25 23:43:28.230751 -No vulnerabilities found. - - -askewseth/StatsFlask -https://github.com/askewseth/StatsFlask -Entry file: StatsFlask/run.py -Scanned: 2016-10-25 23:43:30.022428 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -BlackMud/flask_blog -https://github.com/BlackMud/flask_blog -Entry file: flask_blog/app/__init__.py -Scanned: 2016-10-25 23:43:31.790234 -Vulnerability 1: -File: flask_blog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask_blog/app/api_1_0/posts.py - > Line 16: prev = None - File: flask_blog/app/api_1_0/posts.py - > Line 19: next = None -File: flask_blog/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: flask_blog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask_blog/app/api_1_0/posts.py - > Line 16: prev = None - File: flask_blog/app/api_1_0/posts.py - > Line 19: next = None -File: flask_blog/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: flask_blog/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: flask_blog/app/api_1_0/posts.py - > Line 16: prev = None - File: flask_blog/app/api_1_0/posts.py - > Line 19: next = None -File: flask_blog/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: flask_blog/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask_blog/app/api_1_0/users.py - > Line 20: prev = None - File: flask_blog/app/api_1_0/users.py - > Line 23: next = None -File: flask_blog/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: flask_blog/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask_blog/app/api_1_0/users.py - > Line 20: prev = None - File: flask_blog/app/api_1_0/users.py - > Line 23: next = None -File: flask_blog/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: flask_blog/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: flask_blog/app/api_1_0/users.py - > Line 20: prev = None - File: flask_blog/app/api_1_0/users.py - > Line 23: next = None -File: flask_blog/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: flask_blog/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask_blog/app/api_1_0/users.py - > Line 42: prev = None - File: flask_blog/app/api_1_0/users.py - > Line 45: next = None -File: flask_blog/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: flask_blog/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask_blog/app/api_1_0/users.py - > Line 42: prev = None - File: flask_blog/app/api_1_0/users.py - > Line 45: next = None -File: flask_blog/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: flask_blog/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: flask_blog/app/api_1_0/users.py - > Line 42: prev = None - File: flask_blog/app/api_1_0/users.py - > Line 45: next = None -File: flask_blog/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: flask_blog/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask_blog/app/api_1_0/comments.py - > Line 15: prev = None - File: flask_blog/app/api_1_0/comments.py - > Line 18: next = None -File: flask_blog/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: flask_blog/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask_blog/app/api_1_0/comments.py - > Line 15: prev = None - File: flask_blog/app/api_1_0/comments.py - > Line 18: next = None -File: flask_blog/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: flask_blog/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: flask_blog/app/api_1_0/comments.py - > Line 15: prev = None - File: flask_blog/app/api_1_0/comments.py - > Line 18: next = None -File: flask_blog/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: flask_blog/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask_blog/app/api_1_0/comments.py - > Line 43: prev = None - File: flask_blog/app/api_1_0/comments.py - > Line 46: next = None -File: flask_blog/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: flask_blog/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask_blog/app/api_1_0/comments.py - > Line 43: prev = None - File: flask_blog/app/api_1_0/comments.py - > Line 46: next = None -File: flask_blog/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: flask_blog/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_blog/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: flask_blog/app/api_1_0/comments.py - > Line 43: prev = None - File: flask_blog/app/api_1_0/comments.py - > Line 46: next = None -File: flask_blog/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: flask_blog/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 52: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 55: posts = pagination.items - File: flask_blog/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_blog/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: flask_blog/app/main/views.py - > User input at line 47, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 45: show_followed = False - File: flask_blog/app/main/views.py - > Line 43: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_blog/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: flask_blog/app/main/views.py - > User input at line 63, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 64: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 67: posts = pagination.items -File: flask_blog/app/main/views.py - > reaches line 68, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: flask_blog/app/main/views.py - > User input at line 127, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 129: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flask_blog/app/main/views.py - > Line 131: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 134: comments = pagination.items - File: flask_blog/app/main/views.py - > Line 126: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask_blog/app/main/views.py - > reaches line 135, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: flask_blog/app/main/views.py - > User input at line 194, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 195: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 198: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_blog/app/main/views.py - > Line 193: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_blog/app/main/views.py - > reaches line 200, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: flask_blog/app/main/views.py - > User input at line 211, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 212: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 215: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask_blog/app/main/views.py - > Line 210: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_blog/app/main/views.py - > reaches line 217, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: flask_blog/app/main/views.py - > User input at line 242, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_blog/app/main/views.py - > Line 243: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flask_blog/app/main/views.py - > Line 246: comments = pagination.items -File: flask_blog/app/main/views.py - > reaches line 247, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -bzerroug/flask_appbuilder -https://github.com/bzerroug/flask_appbuilder -Entry file: flask_appbuilder/meteo/__init__.py -Scanned: 2016-10-25 23:43:33.358555 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhkmxx9302013/RPiFlask -https://github.com/zhkmxx9302013/RPiFlask -Entry file: RPiFlask/main.py -Scanned: 2016-10-25 23:43:34.658838 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -tahoe/flask-restless -https://github.com/tahoe/flask-restless -Entry file: flask-restless/tests/helpers.py -Scanned: 2016-10-25 23:43:36.777417 -No vulnerabilities found. - - -PavelMPD/flask_oauth -https://github.com/PavelMPD/flask_oauth -Entry file: flask_oauth/server.py -Scanned: 2016-10-25 23:43:38.066277 -No vulnerabilities found. - - -doubtingben/flask-mongo -https://github.com/doubtingben/flask-mongo -Entry file: flask-mongo/code/tumblelog/__init__.py -Scanned: 2016-10-25 23:43:39.477253 -No vulnerabilities found. - - -hoikin-yiu/flask-blog -https://github.com/hoikin-yiu/flask-blog -Entry file: None -Scanned: 2016-10-25 23:43:39.998689 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Cloudwick-BT/flask_project -https://github.com/Cloudwick-BT/flask_project -Entry file: flask_project/hello.py -Scanned: 2016-10-25 23:43:53.347153 -No vulnerabilities found. - - -gyonghua/flask-blog -https://github.com/gyonghua/flask-blog -Entry file: None -Scanned: 2016-10-25 23:43:53.863799 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -g-rich/flask-blog -https://github.com/g-rich/flask-blog -Entry file: None -Scanned: 2016-10-25 23:43:54.388400 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Zhgong/flask_microblog -https://github.com/Zhgong/flask_microblog -Entry file: flask_microblog/blog/__init__.py -Scanned: 2016-10-25 23:44:03.871786 -No vulnerabilities found. - - -chensdream/learn-flask -https://github.com/chensdream/learn-flask -Entry file: None -Scanned: 2016-10-25 23:44:09.445062 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -coolmile23/flask_practice -https://github.com/coolmile23/flask_practice -Entry file: None -Scanned: 2016-10-25 23:44:17.333565 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -k9luo/Flask-Tutorial -https://github.com/k9luo/Flask-Tutorial -Entry file: Flask-Tutorial/microblog-version-0.10/app/__init__.py -Scanned: 2016-10-25 23:44:24.871458 -No vulnerabilities found. - - -Harry-Yao/learn-flask -https://github.com/Harry-Yao/learn-flask -Entry file: None -Scanned: 2016-10-25 23:44:25.503462 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -danleyb2/flask-cloudinary -https://github.com/danleyb2/flask-cloudinary -Entry file: None -Scanned: 2016-10-25 23:44:26.015627 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danleyb2/flask-cloudinary. - -juan-castano/todo-flask -https://github.com/juan-castano/todo-flask -Entry file: todo-flask/app.py -Scanned: 2016-10-25 23:44:27.331178 -No vulnerabilities found. - - -mullaned/Flask-Test -https://github.com/mullaned/Flask-Test -Entry file: Flask-Test/flask_test.py -Scanned: 2016-10-25 23:44:28.675178 -Vulnerability 1: -File: Flask-Test/flask_test.py - > User input at line 13, trigger word "get(": - age = ages.get(user) -File: Flask-Test/flask_test.py - > reaches line 14, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('users.html',user=user, age=age) - - - -zupeiza/flask-blog -https://github.com/zupeiza/flask-blog -Entry file: None -Scanned: 2016-10-25 23:44:29.193144 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -shopetan/flask-api -https://github.com/shopetan/flask-api -Entry file: None -Scanned: 2016-10-25 23:44:29.705152 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shopetan/flask-api. - -jungkoo/flask-dmango -https://github.com/jungkoo/flask-dmango -Entry file: flask-dmango/sample/blueprint_find.py -Scanned: 2016-10-25 23:44:31.141741 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -raghureddyram/flask-hello -https://github.com/raghureddyram/flask-hello -Entry file: flask-hello/hello_world.py -Scanned: 2016-10-25 23:44:32.435927 -No vulnerabilities found. - - -hrushikesh198/flask-server -https://github.com/hrushikesh198/flask-server -Entry file: None -Scanned: 2016-10-25 23:44:32.965794 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hrushikesh198/flask-server. - -omarkurt/flask-injection -https://github.com/omarkurt/flask-injection -Entry file: flask-injection/index.py -Scanned: 2016-10-25 23:44:35.257675 -No vulnerabilities found. - - -Datalker/Flask_sandbox -https://github.com/Datalker/Flask_sandbox -Entry file: Flask_sandbox/hello.py -Scanned: 2016-10-25 23:44:36.674368 -No vulnerabilities found. - - -getsentry/demo-flask -https://github.com/getsentry/demo-flask -Entry file: demo-flask/app.py -Scanned: 2016-10-25 23:44:38.958011 -No vulnerabilities found. -An Error occurred while scanning the repo: 'Node' object has no attribute 'first_statement' - -technocake/flask-eksempel -https://github.com/technocake/flask-eksempel -Entry file: flask-eksempel/webserver.py -Scanned: 2016-10-25 23:44:40.271863 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -wkzhu/flask_example -https://github.com/wkzhu/flask_example -Entry file: None -Scanned: 2016-10-25 23:44:41.964027 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/wkzhu/flask_example. - -rgsingh/flask-timetrack -https://github.com/rgsingh/flask-timetrack -Entry file: flask-timetrack/app/__init__.py -Scanned: 2016-10-25 23:44:43.357404 -Vulnerability 1: -File: flask-timetrack/app/views.py - > User input at line 29, trigger word "get(": - taskid = request.args.get('id') -Reassigned in: - File: flask-timetrack/app/views.py - > Line 33: filtered_task = [x for x in tasks_file] - File: flask-timetrack/app/views.py - > Line 35: task = json.dumps(filtered_task) -File: flask-timetrack/app/views.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('edittask.html',taskid=taskid, task=task) - - - -pultitom/study-flask -https://github.com/pultitom/study-flask -Entry file: study-flask/microblog/app/__init__.py -Scanned: 2016-10-25 23:44:44.675856 -No vulnerabilities found. - - -StarsHu/ll-flask -https://github.com/StarsHu/ll-flask -Entry file: ll-flask/LikeLines/server.py -Scanned: 2016-10-25 23:44:46.114986 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -morphee31/flask_example -https://github.com/morphee31/flask_example -Entry file: None -Scanned: 2016-10-25 23:44:46.659879 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/morphee31/flask_example. - -wumb0/flask-examples -https://github.com/wumb0/flask-examples -Entry file: flask-examples/bitly/app/__init__.py -Scanned: 2016-10-25 23:44:48.454325 -Vulnerability 1: -File: flask-examples/bitly/app/views/main.py - > User input at line 19, trigger word ".data": - suffix = form.suffix.data -Reassigned in: - File: flask-examples/bitly/app/views/main.py - > Line 24: suffix = tmp - File: flask-examples/bitly/app/views/main.py - > Line 42: link = Link(suffix=suffix, link=form.link.data, expiry=expiry) - File: flask-examples/bitly/app/views/main.py - > Line 25: link = Link.query.filter_by(suffix=suffix).first() -File: flask-examples/bitly/app/views/main.py - > reaches line 47, trigger word "flash(": - flash('Your link is {}://{}/{}'.format(u.scheme, u.netloc, suffix),category='good') - - - -vladimirdotk/flask-boilerplate -https://github.com/vladimirdotk/flask-boilerplate -Entry file: None -Scanned: 2016-10-25 23:44:54.471311 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vladimirdotk/flask-boilerplate. - -zubairah/Flask_App -https://github.com/zubairah/Flask_App -Entry file: Flask_App/Flask_App/app.py -Scanned: 2016-10-25 23:44:55.956975 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ramwin/flask_tutorial -https://github.com/ramwin/flask_tutorial -Entry file: None -Scanned: 2016-10-25 23:45:10.008558 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ramwin/flask_tutorial. - -christopherL91/pythonflask -https://github.com/christopherL91/pythonflask -Entry file: pythonflask/app/main.py -Scanned: 2016-10-25 23:45:12.342404 -No vulnerabilities found. - - -f-guitart/progcoms3-flask -https://github.com/f-guitart/progcoms3-flask -Entry file: progcoms3-flask/app.py -Scanned: 2016-10-25 23:45:19.572903 -Vulnerability 1: -File: progcoms3-flask/app.py - > User input at line 73, trigger word "get(": - zone = request.form.get('area') -Reassigned in: - File: progcoms3-flask/app.py - > Line 75: zone_data = get_zone_data(zone) - File: progcoms3-flask/app.py - > Line 71: zone_data = [] -File: progcoms3-flask/app.py - > reaches line 76, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('zone_data_table.html',zone_data=zone_data, zones=zones) - - - -kolapapa/blog_kola -https://github.com/kolapapa/blog_kola -Entry file: blog_kola/db.py -Scanned: 2016-10-25 23:45:30.467342 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: blog_kola/.venv/lib/python2.7/sre_compile.py - -jackeylu/microblog -https://github.com/jackeylu/microblog -Entry file: None -Scanned: 2016-10-25 23:45:31.026061 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jackeylu/microblog. - -garaud/pyris -https://github.com/garaud/pyris -Entry file: pyris/pyris/api/__init__.py -Scanned: 2016-10-25 23:45:32.609690 -No vulnerabilities found. - - -nicc777/flask-webservice-wsgi-python3-demo -https://github.com/nicc777/flask-webservice-wsgi-python3-demo -Entry file: flask-webservice-wsgi-python3-demo/fwsdemo/app.py -Scanned: 2016-10-25 23:45:34.030047 -No vulnerabilities found. - - -MicahSteinbrecher/mini-blog -https://github.com/MicahSteinbrecher/mini-blog -Entry file: mini-blog/flaskr.py -Scanned: 2016-10-25 23:45:35.839145 -No vulnerabilities found. - - -remarcbalisi/rest-demo-flask- -https://github.com/remarcbalisi/rest-demo-flask- -Entry file: rest-demo-flask-/app.py -Scanned: 2016-10-25 23:45:37.580959 -No vulnerabilities found. - - -duncan60/flask-github-api -https://github.com/duncan60/flask-github-api -Entry file: flask-github-api/app/__init__.py -Scanned: 2016-10-25 23:45:38.895769 -No vulnerabilities found. - - -mattvisco/flask_test_2 -https://github.com/mattvisco/flask_test_2 -Entry file: flask_test_2/insta.py -Scanned: 2016-10-25 23:45:40.332269 -No vulnerabilities found. - - -pavelchalyk/blackjack_on_flask -https://github.com/pavelchalyk/blackjack_on_flask -Entry file: blackjack_on_flask/blackjack.py -Scanned: 2016-10-25 23:45:41.643115 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -merryHunter/chat-flask-socketio -https://github.com/merryHunter/chat-flask-socketio -Entry file: chat-flask-socketio/chat.py -Scanned: 2016-10-25 23:45:47.312254 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -rjantos/flask-hello-world -https://github.com/rjantos/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:45:47.928046 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sd16spring/Toolbox-Flask -https://github.com/sd16spring/Toolbox-Flask -Entry file: Toolbox-Flask/hello.py -Scanned: 2016-10-25 23:45:51.623039 -No vulnerabilities found. - - -HRKpython/flask -https://github.com/HRKpython/flask -Entry file: None -Scanned: 2016-10-25 23:45:52.172810 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bsteinberg/flask -https://github.com/bsteinberg/flask -Entry file: None -Scanned: 2016-10-25 23:45:52.679903 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ninadmhatre/zual -https://github.com/ninadmhatre/zual -Entry file: zual/local_mods/flask-blogging/flask_blogging/engine.py -Scanned: 2016-10-25 23:45:55.503281 -Vulnerability 1: -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > User input at line 104, trigger word "get(": - count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10) -Reassigned in: - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 106: meta = _get_meta(storage, count, page) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 107: offset = meta['offset'] - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 111: posts = storage.get_posts(count=count, offset=offset, include_draft=False, tag=None, user_id=None, recent=True) -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > reaches line 115, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config) - -Vulnerability 2: -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > User input at line 141, trigger word "get(": - count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10) -Reassigned in: - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 142: meta = _get_meta(storage, count, page,tag=tag) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 143: offset = meta['offset'] - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 147: posts = storage.get_posts(count=count, offset=offset, tag=tag, include_draft=False, user_id=None, recent=True) -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config) - -Vulnerability 3: -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > User input at line 159, trigger word "get(": - count = count or config.get('BLOGGING_POSTS_PER_PAGE', 10) -Reassigned in: - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 160: meta = _get_meta(storage, count, page,user_id=user_id) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 161: offset = meta['offset'] - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 164: posts = storage.get_posts(count=count, offset=offset, user_id=user_id, include_draft=False, tag=None, recent=True) -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > reaches line 172, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blogging/index.html',posts=posts, meta=meta, config=config) - -Vulnerability 4: -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > User input at line 199, trigger word ".data": - slug = post_processor.create_slug(form.title.data) -Reassigned in: - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 204: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 214: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 220: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None)) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 224: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None)) -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > reaches line 200, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.page_by_id',post_id=pid, slug=slug)) - -Vulnerability 5: -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > User input at line 199, trigger word ".data": - slug = post_processor.create_slug(form.title.data) -Reassigned in: - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 204: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 214: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 220: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None)) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 224: ret_MAYBE_FUNCTION_NAME = render_template('blogging/editor.html',form=form, post_id=post_id, config=config) - File: zual/local_mods/flask-blogging/flask_blogging/views.py - > Line 228: ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.index',post_id=None)) -File: zual/local_mods/flask-blogging/flask_blogging/views.py - > reaches line 200, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('blogging.page_by_id',post_id=pid, slug=slug)) - - - -taogeT/flask-celery -https://github.com/taogeT/flask-celery -Entry file: flask-celery/example/app/__init__.py -Scanned: 2016-10-25 23:45:56.958816 -No vulnerabilities found. - - -frankV/flask-sendgrid -https://github.com/frankV/flask-sendgrid -Entry file: flask-sendgrid/setup.py -Scanned: 2016-10-25 23:45:58.252627 -No vulnerabilities found. - - -gyonghua/flasktaskr -https://github.com/gyonghua/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:45:58.782933 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Rothschild0120/flaskyblog -https://github.com/Rothschild0120/flaskyblog -Entry file: flaskyblog/app/__init__.py -Scanned: 2016-10-25 23:46:00.666745 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -islandev/flaskweb -https://github.com/islandev/flaskweb -Entry file: None -Scanned: 2016-10-25 23:46:01.217316 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yuyiwei305/flaskr -https://github.com/yuyiwei305/flaskr -Entry file: None -Scanned: 2016-10-25 23:46:01.754498 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yuyiwei305/flaskr. - -stalwart201/flaskimgupload -https://github.com/stalwart201/flaskimgupload -Entry file: flaskimgupload/upload.py -Scanned: 2016-10-25 23:46:03.217039 -Vulnerability 1: -File: flaskimgupload/upload.py - > User input at line 19, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flaskimgupload/upload.py - > Line 21: filename = secure_filename(file.filename) - File: flaskimgupload/upload.py - > Line 25: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' -File: flaskimgupload/upload.py - > reaches line 23, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - -Vulnerability 2: -File: flaskimgupload/upload.py - > User input at line 19, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: flaskimgupload/upload.py - > Line 21: filename = secure_filename(file.filename) - File: flaskimgupload/upload.py - > Line 25: ret_MAYBE_FUNCTION_NAME = ' - - Upload new File -

Upload new File

-
-

- -

- ' -File: flaskimgupload/upload.py - > reaches line 23, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('uploaded_file',filename=filename)) - - - -zixuzhang/flasky -https://github.com/zixuzhang/flasky -Entry file: None -Scanned: 2016-10-25 23:46:03.783766 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hoobalias/Flaskr -https://github.com/hoobalias/Flaskr -Entry file: None -Scanned: 2016-10-25 23:46:10.301180 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -azureappserviceoss/FlaskAzure -https://github.com/azureappserviceoss/FlaskAzure -Entry file: FlaskAzure/FlaskWebProject1/__init__.py -Scanned: 2016-10-25 23:46:20.523675 -No vulnerabilities found. - - -yhappy/FlaskProjects -https://github.com/yhappy/FlaskProjects -Entry file: FlaskProjects/FlaskProjects.py -Scanned: 2016-10-25 23:46:27.880363 -No vulnerabilities found. - - -tajihiro/FlaskBluemix -https://github.com/tajihiro/FlaskBluemix -Entry file: FlaskBluemix/index.py -Scanned: 2016-10-25 23:46:32.203790 -No vulnerabilities found. - - -Leyawiin/FlaskDemo -https://github.com/Leyawiin/FlaskDemo -Entry file: FlaskDemo/app/__init__.py -Scanned: 2016-10-25 23:46:34.137264 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -KotiyaSenya/FlaskLearn -https://github.com/KotiyaSenya/FlaskLearn -Entry file: FlaskLearn/flask_learn/__init__.py -Scanned: 2016-10-25 23:46:35.599607 -Vulnerability 1: -File: FlaskLearn/flask_learn/main/views/index.py - > User input at line 10, trigger word "get(": - user_agent = request.headers.get('User-Agent') -File: FlaskLearn/flask_learn/main/views/index.py - > reaches line 11, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',user_agent=user_agent, current_time=datetime.utcnow()) - - - -Patreon/cartographer -https://github.com/Patreon/cartographer -Entry file: cartographer/example/generic_social_network/app/__init__.py -Scanned: 2016-10-25 23:46:37.410876 -No vulnerabilities found. - - -Ketouem/flask-boto3 -https://github.com/Ketouem/flask-boto3 -Entry file: flask-boto3/example.py -Scanned: 2016-10-25 23:46:38.843061 -No vulnerabilities found. - - -bellkev/docker-flask-browserify -https://github.com/bellkev/docker-flask-browserify -Entry file: docker-flask-browserify/src/python/hello.py -Scanned: 2016-10-25 23:46:40.138625 -No vulnerabilities found. - - -Pushould/pushould-flask-sample -https://github.com/Pushould/pushould-flask-sample -Entry file: pushould-flask-sample/app.py -Scanned: 2016-10-25 23:46:41.450236 -No vulnerabilities found. - - -miaoihan/qulook_flask -https://github.com/miaoihan/qulook_flask -Entry file: qulook_flask/qulook.py -Scanned: 2016-10-25 23:46:45.526538 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: qulook_flask/ENV/lib/python2.7/sre_compile.py - -rogerpence/Flask-App -https://github.com/rogerpence/Flask-App -Entry file: Flask-App/app/__init__.py -Scanned: 2016-10-25 23:46:47.221679 -No vulnerabilities found. - - -sandmarq/flask_test -https://github.com/sandmarq/flask_test -Entry file: None -Scanned: 2016-10-25 23:46:47.744717 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -barcai/Flask_Megatutorial -https://github.com/barcai/Flask_Megatutorial -Entry file: Flask_Megatutorial/app/__init__.py -Scanned: 2016-10-25 23:46:49.135503 -No vulnerabilities found. - - -kessiacastro/flask-hello -https://github.com/kessiacastro/flask-hello -Entry file: flask-hello/app.py -Scanned: 2016-10-25 23:46:53.215063 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -renaldopringle/flask_heroku -https://github.com/renaldopringle/flask_heroku -Entry file: flask_heroku/app.py -Scanned: 2016-10-25 23:46:56.914129 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sunhughees/flask-blog -https://github.com/sunhughees/flask-blog -Entry file: None -Scanned: 2016-10-25 23:46:57.978887 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AVandelay/flask_blog -https://github.com/AVandelay/flask_blog -Entry file: flask_blog/__init__.py -Scanned: 2016-10-25 23:47:01.836003 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_blog/venv/lib/python3.4/operator.py - -uyoaix/learn-flask -https://github.com/uyoaix/learn-flask -Entry file: None -Scanned: 2016-10-25 23:47:02.403185 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -frenos/flask-sample -https://github.com/frenos/flask-sample -Entry file: flask-sample/app/__init__.py -Scanned: 2016-10-25 23:47:03.857786 -No vulnerabilities found. - - -gyonghua/flask-blog -https://github.com/gyonghua/flask-blog -Entry file: None -Scanned: 2016-10-25 23:47:04.394218 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Zhgong/flask_microblog -https://github.com/Zhgong/flask_microblog -Entry file: flask_microblog/blog/__init__.py -Scanned: 2016-10-25 23:47:05.769293 -No vulnerabilities found. - - -zhangcheng/flask-example -https://github.com/zhangcheng/flask-example -Entry file: flask-example/example/app.py -Scanned: 2016-10-25 23:47:07.106592 -No vulnerabilities found. - - -gemimarosier/flask_project -https://github.com/gemimarosier/flask_project -Entry file: flask_project/tv_routes.py -Scanned: 2016-10-25 23:47:10.264218 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_project/env/lib/python2.7/sre_compile.py - -gchange/flask_server -https://github.com/gchange/flask_server -Entry file: flask_server/flask_server/main.py -Scanned: 2016-10-25 23:47:11.606793 -Vulnerability 1: -File: flask_server/flask_server/main.py - > User input at line 21, trigger word "form[": - account = request.form['account'] -Reassigned in: - File: flask_server/flask_server/main.py - > Line 31: account = generator.generator(account, account, account_length, is_digit, is_uplow) - File: flask_server/flask_server/main.py - > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow) - File: flask_server/flask_server/main.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/') - File: flask_server/flask_server/main.py - > Line 22: password = request.form['password'] -File: flask_server/flask_server/main.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password) - -Vulnerability 2: -File: flask_server/flask_server/main.py - > User input at line 22, trigger word "form[": - password = request.form['password'] -Reassigned in: - File: flask_server/flask_server/main.py - > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow) - File: flask_server/flask_server/main.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/') -File: flask_server/flask_server/main.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password) - -Vulnerability 3: -File: flask_server/flask_server/main.py - > User input at line 23, trigger word "form[": - account_length = int(request.form['account_length']) -Reassigned in: - File: flask_server/flask_server/main.py - > Line 31: account = generator.generator(account, account, account_length, is_digit, is_uplow) - File: flask_server/flask_server/main.py - > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow) - File: flask_server/flask_server/main.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/') - File: flask_server/flask_server/main.py - > Line 21: account = request.form['account'] - File: flask_server/flask_server/main.py - > Line 22: password = request.form['password'] -File: flask_server/flask_server/main.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password) - -Vulnerability 4: -File: flask_server/flask_server/main.py - > User input at line 24, trigger word "form[": - password_length = int(request.form['password_length']) -Reassigned in: - File: flask_server/flask_server/main.py - > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow) - File: flask_server/flask_server/main.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/') - File: flask_server/flask_server/main.py - > Line 22: password = request.form['password'] -File: flask_server/flask_server/main.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password) - -Vulnerability 5: -File: flask_server/flask_server/main.py - > User input at line 25, trigger word "form[": - is_digit = request.form['is_digit'] -Reassigned in: - File: flask_server/flask_server/main.py - > Line 28: is_digit = is_digit.lower() == 'true'TrueFalse - File: flask_server/flask_server/main.py - > Line 31: account = generator.generator(account, account, account_length, is_digit, is_uplow) - File: flask_server/flask_server/main.py - > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow) - File: flask_server/flask_server/main.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/') - File: flask_server/flask_server/main.py - > Line 21: account = request.form['account'] - File: flask_server/flask_server/main.py - > Line 22: password = request.form['password'] -File: flask_server/flask_server/main.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password) - -Vulnerability 6: -File: flask_server/flask_server/main.py - > User input at line 26, trigger word "form[": - is_uplow = request.form['is_uplow'] -Reassigned in: - File: flask_server/flask_server/main.py - > Line 29: is_uplow = is_uplow.lower() == 'true'TrueFalse - File: flask_server/flask_server/main.py - > Line 31: account = generator.generator(account, account, account_length, is_digit, is_uplow) - File: flask_server/flask_server/main.py - > Line 32: password = generator.generator(account, password, password_length, is_digit, is_uplow) - File: flask_server/flask_server/main.py - > Line 19: ret_MAYBE_FUNCTION_NAME = redirect('/password/') - File: flask_server/flask_server/main.py - > Line 21: account = request.form['account'] - File: flask_server/flask_server/main.py - > Line 22: password = request.form['password'] -File: flask_server/flask_server/main.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('generator.html',account=account, password=password) - - - -Nickyzj/flask-first -https://github.com/Nickyzj/flask-first -Entry file: flask-first/flask-first-notes.py -Scanned: 2016-10-25 23:47:13.177572 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -propupul/Flask_app -https://github.com/propupul/Flask_app -Entry file: Flask_app/hello.py -Scanned: 2016-10-25 23:47:16.720423 -Vulnerability 1: -File: Flask_app/hello.py - > User input at line 43, trigger word ".data": - name = form.name.data -Reassigned in: - File: Flask_app/hello.py - > Line 44: prod_name = location(name)[0] - File: Flask_app/hello.py - > Line 45: loc_name = location(name)[1] + '-' + location(name)[2] + '-' + location(name)[3] - File: Flask_app/hello.py - > Line 49: prod_name = '' - File: Flask_app/hello.py - > Line 38: prod_name = '' - File: Flask_app/hello.py - > Line 39: loc_name = '' -File: Flask_app/hello.py - > reaches line 52, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, prod_name=prod_name, loc_name=loc_name) - - - -m18664319351/Blog_Flask -https://github.com/m18664319351/Blog_Flask -Entry file: Blog_Flask/app/__init__.py -Scanned: 2016-10-25 23:47:18.174589 -No vulnerabilities found. - - -testforvln/flask-learning -https://github.com/testforvln/flask-learning -Entry file: flask-learning/hello.py -Scanned: 2016-10-25 23:47:19.472930 -No vulnerabilities found. - - -Unicomcat/flask_test -https://github.com/Unicomcat/flask_test -Entry file: None -Scanned: 2016-10-25 23:47:19.999228 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jidn/flask-obscure -https://github.com/jidn/flask-obscure -Entry file: flask-obscure/tests/test_url.py -Scanned: 2016-10-25 23:47:28.458800 -No vulnerabilities found. - - -cdaidone/small_flask -https://github.com/cdaidone/small_flask -Entry file: small_flask/small_flask.py -Scanned: 2016-10-25 23:47:34.876770 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -morphee31/flask_example -https://github.com/morphee31/flask_example -Entry file: None -Scanned: 2016-10-25 23:47:35.425716 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/morphee31/flask_example. - -pedrogaudencio/refunite-flask -https://github.com/pedrogaudencio/refunite-flask -Entry file: refunite-flask/app.py -Scanned: 2016-10-25 23:47:36.970458 -No vulnerabilities found. - - -master105/flask_server -https://github.com/master105/flask_server -Entry file: flask_server/project.py -Scanned: 2016-10-25 23:47:39.992457 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -d3prof3t/flask-intro -https://github.com/d3prof3t/flask-intro -Entry file: flask-intro/flasktaskr/__init__.py -Scanned: 2016-10-25 23:47:41.427171 -No vulnerabilities found. - - -zubairah/Flask_App -https://github.com/zubairah/Flask_App -Entry file: Flask_App/Flask_App/app.py -Scanned: 2016-10-25 23:47:42.826008 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -shinstev/flask_server -https://github.com/shinstev/flask_server -Entry file: flask_server/app.py -Scanned: 2016-10-25 23:47:46.301702 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_server/venv/lib/python2.7/sre_compile.py - -vramakin/LearnFlask -https://github.com/vramakin/LearnFlask -Entry file: LearnFlask/flaskr.py -Scanned: 2016-10-25 23:47:47.744531 -No vulnerabilities found. - - -nbeede/docker-flask -https://github.com/nbeede/docker-flask -Entry file: docker-flask/app.py -Scanned: 2016-10-25 23:47:49.044002 -No vulnerabilities found. - - -runningstrawberry/microblog -https://github.com/runningstrawberry/microblog -Entry file: None -Scanned: 2016-10-25 23:47:49.604090 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/runningstrawberry/microblog. - -kolapapa/blog_kola -https://github.com/kolapapa/blog_kola -Entry file: blog_kola/db.py -Scanned: 2016-10-25 23:47:53.598359 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: blog_kola/.venv/lib/python2.7/sre_compile.py - -B2Crypt/Random-Gamemode- -https://github.com/B2Crypt/Random-Gamemode- -Entry file: Random-Gamemode-/FLASK/__init__.py -Scanned: 2016-10-25 23:47:55.410779 -No vulnerabilities found. - - -Lich2013/learnflask -https://github.com/Lich2013/learnflask -Entry file: None -Scanned: 2016-10-25 23:47:57.069508 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Lich2013/learnflask. - -jbisasky/flaskProtoBuffer -https://github.com/jbisasky/flaskProtoBuffer -Entry file: flaskProtoBuffer/flaskHello.py -Scanned: 2016-10-25 23:48:00.664132 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -WangShengguang/FlaskWebDevelopment -https://github.com/WangShengguang/FlaskWebDevelopment -Entry file: FlaskWebDevelopment/hello.py -Scanned: 2016-10-25 23:48:02.733082 -Vulnerability 1: -File: FlaskWebDevelopment/app/main/views.py - > User input at line 17, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskWebDevelopment/app/main/views.py - > Line 25: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskWebDevelopment/app/main/views.py - > Line 27: posts = pagination.items - File: FlaskWebDevelopment/app/main/views.py - > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskWebDevelopment/app/main/views.py - > reaches line 28, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: FlaskWebDevelopment/app/main/views.py - > User input at line 20, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: FlaskWebDevelopment/app/main/views.py - > Line 18: show_followed = False - File: FlaskWebDevelopment/app/main/views.py - > Line 16: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskWebDevelopment/app/main/views.py - > reaches line 28, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: FlaskWebDevelopment/app/main/views.py - > User input at line 108, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskWebDevelopment/app/main/views.py - > Line 110: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: FlaskWebDevelopment/app/main/views.py - > Line 111: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskWebDevelopment/app/main/views.py - > Line 113: comments = pagination.items - File: FlaskWebDevelopment/app/main/views.py - > Line 107: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: FlaskWebDevelopment/app/main/views.py - > reaches line 114, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: FlaskWebDevelopment/app/main/views.py - > User input at line 170, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskWebDevelopment/app/main/views.py - > Line 171: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWS_PER_PAGE'], error_out=False) - File: FlaskWebDevelopment/app/main/views.py - > Line 172: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: FlaskWebDevelopment/app/main/views.py - > Line 169: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskWebDevelopment/app/main/views.py - > reaches line 173, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: FlaskWebDevelopment/app/main/views.py - > User input at line 183, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskWebDevelopment/app/main/views.py - > Line 184: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: FlaskWebDevelopment/app/main/views.py - > Line 187: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: FlaskWebDevelopment/app/main/views.py - > Line 182: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskWebDevelopment/app/main/views.py - > reaches line 189, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 6: -File: FlaskWebDevelopment/app/main/views.py - > User input at line 198, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskWebDevelopment/app/main/views.py - > Line 199: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskWebDevelopment/app/main/views.py - > Line 201: comments = pagination.items -File: FlaskWebDevelopment/app/main/views.py - > reaches line 202, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -JunliuHub/FlaskWebDevelopment -https://github.com/JunliuHub/FlaskWebDevelopment -Entry file: FlaskWebDevelopment/src/helloflask.py -Scanned: 2016-10-25 23:48:05.058306 -No vulnerabilities found. - - -adrianomaringolo/py-flask-tuts -https://github.com/adrianomaringolo/py-flask-tuts -Entry file: None -Scanned: 2016-10-25 23:48:11.239641 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rjantos/flask-hello-world -https://github.com/rjantos/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:48:11.747538 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ishwarya-iyer/nuage_proj_flask_app -https://github.com/ishwarya-iyer/nuage_proj_flask_app -Entry file: nuage_proj_flask_app/app.py -Scanned: 2016-10-25 23:48:13.974662 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -SamirKanaan/PlantillaFlaskREST1 -https://github.com/SamirKanaan/PlantillaFlaskREST1 -Entry file: PlantillaFlaskREST1/plantilla1.py -Scanned: 2016-10-25 23:48:15.877151 -No vulnerabilities found. - - -remarcbalisi/flask-angular-auth -https://github.com/remarcbalisi/flask-angular-auth -Entry file: flask-angular-auth/project/__init__.py -Scanned: 2016-10-25 23:48:17.183057 -No vulnerabilities found. - - -jarosenb/flask_ionratio_V2 -https://github.com/jarosenb/flask_ionratio_V2 -Entry file: flask_ionratio_V2/hello.py -Scanned: 2016-10-25 23:48:18.615204 -No vulnerabilities found. - - -themuppet2/flask-hello-world -https://github.com/themuppet2/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:48:19.163639 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kindoprec/Flask-SecureHeaders -https://github.com/kindoprec/Flask-SecureHeaders -Entry file: Flask-SecureHeaders/tests/core_test.py -Scanned: 2016-10-25 23:48:20.486198 -No vulnerabilities found. - - -ishwarya-iyer/nuage_flask_app -https://github.com/ishwarya-iyer/nuage_flask_app -Entry file: nuage_flask_app/app.py -Scanned: 2016-10-25 23:48:23.676666 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Christomas/flask_project_skeleton -https://github.com/Christomas/flask_project_skeleton -Entry file: flask_project_skeleton/app/__init__.py -Scanned: 2016-10-25 23:48:25.128863 -No vulnerabilities found. - - -pranavn-cuelogic/flask_video_conference_room -https://github.com/pranavn-cuelogic/flask_video_conference_room -Entry file: flask_video_conference_room/video_conf/main.py -Scanned: 2016-10-25 23:48:26.540450 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -llxxee/A-website-by-Flask -https://github.com/llxxee/A-website-by-Flask -Entry file: None -Scanned: 2016-10-25 23:48:27.860845 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/llxxee/A-website-by-Flask. - -micah-cal-sandbox/flask-heroku-sandbox -https://github.com/micah-cal-sandbox/flask-heroku-sandbox -Entry file: flask-heroku-sandbox/app.py -Scanned: 2016-10-25 23:48:29.138487 -No vulnerabilities found. - - -lkpanganiban/flask-rest-example -https://github.com/lkpanganiban/flask-rest-example -Entry file: flask-rest-example/app.py -Scanned: 2016-10-25 23:48:33.456492 -Vulnerability 1: -File: flask-rest-example/app.py - > User input at line 48, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flask-rest-example/app.py - > reaches line 55, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -rodcox89/flask-restful-blueprint-boilerplate -https://github.com/rodcox89/flask-restful-blueprint-boilerplate -Entry file: flask-restful-blueprint-boilerplate/main.py -Scanned: 2016-10-25 23:48:36.926773 -No vulnerabilities found. - - -braddmiller/flask-by-example -https://github.com/braddmiller/flask-by-example -Entry file: None -Scanned: 2016-10-25 23:48:37.455173 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/braddmiller/flask-by-example. - -tych0/flask-demo-app -https://github.com/tych0/flask-demo-app -Entry file: flask-demo-app/app/__init__.py -Scanned: 2016-10-25 23:48:42.248457 -No vulnerabilities found. - - -technocake/flask-user-profiles-example -https://github.com/technocake/flask-user-profiles-example -Entry file: flask-user-profiles-example/pyhtml.py -Scanned: 2016-10-25 23:48:43.536913 -No vulnerabilities found. - - -Christomas/i_dev_flask -https://github.com/Christomas/i_dev_flask -Entry file: i_dev_flask/app/__init__.py -Scanned: 2016-10-25 23:48:44.983972 -Vulnerability 1: -File: i_dev_flask/app/auth/views.py - > User input at line 121, trigger word ".data": - user = models.User.query.filter_by(email=form.email.data).first() -Reassigned in: - File: i_dev_flask/app/auth/views.py - > Line 123: token = options.dump_token('reset_password', user.id) -File: i_dev_flask/app/auth/views.py - > reaches line 124, trigger word "url_for(": - options.send_email(user.email, '重置密码', 'auth/mail/reset_password',user=user, url=url_for('auth.reset_confirm',token=token, _external=True)) - -Vulnerability 2: -File: i_dev_flask/app/auth/views.py - > User input at line 139, trigger word "get(": - user = models.User.query.get(user_id) -Reassigned in: - File: i_dev_flask/app/auth/views.py - > Line 143: form = forms.ResetPasswordForm(email=user.email) - File: i_dev_flask/app/auth/views.py - > Line 147: user.password = form.password.data - File: i_dev_flask/app/auth/views.py - > Line 138: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.login')) - File: i_dev_flask/app/auth/views.py - > Line 142: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.lgoin')) - File: i_dev_flask/app/auth/views.py - > Line 150: ret_MAYBE_FUNCTION_NAME = redirect(url_for('auth.login')) -File: i_dev_flask/app/auth/views.py - > reaches line 151, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('auth/reset_confirm.html',form=form) - - - -paulsavala/flask_aws_demo -https://github.com/paulsavala/flask_aws_demo -Entry file: None -Scanned: 2016-10-25 23:48:53.968114 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -udpcloud/flask-rest-api -https://github.com/udpcloud/flask-rest-api -Entry file: flask-rest-api/app/__init__.py -Scanned: 2016-10-25 23:48:55.280709 -Vulnerability 1: -File: flask-rest-api/app/api_v1/spaces.py - > User input at line 16, trigger word "get(": - space = Spaces.query.get(id) -File: flask-rest-api/app/api_v1/spaces.py - > reaches line 19, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(space_schema.dump(space).data) - - - -AndersonQ/appengine-flask-contacts-api -https://github.com/AndersonQ/appengine-flask-contacts-api -Entry file: appengine-flask-contacts-api/application/__init__.py -Scanned: 2016-10-25 23:48:56.920150 -No vulnerabilities found. - - -dhiraka/flask_basic_app -https://github.com/dhiraka/flask_basic_app -Entry file: flask_basic_app/test_rest_app.py -Scanned: 2016-10-25 23:48:58.240582 -No vulnerabilities found. - - -aaronja38/assignment10-flask -https://github.com/aaronja38/assignment10-flask -Entry file: assignment10-flask/winners.py -Scanned: 2016-10-25 23:49:01.965394 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: assignment10-flask/env/lib/python2.7/sre_compile.py - -avikantz/Flask-API-Demo -https://github.com/avikantz/Flask-API-Demo -Entry file: Flask-API-Demo/app/__init__.py -Scanned: 2016-10-25 23:49:03.778078 -No vulnerabilities found. - - -deenaacree/flask_app1 -https://github.com/deenaacree/flask_app1 -Entry file: flask_app1/songsapp.py -Scanned: 2016-10-25 23:49:07.179749 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_app1/env/lib/python2.7/sre_compile.py - -AMontalva/flask_hello_world -https://github.com/AMontalva/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-25 23:49:09.504498 -No vulnerabilities found. - - -xiewenlongs/Flask-CacheOBJ -https://github.com/xiewenlongs/Flask-CacheOBJ -Entry file: Flask-CacheOBJ/tests.py -Scanned: 2016-10-25 23:49:11.078192 -No vulnerabilities found. - - -thefunkjunky/python-flask-boilerplate -https://github.com/thefunkjunky/python-flask-boilerplate -Entry file: python-flask-boilerplate/mainapp/__init__.py -Scanned: 2016-10-25 23:49:12.495352 -No vulnerabilities found. - - -harryoh/flask-rest-api -https://github.com/harryoh/flask-rest-api -Entry file: flask-rest-api/app/__init__.py -Scanned: 2016-10-25 23:49:13.802946 -Vulnerability 1: -File: flask-rest-api/app/api_v1/spaces.py - > User input at line 16, trigger word "get(": - space = Spaces.query.get(id) -File: flask-rest-api/app/api_v1/spaces.py - > reaches line 19, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(space_schema.dump(space).data) - - - -DanBlakeman/flask-deploy-practice -https://github.com/DanBlakeman/flask-deploy-practice -Entry file: flask-deploy-practice/src/app.py -Scanned: 2016-10-25 23:49:15.213206 -No vulnerabilities found. - - -MoxmiNu/flask-mongo-test -https://github.com/MoxmiNu/flask-mongo-test -Entry file: flask-mongo-test/provisioning/files/dr-app.py -Scanned: 2016-10-25 23:49:32.249793 -No vulnerabilities found. - - -medev21/Social-Network---Flask -https://github.com/medev21/Social-Network---Flask -Entry file: Social-Network---Flask/app.py -Scanned: 2016-10-25 23:49:33.605512 -No vulnerabilities found. - - -sealzjh/flask-celery-test -https://github.com/sealzjh/flask-celery-test -Entry file: None -Scanned: 2016-10-25 23:49:34.918659 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sealzjh/flask-celery-test. - -Glaun/flask-hello-world -https://github.com/Glaun/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:49:35.455788 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -acouderc/flask -https://github.com/acouderc/flask -Entry file: None -Scanned: 2016-10-25 23:49:37.869313 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aintmetho/flask -https://github.com/aintmetho/flask -Entry file: None -Scanned: 2016-10-25 23:49:38.400136 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MapEntryManagement/flask -https://github.com/MapEntryManagement/flask -Entry file: None -Scanned: 2016-10-25 23:49:38.915544 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -klen/flask-pw -https://github.com/klen/flask-pw -Entry file: flask-pw/tests.py -Scanned: 2016-10-25 23:49:40.369728 -No vulnerabilities found. - - -KujiraProject/Flask-PAM -https://github.com/KujiraProject/Flask-PAM -Entry file: Flask-PAM/example/www.py -Scanned: 2016-10-25 23:49:41.790955 -No vulnerabilities found. - - -colingorrie/flask-boilerplate -https://github.com/colingorrie/flask-boilerplate -Entry file: None -Scanned: 2016-10-25 23:49:42.303438 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/colingorrie/flask-boilerplate. - -TwilioDevEd/automated-survey-flask -https://github.com/TwilioDevEd/automated-survey-flask -Entry file: automated-survey-flask/automated_survey_flask/__init__.py -Scanned: 2016-10-25 23:49:45.002406 -No vulnerabilities found. - - -gene1wood/flaskoktaapp -https://github.com/gene1wood/flaskoktaapp -Entry file: flaskoktaapp/flaskoktaapp/__init__.py -Scanned: 2016-10-25 23:49:46.438064 -Vulnerability 1: -File: flaskoktaapp/flaskoktaapp/__init__.py - > User input at line 201, trigger word "form[": - url = request.form['RelayState'] -File: flaskoktaapp/flaskoktaapp/__init__.py - > reaches line 196, trigger word "url_for(": - url = url_for('user') - -Vulnerability 2: -File: flaskoktaapp/flaskoktaapp/__init__.py - > User input at line 201, trigger word "form[": - url = request.form['RelayState'] -File: flaskoktaapp/flaskoktaapp/__init__.py - > reaches line 204, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url) - - - -yu66s/flaskr -https://github.com/yu66s/flaskr -Entry file: None -Scanned: 2016-10-25 23:49:46.974597 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yu66s/flaskr. - -xiaohu2015/Flasky -https://github.com/xiaohu2015/Flasky -Entry file: None -Scanned: 2016-10-25 23:49:47.491295 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/xiaohu2015/Flasky. - -cwywang/flasky -https://github.com/cwywang/flasky -Entry file: None -Scanned: 2016-10-25 23:49:48.024507 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wangxuan007/flasky -https://github.com/wangxuan007/flasky -Entry file: None -Scanned: 2016-10-25 23:49:48.578362 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lambdaplus/flasko -https://github.com/lambdaplus/flasko -Entry file: flasko/Flasko.py -Scanned: 2016-10-25 23:49:53.021558 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flasko/lib/python3.4/operator.py - -SSUHan/flasktutorial -https://github.com/SSUHan/flasktutorial -Entry file: None -Scanned: 2016-10-25 23:49:54.601370 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SSUHan/flasktutorial. - -ma53192190/flaskwork -https://github.com/ma53192190/flaskwork -Entry file: flaskwork/flaskwork.py -Scanned: 2016-10-25 23:49:56.949303 -No vulnerabilities found. - - -hoobalias/Flaskr -https://github.com/hoobalias/Flaskr -Entry file: None -Scanned: 2016-10-25 23:49:57.473068 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -NapoleonYoung/FlaskWeb -https://github.com/NapoleonYoung/FlaskWeb -Entry file: FlaskWeb/MyFirstWebServer/app/__init__.py -Scanned: 2016-10-25 23:50:03.029763 -Vulnerability 1: -File: FlaskWeb/MyFirstWebServer/app/main/views.py - > User input at line 15, trigger word ".data": - name = form.name.data -Reassigned in: - File: FlaskWeb/MyFirstWebServer/app/main/views.py - > Line 12: name = None -File: FlaskWeb/MyFirstWebServer/app/main/views.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name) - - - -zhouyang2640/FlaskInit -https://github.com/zhouyang2640/FlaskInit -Entry file: FlaskInit/hello.py -Scanned: 2016-10-25 23:50:04.519087 -No vulnerabilities found. - - -s3c0nDD/FlaskTutorial -https://github.com/s3c0nDD/FlaskTutorial -Entry file: FlaskTutorial/app/__init__.py -Scanned: 2016-10-25 23:50:05.834080 -No vulnerabilities found. - - -ZaighumRajput/flaskPractice -https://github.com/ZaighumRajput/flaskPractice -Entry file: flaskPractice/chapter2/hello.py -Scanned: 2016-10-25 23:50:09.297750 -No vulnerabilities found. - - -rmotr/flask-api-example -https://github.com/rmotr/flask-api-example -Entry file: flask-api-example/api/_01_manual_response_class.py -Scanned: 2016-10-25 23:50:13.151900 -No vulnerabilities found. - - -jjapp/flask-blog -https://github.com/jjapp/flask-blog -Entry file: None -Scanned: 2016-10-25 23:50:13.662303 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -frankpiva/mastering-flask -https://github.com/frankpiva/mastering-flask -Entry file: mastering-flask/main.py -Scanned: 2016-10-25 23:50:15.956640 -No vulnerabilities found. - - -engfilipe/curso_flask -https://github.com/engfilipe/curso_flask -Entry file: None -Scanned: 2016-10-25 23:50:21.452681 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sandmarq/flask_test -https://github.com/sandmarq/flask_test -Entry file: None -Scanned: 2016-10-25 23:50:32.969623 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -barcai/Flask_Megatutorial -https://github.com/barcai/Flask_Megatutorial -Entry file: Flask_Megatutorial/app/__init__.py -Scanned: 2016-10-25 23:50:35.374413 -No vulnerabilities found. - - -zhang-zhang/learning-flask -https://github.com/zhang-zhang/learning-flask -Entry file: learning-flask/flaskr.py -Scanned: 2016-10-25 23:50:36.684811 -No vulnerabilities found. - - -kosen10spajam/f-flask -https://github.com/kosen10spajam/f-flask -Entry file: f-flask/main.py -Scanned: 2016-10-25 23:50:38.099954 -Vulnerability 1: -File: f-flask/main.py - > User input at line 132, trigger word "get(": - since = int(request.args.get('since')) -File: f-flask/main.py - > reaches line 134, trigger word "execute(": - sql.execute('SELECT time, animal, message FROM messages WHERE time >= %d' % since) - -Vulnerability 2: -File: f-flask/main.py - > User input at line 142, trigger word "get(": - animal = request.values.get('animal') -File: f-flask/main.py - > reaches line 146, trigger word "execute(": - sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message)) - -Vulnerability 3: -File: f-flask/main.py - > User input at line 143, trigger word "get(": - message = request.values.get('message') -File: f-flask/main.py - > reaches line 146, trigger word "execute(": - sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message)) - -Vulnerability 4: -File: f-flask/main.py - > User input at line 144, trigger word "get(": - time = int(request.values.get('time')) -File: f-flask/main.py - > reaches line 146, trigger word "execute(": - sql.execute('INSERT INTO messages (time, animal, message) VALUES (%d, '%s', $$%s$$)' % (time, animal, message)) - - - -mihai011/flask_server -https://github.com/mihai011/flask_server -Entry file: flask_server/app.py -Scanned: 2016-10-25 23:50:39.990400 -No vulnerabilities found. - - -morganvdavis/boilerplate-flask -https://github.com/morganvdavis/boilerplate-flask -Entry file: None -Scanned: 2016-10-25 23:50:41.294880 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/morganvdavis/boilerplate-flask. - -jwg4/flask_converter -https://github.com/jwg4/flask_converter -Entry file: flask_converter/examples/app_with_constructor.py -Scanned: 2016-10-25 23:50:42.712177 -No vulnerabilities found. - - -AVandelay/flask_blog -https://github.com/AVandelay/flask_blog -Entry file: flask_blog/__init__.py -Scanned: 2016-10-25 23:50:46.021547 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_blog/venv/lib/python3.4/operator.py - -Davidthecoolsmartguy/weasyprint-Flask -https://github.com/Davidthecoolsmartguy/weasyprint-Flask -Entry file: weasyprint-Flask/app.py -Scanned: 2016-10-25 23:50:47.359240 -No vulnerabilities found. - - -rajdeepd/flask-helloworld -https://github.com/rajdeepd/flask-helloworld -Entry file: flask-helloworld/app.py -Scanned: 2016-10-25 23:50:50.820277 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-helloworld/venv/lib/python2.7/sre_compile.py - -honeeWong/Flask-Blog -https://github.com/honeeWong/Flask-Blog -Entry file: Flask-Blog/application/__init__.py -Scanned: 2016-10-25 23:50:52.676873 -No vulnerabilities found. - - -frenos/flask-sample -https://github.com/frenos/flask-sample -Entry file: flask-sample/app/__init__.py -Scanned: 2016-10-25 23:50:54.071440 -No vulnerabilities found. - - -lockie/flask_ldap -https://github.com/lockie/flask_ldap -Entry file: flask_ldap/index.py -Scanned: 2016-10-25 23:50:55.384394 -Vulnerability 1: -File: flask_ldap/index.py - > User input at line 28, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask_ldap/index.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask_ldap/index.py - > reaches line 29, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - -Vulnerability 2: -File: flask_ldap/index.py - > User input at line 28, trigger word "get(": - next = request.args.get('next') -Reassigned in: - File: flask_ldap/index.py - > Line 30: ret_MAYBE_FUNCTION_NAME = render_template('login.html',form=form) -File: flask_ldap/index.py - > reaches line 29, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(next or url_for('index')) - - - -AndreyBalandin/flask-test -https://github.com/AndreyBalandin/flask-test -Entry file: flask-test/app.py -Scanned: 2016-10-25 23:50:56.677561 -No vulnerabilities found. - - -kessiacastro/imdb-flask -https://github.com/kessiacastro/imdb-flask -Entry file: imdb-flask/app.py -Scanned: 2016-10-25 23:51:01.865563 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -AmI-2016/python-Flask -https://github.com/AmI-2016/python-Flask -Entry file: python-Flask/flask-ex.py -Scanned: 2016-10-25 23:51:03.862636 -Vulnerability 1: -File: python-Flask/flask-ex.py - > User input at line 30, trigger word "form[": - user = request.form['user'] -Reassigned in: - File: python-Flask/flask-ex.py - > Line 33: session['user'] = user - File: python-Flask/flask-ex.py - > Line 34: session['valid'] = True -File: python-Flask/flask-ex.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',user=user) - - - -anazard/zardify_flask -https://github.com/anazard/zardify_flask -Entry file: zardify_flask/main/__init__.py -Scanned: 2016-10-25 23:51:08.481199 -No vulnerabilities found. - - -buckeye76guy/learning-flask -https://github.com/buckeye76guy/learning-flask -Entry file: learning-flask/curious.py -Scanned: 2016-10-25 23:51:10.310590 -No vulnerabilities found. - - -thewhitedingo/MenuFlask -https://github.com/thewhitedingo/MenuFlask -Entry file: MenuFlask/flaskserver.py -Scanned: 2016-10-25 23:51:11.781226 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -anazard/flask_project -https://github.com/anazard/flask_project -Entry file: flask_project/main/__init__.py -Scanned: 2016-10-25 23:51:16.294195 -No vulnerabilities found. - - -lizmeister321/flask_practice -https://github.com/lizmeister321/flask_practice -Entry file: None -Scanned: 2016-10-25 23:51:16.872664 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -phillip-hopper/flask-test -https://github.com/phillip-hopper/flask-test -Entry file: flask-test/flaskr.py -Scanned: 2016-10-25 23:51:18.280888 -No vulnerabilities found. - - -wkqzxh/flask_leaklib -https://github.com/wkqzxh/flask_leaklib -Entry file: flask_leaklib/flask_leaklib/leaklib_app/__init__.py -Scanned: 2016-10-25 23:51:19.610322 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Y-Rookie/flask_blog -https://github.com/Y-Rookie/flask_blog -Entry file: None -Scanned: 2016-10-25 23:51:24.429489 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -brightforme/flask-sqlalchemy -https://github.com/brightforme/flask-sqlalchemy -Entry file: flask-sqlalchemy/flask_sqlalchemy/__init__.py -Scanned: 2016-10-25 23:51:26.410195 -No vulnerabilities found. - - -pedrogaudencio/refunite-flask -https://github.com/pedrogaudencio/refunite-flask -Entry file: refunite-flask/app.py -Scanned: 2016-10-25 23:51:34.458777 -No vulnerabilities found. - - -holmandw/flask-arduino -https://github.com/holmandw/flask-arduino -Entry file: flask-arduino/app/__init__.py -Scanned: 2016-10-25 23:51:36.041854 -No vulnerabilities found. - - -zenyui/flask-test -https://github.com/zenyui/flask-test -Entry file: flask-test/api-test/api2.py -Scanned: 2016-10-25 23:51:37.370877 -No vulnerabilities found. - - -vobine/JobFlask -https://github.com/vobine/JobFlask -Entry file: None -Scanned: 2016-10-25 23:51:38.912695 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vobine/JobFlask. - -Lobster1991/learn_flask -https://github.com/Lobster1991/learn_flask -Entry file: learn_flask/app/models.py -Scanned: 2016-10-25 23:51:42.997782 -No vulnerabilities found. - - -SarahJaine/flask-tutorial -https://github.com/SarahJaine/flask-tutorial -Entry file: None -Scanned: 2016-10-25 23:51:43.537462 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SarahJaine/flask-tutorial. - -vatseek/flask_lessons -https://github.com/vatseek/flask_lessons -Entry file: flask_lessons/app/__init__.py -Scanned: 2016-10-25 23:51:44.869209 -No vulnerabilities found. - - -Michael-F-Bryan/flask_template -https://github.com/Michael-F-Bryan/flask_template -Entry file: flask_template/app/__init__.py -Scanned: 2016-10-25 23:51:46.298082 -No vulnerabilities found. - - -ol3j/azureday-flask -https://github.com/ol3j/azureday-flask -Entry file: azureday-flask/FlaskWebProject/__init__.py -Scanned: 2016-10-25 23:51:48.101965 -Vulnerability 1: -File: azureday-flask/FlaskWebProject/views.py - > User input at line 57, trigger word "form[": - mobile = request.form['yourmobile'] -Reassigned in: - File: azureday-flask/FlaskWebProject/views.py - > Line 74: task = 'PartitionKey''RowKey''mobile''file''tasksPoznan'suffixmobilefilename - File: azureday-flask/FlaskWebProject/views.py - > Line 77: new = db.Log(suffix=suffix, mobile=mobile, image=filename) -File: azureday-flask/FlaskWebProject/views.py - > reaches line 86, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('form_action.html',mobile=mobile, url=url, important_metric=important_metric) - -Vulnerability 2: -File: azureday-flask/FlaskWebProject/views.py - > User input at line 58, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: azureday-flask/FlaskWebProject/views.py - > Line 59: basename = file.filename - File: azureday-flask/FlaskWebProject/views.py - > Line 61: filename = '_'.join([suffix, basename]) - File: azureday-flask/FlaskWebProject/views.py - > Line 68: url = blob_service.make_blob_url(https://github.com/container_name='images',%20blob_name=filename) - File: azureday-flask/FlaskWebProject/views.py - > Line 72: body = json.dumps('suffix''image'str(suffix)str(url)) - File: azureday-flask/FlaskWebProject/views.py - > Line 74: task = 'PartitionKey''RowKey''mobile''file''tasksPoznan'suffixmobilefilename - File: azureday-flask/FlaskWebProject/views.py - > Line 77: new = db.Log(suffix=suffix, mobile=mobile, image=filename) -File: azureday-flask/FlaskWebProject/views.py - > reaches line 86, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('form_action.html',mobile=mobile, url=url, important_metric=important_metric) - - - -runningstrawberry/microblog -https://github.com/runningstrawberry/microblog -Entry file: None -Scanned: 2016-10-25 23:51:48.660785 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/runningstrawberry/microblog. - -ShivamMahajan/my_first_flask_project -https://github.com/ShivamMahajan/my_first_flask_project -Entry file: my_first_flask_project/hello.py -Scanned: 2016-10-25 23:51:57.296164 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: my_first_flask_project/venv/lib/python2.7/sre_compile.py - -sakib3/flask_Cartridge_openshift -https://github.com/sakib3/flask_Cartridge_openshift -Entry file: flask_Cartridge_openshift/flaskapp.py -Scanned: 2016-10-25 23:51:58.711077 -No vulnerabilities found. - - -mfyock/flask_hello_world -https://github.com/mfyock/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-25 23:52:02.091711 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sakib3/flask_cartridge_Heroku -https://github.com/sakib3/flask_cartridge_Heroku -Entry file: flask_cartridge_Heroku/app.py -Scanned: 2016-10-25 23:52:03.505062 -No vulnerabilities found. - - -gclabon/Twilio-Flask-CSV -https://github.com/gclabon/Twilio-Flask-CSV -Entry file: Twilio-Flask-CSV/twilioFlaskBasic/twilioFlaskBasic.py -Scanned: 2016-10-25 23:52:04.953511 -No vulnerabilities found. - - -AdamHumphrey/housing2016flask -https://github.com/AdamHumphrey/housing2016flask -Entry file: None -Scanned: 2016-10-25 23:52:06.491980 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/AdamHumphrey/housing2016flask. - -SamirKanaan/PlantillaFlaskREST2 -https://github.com/SamirKanaan/PlantillaFlaskREST2 -Entry file: PlantillaFlaskREST2/inicia.py -Scanned: 2016-10-25 23:52:07.909877 -No vulnerabilities found. - - -pravinthsam/MnistFlaskKeras -https://github.com/pravinthsam/MnistFlaskKeras -Entry file: MnistFlaskKeras/flaskserver.py -Scanned: 2016-10-25 23:52:10.323396 -No vulnerabilities found. - - -rfmapp/flask-by-example -https://github.com/rfmapp/flask-by-example -Entry file: None -Scanned: 2016-10-25 23:52:10.851899 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rfmapp/flask-by-example. - -dschuler36/SimpleFlaskBlog -https://github.com/dschuler36/SimpleFlaskBlog -Entry file: SimpleFlaskBlog/main.py -Scanned: 2016-10-25 23:53:19.365335 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -macloo/flask_project1 -https://github.com/macloo/flask_project1 -Entry file: flask_project1/winners_BAK.py -Scanned: 2016-10-25 23:53:20.833543 -No vulnerabilities found. - - -3130000547/musicbox-base-on-flask -https://github.com/3130000547/musicbox-base-on-flask -Entry file: musicbox-base-on-flask/musicbox.py -Scanned: 2016-10-25 23:53:22.364640 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -AjithPanneerselvam/my_flask_project -https://github.com/AjithPanneerselvam/my_flask_project -Entry file: my_flask_project/project.py -Scanned: 2016-10-25 23:53:23.798359 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -avikantz/Flask-API-Demo -https://github.com/avikantz/Flask-API-Demo -Entry file: Flask-API-Demo/app/__init__.py -Scanned: 2016-10-25 23:53:25.557104 -No vulnerabilities found. - - -dengjonathan/flask_first_project -https://github.com/dengjonathan/flask_first_project -Entry file: flask_first_project/final_project.py -Scanned: 2016-10-25 23:53:27.363730 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -boyombo/asterisk-pycall-flask -https://github.com/boyombo/asterisk-pycall-flask -Entry file: asterisk-pycall-flask/calldemo/app.py -Scanned: 2016-10-25 23:53:28.668767 -No vulnerabilities found. - - -kaslemr/sample_flask_project -https://github.com/kaslemr/sample_flask_project -Entry file: sample_flask_project/app2.py -Scanned: 2016-10-25 23:53:30.163842 -Vulnerability 1: -File: sample_flask_project/app2.py - > User input at line 129, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: sample_flask_project/app2.py - > Line 135: user = User(username=username) -File: sample_flask_project/app2.py - > reaches line 139, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 2: -File: sample_flask_project/app2.py - > User input at line 129, trigger word "get(": - username = request.json.get('username') -Reassigned in: - File: sample_flask_project/app2.py - > Line 135: user = User(username=username) -File: sample_flask_project/app2.py - > reaches line 139, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('username'user.username), 201, 'Location'url_for('get_user',id=user.id, _external=True)) - -Vulnerability 3: -File: sample_flask_project/app2.py - > User input at line 145, trigger word "get(": - user = User.query.get(id) -File: sample_flask_project/app2.py - > reaches line 148, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('username'user.username) - -Vulnerability 4: -File: sample_flask_project/app.py - > User input at line 81, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: sample_flask_project/app.py - > reaches line 88, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'make_public_task(task)), 201) - - - -mapingfan/Flask-Mail-Test -https://github.com/mapingfan/Flask-Mail-Test -Entry file: Flask-Mail-Test/Mail-Test.py -Scanned: 2016-10-25 23:53:32.460840 -No vulnerabilities found. - - -4Catalyzer/flask-resty-tenants -https://github.com/4Catalyzer/flask-resty-tenants -Entry file: flask-resty-tenants/tests/conftest.py -Scanned: 2016-10-25 23:53:33.868301 -No vulnerabilities found. - - -lucaswadedavis/iguanodon -https://github.com/lucaswadedavis/iguanodon -Entry file: iguanodon/server.py -Scanned: 2016-10-25 23:53:35.503703 -No vulnerabilities found. - - -ederavilaprado/paas-app-example-python-flask -https://github.com/ederavilaprado/paas-app-example-python-flask -Entry file: paas-app-example-python-flask/app.py -Scanned: 2016-10-25 23:53:37.295368 -No vulnerabilities found. - - -afh/yabab -https://github.com/afh/yabab -Entry file: yabab/yabab/__init__.py -Scanned: 2016-10-25 23:53:39.216623 -No vulnerabilities found. - - -Michael-F-Bryan/mfb_website -https://github.com/Michael-F-Bryan/mfb_website -Entry file: mfb_website/app/__init__.py -Scanned: 2016-10-25 23:53:40.657338 -No vulnerabilities found. - - -Yelloworking/SlackWebservice -https://github.com/Yelloworking/SlackWebservice -Entry file: None -Scanned: 2016-10-25 23:53:41.959974 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Yelloworking/SlackWebservice. - -TrailBlazerZ/imgaptcha--api -https://github.com/TrailBlazerZ/imgaptcha--api -Entry file: imgaptcha--api/app.py -Scanned: 2016-10-25 23:53:43.657140 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -NSBum/AnkiStatsServer -https://github.com/NSBum/AnkiStatsServer -Entry file: AnkiStatsServer/app.py -Scanned: 2016-10-25 23:53:45.630148 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -yobuntu/laboratory -https://github.com/yobuntu/laboratory -Entry file: laboratory/laboratory/fooflask.py -Scanned: 2016-10-25 23:53:46.925954 -Vulnerability 1: -File: laboratory/laboratory/tests/test_base.py - > User input at line 5, trigger word "get(": - response = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 5, trigger word "url_for(": - response = client.get(url_for('hello')) - -Vulnerability 2: -File: laboratory/laboratory/tests/test_base.py - > User input at line 11, trigger word "get(": - r = client.get(url_for('add',name='test')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 11, trigger word "url_for(": - r = client.get(url_for('add',name='test')) - -Vulnerability 3: -File: laboratory/laboratory/tests/test_base.py - > User input at line 12, trigger word "get(": - r = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 11, trigger word "url_for(": - r = client.get(url_for('add',name='test')) - -Vulnerability 4: -File: laboratory/laboratory/tests/test_base.py - > User input at line 11, trigger word "get(": - r = client.get(url_for('add',name='test')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 12, trigger word "url_for(": - r = client.get(url_for('hello')) - -Vulnerability 5: -File: laboratory/laboratory/tests/test_base.py - > User input at line 12, trigger word "get(": - r = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 12, trigger word "url_for(": - r = client.get(url_for('hello')) - -Vulnerability 6: -File: laboratory/laboratory/tests/test_base.py - > User input at line 19, trigger word "get(": - response = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 19, trigger word "url_for(": - response = client.get(url_for('hello')) - -Vulnerability 7: -File: laboratory/laboratory/tests/test_base.py - > User input at line 26, trigger word "get(": - r = client.get(url_for('add',name='test0')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 26, trigger word "url_for(": - r = client.get(url_for('add',name='test0')) - -Vulnerability 8: -File: laboratory/laboratory/tests/test_base.py - > User input at line 27, trigger word "get(": - r = client.get(url_for('add',name='test1')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 26, trigger word "url_for(": - r = client.get(url_for('add',name='test0')) - -Vulnerability 9: -File: laboratory/laboratory/tests/test_base.py - > User input at line 28, trigger word "get(": - r = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 26, trigger word "url_for(": - r = client.get(url_for('add',name='test0')) - -Vulnerability 10: -File: laboratory/laboratory/tests/test_base.py - > User input at line 26, trigger word "get(": - r = client.get(url_for('add',name='test0')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 27, trigger word "url_for(": - r = client.get(url_for('add',name='test1')) - -Vulnerability 11: -File: laboratory/laboratory/tests/test_base.py - > User input at line 27, trigger word "get(": - r = client.get(url_for('add',name='test1')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 27, trigger word "url_for(": - r = client.get(url_for('add',name='test1')) - -Vulnerability 12: -File: laboratory/laboratory/tests/test_base.py - > User input at line 28, trigger word "get(": - r = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 27, trigger word "url_for(": - r = client.get(url_for('add',name='test1')) - -Vulnerability 13: -File: laboratory/laboratory/tests/test_base.py - > User input at line 26, trigger word "get(": - r = client.get(url_for('add',name='test0')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 28, trigger word "url_for(": - r = client.get(url_for('hello')) - -Vulnerability 14: -File: laboratory/laboratory/tests/test_base.py - > User input at line 27, trigger word "get(": - r = client.get(url_for('add',name='test1')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 28, trigger word "url_for(": - r = client.get(url_for('hello')) - -Vulnerability 15: -File: laboratory/laboratory/tests/test_base.py - > User input at line 28, trigger word "get(": - r = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 28, trigger word "url_for(": - r = client.get(url_for('hello')) - -Vulnerability 16: -File: laboratory/laboratory/tests/test_base.py - > User input at line 36, trigger word "get(": - response = client.get(url_for('hello')) -File: laboratory/laboratory/tests/test_base.py - > reaches line 36, trigger word "url_for(": - response = client.get(url_for('hello')) - - - -hkalexling/Twitter-Like-Count -https://github.com/hkalexling/Twitter-Like-Count -Entry file: Twitter-Like-Count/__init__.py -Scanned: 2016-10-25 23:53:48.467972 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ljxxcaijing/flask -https://github.com/ljxxcaijing/flask -Entry file: None -Scanned: 2016-10-25 23:53:50.399875 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -PacktPublishing/Mastering-Flask -https://github.com/PacktPublishing/Mastering-Flask -Entry file: Mastering-Flask/Chapter 13_Code/Chapter 13/webapp/__init__.py -Scanned: 2016-10-25 23:53:52.549179 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -migrateup/flaskr -https://github.com/migrateup/flaskr -Entry file: None -Scanned: 2016-10-25 23:53:53.086162 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/migrateup/flaskr. - -reparadocs/Flask-HelloWorldBot -https://github.com/reparadocs/Flask-HelloWorldBot -Entry file: Flask-HelloWorldBot/HelloWorldBot.py -Scanned: 2016-10-25 23:53:54.484699 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -singingwolfboy/flask-sse -https://github.com/singingwolfboy/flask-sse -Entry file: flask-sse/tests/conftest.py -Scanned: 2016-10-25 23:53:55.926372 -No vulnerabilities found. - - -pankajpant22/flask -https://github.com/pankajpant22/flask -Entry file: None -Scanned: 2016-10-25 23:54:13.497423 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -underdogio/flask-graylog -https://github.com/underdogio/flask-graylog -Entry file: flask-graylog/example/app.py -Scanned: 2016-10-25 23:54:20.844714 -No vulnerabilities found. - - -adyouri/flask-basics -https://github.com/adyouri/flask-basics -Entry file: flask-basics/lesson5/app.py -Scanned: 2016-10-25 23:54:22.289456 -No vulnerabilities found. - - -KujiraProject/Flask-PAM -https://github.com/KujiraProject/Flask-PAM -Entry file: Flask-PAM/example/www.py -Scanned: 2016-10-25 23:54:24.708633 -No vulnerabilities found. - - -TwilioDevEd/automated-survey-flask -https://github.com/TwilioDevEd/automated-survey-flask -Entry file: automated-survey-flask/automated_survey_flask/__init__.py -Scanned: 2016-10-25 23:54:27.368360 -No vulnerabilities found. - - -gucxufangling/flask-- -https://github.com/gucxufangling/flask-- -Entry file: flask--/app/__init__.py -Scanned: 2016-10-25 23:54:31.837086 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pragmaticcoders/flask-react-seed -https://github.com/pragmaticcoders/flask-react-seed -Entry file: None -Scanned: 2016-10-25 23:54:32.437875 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pragmaticcoders/flask-react-seed. - -danil3d/flaskblog -https://github.com/danil3d/flaskblog -Entry file: None -Scanned: 2016-10-25 23:54:32.952405 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/danil3d/flaskblog. - -ailtoncsf/flasklearn -https://github.com/ailtoncsf/flasklearn -Entry file: flasklearn/flask-basics/app.py -Scanned: 2016-10-25 23:54:40.494439 -No vulnerabilities found. - - -VimDong/flaskme -https://github.com/VimDong/flaskme -Entry file: flaskme/app/__init__.py -Scanned: 2016-10-25 23:54:42.119872 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -axavio/flasky -https://github.com/axavio/flasky -Entry file: None -Scanned: 2016-10-25 23:54:42.634264 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -annoys-parrot/flaskbook -https://github.com/annoys-parrot/flaskbook -Entry file: flaskbook/application.py -Scanned: 2016-10-25 23:54:44.246705 -Vulnerability 1: -File: flaskbook/user/views.py - > User input at line 24, trigger word ".data": - user = User.objects.filter(username=form.username.data).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 37: user = None -File: flaskbook/user/views.py - > reaches line 24, trigger word "filter(": - user = User.objects.filter(username=form.username.data).first() - -Vulnerability 2: -File: flaskbook/user/views.py - > User input at line 31, trigger word "get(": - next = session.get('next') -Reassigned in: - File: flaskbook/user/views.py - > Line 35: ret_MAYBE_FUNCTION_NAME = 'User logged in' - File: flaskbook/user/views.py - > Line 40: ret_MAYBE_FUNCTION_NAME = render_template('user/login.html',form=form, error=error) -File: flaskbook/user/views.py - > reaches line 33, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(next) - -Vulnerability 3: -File: flaskbook/user/views.py - > User input at line 47, trigger word ".data": - hashed_password = bcrypt.hashpw(form.password.data, salt) -Reassigned in: - File: flaskbook/user/views.py - > Line 49: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode) -File: flaskbook/user/views.py - > reaches line 62, trigger word "render_template(": - body_html = render_template('mail/user/register.html',user=user) - -Vulnerability 4: -File: flaskbook/user/views.py - > User input at line 49, trigger word ".data": - user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode) -File: flaskbook/user/views.py - > reaches line 62, trigger word "render_template(": - body_html = render_template('mail/user/register.html',user=user) - -Vulnerability 5: -File: flaskbook/user/views.py - > User input at line 47, trigger word ".data": - hashed_password = bcrypt.hashpw(form.password.data, salt) -Reassigned in: - File: flaskbook/user/views.py - > Line 49: user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode) -File: flaskbook/user/views.py - > reaches line 63, trigger word "render_template(": - body_text = render_template('mail/user/register.txt',user=user) - -Vulnerability 6: -File: flaskbook/user/views.py - > User input at line 49, trigger word ".data": - user = User(username=form.username.data, password=hashed_password, email=form.email.data, first_name=form.first_name.data, last_name=form.last_name.data, change_configuration='new_email''confirmation_code'form.email.datacode) -File: flaskbook/user/views.py - > reaches line 63, trigger word "render_template(": - body_text = render_template('mail/user/register.txt',user=user) - -Vulnerability 7: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 90, trigger word "filter(": - user = User.objects.filter(username=session.get('username')).first() - -Vulnerability 8: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 106, trigger word "filter(": - if User.objects.filter(username=form.username.data.lower()).first(): - -Vulnerability 9: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 113, trigger word "filter(": - if User.objects.filter(email=form.email.data.lower()).first(): - -Vulnerability 10: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 126, trigger word "render_template(": - body_html = render_template('mail/user/change_email.html',user=user) - -Vulnerability 11: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 127, trigger word "render_template(": - body_text = render_template('mail/user/change_email.txt',user=user) - -Vulnerability 12: -File: flaskbook/user/views.py - > User input at line 90, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -Reassigned in: - File: flaskbook/user/views.py - > Line 92: form = EditForm(obj=user) - File: flaskbook/user/views.py - > Line 99: filename = secure_filename(form.image.data.filename) - File: flaskbook/user/views.py - > Line 100: file_path = os.path.join(UPLOAD_FOLDER, 'user', filename) - File: flaskbook/user/views.py - > Line 102: image_ts = str(thumbnail_process(file_path, 'user', str(user.id))) - File: flaskbook/user/views.py - > Line 122: form.email.data = user.email - File: flaskbook/user/views.py - > Line 133: user.profile_image = image_ts - File: flaskbook/user/views.py - > Line 97: image_ts = None -File: flaskbook/user/views.py - > reaches line 137, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user/edit.html',form=form, error=error, message=message, user=user) - -Vulnerability 13: -File: flaskbook/user/views.py - > User input at line 160, trigger word ".data": - user = User.objects.filter(email=form.email.data).first() -File: flaskbook/user/views.py - > reaches line 160, trigger word "filter(": - user = User.objects.filter(email=form.email.data).first() - -Vulnerability 14: -File: flaskbook/user/views.py - > User input at line 160, trigger word ".data": - user = User.objects.filter(email=form.email.data).first() -File: flaskbook/user/views.py - > reaches line 168, trigger word "render_template(": - body_html = render_template('mail/user/password_reset.html',user=user) - -Vulnerability 15: -File: flaskbook/user/views.py - > User input at line 160, trigger word ".data": - user = User.objects.filter(email=form.email.data).first() -File: flaskbook/user/views.py - > reaches line 169, trigger word "render_template(": - body_text = render_template('mail/user/password_reset.txt',user=user) - -Vulnerability 16: -File: flaskbook/user/views.py - > User input at line 215, trigger word "get(": - user = User.objects.filter(username=session.get('username')).first() -File: flaskbook/user/views.py - > reaches line 215, trigger word "filter(": - user = User.objects.filter(username=session.get('username')).first() - - - -jinxiaoyuan/flaskr -https://github.com/jinxiaoyuan/flaskr -Entry file: None -Scanned: 2016-10-25 23:54:44.770027 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jinxiaoyuan/flaskr. - -fkirwin/flaskhelloworld -https://github.com/fkirwin/flaskhelloworld -Entry file: flaskhelloworld/hello_world.py -Scanned: 2016-10-25 23:54:48.043076 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -wang7lu6qiang5/flasky -https://github.com/wang7lu6qiang5/flasky -Entry file: None -Scanned: 2016-10-25 23:54:48.557326 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ak042/flasktaskr -https://github.com/ak042/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:54:49.080037 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wanghaa/flasky -https://github.com/wanghaa/flasky -Entry file: None -Scanned: 2016-10-25 23:54:49.591341 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -omshankar1/flaskapp -https://github.com/omshankar1/flaskapp -Entry file: None -Scanned: 2016-10-25 23:54:50.104846 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/omshankar1/flaskapp. - -maxwang051/flasktaskr -https://github.com/maxwang051/flasktaskr -Entry file: None -Scanned: 2016-10-25 23:54:50.618328 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -joanna-solomiewicz/FlaskWorkshop -https://github.com/joanna-solomiewicz/FlaskWorkshop -Entry file: FlaskWorkshop/app.py -Scanned: 2016-10-25 23:54:53.669451 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskWorkshop/venv/lib/python3.5/operator.py - -NapoleonYoung/FlaskWeb -https://github.com/NapoleonYoung/FlaskWeb -Entry file: FlaskWeb/MyFirstWebServer/app/__init__.py -Scanned: 2016-10-25 23:54:58.520162 -Vulnerability 1: -File: FlaskWeb/MyFirstWebServer/app/main/views.py - > User input at line 15, trigger word ".data": - name = form.name.data -Reassigned in: - File: FlaskWeb/MyFirstWebServer/app/main/views.py - > Line 12: name = None -File: FlaskWeb/MyFirstWebServer/app/main/views.py - > reaches line 18, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, name=name) - - - -rmGuarachi/flaskTutorial -https://github.com/rmGuarachi/flaskTutorial -Entry file: flaskTutorial/webapp.py -Scanned: 2016-10-25 23:54:59.853424 -No vulnerabilities found. - - -mion00/flaskSQLAlchemy -https://github.com/mion00/flaskSQLAlchemy -Entry file: flaskSQLAlchemy/app.py -Scanned: 2016-10-25 23:55:01.218388 -Vulnerability 1: -File: flaskSQLAlchemy/app.py - > User input at line 32, trigger word "get(": - service = request.args.get('service') -File: flaskSQLAlchemy/app.py - > reaches line 34, trigger word "filter(": - users = User.query.filter(User.json.has_key(service)).all() - - - -GriMel/FlaskFirst -https://github.com/GriMel/FlaskFirst -Entry file: FlaskFirst/app/__init__.py -Scanned: 2016-10-25 23:55:02.957350 -No vulnerabilities found. - - -Pazoles/Geocoder -https://github.com/Pazoles/Geocoder -Entry file: Geocoder/app.py -Scanned: 2016-10-25 23:55:06.939965 -No vulnerabilities found. - - -spring3th/flask-blogdemo -https://github.com/spring3th/flask-blogdemo -Entry file: flask-blogdemo/app/__init__.py -Scanned: 2016-10-25 23:55:08.562780 -Vulnerability 1: -File: flask-blogdemo/app/main/views.py - > User input at line 27, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 35: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['SIKA_POSTS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 38: posts = pagination.items - File: flask-blogdemo/app/main/views.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blogdemo/app/main/views.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flask-blogdemo/app/main/views.py - > User input at line 30, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 28: show_followed = False - File: flask-blogdemo/app/main/views.py - > Line 26: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blogdemo/app/main/views.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flask-blogdemo/app/main/views.py - > User input at line 44, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 45: pagination = User.query.order_by(User.member_since.desc()).paginate(page,per_page=current_app.config['SIKA_USERS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 46: alluser = pagination.items -File: flask-blogdemo/app/main/views.py - > reaches line 47, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('alluser.html',alluser=alluser, pagination=pagination, page=page) - -Vulnerability 4: -File: flask-blogdemo/app/main/views.py - > User input at line 106, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 108: page = post.comments.count() - 1 // current_app.config['SIKA_COMMENTS_PER_PAGE'] + 1 - File: flask-blogdemo/app/main/views.py - > Line 110: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['SIKA_COMMENTS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 111: comments = pagination.items - File: flask-blogdemo/app/main/views.py - > Line 105: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flask-blogdemo/app/main/views.py - > reaches line 112, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flask-blogdemo/app/main/views.py - > User input at line 184, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 185: pagination = user.followers.paginate(page,per_page=current_app.config['SIKA_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 188: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask-blogdemo/app/main/views.py - > Line 183: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blogdemo/app/main/views.py - > reaches line 190, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flask-blogdemo/app/main/views.py - > User input at line 201, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 202: pagination = user.followed.paginate(page,per_page=current_app.config['SIKA_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 205: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask-blogdemo/app/main/views.py - > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask-blogdemo/app/main/views.py - > reaches line 207, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: flask-blogdemo/app/main/views.py - > User input at line 230, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask-blogdemo/app/main/views.py - > Line 231: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['SIKA_COMMENTS_PER_PAGE'], error_out=False) - File: flask-blogdemo/app/main/views.py - > Line 232: comments = pagination.items -File: flask-blogdemo/app/main/views.py - > reaches line 233, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -NixonInnes/Flask-Blueprints -https://github.com/NixonInnes/Flask-Blueprints -Entry file: Flask-Blueprints/app/__init__.py -Scanned: 2016-10-25 23:55:10.831447 -No vulnerabilities found. - - -isichkodmitry/flask-caesar -https://github.com/isichkodmitry/flask-caesar -Entry file: flask-caesar/app/__init__.py -Scanned: 2016-10-25 23:55:12.269001 -No vulnerabilities found. - - -and3rson/flask-testsite -https://github.com/and3rson/flask-testsite -Entry file: flask-testsite/app.py -Scanned: 2016-10-25 23:55:13.588264 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -SShayashi/flask-test -https://github.com/SShayashi/flask-test -Entry file: flask-test/flaskr/__init__.py -Scanned: 2016-10-25 23:55:14.991249 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -tyrelsouza/flask_vagrant -https://github.com/tyrelsouza/flask_vagrant -Entry file: flask_vagrant/code/src/app.py -Scanned: 2016-10-25 23:55:21.391221 -No vulnerabilities found. - - -ak042/flask-blog -https://github.com/ak042/flask-blog -Entry file: None -Scanned: 2016-10-25 23:55:21.934922 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zhang-zhang/learning-flask -https://github.com/zhang-zhang/learning-flask -Entry file: learning-flask/flaskr.py -Scanned: 2016-10-25 23:55:25.238595 -No vulnerabilities found. - - -syniuhin/storyteller-flask -https://github.com/syniuhin/storyteller-flask -Entry file: storyteller-flask/app/__init__.py -Scanned: 2016-10-25 23:55:26.714668 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -arushijain/flask_tutorial -https://github.com/arushijain/flask_tutorial -Entry file: None -Scanned: 2016-10-25 23:55:28.267683 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/arushijain/flask_tutorial. - -iooop/flask-blog -https://github.com/iooop/flask-blog -Entry file: None -Scanned: 2016-10-25 23:55:32.822191 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -AndreyBalandin/flask-test -https://github.com/AndreyBalandin/flask-test -Entry file: flask-test/app.py -Scanned: 2016-10-25 23:55:34.137959 -No vulnerabilities found. - - -mastershao/lening-flask -https://github.com/mastershao/lening-flask -Entry file: None -Scanned: 2016-10-25 23:55:42.056314 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mastershao/lening-flask. - -markchodges/mastering-flask -https://github.com/markchodges/mastering-flask -Entry file: mastering-flask/webapp/__init__.py -Scanned: 2016-10-25 23:55:46.259644 -Vulnerability 1: -File: mastering-flask/webapp/controllers/blog.py - > User input at line 71, trigger word ".data": - filename = secure_filename(form.photo.data.filename) -Reassigned in: - File: mastering-flask/webapp/controllers/blog.py - > Line 74: filename = None -File: mastering-flask/webapp/controllers/blog.py - > reaches line 75, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('upload.html',form=form, filename=filename) - - - -keeleys/flask_RESTful -https://github.com/keeleys/flask_RESTful -Entry file: flask_RESTful/api/__init__.py -Scanned: 2016-10-25 23:55:47.702369 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Datamine/PokerTexter -https://github.com/Datamine/PokerTexter -Entry file: PokerTexter/run-pokertexter.py -Scanned: 2016-10-25 23:55:49.880586 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -AmI-2016/python-Flask -https://github.com/AmI-2016/python-Flask -Entry file: python-Flask/flask-ex.py -Scanned: 2016-10-25 23:55:51.307774 -Vulnerability 1: -File: python-Flask/flask-ex.py - > User input at line 30, trigger word "form[": - user = request.form['user'] -Reassigned in: - File: python-Flask/flask-ex.py - > Line 33: session['user'] = user - File: python-Flask/flask-ex.py - > Line 34: session['valid'] = True -File: python-Flask/flask-ex.py - > reaches line 36, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('login.html',user=user) - - - -SorenPeterson/flask-intro -https://github.com/SorenPeterson/flask-intro -Entry file: flask-intro/app.py -Scanned: 2016-10-25 23:55:54.995539 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-intro/venv/lib/python2.7/sre_compile.py - -an5rag/flask-tutorial -https://github.com/an5rag/flask-tutorial -Entry file: None -Scanned: 2016-10-25 23:55:55.568995 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/an5rag/flask-tutorial. - -sugarguo/Flask_Blog -https://github.com/sugarguo/Flask_Blog -Entry file: Flask_Blog/app/__init__.py -Scanned: 2016-10-25 23:56:00.044832 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -andresgariglio/poc-flask -https://github.com/andresgariglio/poc-flask -Entry file: poc-flask/poc-flask/flask_rest_service/__init__.py -Scanned: 2016-10-25 23:56:01.498249 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -stuncyilmaz/flask_init -https://github.com/stuncyilmaz/flask_init -Entry file: flask_init/hello.py -Scanned: 2016-10-25 23:56:03.074105 -No vulnerabilities found. - - -mrpatiwi/flask-starter -https://github.com/mrpatiwi/flask-starter -Entry file: None -Scanned: 2016-10-25 23:56:03.600368 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mrpatiwi/flask-starter. - -jmccutchan/raspi_flask -https://github.com/jmccutchan/raspi_flask -Entry file: raspi_flask/app.py -Scanned: 2016-10-25 23:56:07.414160 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -priyankt68/flask_example -https://github.com/priyankt68/flask_example -Entry file: None -Scanned: 2016-10-25 23:56:07.969120 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/priyankt68/flask_example. - -zeratullich/flask_maizi -https://github.com/zeratullich/flask_maizi -Entry file: flask_maizi/app/__init__.py -Scanned: 2016-10-25 23:56:10.513983 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mtimebombm/python-flask -https://github.com/mtimebombm/python-flask -Entry file: python-flask/app/__init__.py -Scanned: 2016-10-25 23:56:12.239294 -No vulnerabilities found. - - -Lobster1991/learn_flask -https://github.com/Lobster1991/learn_flask -Entry file: learn_flask/app/models.py -Scanned: 2016-10-25 23:56:17.119633 -No vulnerabilities found. - - -JessyHurbain/Flask_test -https://github.com/JessyHurbain/Flask_test -Entry file: Flask_test/coucou.py -Scanned: 2016-10-25 23:56:18.439453 -No vulnerabilities found. - - -achinnac/microblog-flask -https://github.com/achinnac/microblog-flask -Entry file: microblog-flask/app/__init__.py -Scanned: 2016-10-25 23:56:19.728384 -No vulnerabilities found. - - -jpirih/Flask-Blog -https://github.com/jpirih/Flask-Blog -Entry file: None -Scanned: 2016-10-25 23:56:25.190999 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zhaokefei/web_flask -https://github.com/zhaokefei/web_flask -Entry file: web_flask/app/__init__.py -Scanned: 2016-10-25 23:56:26.962714 -Vulnerability 1: -File: web_flask/app/main/views.py - > User input at line 24, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: web_flask/app/main/views.py - > Line 25: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: web_flask/app/main/views.py - > Line 28: posts = pagination.items - File: web_flask/app/main/views.py - > Line 23: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: web_flask/app/main/views.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - - - -BaichuanWu/Blog_flask -https://github.com/BaichuanWu/Blog_flask -Entry file: Blog_flask/flaskpractise.py -Scanned: 2016-10-25 23:56:28.261975 -No vulnerabilities found. - - -sreyemnayr/jss-flask -https://github.com/sreyemnayr/jss-flask -Entry file: jss-flask/jss-flask.py -Scanned: 2016-10-25 23:56:29.582612 -No vulnerabilities found. - - -hectorip/TinyFlaskExperiment -https://github.com/hectorip/TinyFlaskExperiment -Entry file: TinyFlaskExperiment/hello.py -Scanned: 2016-10-25 23:56:30.870668 -No vulnerabilities found. - - -WhiteShirts/windowsflask -https://github.com/WhiteShirts/windowsflask -Entry file: windowsflask/flasky/app/__init__.py -Scanned: 2016-10-25 23:56:32.625957 -Vulnerability 1: -File: windowsflask/flasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 16: prev = None - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 19: next = None -File: windowsflask/flasky/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: windowsflask/flasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 16: prev = None - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 19: next = None -File: windowsflask/flasky/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: windowsflask/flasky/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 16: prev = None - File: windowsflask/flasky/app/api_1_0/posts.py - > Line 19: next = None -File: windowsflask/flasky/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 20: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 23: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 20: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 23: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 20: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 23: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 42: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 45: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 42: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 45: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: windowsflask/flasky/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: windowsflask/flasky/app/api_1_0/users.py - > Line 42: prev = None - File: windowsflask/flasky/app/api_1_0/users.py - > Line 45: next = None -File: windowsflask/flasky/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 15: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 18: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 15: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 18: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 15: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 18: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 43: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 46: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 43: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 46: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: windowsflask/flasky/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 43: prev = None - File: windowsflask/flasky/app/api_1_0/comments.py - > Line 46: next = None -File: windowsflask/flasky/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: windowsflask/flasky/app/main/views.py - > User input at line 27, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 37: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 40: posts = pagination.items - File: windowsflask/flasky/app/main/views.py - > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: windowsflask/flasky/app/main/views.py - > reaches line 42, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: windowsflask/flasky/app/main/views.py - > User input at line 32, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 30: show_followed = False - File: windowsflask/flasky/app/main/views.py - > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: windowsflask/flasky/app/main/views.py - > reaches line 42, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: windowsflask/flasky/app/main/views.py - > User input at line 67, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 68: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 71: posts = pagination.items -File: windowsflask/flasky/app/main/views.py - > reaches line 72, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: windowsflask/flasky/app/main/views.py - > User input at line 135, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 137: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: windowsflask/flasky/app/main/views.py - > Line 139: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 142: comments = pagination.items - File: windowsflask/flasky/app/main/views.py - > Line 134: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: windowsflask/flasky/app/main/views.py - > reaches line 143, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: windowsflask/flasky/app/main/views.py - > User input at line 201, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 202: pagination = user.followers.paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 205: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: windowsflask/flasky/app/main/views.py - > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: windowsflask/flasky/app/main/views.py - > reaches line 207, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of ', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: windowsflask/flasky/app/main/views.py - > User input at line 217, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 218: pagination = user.followed.paginate(page,per_page=current_app.config['FLASK_POSTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 221: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: windowsflask/flasky/app/main/views.py - > Line 216: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: windowsflask/flasky/app/main/views.py - > reaches line 223, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: windowsflask/flasky/app/main/views.py - > User input at line 231, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: windowsflask/flasky/app/main/views.py - > Line 232: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: windowsflask/flasky/app/main/views.py - > Line 235: comments = pagination.items -File: windowsflask/flasky/app/main/views.py - > reaches line 236, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -ptomelle/appflask -https://github.com/ptomelle/appflask -Entry file: appflask/wsgi/myflaskapp.py -Scanned: 2016-10-25 23:56:34.175690 -No vulnerabilities found. - - -globocom/gbix -https://github.com/globocom/gbix -Entry file: gbix/src/server_jsonrpc.py -Scanned: 2016-10-25 23:56:35.614339 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -martinpeck/bedlam-slack -https://github.com/martinpeck/bedlam-slack -Entry file: bedlam-slack/bedlam_slack/__init__.py -Scanned: 2016-10-25 23:56:37.062273 -Vulnerability 1: -File: bedlam-slack/bedlam_slack/ud.py - > User input at line 11, trigger word "get(": - phrase = parse.quote_plus(request.values.get('text').strip()) -Reassigned in: - File: bedlam-slack/bedlam_slack/ud.py - > Line 13: response = 'response_type''text''unfurl_links''in_channel''http://www.urbandictionary.com/define.php?term=' + phrase'true' -File: bedlam-slack/bedlam_slack/ud.py - > reaches line 19, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(response) - - - -kud-i/FlaskRestAPI -https://github.com/kud-i/FlaskRestAPI -Entry file: FlaskRestAPI/REST_API.py -Scanned: 2016-10-25 23:56:38.368209 -Vulnerability 1: -File: FlaskRestAPI/REST_API.py - > User input at line 75, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: FlaskRestAPI/REST_API.py - > reaches line 82, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -mapingfan/Flask-Web-Dev -https://github.com/mapingfan/Flask-Web-Dev -Entry file: Flask-Web-Dev/app.py -Scanned: 2016-10-25 23:56:46.733269 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -opendatakosovo/flask-app-framework -https://github.com/opendatakosovo/flask-app-framework -Entry file: flask-app-framework/app/__init__.py -Scanned: 2016-10-25 23:56:48.252284 -No vulnerabilities found. - - -cbeasley92/Flask-REST-API-Testing -https://github.com/cbeasley92/Flask-REST-API-Testing -Entry file: Flask-REST-API-Testing/rest_api.py -Scanned: 2016-10-25 23:56:49.560717 -Vulnerability 1: -File: Flask-REST-API-Testing/rest_api.py - > User input at line 88, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: Flask-REST-API-Testing/rest_api.py - > reaches line 95, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -kriesbeck/flask_heroku_practice -https://github.com/kriesbeck/flask_heroku_practice -Entry file: flask_heroku_practice/app/__init__.py -Scanned: 2016-10-25 23:56:51.123626 -No vulnerabilities found. - - -zelinlee0303/python-flask-mysql -https://github.com/zelinlee0303/python-flask-mysql -Entry file: python-flask-mysql/app/__init__.py -Scanned: 2016-10-25 23:56:52.720275 -Vulnerability 1: -File: python-flask-mysql/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: python-flask-mysql/app/main/views.py - > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: python-flask-mysql/app/main/views.py - > Line 26: posts = pagination.items - File: python-flask-mysql/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: python-flask-mysql/app/main/views.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: python-flask-mysql/app/main/views.py - > User input at line 41, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: python-flask-mysql/app/main/views.py - > Line 42: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: python-flask-mysql/app/main/views.py - > Line 45: posts = pagination.items - File: python-flask-mysql/app/main/views.py - > Line 40: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace')) -File: python-flask-mysql/app/main/views.py - > reaches line 46, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('mindtrace.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 3: -File: python-flask-mysql/app/main/views.py - > User input at line 118, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: python-flask-mysql/app/main/views.py - > Line 119: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: python-flask-mysql/app/main/views.py - > Line 122: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: python-flask-mysql/app/main/views.py - > Line 117: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace')) -File: python-flask-mysql/app/main/views.py - > reaches line 124, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='被', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 4: -File: python-flask-mysql/app/main/views.py - > User input at line 135, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: python-flask-mysql/app/main/views.py - > Line 136: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: python-flask-mysql/app/main/views.py - > Line 139: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: python-flask-mysql/app/main/views.py - > Line 134: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.mindtrace')) -File: python-flask-mysql/app/main/views.py - > reaches line 141, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 5: -File: python-flask-mysql/app/main/views.py - > User input at line 154, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: python-flask-mysql/app/main/views.py - > Line 155: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: python-flask-mysql/app/main/views.py - > Line 158: posts = pagination.items -File: python-flask-mysql/app/main/views.py - > reaches line 159, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - - - -ZAGJAB/Flask_OAuth2 -https://github.com/ZAGJAB/Flask_OAuth2 -Entry file: Flask_OAuth2/app.py -Scanned: 2016-10-25 23:56:54.023385 -Vulnerability 1: -File: Flask_OAuth2/app.py - > User input at line 75, trigger word "get(": - code = request.args.get('code') -Reassigned in: - File: Flask_OAuth2/app.py - > Line 76: uri = 'http://localhost:5000/oauth?response_type=%s&client_id=%s&redirect_uri=%s' % (code, client_id, redirect_uri) -File: Flask_OAuth2/app.py - > reaches line 77, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(uri) - - - -k-funk/flask-bower-bootstrap-compass -https://github.com/k-funk/flask-bower-bootstrap-compass -Entry file: flask-bower-bootstrap-compass/app_name/__init__.py -Scanned: 2016-10-25 23:56:57.380250 -No vulnerabilities found. - - -SamirKanaan/PlantillaFlaskREST3 -https://github.com/SamirKanaan/PlantillaFlaskREST3 -Entry file: PlantillaFlaskREST3/inicia.py -Scanned: 2016-10-25 23:56:58.795844 -No vulnerabilities found. - - -cruor99/heartbeat-flask-app -https://github.com/cruor99/heartbeat-flask-app -Entry file: heartbeat-flask-app/flaskheartbeat/__init__.py -Scanned: 2016-10-25 23:57:00.469314 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sakib3/flask_cartridge_Heroku -https://github.com/sakib3/flask_cartridge_Heroku -Entry file: flask_cartridge_Heroku/app.py -Scanned: 2016-10-25 23:57:01.954065 -No vulnerabilities found. - - -gclabon/Twilio-Flask-CSV -https://github.com/gclabon/Twilio-Flask-CSV -Entry file: Twilio-Flask-CSV/twilioFlaskBasic/twilioFlaskBasic.py -Scanned: 2016-10-25 23:57:03.408805 -No vulnerabilities found. - - -ak042/flask-hello-world -https://github.com/ak042/flask-hello-world -Entry file: None -Scanned: 2016-10-25 23:57:03.991417 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -king100/Flask-Hello-World- -https://github.com/king100/Flask-Hello-World- -Entry file: Flask-Hello-World-/app.py -Scanned: 2016-10-25 23:57:08.278334 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: Flask-Hello-World-/flask/lib/python2.7/sre_compile.py - -MMohan1/Flask_with_celery -https://github.com/MMohan1/Flask_with_celery -Entry file: Flask_with_celery/flask_app_test/flask_app/edge/__init__.py -Scanned: 2016-10-25 23:57:09.644395 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jhelgren/flask_movie_reviews -https://github.com/jhelgren/flask_movie_reviews -Entry file: flask_movie_reviews/server.py -Scanned: 2016-10-25 23:57:11.066976 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -NixonInnes/Flask-Blueprints-Logins -https://github.com/NixonInnes/Flask-Blueprints-Logins -Entry file: Flask-Blueprints-Logins/app/__init__.py -Scanned: 2016-10-25 23:57:12.877117 -No vulnerabilities found. - - -nejohnson2/flask-template-app -https://github.com/nejohnson2/flask-template-app -Entry file: flask-template-app/app.py -Scanned: 2016-10-25 23:57:14.285872 -No vulnerabilities found. - - -xlmn/DiplomFlaskAngular -https://github.com/xlmn/DiplomFlaskAngular -Entry file: DiplomFlaskAngular/app/__init__.py -Scanned: 2016-10-25 23:57:19.120151 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -AMontalva/flask-thinkful-api -https://github.com/AMontalva/flask-thinkful-api -Entry file: flask-thinkful-api/posts/__init__.py -Scanned: 2016-10-25 23:57:20.443705 -Vulnerability 1: -File: flask-thinkful-api/posts/api.py - > User input at line 16, trigger word "get(": - title_like = request.args.get('title_like') -Reassigned in: - File: flask-thinkful-api/posts/api.py - > Line 22: posts = posts.order_by(models.Post.id) - File: flask-thinkful-api/posts/api.py - > Line 25: data = json.dumps([post.as_dictionary() for post in posts]) - File: flask-thinkful-api/posts/api.py - > Line 26: ret_MAYBE_FUNCTION_NAME = Response(data, 200,mimetype='application/json') - File: flask-thinkful-api/posts/api.py - > Line 19: posts = session.query(models.Post) -File: flask-thinkful-api/posts/api.py - > reaches line 21, trigger word "filter(": - posts = posts.filter(models.Post.title.contains(title_like)) - - - -davidnuon/flask-falcon-example -https://github.com/davidnuon/flask-falcon-example -Entry file: flask-falcon-example/flask-demo.py -Scanned: 2016-10-25 23:57:21.746998 -No vulnerabilities found. - - -genedex/flask-neo4j -https://github.com/genedex/flask-neo4j -Entry file: flask-neo4j/blog/views.py -Scanned: 2016-10-25 23:57:27.078727 -No vulnerabilities found. - - -yazquez/example-rest-flask.python -https://github.com/yazquez/example-rest-flask.python -Entry file: None -Scanned: 2016-10-25 23:57:30.001066 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yazquez/example-rest-flask.python. - -sceene/test-flask-app -https://github.com/sceene/test-flask-app -Entry file: None -Scanned: 2016-10-25 23:57:31.403399 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sceene/test-flask-app. - -mtnriver/docker-flask-app -https://github.com/mtnriver/docker-flask-app -Entry file: docker-flask-app/app.py -Scanned: 2016-10-25 23:57:32.683300 -No vulnerabilities found. - - -josephmuli/Flask -https://github.com/josephmuli/Flask -Entry file: None -Scanned: 2016-10-25 23:57:35.509860 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -janukobytsch/flask-autofixture -https://github.com/janukobytsch/flask-autofixture -Entry file: flask-autofixture/tests/conftest.py -Scanned: 2016-10-25 23:57:39.551860 -No vulnerabilities found. - - -paceko/shopping-site -https://github.com/paceko/shopping-site -Entry file: shopping-site/shoppingsite.py -Scanned: 2016-10-25 23:57:45.819025 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pragmaticcoders/flask-react-seed -https://github.com/pragmaticcoders/flask-react-seed -Entry file: None -Scanned: 2016-10-25 23:57:47.331670 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/pragmaticcoders/flask-react-seed. - -axavio/flasky -https://github.com/axavio/flasky -Entry file: None -Scanned: 2016-10-25 23:57:48.837954 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rahulballal/flasktemplate -https://github.com/rahulballal/flasktemplate -Entry file: flasktemplate/app.py -Scanned: 2016-10-25 23:57:51.268915 -No vulnerabilities found. - - -dimdal/flasktutorial -https://github.com/dimdal/flasktutorial -Entry file: None -Scanned: 2016-10-25 23:57:51.788685 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/dimdal/flasktutorial. - -bspaans/flaskal -https://github.com/bspaans/flaskal -Entry file: flaskal/flaskal/imports.py -Scanned: 2016-10-25 23:57:54.222465 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -stoodsteal/flasky -https://github.com/stoodsteal/flasky -Entry file: None -Scanned: 2016-10-25 23:57:56.739733 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -fkirwin/flaskhelloworld -https://github.com/fkirwin/flaskhelloworld -Entry file: flaskhelloworld/hello_world.py -Scanned: 2016-10-25 23:58:02.248294 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -thedrew82/flaskr -https://github.com/thedrew82/flaskr -Entry file: None -Scanned: 2016-10-25 23:58:02.789718 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/thedrew82/flaskr. - -shenmj053/flaskr -https://github.com/shenmj053/flaskr -Entry file: None -Scanned: 2016-10-25 23:58:03.332328 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shenmj053/flaskr. - -zverxw13/flaskr -https://github.com/zverxw13/flaskr -Entry file: None -Scanned: 2016-10-25 23:58:03.847553 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zverxw13/flaskr. - -allergier/flaskr -https://github.com/allergier/flaskr -Entry file: None -Scanned: 2016-10-25 23:58:04.370358 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/allergier/flaskr. - -liuhuai0217/flasky -https://github.com/liuhuai0217/flasky -Entry file: None -Scanned: 2016-10-25 23:58:04.892758 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -erk52/FlaskDynamics -https://github.com/erk52/FlaskDynamics -Entry file: FlaskDynamics/view.py -Scanned: 2016-10-25 23:58:10.218006 -Vulnerability 1: -File: FlaskDynamics/view.py - > User input at line 18, trigger word ".data": - result = phasePlot(form.XPrime.data, form.YPrime.data) -Reassigned in: - File: FlaskDynamics/view.py - > Line 20: result = None -File: FlaskDynamics/view.py - > reaches line 22, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('new_view.html',form=form, result=result) - - - -KentaYamada/flaskr2 -https://github.com/KentaYamada/flaskr2 -Entry file: flaskr2/__init__.py -Scanned: 2016-10-25 23:58:11.526383 -No vulnerabilities found. - - -HaarisKhan/FlaskDemos -https://github.com/HaarisKhan/FlaskDemos -Entry file: None -Scanned: 2016-10-25 23:58:12.059973 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gnu4cn/flaskLearnings -https://github.com/gnu4cn/flaskLearnings -Entry file: flaskLearnings/demos/request_attributes.py -Scanned: 2016-10-25 23:58:19.533069 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -pepemontana7/flaskFinal -https://github.com/pepemontana7/flaskFinal -Entry file: flaskFinal/firstapp/hello.py -Scanned: 2016-10-25 23:58:20.846296 -No vulnerabilities found. - - -rishilification/Flask_Sql -https://github.com/rishilification/Flask_Sql -Entry file: Flask_Sql/app.py -Scanned: 2016-10-25 23:58:22.560721 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -marvelaz/Flask_python -https://github.com/marvelaz/Flask_python -Entry file: Flask_python/app.py -Scanned: 2016-10-25 23:58:23.859755 -Vulnerability 1: -File: Flask_python/app.py - > User input at line 30, trigger word ".data": - url = form.url.data -File: Flask_python/app.py - > reaches line 33, trigger word "flash(": - flash('Stored bookmark '{}''.format(url)) - - - -HDking/flask-blog -https://github.com/HDking/flask-blog -Entry file: None -Scanned: 2016-10-25 23:58:26.407804 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Topytops/nice-flask -https://github.com/Topytops/nice-flask -Entry file: nice-flask/nice.py -Scanned: 2016-10-25 23:58:28.716148 -No vulnerabilities found. - - -Bluepig/flask-blog -https://github.com/Bluepig/flask-blog -Entry file: None -Scanned: 2016-10-25 23:58:29.230339 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -groovycol/flask-intro -https://github.com/groovycol/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:58:31.544786 -No vulnerabilities found. - - -lyoness1/flask-intro -https://github.com/lyoness1/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:58:32.858454 -No vulnerabilities found. - - -kelseyoo14/flask-intro -https://github.com/kelseyoo14/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:58:34.159351 -No vulnerabilities found. - - -filiplasak/flask-skeleton -https://github.com/filiplasak/flask-skeleton -Entry file: flask-skeleton/app/__init__.py -Scanned: 2016-10-25 23:58:36.506210 -No vulnerabilities found. - - -tyrelsouza/flask_vagrant -https://github.com/tyrelsouza/flask_vagrant -Entry file: flask_vagrant/code/src/app.py -Scanned: 2016-10-25 23:58:37.797094 -No vulnerabilities found. - - -HBKO/flask-test -https://github.com/HBKO/flask-test -Entry file: None -Scanned: 2016-10-25 23:58:40.159625 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/HBKO/flask-test. - -wolfram74/flask_exploration -https://github.com/wolfram74/flask_exploration -Entry file: flask_exploration/app2.py -Scanned: 2016-10-25 23:58:45.487183 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -CrustyBarnacle/flask_app -https://github.com/CrustyBarnacle/flask_app -Entry file: None -Scanned: 2016-10-25 23:58:46.010252 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Weilor/learn_flask -https://github.com/Weilor/learn_flask -Entry file: learn_flask/app/__init__.py -Scanned: 2016-10-25 23:58:48.570424 -No vulnerabilities found. - - -cristinamclarkin/flask-intro -https://github.com/cristinamclarkin/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:58:49.876735 -No vulnerabilities found. - - -emilydowgialo/flask-intro -https://github.com/emilydowgialo/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:58:51.179484 -No vulnerabilities found. - - -roboticmonkey/flask-intro -https://github.com/roboticmonkey/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:58:53.492151 -No vulnerabilities found. - - -sarahcstringer/flask-intro -https://github.com/sarahcstringer/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:58:54.794641 -No vulnerabilities found. - - -askiefer/flask-intro -https://github.com/askiefer/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:58:58.098786 -No vulnerabilities found. - - -lachilles/flask-intro -https://github.com/lachilles/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:58:59.414936 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -dencynluv/Flask--Intro -https://github.com/dencynluv/Flask--Intro -Entry file: Flask--Intro/nice.py -Scanned: 2016-10-25 23:59:03.767091 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -holmandw/flask-pi -https://github.com/holmandw/flask-pi -Entry file: flask-pi/app/__init__.py -Scanned: 2016-10-25 23:59:05.314026 -No vulnerabilities found. - - -amiceli/flask-blog -https://github.com/amiceli/flask-blog -Entry file: None -Scanned: 2016-10-25 23:59:05.831127 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kellyhiggins/flask-intro -https://github.com/kellyhiggins/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:59:07.129127 -No vulnerabilities found. - - -hollywoodno/flask-intro -https://github.com/hollywoodno/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:59:08.451205 -No vulnerabilities found. - - -k-hub/flask-intro -https://github.com/k-hub/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:59:10.775423 -No vulnerabilities found. - - -sunshine-water/Flask_Exercise -https://github.com/sunshine-water/Flask_Exercise -Entry file: Flask_Exercise/nice.py -Scanned: 2016-10-25 23:59:12.085747 -No vulnerabilities found. - - -loopDelicious/flask-intro -https://github.com/loopDelicious/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:59:13.401136 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -mastershao/lening-flask -https://github.com/mastershao/lening-flask -Entry file: None -Scanned: 2016-10-25 23:59:13.938467 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/mastershao/lening-flask. - -bulain/flask-demo -https://github.com/bulain/flask-demo -Entry file: flask-demo/hello.py -Scanned: 2016-10-25 23:59:21.267201 -No vulnerabilities found. - - -diannaowa/flask-blog -https://github.com/diannaowa/flask-blog -Entry file: None -Scanned: 2016-10-25 23:59:21.785422 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hyhlinux/stu_flask -https://github.com/hyhlinux/stu_flask -Entry file: stu_flask/part3/h.py -Scanned: 2016-10-25 23:59:29.554143 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -wOstensen/flask-first -https://github.com/wOstensen/flask-first -Entry file: None -Scanned: 2016-10-25 23:59:38.009563 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Tacolizard/flask-kott -https://github.com/Tacolizard/flask-kott -Entry file: flask-kott/kott.py -Scanned: 2016-10-25 23:59:39.328800 -No vulnerabilities found. - - -wattanar/flask-sample -https://github.com/wattanar/flask-sample -Entry file: flask-sample/app.py -Scanned: 2016-10-25 23:59:40.617864 -No vulnerabilities found. - - -rpalo/flask-headlines -https://github.com/rpalo/flask-headlines -Entry file: flask-headlines/headlines.py -Scanned: 2016-10-25 23:59:41.933384 -No vulnerabilities found. - - -stanliski/flask_dev -https://github.com/stanliski/flask_dev -Entry file: None -Scanned: 2016-10-25 23:59:45.310883 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -an5rag/flask-tutorial -https://github.com/an5rag/flask-tutorial -Entry file: None -Scanned: 2016-10-25 23:59:45.824040 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/an5rag/flask-tutorial. - -sugarguo/Flask_Blog -https://github.com/sugarguo/Flask_Blog -Entry file: Flask_Blog/app/__init__.py -Scanned: 2016-10-25 23:59:51.529525 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -tlwlmy/flask_base -https://github.com/tlwlmy/flask_base -Entry file: flask_base/app/__init__.py -Scanned: 2016-10-25 23:59:53.021424 -No vulnerabilities found. - - -themuppet2/flask-blog -https://github.com/themuppet2/flask-blog -Entry file: None -Scanned: 2016-10-25 23:59:53.574207 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Aaver69/Python-Flask -https://github.com/Aaver69/Python-Flask -Entry file: None -Scanned: 2016-10-25 23:59:55.314038 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Aaver69/Python-Flask. - -Aperyon/flask-base -https://github.com/Aperyon/flask-base -Entry file: flask-base/src/__init__.py -Scanned: 2016-10-25 23:59:56.775982 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ak042/flask-bdd -https://github.com/ak042/flask-bdd -Entry file: flask-bdd/flaskr.py -Scanned: 2016-10-25 23:59:58.097900 -No vulnerabilities found. - - -k-wiz/flask-intro -https://github.com/k-wiz/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-25 23:59:59.404702 -No vulnerabilities found. - - -dflee/flask-intro -https://github.com/dflee/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:00.712178 -No vulnerabilities found. - - -glasses4days/flask-intro -https://github.com/glasses4days/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:02.714538 -No vulnerabilities found. - - -maheskett/flask-intro -https://github.com/maheskett/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:04.727552 -No vulnerabilities found. - - -kelly4strength/flask-lab -https://github.com/kelly4strength/flask-lab -Entry file: flask-lab/nice.py -Scanned: 2016-10-26 00:00:06.418146 -No vulnerabilities found. - - -kjlundsgaard/flask-intro -https://github.com/kjlundsgaard/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:07.784670 -No vulnerabilities found. - - -laurensila/flask-intro -https://github.com/laurensila/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:09.258034 -No vulnerabilities found. - - -Munnu/flask-intro -https://github.com/Munnu/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:10.696697 -No vulnerabilities found. - - -nanoha25/flask_local -https://github.com/nanoha25/flask_local -Entry file: flask_local/setup.py -Scanned: 2016-10-26 00:00:17.294218 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -yaoice/flask-micblog -https://github.com/yaoice/flask-micblog -Entry file: flask-micblog/micblog/app/__init__.py -Scanned: 2016-10-26 00:00:19.281283 -Vulnerability 1: -File: flask-micblog/micblog/app/views.py - > User input at line 92, trigger word "get(": - user_name = request.form.get('user_name') -Reassigned in: - File: flask-micblog/micblog/app/views.py - > Line 102: user.nickname = user_name -File: flask-micblog/micblog/app/views.py - > reaches line 95, trigger word "filter(": - register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first() - -Vulnerability 2: -File: flask-micblog/micblog/app/views.py - > User input at line 93, trigger word "get(": - user_email = request.form.get('user_email') -Reassigned in: - File: flask-micblog/micblog/app/views.py - > Line 103: user.email = user_email -File: flask-micblog/micblog/app/views.py - > reaches line 95, trigger word "filter(": - register_check = User.query.filter(db.or_(User.nickname == user_name, User.email == user_email)).first() - - - -Wynndow/flask_skeleton -https://github.com/Wynndow/flask_skeleton -Entry file: None -Scanned: 2016-10-26 00:00:19.808733 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Wynndow/flask_skeleton. - -chiubaca/flask-app -https://github.com/chiubaca/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-26 00:00:28.233520 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -afarges/flask-intro -https://github.com/afarges/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:30.060593 -No vulnerabilities found. - - -paceko/flask-intro -https://github.com/paceko/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:31.556022 -No vulnerabilities found. - - -ucgyyf/yaoke-flask -https://github.com/ucgyyf/yaoke-flask -Entry file: yaoke-flask/app/__init__.py -Scanned: 2016-10-26 00:00:33.190444 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -SethHWeidman/flask-test -https://github.com/SethHWeidman/flask-test -Entry file: None -Scanned: 2016-10-26 00:00:34.236593 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/SethHWeidman/flask-test. - -rpalo/flask-firstapp -https://github.com/rpalo/flask-firstapp -Entry file: flask-firstapp/hello.py -Scanned: 2016-10-26 00:00:39.563565 -No vulnerabilities found. - - -Jar-win/Flask-Pratice -https://github.com/Jar-win/Flask-Pratice -Entry file: Flask-Pratice/8a-login/app/__init__.py -Scanned: 2016-10-26 00:00:41.048843 -No vulnerabilities found. - - -stuncyilmaz/flask_init -https://github.com/stuncyilmaz/flask_init -Entry file: flask_init/hello.py -Scanned: 2016-10-26 00:00:42.345476 -No vulnerabilities found. - - -tageee/test_Flask -https://github.com/tageee/test_Flask -Entry file: test_Flask/hello.py -Scanned: 2016-10-26 00:00:44.125295 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Aisling-Dempsey/flask-intro -https://github.com/Aisling-Dempsey/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:47.443455 -No vulnerabilities found. - - -tkahnhau/flask-intro -https://github.com/tkahnhau/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:48.789481 -No vulnerabilities found. - - -ubermelon/Flask_exercise -https://github.com/ubermelon/Flask_exercise -Entry file: Flask_exercise/nice.py -Scanned: 2016-10-26 00:00:50.144074 -No vulnerabilities found. - - -lsylk/flask-intro -https://github.com/lsylk/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:51.456416 -No vulnerabilities found. - - -minyisme/flask-intro -https://github.com/minyisme/flask-intro -Entry file: flask-intro/nice.py -Scanned: 2016-10-26 00:00:53.759826 -No vulnerabilities found. - - -allisonscofield/flask-lab -https://github.com/allisonscofield/flask-lab -Entry file: flask-lab/nice.py -Scanned: 2016-10-26 00:00:55.074137 -No vulnerabilities found. - - -TiyaBelay/Flask-intro -https://github.com/TiyaBelay/Flask-intro -Entry file: Flask-intro/nice.py -Scanned: 2016-10-26 00:00:56.416045 -No vulnerabilities found. - - -chck/flask-sandbox -https://github.com/chck/flask-sandbox -Entry file: flask-sandbox/app.py -Scanned: 2016-10-26 00:00:57.773992 -Vulnerability 1: -File: flask-sandbox/controllers.py - > User input at line 22, trigger word "get(": - limit = request.args.get('limit', 20) -Reassigned in: - File: flask-sandbox/controllers.py - > Line 27: ret_MAYBE_FUNCTION_NAME = jsonify(data=[material.serialize for material in materials]) -File: flask-sandbox/controllers.py - > reaches line 24, trigger word "filter(": - materials = idMaterial.query.filter(Material.id == id)Material.query.order_by(Material.updated_at.desc()).limit(limit) - - - -NixonInnes/Flask-Calendar -https://github.com/NixonInnes/Flask-Calendar -Entry file: Flask-Calendar/app/__init__.py -Scanned: 2016-10-26 00:00:59.613498 -Vulnerability 1: -File: Flask-Calendar/app/blueprints/calendar/views.py - > User input at line 30, trigger word ".data": - calendar = Calendar(author_id=current_user.id, name=form.name.data) -Reassigned in: - File: Flask-Calendar/app/blueprints/calendar/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = render_template('calendar/calendar_form.html',form=form) -File: Flask-Calendar/app/blueprints/calendar/views.py - > reaches line 37, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('calendar.get',id=calendar.id)) - -Vulnerability 2: -File: Flask-Calendar/app/blueprints/calendar/views.py - > User input at line 30, trigger word ".data": - calendar = Calendar(author_id=current_user.id, name=form.name.data) -Reassigned in: - File: Flask-Calendar/app/blueprints/calendar/views.py - > Line 38: ret_MAYBE_FUNCTION_NAME = render_template('calendar/calendar_form.html',form=form) -File: Flask-Calendar/app/blueprints/calendar/views.py - > reaches line 37, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('calendar.get',id=calendar.id)) - - - -aurigadl/flask-base -https://github.com/aurigadl/flask-base -Entry file: flask-base/app.py -Scanned: 2016-10-26 00:01:01.151266 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -tageee/Blog -https://github.com/tageee/Blog -Entry file: Blog/app/__init__.py -Scanned: 2016-10-26 00:01:03.290213 -Vulnerability 1: -File: Blog/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 33: posts = pagination.items - File: Blog/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Blog/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Blog/app/main/views.py - > Line 23: show_followed = False - File: Blog/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Blog/app/main/views.py - > User input at line 59, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 60: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 63: posts = pagination.items -File: Blog/app/main/views.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Blog/app/main/views.py - > User input at line 122, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 124: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Blog/app/main/views.py - > Line 126: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 129: comments = pagination.items - File: Blog/app/main/views.py - > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Blog/app/main/views.py - > reaches line 130, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Blog/app/main/views.py - > User input at line 189, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 190: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 193: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Blog/app/main/views.py - > Line 188: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Blog/app/main/views.py - > User input at line 206, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 207: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 210: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Blog/app/main/views.py - > Line 205: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 212, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Blog/app/main/views.py - > User input at line 221, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 222: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 225: comments = pagination.items -File: Blog/app/main/views.py - > reaches line 226, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -amateurPotato/flask -https://github.com/amateurPotato/flask -Entry file: None -Scanned: 2016-10-26 00:01:05.571778 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ahdrage/flask -https://github.com/ahdrage/flask -Entry file: None -Scanned: 2016-10-26 00:01:06.083534 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Goomah/flask -https://github.com/Goomah/flask -Entry file: None -Scanned: 2016-10-26 00:01:07.660084 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ultramarine7/flask -https://github.com/ultramarine7/flask -Entry file: None -Scanned: 2016-10-26 00:01:09.200302 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -od210291jpv/flask -https://github.com/od210291jpv/flask -Entry file: None -Scanned: 2016-10-26 00:01:10.718133 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MonPower/Flask -https://github.com/MonPower/Flask -Entry file: None -Scanned: 2016-10-26 00:01:11.281314 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -wenzi0595/flask -https://github.com/wenzi0595/flask -Entry file: None -Scanned: 2016-10-26 00:01:18.804282 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -singingwolfboy/build-a-flask-api -https://github.com/singingwolfboy/build-a-flask-api -Entry file: build-a-flask-api/step08/puppy.py -Scanned: 2016-10-26 00:01:21.962900 -Vulnerability 1: -File: build-a-flask-api/step08/puppy.py - > User input at line 25, trigger word "get(": - name = request.form.get('name') -Reassigned in: - File: build-a-flask-api/step08/puppy.py - > Line 31: slug = slugify(name) - File: build-a-flask-api/step08/puppy.py - > Line 34: puppy = Puppy(slug=slug, name=name, image_url=image_url) - File: build-a-flask-api/step08/puppy.py - > Line 43: resp.headers['Location'] = location -File: build-a-flask-api/step08/puppy.py - > reaches line 40, trigger word "url_for(": - location = url_for('get_puppy',slug=slug) - - - -sunary/flask-optimize -https://github.com/sunary/flask-optimize -Entry file: flask-optimize/tests/flask_app.py -Scanned: 2016-10-26 00:01:23.380848 -No vulnerabilities found. - - -kashyap32/flask-REST -https://github.com/kashyap32/flask-REST -Entry file: None -Scanned: 2016-10-26 00:01:31.455674 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/kashyap32/flask-REST. - -Julzmbugua/flasky -https://github.com/Julzmbugua/flasky -Entry file: None -Scanned: 2016-10-26 00:01:34.493307 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rsk7/flaskapp -https://github.com/rsk7/flaskapp -Entry file: None -Scanned: 2016-10-26 00:01:35.012896 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/rsk7/flaskapp. - -Sarmacid/flaskr -https://github.com/Sarmacid/flaskr -Entry file: None -Scanned: 2016-10-26 00:01:39.534942 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Sarmacid/flaskr. - -skhe/flasky -https://github.com/skhe/flasky -Entry file: None -Scanned: 2016-10-26 00:01:41.440749 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -baloo98/flasky -https://github.com/baloo98/flasky -Entry file: None -Scanned: 2016-10-26 00:01:41.964335 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sanketg10/flaskapp -https://github.com/sanketg10/flaskapp -Entry file: None -Scanned: 2016-10-26 00:01:43.547681 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/sanketg10/flaskapp. - -neotrinity/flaskavro -https://github.com/neotrinity/flaskavro -Entry file: flaskavro/main.py -Scanned: 2016-10-26 00:01:47.880805 -No vulnerabilities found. - - -zeroisme/flaskblog -https://github.com/zeroisme/flaskblog -Entry file: None -Scanned: 2016-10-26 00:01:48.401907 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/zeroisme/flaskblog. - -Mendurim/flasktut -https://github.com/Mendurim/flasktut -Entry file: flasktut/hello.py -Scanned: 2016-10-26 00:01:50.731251 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -HDking/flasktaskr -https://github.com/HDking/flasktaskr -Entry file: None -Scanned: 2016-10-26 00:01:51.279327 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gjcooper/flaskprac -https://github.com/gjcooper/flaskprac -Entry file: flaskprac/app/__init__.py -Scanned: 2016-10-26 00:01:54.723192 -No vulnerabilities found. - - -deliveryyyyguy/flaskapp -https://github.com/deliveryyyyguy/flaskapp -Entry file: None -Scanned: 2016-10-26 00:01:55.242693 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/deliveryyyyguy/flaskapp. - -aaron077/flaskblog -https://github.com/aaron077/flaskblog -Entry file: None -Scanned: 2016-10-26 00:01:55.794680 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/aaron077/flaskblog. - -DaBaiLi/FlaskBlog -https://github.com/DaBaiLi/FlaskBlog -Entry file: FlaskBlog/app/__init__.py -Scanned: 2016-10-26 00:01:58.275685 -Vulnerability 1: -File: FlaskBlog/app/main/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 23: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 26: posts = pagination.items - File: FlaskBlog/app/main/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskBlog/app/main/views.py - > reaches line 27, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 2: -File: FlaskBlog/app/main/views.py - > User input at line 34, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 35: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 38: posts = pagination.items -File: FlaskBlog/app/main/views.py - > reaches line 39, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 3: -File: FlaskBlog/app/main/views.py - > User input at line 98, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 100: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: FlaskBlog/app/main/views.py - > Line 102: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 105: comments = pagination.items - File: FlaskBlog/app/main/views.py - > Line 97: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: FlaskBlog/app/main/views.py - > reaches line 106, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 4: -File: FlaskBlog/app/main/views.py - > User input at line 131, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskBlog/app/main/views.py - > Line 132: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskBlog/app/main/views.py - > Line 135: comments = pagination.items -File: FlaskBlog/app/main/views.py - > reaches line 136, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -cs207-project/FlaskAPI -https://github.com/cs207-project/FlaskAPI -Entry file: None -Scanned: 2016-10-26 00:01:58.792453 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/cs207-project/FlaskAPI. - -Thetides/FlaskyTut -https://github.com/Thetides/FlaskyTut -Entry file: FlaskyTut/app.py -Scanned: 2016-10-26 00:02:01.135535 -No vulnerabilities found. - - -prrateekk/FlaskTesting -https://github.com/prrateekk/FlaskTesting -Entry file: FlaskTesting/hello.py -Scanned: 2016-10-26 00:02:05.290408 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: FlaskTesting/venv/lib/python2.7/sre_compile.py - -kolapapa/flasky2 -https://github.com/kolapapa/flasky2 -Entry file: flasky2/app/__init__.py -Scanned: 2016-10-26 00:02:06.789481 -No vulnerabilities found. - - -argenis2021/FlaskTutorial -https://github.com/argenis2021/FlaskTutorial -Entry file: FlaskTutorial/app/__init__.py -Scanned: 2016-10-26 00:02:08.428851 -No vulnerabilities found. - - -konglx90/flask_study -https://github.com/konglx90/flask_study -Entry file: flask_study/hello.py -Scanned: 2016-10-26 00:02:09.887808 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -datademofun/congress-flask -https://github.com/datademofun/congress-flask -Entry file: congress-flask/app.py -Scanned: 2016-10-26 00:02:12.243705 -No vulnerabilities found. - - -ifwenvlook/flask-celery -https://github.com/ifwenvlook/flask-celery -Entry file: flask-celery/app.py -Scanned: 2016-10-26 00:02:13.563204 -Vulnerability 1: -File: flask-celery/app.py - > User input at line 66, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: flask-celery/app.py - > Line 67: session['email'] = email -File: flask-celery/app.py - > reaches line 76, trigger word "flash(": - flash('Sending email to {0}'.format(email)) - -Vulnerability 2: -File: flask-celery/app.py - > User input at line 66, trigger word "form[": - email = request.form['email'] -Reassigned in: - File: flask-celery/app.py - > Line 67: session['email'] = email -File: flask-celery/app.py - > reaches line 80, trigger word "flash(": - flash('An email will be sent to {0} in one minute'.format(email)) - -Vulnerability 3: -File: flask-celery/app.py - > User input at line 103, trigger word "get(": - response = 'state''current''total''status'task.statetask.info.get('current', 0)task.info.get('total', 1)task.info.get('status', '') -Reassigned in: - File: flask-celery/app.py - > Line 96: response = 'state''current''total''status'task.state01'Pending...' - File: flask-celery/app.py - > Line 113: response = 'state''current''total''status'task.state11str(task.info) -File: flask-celery/app.py - > reaches line 119, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(response) - - - -jonalligood/flask-diary -https://github.com/jonalligood/flask-diary -Entry file: flask-diary/app/__init__.py -Scanned: 2016-10-26 00:02:26.171263 -No vulnerabilities found. - - -HDking/flask-blog -https://github.com/HDking/flask-blog -Entry file: None -Scanned: 2016-10-26 00:02:26.776073 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -sugarguo/flask-login -https://github.com/sugarguo/flask-login -Entry file: flask-login/yan.py -Scanned: 2016-10-26 00:02:33.008711 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Afghary/bloggingFlask -https://github.com/Afghary/bloggingFlask -Entry file: bloggingFlask/src/app.py -Scanned: 2016-10-26 00:02:34.368859 -No vulnerabilities found. - - -abaratif/flask_sms -https://github.com/abaratif/flask_sms -Entry file: flask_sms/app.py -Scanned: 2016-10-26 00:02:35.707017 -No vulnerabilities found. - - -full-stakk/flask-rest -https://github.com/full-stakk/flask-rest -Entry file: flask-rest/app.py -Scanned: 2016-10-26 00:02:37.163694 -No vulnerabilities found. - - -ikolito/flask-yahoomarket -https://github.com/ikolito/flask-yahoomarket -Entry file: None -Scanned: 2016-10-26 00:02:38.469506 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ikolito/flask-yahoomarket. - -kunalj101/flask-blog -https://github.com/kunalj101/flask-blog -Entry file: None -Scanned: 2016-10-26 00:02:38.997597 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -RiverAge/flask-mongodb -https://github.com/RiverAge/flask-mongodb -Entry file: flask-mongodb/app/__init__.py -Scanned: 2016-10-26 00:02:41.311489 -No vulnerabilities found. - - -natedoyle/flask-cyoa -https://github.com/natedoyle/flask-cyoa -Entry file: flask-cyoa/src/app.py -Scanned: 2016-10-26 00:02:42.605850 -No vulnerabilities found. - - -ShakedFadi/flask_blog -https://github.com/ShakedFadi/flask_blog -Entry file: None -Scanned: 2016-10-26 00:02:43.127476 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -makensy/flask_alchemy -https://github.com/makensy/flask_alchemy -Entry file: flask_alchemy/app/__init__.py -Scanned: 2016-10-26 00:02:44.424792 -No vulnerabilities found. - - -28sui/dao-flask -https://github.com/28sui/dao-flask -Entry file: dao-flask/app.py -Scanned: 2016-10-26 00:02:48.739736 -No vulnerabilities found. - - -quvide/docker-flask -https://github.com/quvide/docker-flask -Entry file: docker-flask/flask/app/main.py -Scanned: 2016-10-26 00:02:50.245853 -No vulnerabilities found. - - -carlsagan21/flask-crawler -https://github.com/carlsagan21/flask-crawler -Entry file: flask-crawler/flask-crawler.py -Scanned: 2016-10-26 00:02:51.541421 -No vulnerabilities found. - - -Ouro130Ros/LearningFlask -https://github.com/Ouro130Ros/LearningFlask -Entry file: LearningFlask/1-HelloWorld/helloWorld.py -Scanned: 2016-10-26 00:02:52.823103 -No vulnerabilities found. - - -mandshaw/flask_microbrewery -https://github.com/mandshaw/flask_microbrewery -Entry file: flask_microbrewery/flask_microbrewery/run.py -Scanned: 2016-10-26 00:02:55.246671 -No vulnerabilities found. - - -kindoprec/flask-boot -https://github.com/kindoprec/flask-boot -Entry file: flask-boot/app.py -Scanned: 2016-10-26 00:02:56.553486 -Vulnerability 1: -File: flask-boot/app.py - > User input at line 15, trigger word "get(": - out = 'Hello ' + request.args.get('name', '') -File: flask-boot/app.py - > reaches line 16, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(output=out) - - - -liuyun90/learn_flask -https://github.com/liuyun90/learn_flask -Entry file: learn_flask/app/__init__.py -Scanned: 2016-10-26 00:02:58.058311 -Vulnerability 1: -File: learn_flask/app/api_1_0/posts.py - > User input at line 12, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/posts.py - > Line 13: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: learn_flask/app/api_1_0/posts.py - > Line 15: prev = None - File: learn_flask/app/api_1_0/posts.py - > Line 18: next = None -File: learn_flask/app/api_1_0/posts.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: learn_flask/app/api_1_0/posts.py - > User input at line 12, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/posts.py - > Line 13: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: learn_flask/app/api_1_0/posts.py - > Line 15: prev = None - File: learn_flask/app/api_1_0/posts.py - > Line 18: next = None -File: learn_flask/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: learn_flask/app/api_1_0/posts.py - > User input at line 12, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/posts.py - > Line 13: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: learn_flask/app/api_1_0/posts.py - > Line 15: prev = None - File: learn_flask/app/api_1_0/posts.py - > Line 18: next = None -File: learn_flask/app/api_1_0/posts.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: learn_flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: learn_flask/app/api_1_0/users.py - > Line 20: prev = None - File: learn_flask/app/api_1_0/users.py - > Line 23: next = None -File: learn_flask/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',id=id, page=page - 1, _external=True) - -Vulnerability 5: -File: learn_flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: learn_flask/app/api_1_0/users.py - > Line 20: prev = None - File: learn_flask/app/api_1_0/users.py - > Line 23: next = None -File: learn_flask/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',id=id, page=page + 1, _external=True) - -Vulnerability 6: -File: learn_flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: learn_flask/app/api_1_0/users.py - > Line 20: prev = None - File: learn_flask/app/api_1_0/users.py - > Line 23: next = None -File: learn_flask/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: learn_flask/app/api_1_0/users.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/users.py - > Line 39: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: learn_flask/app/api_1_0/users.py - > Line 42: prev = None - File: learn_flask/app/api_1_0/users.py - > Line 45: next = None -File: learn_flask/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_user_followed_posts',id=user.id, page=page - 1, _external=True) - -Vulnerability 8: -File: learn_flask/app/api_1_0/users.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/users.py - > Line 39: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: learn_flask/app/api_1_0/users.py - > Line 42: prev = None - File: learn_flask/app/api_1_0/users.py - > Line 45: next = None -File: learn_flask/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_user_followed_posts',id=user.id, page=page + 1, _external=True) - -Vulnerability 9: -File: learn_flask/app/api_1_0/users.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/users.py - > Line 39: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: learn_flask/app/api_1_0/users.py - > Line 42: prev = None - File: learn_flask/app/api_1_0/users.py - > Line 45: next = None -File: learn_flask/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: learn_flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/comments.py - > Line 13: comments = pagination.items - File: learn_flask/app/api_1_0/comments.py - > Line 14: prev = None - File: learn_flask/app/api_1_0/comments.py - > Line 17: next = None -File: learn_flask/app/api_1_0/comments.py - > reaches line 16, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: learn_flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/comments.py - > Line 13: comments = pagination.items - File: learn_flask/app/api_1_0/comments.py - > Line 14: prev = None - File: learn_flask/app/api_1_0/comments.py - > Line 17: next = None -File: learn_flask/app/api_1_0/comments.py - > reaches line 19, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: learn_flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/comments.py - > Line 13: comments = pagination.items - File: learn_flask/app/api_1_0/comments.py - > Line 14: prev = None - File: learn_flask/app/api_1_0/comments.py - > Line 17: next = None -File: learn_flask/app/api_1_0/comments.py - > reaches line 20, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: learn_flask/app/api_1_0/comments.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/comments.py - > Line 38: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/comments.py - > Line 40: comments = pagination.items - File: learn_flask/app/api_1_0/comments.py - > Line 41: prev = None - File: learn_flask/app/api_1_0/comments.py - > Line 44: next = None -File: learn_flask/app/api_1_0/comments.py - > reaches line 43, trigger word "url_for(": - prev = url_for('api.get_post_comments',id=post.id, page=page - 1, _external=True) - -Vulnerability 14: -File: learn_flask/app/api_1_0/comments.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/comments.py - > Line 38: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/comments.py - > Line 40: comments = pagination.items - File: learn_flask/app/api_1_0/comments.py - > Line 41: prev = None - File: learn_flask/app/api_1_0/comments.py - > Line 44: next = None -File: learn_flask/app/api_1_0/comments.py - > reaches line 46, trigger word "url_for(": - next = url_for('api.get_post_comments',id=post.id, page=page + 1, _external=True) - -Vulnerability 15: -File: learn_flask/app/api_1_0/comments.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/api_1_0/comments.py - > Line 38: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: learn_flask/app/api_1_0/comments.py - > Line 40: comments = pagination.items - File: learn_flask/app/api_1_0/comments.py - > Line 41: prev = None - File: learn_flask/app/api_1_0/comments.py - > Line 44: next = None -File: learn_flask/app/api_1_0/comments.py - > reaches line 47, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('comments''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: learn_flask/app/main/views.py - > User input at line 20, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: learn_flask/app/main/views.py - > Line 18: show_followed = False - File: learn_flask/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: learn_flask/app/main/views.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed) - -Vulnerability 17: -File: learn_flask/app/main/views.py - > User input at line 25, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/main/views.py - > Line 26: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/main/views.py - > Line 28: posts = pagination.items - File: learn_flask/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: learn_flask/app/main/views.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed) - -Vulnerability 18: -File: learn_flask/app/main/views.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/main/views.py - > Line 38: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: learn_flask/app/main/views.py - > Line 40: posts = pagination.items -File: learn_flask/app/main/views.py - > reaches line 41, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: learn_flask/app/main/views.py - > User input at line 98, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/main/views.py - > Line 100: page = int(post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1) - File: learn_flask/app/main/views.py - > Line 101: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: learn_flask/app/main/views.py - > Line 104: comments = pagination.items - File: learn_flask/app/main/views.py - > Line 97: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: learn_flask/app/main/views.py - > reaches line 105, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: learn_flask/app/main/views.py - > User input at line 162, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/main/views.py - > Line 163: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: learn_flask/app/main/views.py - > Line 165: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: learn_flask/app/main/views.py - > Line 161: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: learn_flask/app/main/views.py - > reaches line 166, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of ', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: learn_flask/app/main/views.py - > User input at line 176, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/main/views.py - > Line 177: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: learn_flask/app/main/views.py - > Line 179: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: learn_flask/app/main/views.py - > Line 175: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: learn_flask/app/main/views.py - > reaches line 180, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by ', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: learn_flask/app/main/views.py - > User input at line 204, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: learn_flask/app/main/views.py - > Line 205: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: learn_flask/app/main/views.py - > Line 208: comments = pagination.items -File: learn_flask/app/main/views.py - > reaches line 209, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -richardqlin/flask_app -https://github.com/richardqlin/flask_app -Entry file: None -Scanned: 2016-10-26 00:02:58.600864 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -blarneyosullivan/flask_blog -https://github.com/blarneyosullivan/flask_blog -Entry file: None -Scanned: 2016-10-26 00:02:59.134074 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -MUICProgrammingClub/flask-tutorial -https://github.com/MUICProgrammingClub/flask-tutorial -Entry file: None -Scanned: 2016-10-26 00:03:00.651008 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/MUICProgrammingClub/flask-tutorial. - -AuthentiqID/examples-flask -https://github.com/AuthentiqID/examples-flask -Entry file: examples-flask/example_basic.py -Scanned: 2016-10-26 00:03:04.127335 -Vulnerability 1: -File: examples-flask/example_basic.py - > User input at line 135, trigger word "get(": - userinfo = authentiq.get(USERINFO_URL).json() -File: examples-flask/example_basic.py - > reaches line 149, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(userinfo) - -Vulnerability 2: -File: examples-flask/test_example_basic.py - > User input at line 71, trigger word "get(": - res = test_app.get(url_for('index')) -Reassigned in: - File: examples-flask/test_example_basic.py - > Line 76: res = requests.get(url,allow_redirects=1) -File: examples-flask/test_example_basic.py - > reaches line 71, trigger word "url_for(": - res = test_app.get(url_for('index')) - -Vulnerability 3: -File: examples-flask/test_example_basic.py - > User input at line 75, trigger word "get(": - url = res.headers.get('Location') -Reassigned in: - File: examples-flask/test_example_basic.py - > Line 76: res = requests.get(url,allow_redirects=1) -File: examples-flask/test_example_basic.py - > reaches line 71, trigger word "url_for(": - res = test_app.get(url_for('index')) - -Vulnerability 4: -File: examples-flask/test_example_basic.py - > User input at line 76, trigger word "get(": - res = requests.get(url,allow_redirects=1) -File: examples-flask/test_example_basic.py - > reaches line 71, trigger word "url_for(": - res = test_app.get(url_for('index')) - -Vulnerability 5: -File: examples-flask/example_2fa.py - > User input at line 159, trigger word "get(": - userinfo = authentiq.get(USERINFO_URL).json() -File: examples-flask/example_2fa.py - > reaches line 173, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(userinfo) - - - -rpalo/flask-headlines -https://github.com/rpalo/flask-headlines -Entry file: flask-headlines/headlines.py -Scanned: 2016-10-26 00:03:07.440340 -No vulnerabilities found. - - -stanliski/flask_dev -https://github.com/stanliski/flask_dev -Entry file: None -Scanned: 2016-10-26 00:03:08.002870 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -s4ayub/FirstFlask -https://github.com/s4ayub/FirstFlask -Entry file: FirstFlask/app.py -Scanned: 2016-10-26 00:03:12.656815 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -emilydowgialo/skills-flask -https://github.com/emilydowgialo/skills-flask -Entry file: skills-flask/application.py -Scanned: 2016-10-26 00:03:15.395671 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: skills-flask/env/lib/python2.7/sre_compile.py - -condemnedbachelor/flask-skills -https://github.com/condemnedbachelor/flask-skills -Entry file: flask-skills/application.py -Scanned: 2016-10-26 00:03:19.121224 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'ingoing' - -jimlambrt-roadscholar/udemy-flask -https://github.com/jimlambrt-roadscholar/udemy-flask -Entry file: udemy-flask/hello.py -Scanned: 2016-10-26 00:03:20.464275 -No vulnerabilities found. - - -CharAct3/flask_test -https://github.com/CharAct3/flask_test -Entry file: None -Scanned: 2016-10-26 00:03:20.999941 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -jlberzal/Flask-User -https://github.com/jlberzal/Flask-User -Entry file: Flask-User/flask_user/tests/tst_app.py -Scanned: 2016-10-26 00:03:23.913987 -Vulnerability 1: -File: Flask-User/flask_user/tests/tst_app.py - > User input at line 119, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserInvitationClass=UserInvitation) -Reassigned in: - File: Flask-User/flask_user/tests/tst_app.py - > Line 120: user_manager = UserManager(db_adapter, app) -File: Flask-User/flask_user/tests/tst_app.py - > reaches line 123, trigger word "filter(": - if not User.query.filter(User.username == 'member').first(): - -Vulnerability 2: -File: Flask-User/flask_user/tests/tst_app.py - > User input at line 119, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserInvitationClass=UserInvitation) -Reassigned in: - File: Flask-User/flask_user/tests/tst_app.py - > Line 120: user_manager = UserManager(db_adapter, app) -File: Flask-User/flask_user/tests/tst_app.py - > reaches line 130, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 3: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 59, trigger word "url_for(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) - -Vulnerability 4: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 59, trigger word "url_for(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) - -Vulnerability 5: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 71, trigger word "url_for(": - response = client.get_valid_page(url_for('user.manage_emails')) - -Vulnerability 6: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 71, trigger word "url_for(": - response = client.get_valid_page(url_for('user.manage_emails')) - -Vulnerability 7: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 75, trigger word "url_for(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) - -Vulnerability 8: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 75, trigger word "url_for(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) - -Vulnerability 9: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 98, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/confirm')) - -Vulnerability 10: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 98, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/confirm')) - -Vulnerability 11: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 101, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/make-primary')) - -Vulnerability 12: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 101, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/make-primary')) - -Vulnerability 13: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 104, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email1.id, action='https://github.com/delete')) - -Vulnerability 14: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 104, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email1.id, action='https://github.com/delete')) - - - -kstripp/flask-crud -https://github.com/kstripp/flask-crud -Entry file: flask-crud/app/__init__.py -Scanned: 2016-10-26 00:03:28.356051 -Vulnerability 1: -File: flask-crud/app/views.py - > User input at line 25, trigger word "get(": - post = models.Post.query.get(id) -File: flask-crud/app/views.py - > reaches line 28, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('show.html',post=post) - - - -iceihehe/flask-test -https://github.com/iceihehe/flask-test -Entry file: None -Scanned: 2016-10-26 00:03:28.880519 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/iceihehe/flask-test. - -gonza-peralta/flask-celery -https://github.com/gonza-peralta/flask-celery -Entry file: flask-celery/app/factory.py -Scanned: 2016-10-26 00:03:35.330716 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -girishramnani/flask-facebookbot -https://github.com/girishramnani/flask-facebookbot -Entry file: flask-facebookbot/app.py -Scanned: 2016-10-26 00:03:36.670935 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Master-Yan/flask_template -https://github.com/Master-Yan/flask_template -Entry file: flask_template/app/__init__.py -Scanned: 2016-10-26 00:03:38.326550 -No vulnerabilities found. - - -zjqzero/flask_migrate -https://github.com/zjqzero/flask_migrate -Entry file: flask_migrate/add_index/test.py -Scanned: 2016-10-26 00:03:39.758977 -No vulnerabilities found. - - -nanoha25/flask_local -https://github.com/nanoha25/flask_local -Entry file: flask_local/setup.py -Scanned: 2016-10-26 00:03:43.770472 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Wynndow/flask_skeleton -https://github.com/Wynndow/flask_skeleton -Entry file: None -Scanned: 2016-10-26 00:03:44.295301 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Wynndow/flask_skeleton. - -chiubaca/flask-app -https://github.com/chiubaca/flask-app -Entry file: flask-app/app.py -Scanned: 2016-10-26 00:03:48.551668 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -bdhammel/asteroid-flask -https://github.com/bdhammel/asteroid-flask -Entry file: asteroid-flask/game.py -Scanned: 2016-10-26 00:03:57.300410 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -FizLBQ/Flask_fiz -https://github.com/FizLBQ/Flask_fiz -Entry file: Flask_fiz/demo.py -Scanned: 2016-10-26 00:03:58.635997 -No vulnerabilities found. - - -rpalo/flask-firstapp -https://github.com/rpalo/flask-firstapp -Entry file: flask-firstapp/hello.py -Scanned: 2016-10-26 00:03:59.914069 -No vulnerabilities found. - - -rpalo/flask-crimemap -https://github.com/rpalo/flask-crimemap -Entry file: flask-crimemap/crimemap.py -Scanned: 2016-10-26 00:04:01.456921 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -singleyoungtao/myblog-flask -https://github.com/singleyoungtao/myblog-flask -Entry file: myblog-flask/app/__init__.py -Scanned: 2016-10-26 00:04:03.394910 -Vulnerability 1: -File: myblog-flask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: myblog-flask/app/api_1_0/posts.py - > Line 16: prev = None - File: myblog-flask/app/api_1_0/posts.py - > Line 19: next = None -File: myblog-flask/app/api_1_0/posts.py - > reaches line 18, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: myblog-flask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: myblog-flask/app/api_1_0/posts.py - > Line 16: prev = None - File: myblog-flask/app/api_1_0/posts.py - > Line 19: next = None -File: myblog-flask/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: myblog-flask/app/api_1_0/posts.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/posts.py - > Line 12: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/posts.py - > Line 15: posts = pagination.items - File: myblog-flask/app/api_1_0/posts.py - > Line 16: prev = None - File: myblog-flask/app/api_1_0/posts.py - > Line 19: next = None -File: myblog-flask/app/api_1_0/posts.py - > reaches line 22, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 4: -File: myblog-flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 20: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 23: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 5: -File: myblog-flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 20: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 23: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 6: -File: myblog-flask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 20: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 23: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 7: -File: myblog-flask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 42: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 45: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 44, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: myblog-flask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 42: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 45: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 47, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: myblog-flask/app/api_1_0/users.py - > User input at line 37, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/users.py - > Line 38: pagination = user.followed_posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/users.py - > Line 41: posts = pagination.items - File: myblog-flask/app/api_1_0/users.py - > Line 42: prev = None - File: myblog-flask/app/api_1_0/users.py - > Line 45: next = None -File: myblog-flask/app/api_1_0/users.py - > reaches line 48, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 10: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 15: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 18: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 11: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 15: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 18: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 12: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 15: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 18: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 13: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 43: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 46: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 45, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 14: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 43: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 46: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 48, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 15: -File: myblog-flask/app/api_1_0/comments.py - > User input at line 38, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/api_1_0/comments.py - > Line 39: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/api_1_0/comments.py - > Line 42: comments = pagination.items - File: myblog-flask/app/api_1_0/comments.py - > Line 43: prev = None - File: myblog-flask/app/api_1_0/comments.py - > Line 46: next = None -File: myblog-flask/app/api_1_0/comments.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 16: -File: myblog-flask/app/main/views.py - > User input at line 47, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 55: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 58: posts = pagination.items - File: myblog-flask/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: myblog-flask/app/main/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 17: -File: myblog-flask/app/main/views.py - > User input at line 50, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 48: show_followed = False - File: myblog-flask/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: myblog-flask/app/main/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 18: -File: myblog-flask/app/main/views.py - > User input at line 66, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 67: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 70: posts = pagination.items -File: myblog-flask/app/main/views.py - > reaches line 71, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 19: -File: myblog-flask/app/main/views.py - > User input at line 133, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 135: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: myblog-flask/app/main/views.py - > Line 137: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 140: comments = pagination.items - File: myblog-flask/app/main/views.py - > Line 132: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: myblog-flask/app/main/views.py - > reaches line 141, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 20: -File: myblog-flask/app/main/views.py - > User input at line 201, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 202: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 205: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: myblog-flask/app/main/views.py - > Line 200: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: myblog-flask/app/main/views.py - > reaches line 207, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 21: -File: myblog-flask/app/main/views.py - > User input at line 218, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 219: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 222: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: myblog-flask/app/main/views.py - > Line 217: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: myblog-flask/app/main/views.py - > reaches line 224, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 22: -File: myblog-flask/app/main/views.py - > User input at line 249, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: myblog-flask/app/main/views.py - > Line 250: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: myblog-flask/app/main/views.py - > Line 253: comments = pagination.items -File: myblog-flask/app/main/views.py - > reaches line 254, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -rpalo/flask-waitercaller -https://github.com/rpalo/flask-waitercaller -Entry file: flask-waitercaller/waitercaller.py -Scanned: 2016-10-26 00:04:04.710233 -No vulnerabilities found. - - -NJUPole/Flask_tickets -https://github.com/NJUPole/Flask_tickets -Entry file: Flask_tickets/tickets.py -Scanned: 2016-10-26 00:04:06.671048 -Vulnerability 1: -File: Flask_tickets/tickets.py - > User input at line 62, trigger word "get(": - movieDate = request.args.get('date') -Reassigned in: - File: Flask_tickets/tickets.py - > Line 74: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 75: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 78: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 79: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 81: resultNum = len(results) - File: Flask_tickets/tickets.py - > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1 - File: Flask_tickets/tickets.py - > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price) - File: Flask_tickets/tickets.py - > Line 65: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 66: dateList = list(set(map(x.date, results))) - File: Flask_tickets/tickets.py - > Line 71: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 72: dateList = list(set(map(x.date, results))) -File: Flask_tickets/tickets.py - > reaches line 70, trigger word "filter(": - queryRes = queryRes.filter(data.cinemaName.like('%{}%'.format(searchWords))) - -Vulnerability 2: -File: Flask_tickets/tickets.py - > User input at line 63, trigger word "get(": - searchWords = request.args.get('search') -Reassigned in: - File: Flask_tickets/tickets.py - > Line 71: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 72: dateList = list(set(map(x.date, results))) - File: Flask_tickets/tickets.py - > Line 74: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 75: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 78: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 79: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 81: resultNum = len(results) - File: Flask_tickets/tickets.py - > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1 - File: Flask_tickets/tickets.py - > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price) - File: Flask_tickets/tickets.py - > Line 65: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 66: dateList = list(set(map(x.date, results))) -File: Flask_tickets/tickets.py - > reaches line 70, trigger word "filter(": - queryRes = queryRes.filter(data.cinemaName.like('%{}%'.format(searchWords))) - -Vulnerability 3: -File: Flask_tickets/tickets.py - > User input at line 61, trigger word "get(": - page = request.args.get('page') -Reassigned in: - File: Flask_tickets/tickets.py - > Line 68: page = pageint(page) - 10 -File: Flask_tickets/tickets.py - > reaches line 83, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords) - -Vulnerability 4: -File: Flask_tickets/tickets.py - > User input at line 62, trigger word "get(": - movieDate = request.args.get('date') -Reassigned in: - File: Flask_tickets/tickets.py - > Line 74: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 75: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 78: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 79: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 81: resultNum = len(results) - File: Flask_tickets/tickets.py - > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1 - File: Flask_tickets/tickets.py - > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price) - File: Flask_tickets/tickets.py - > Line 65: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 66: dateList = list(set(map(x.date, results))) - File: Flask_tickets/tickets.py - > Line 71: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 72: dateList = list(set(map(x.date, results))) -File: Flask_tickets/tickets.py - > reaches line 83, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords) - -Vulnerability 5: -File: Flask_tickets/tickets.py - > User input at line 63, trigger word "get(": - searchWords = request.args.get('search') -Reassigned in: - File: Flask_tickets/tickets.py - > Line 71: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 72: dateList = list(set(map(x.date, results))) - File: Flask_tickets/tickets.py - > Line 74: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 75: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 78: queryRes = queryRes.filter_by(date=movieDate) - File: Flask_tickets/tickets.py - > Line 79: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 81: resultNum = len(results) - File: Flask_tickets/tickets.py - > Line 82: pageNum = resultNum % 20 == 0int(resultNum / 20)int(resultNum / 20) + 1 - File: Flask_tickets/tickets.py - > Line 64: queryRes = data.query.filter_by(movieName=movieName).order_by(data.price) - File: Flask_tickets/tickets.py - > Line 65: results = queryRes[] - File: Flask_tickets/tickets.py - > Line 66: dateList = list(set(map(x.date, results))) -File: Flask_tickets/tickets.py - > reaches line 83, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('showtimeTable.html',results=results[20 * page20 * page + 1], page=page, pageNum=pageNum, movieList=movieList, dateList=dateList, movieDate=movieDate, searchWords=searchWords) - - - -Mingz2013/demo.flasky -https://github.com/Mingz2013/demo.flasky -Entry file: None -Scanned: 2016-10-26 00:04:08.087680 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Mingz2013/demo.flasky. - -LaundryOrder/Backend -https://github.com/LaundryOrder/Backend -Entry file: Backend/app.py -Scanned: 2016-10-26 00:04:09.540130 -No vulnerabilities found. - - -tageee/Blog -https://github.com/tageee/Blog -Entry file: Blog/app/__init__.py -Scanned: 2016-10-26 00:04:11.804298 -Vulnerability 1: -File: Blog/app/main/views.py - > User input at line 21, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 30: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 33: posts = pagination.items - File: Blog/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: Blog/app/main/views.py - > User input at line 25, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: Blog/app/main/views.py - > Line 23: show_followed = False - File: Blog/app/main/views.py - > Line 20: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: Blog/app/main/views.py - > User input at line 59, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 60: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 63: posts = pagination.items -File: Blog/app/main/views.py - > reaches line 64, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: Blog/app/main/views.py - > User input at line 122, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 124: page = post.comments.count() - 1 // current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: Blog/app/main/views.py - > Line 126: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 129: comments = pagination.items - File: Blog/app/main/views.py - > Line 121: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: Blog/app/main/views.py - > reaches line 130, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: Blog/app/main/views.py - > User input at line 189, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 190: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 193: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: Blog/app/main/views.py - > Line 188: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 195, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: Blog/app/main/views.py - > User input at line 206, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 207: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 210: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: Blog/app/main/views.py - > Line 205: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Blog/app/main/views.py - > reaches line 212, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - -Vulnerability 7: -File: Blog/app/main/views.py - > User input at line 221, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Blog/app/main/views.py - > Line 222: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: Blog/app/main/views.py - > Line 225: comments = pagination.items -File: Blog/app/main/views.py - > reaches line 226, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -ahumeijun/RestfulTest -https://github.com/ahumeijun/RestfulTest -Entry file: RestfulTest/app/__init__.py -Scanned: 2016-10-26 00:04:13.606577 -No vulnerabilities found. - - -jlberzal/my_app -https://github.com/jlberzal/my_app -Entry file: my_app/app/__init__.py -Scanned: 2016-10-26 00:04:15.175230 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zzq2015/myFirstWeb -https://github.com/zzq2015/myFirstWeb -Entry file: None -Scanned: 2016-10-26 00:04:20.695862 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -thomasroulin/SpreadPoll -https://github.com/thomasroulin/SpreadPoll -Entry file: SpreadPoll/SpreadPoll.py -Scanned: 2016-10-26 00:04:22.027926 -No vulnerabilities found. - - -vincentdnl/flask-facebook-messenger-bot-boilerplate -https://github.com/vincentdnl/flask-facebook-messenger-bot-boilerplate -Entry file: flask-facebook-messenger-bot-boilerplate/app.py -Scanned: 2016-10-26 00:04:23.328485 -No vulnerabilities found. - - -vishwanath79/FlaskRestAPI -https://github.com/vishwanath79/FlaskRestAPI -Entry file: FlaskRestAPI/rest.py -Scanned: 2016-10-26 00:04:24.649867 -Vulnerability 1: -File: FlaskRestAPI/rest.py - > User input at line 41, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: FlaskRestAPI/rest.py - > reaches line 49, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -GrantJamesPowell/FlaskRaffleApp -https://github.com/GrantJamesPowell/FlaskRaffleApp -Entry file: FlaskRaffleApp/raffleapp.py -Scanned: 2016-10-26 00:04:26.184511 -No vulnerabilities found. - - -catmin/flask49erStore -https://github.com/catmin/flask49erStore -Entry file: flask49erStore/flask49erStore.py -Scanned: 2016-10-26 00:04:29.014960 -Vulnerability 1: -File: flask49erStore/flask49erStore.py - > User input at line 253, trigger word "get(": - offer = Offer.query.get(id) -Reassigned in: - File: flask49erStore/flask49erStore.py - > Line 254: hulls = Hull.query.filter_by(offer_id=offer.id) - File: flask49erStore/flask49erStore.py - > Line 255: masts = Mast.query.filter_by(offer_id=offer.id) - File: flask49erStore/flask49erStore.py - > Line 256: sails = Sail.query.filter_by(offer_id=offer.id) -File: flask49erStore/flask49erStore.py - > reaches line 261, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('offer_details.html',offer=offer, sails=sails, hulls=hulls, masts=masts) - - - -leavyli/flaskWebDevelopment -https://github.com/leavyli/flaskWebDevelopment -Entry file: flaskWebDevelopment/hello/hello.py -Scanned: 2016-10-26 00:04:30.322748 -No vulnerabilities found. - - -thedod/boilerplate-peewee-flask -https://github.com/thedod/boilerplate-peewee-flask -Entry file: None -Scanned: 2016-10-26 00:04:35.882961 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/thedod/boilerplate-peewee-flask. - -shn7798/FlaskZhihu -https://github.com/shn7798/FlaskZhihu -Entry file: FlaskZhihu/tests/test_orm.py -Scanned: 2016-10-26 00:04:39.028828 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -syntaxSizer/flask -https://github.com/syntaxSizer/flask -Entry file: None -Scanned: 2016-10-26 00:04:39.596681 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gabrielecker/Flask -https://github.com/gabrielecker/Flask -Entry file: None -Scanned: 2016-10-26 00:04:41.108810 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Dianalim209/flask -https://github.com/Dianalim209/flask -Entry file: None -Scanned: 2016-10-26 00:04:41.683585 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -luojiyin1987/flask -https://github.com/luojiyin1987/flask -Entry file: None -Scanned: 2016-10-26 00:04:45.228063 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chrislinan/flask -https://github.com/chrislinan/flask -Entry file: None -Scanned: 2016-10-26 00:04:45.743435 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -lagougou/flask -https://github.com/lagougou/flask -Entry file: None -Scanned: 2016-10-26 00:04:49.250078 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tkirkland/Flask -https://github.com/tkirkland/Flask -Entry file: None -Scanned: 2016-10-26 00:04:58.791634 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ooohiroyukiooo/flask -https://github.com/ooohiroyukiooo/flask -Entry file: None -Scanned: 2016-10-26 00:04:59.300265 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -RoseOu/Flask-learning -https://github.com/RoseOu/Flask-learning -Entry file: None -Scanned: 2016-10-26 00:05:00.841186 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yassipo/webservice -https://github.com/yassipo/webservice -Entry file: webservice/app.py -Scanned: 2016-10-26 00:05:05.853225 -No vulnerabilities found. - - -amey-sam/Flask-MailGun -https://github.com/amey-sam/Flask-MailGun -Entry file: None -Scanned: 2016-10-26 00:05:06.368888 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/amey-sam/Flask-MailGun. - -efrainmunoz/flasktaskr -https://github.com/efrainmunoz/flasktaskr -Entry file: None -Scanned: 2016-10-26 00:05:06.883108 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -HansKramer/flaskr -https://github.com/HansKramer/flaskr -Entry file: None -Scanned: 2016-10-26 00:05:07.398492 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/HansKramer/flaskr. - -shorian/flaskr -https://github.com/shorian/flaskr -Entry file: None -Scanned: 2016-10-26 00:05:08.916893 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shorian/flaskr. - -mmoran0032/flaskwork -https://github.com/mmoran0032/flaskwork -Entry file: flaskwork/hello.py -Scanned: 2016-10-26 00:05:11.492943 -No vulnerabilities found. - - -Maxwell-Ying/flaskbook -https://github.com/Maxwell-Ying/flaskbook -Entry file: flaskbook/app/__init__.py -Scanned: 2016-10-26 00:05:13.962236 -Vulnerability 1: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 2: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 3: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 4: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 5: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 6: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 7: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 84, trigger word "filter(": - results = results.filter(books.name.like('%' + form.name.data + '%')) - -Vulnerability 8: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 9: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 10: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 11: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 12: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 13: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 14: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 86, trigger word "filter(": - results = results.filter(books.author.like('%' + form.author.data + '%')) - -Vulnerability 15: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 16: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 17: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 18: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 19: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 20: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 21: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 88, trigger word "filter(": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) - -Vulnerability 22: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 23: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 24: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 25: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 26: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 27: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 28: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 90, trigger word "filter(": - results = results.filter(books.public.like('%' + form.public.data + '%')) - -Vulnerability 29: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 30: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 31: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 32: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 33: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 34: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 35: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 92, trigger word "filter(": - results = results.filter(books.home.like('%' + form.home.data + '%')) - -Vulnerability 36: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 37: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 38: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 39: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 40: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 41: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 42: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 94, trigger word "filter(": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) - -Vulnerability 43: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 44: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 45: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 46: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 47: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 48: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 49: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 97, trigger word "filter(": - results = results.filter(books.name == form.name.data) - -Vulnerability 50: -File: flaskbook/app/views.py - > User input at line 84, trigger word ".data": - results = results.filter(books.name.like('%' + form.name.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 51: -File: flaskbook/app/views.py - > User input at line 86, trigger word ".data": - results = results.filter(books.author.like('%' + form.author.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 52: -File: flaskbook/app/views.py - > User input at line 88, trigger word ".data": - results = results.filter(books.age < form.age.data + 10, books.age > form.age.data - 10) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 53: -File: flaskbook/app/views.py - > User input at line 90, trigger word ".data": - results = results.filter(books.public.like('%' + form.public.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 54: -File: flaskbook/app/views.py - > User input at line 92, trigger word ".data": - results = results.filter(books.home.like('%' + form.home.data + '%')) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 55: -File: flaskbook/app/views.py - > User input at line 94, trigger word ".data": - results = results.filter(books.pages < form.pages.data + 20, books.pages > form.pages.data - 20) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - -Vulnerability 56: -File: flaskbook/app/views.py - > User input at line 97, trigger word ".data": - results = results.filter(books.name == form.name.data) -Reassigned in: - File: flaskbook/app/views.py - > Line 81: results = books.query -File: flaskbook/app/views.py - > reaches line 108, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('result.html',title='search', results=results.all()) - - - -yoophi/flaskygram -https://github.com/yoophi/flaskygram -Entry file: None -Scanned: 2016-10-26 00:05:16.486849 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/yoophi/flaskygram. - -Ifresher/Flaskr -https://github.com/Ifresher/Flaskr -Entry file: None -Scanned: 2016-10-26 00:05:22.007264 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hongmaoxiao/flasky -https://github.com/hongmaoxiao/flasky -Entry file: None -Scanned: 2016-10-26 00:05:23.519621 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ojgoyal/flaskr -https://github.com/ojgoyal/flaskr -Entry file: None -Scanned: 2016-10-26 00:05:24.029489 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ojgoyal/flaskr. - -hoorn91/flaskproject -https://github.com/hoorn91/flaskproject -Entry file: flaskproject/app/hello.py -Scanned: 2016-10-26 00:05:26.476151 -Vulnerability 1: -File: flaskproject/app/hello.py - > User input at line 70, trigger word "get(": - task = 'id''title''description''done'tasks[-1]['id'] + 1request.json['title']request.json.get('description', '')False -File: flaskproject/app/hello.py - > reaches line 77, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = (jsonify('task'task), 201) - - - -jiuhuandao/Flaskr -https://github.com/jiuhuandao/Flaskr -Entry file: None -Scanned: 2016-10-26 00:05:27.017705 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ansel333/flaskr -https://github.com/ansel333/flaskr -Entry file: None -Scanned: 2016-10-26 00:05:28.562201 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ansel333/flaskr. - -richardqlin/flaskralchemy -https://github.com/richardqlin/flaskralchemy -Entry file: None -Scanned: 2016-10-26 00:05:35.600190 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flaskralchemy. - -shen5630/FlaskProject -https://github.com/shen5630/FlaskProject -Entry file: FlaskProject/myRestful/healthcareApi.py -Scanned: 2016-10-26 00:05:37.990174 -No vulnerabilities found. - - -viprs/FlaskyBlog -https://github.com/viprs/FlaskyBlog -Entry file: FlaskyBlog/app/__init__.py -Scanned: 2016-10-26 00:05:39.842410 -Vulnerability 1: -File: FlaskyBlog/app/api_1_0/posts.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/posts.py - > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/posts.py - > Line 18: posts = pagination.items - File: FlaskyBlog/app/api_1_0/posts.py - > Line 25: post_list = [post.to_json() for post in posts] - File: FlaskyBlog/app/api_1_0/posts.py - > Line 19: prev_page = None - File: FlaskyBlog/app/api_1_0/posts.py - > Line 22: next_page = None -File: FlaskyBlog/app/api_1_0/posts.py - > reaches line 21, trigger word "url_for(": - prev_page = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 2: -File: FlaskyBlog/app/api_1_0/posts.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/posts.py - > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/posts.py - > Line 18: posts = pagination.items - File: FlaskyBlog/app/api_1_0/posts.py - > Line 25: post_list = [post.to_json() for post in posts] - File: FlaskyBlog/app/api_1_0/posts.py - > Line 19: prev_page = None - File: FlaskyBlog/app/api_1_0/posts.py - > Line 22: next_page = None -File: FlaskyBlog/app/api_1_0/posts.py - > reaches line 24, trigger word "url_for(": - next_page = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 3: -File: FlaskyBlog/app/api_1_0/posts.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/posts.py - > Line 15: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/posts.py - > Line 18: posts = pagination.items - File: FlaskyBlog/app/api_1_0/posts.py - > Line 25: post_list = [post.to_json() for post in posts] - File: FlaskyBlog/app/api_1_0/posts.py - > Line 19: prev_page = None - File: FlaskyBlog/app/api_1_0/posts.py - > Line 22: next_page = None -File: FlaskyBlog/app/api_1_0/posts.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev_page''next_page''total_count''page_count'post_listprev_pagenext_pagepagination.totalpost_list.__len__()) - -Vulnerability 4: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 15: users = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 22: user_list = [user.to_json() for user in users] - File: FlaskyBlog/app/api_1_0/users.py - > Line 16: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 19: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 18, trigger word "url_for(": - prev_page = url_for('api.get_users',page=page - 1, _external=True) - -Vulnerability 5: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 15: users = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 22: user_list = [user.to_json() for user in users] - File: FlaskyBlog/app/api_1_0/users.py - > Line 16: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 19: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 21, trigger word "url_for(": - next_page = url_for('api.get_users',page=page + 1, _external=True) - -Vulnerability 6: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 11, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 12: pagination = User.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 15: users = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 22: user_list = [user.to_json() for user in users] - File: FlaskyBlog/app/api_1_0/users.py - > Line 16: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 19: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 23, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users''prev_page''next_page''total_count''page_count'user_listprev_pagenext_pagepagination.totaluser_list.__len__()) - -Vulnerability 7: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 41, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 46: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 49: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 48, trigger word "url_for(": - prev_page = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 8: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 41, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 46: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 49: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 51, trigger word "url_for(": - next_page = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 9: -File: FlaskyBlog/app/api_1_0/users.py - > User input at line 41, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/api_1_0/users.py - > Line 42: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/api_1_0/users.py - > Line 45: posts = pagination.items - File: FlaskyBlog/app/api_1_0/users.py - > Line 46: prev_page = None - File: FlaskyBlog/app/api_1_0/users.py - > Line 49: next_page = None -File: FlaskyBlog/app/api_1_0/users.py - > reaches line 52, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev_page''next_page''count'[post.to_json() for post in posts]prev_pagenext_pagepagination.total) - -Vulnerability 10: -File: FlaskyBlog/app/main/views.py - > User input at line 26, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/main/views.py - > Line 27: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/main/views.py - > Line 31: posts = pagination.items - File: FlaskyBlog/app/main/views.py - > Line 24: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskyBlog/app/main/views.py - > reaches line 32, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination) - -Vulnerability 11: -File: FlaskyBlog/app/main/views.py - > User input at line 47, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/main/views.py - > Line 50: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: FlaskyBlog/app/main/views.py - > Line 52: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/main/views.py - > Line 55: comments = pagination.items - File: FlaskyBlog/app/main/views.py - > Line 46: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: FlaskyBlog/app/main/views.py - > reaches line 56, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 12: -File: FlaskyBlog/app/main/views.py - > User input at line 170, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/main/views.py - > Line 171: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/main/views.py - > Line 175: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: FlaskyBlog/app/main/views.py - > Line 169: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskyBlog/app/main/views.py - > reaches line 177, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 13: -File: FlaskyBlog/app/main/views.py - > User input at line 187, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/main/views.py - > Line 188: pagination = user.follower.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/main/views.py - > Line 192: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: FlaskyBlog/app/main/views.py - > Line 186: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: FlaskyBlog/app/main/views.py - > reaches line 194, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 14: -File: FlaskyBlog/app/main/views.py - > User input at line 203, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: FlaskyBlog/app/main/views.py - > Line 204: pagination = Comment.query.order_by(Comment.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: FlaskyBlog/app/main/views.py - > Line 207: comments = pagination.items -File: FlaskyBlog/app/main/views.py - > reaches line 208, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('moderate.html',comments=comments, pagination=pagination, page=page) - - - -thunn/Flaskr1 -https://github.com/thunn/Flaskr1 -Entry file: Flaskr1/flaskr.py -Scanned: 2016-10-26 00:05:41.159625 -No vulnerabilities found. - - -thejojo87/FlaskBlog -https://github.com/thejojo87/FlaskBlog -Entry file: FlaskBlog/final/app/__init__.py -Scanned: 2016-10-26 00:05:43.496421 -No vulnerabilities found. - - -er3456qi/FlaskTutorial -https://github.com/er3456qi/FlaskTutorial -Entry file: FlaskTutorial/flaskr.py -Scanned: 2016-10-26 00:05:44.866023 -No vulnerabilities found. - - -PaperAndColours/flaskImage -https://github.com/PaperAndColours/flaskImage -Entry file: flaskImage/app.py -Scanned: 2016-10-26 00:05:47.621161 -No vulnerabilities found. - - -hamartia0/FlaskWeb -https://github.com/hamartia0/FlaskWeb -Entry file: FlaskWeb/web3b.py -Scanned: 2016-10-26 00:05:51.660757 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -rmGuarachi/flask2 -https://github.com/rmGuarachi/flask2 -Entry file: flask2/flask2/app/__init__.py -Scanned: 2016-10-26 00:05:53.478082 -No vulnerabilities found. - - -maheskett/flask-testing -https://github.com/maheskett/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-26 00:06:00.413746 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -kellyhiggins/Flask-testing -https://github.com/kellyhiggins/Flask-testing -Entry file: Flask-testing/party.py -Scanned: 2016-10-26 00:06:02.520113 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -laurensila/flask-testing -https://github.com/laurensila/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-26 00:06:04.309419 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sugarguo/flask-login -https://github.com/sugarguo/flask-login -Entry file: flask-login/yan.py -Scanned: 2016-10-26 00:06:11.067297 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Afghary/bloggingFlask -https://github.com/Afghary/bloggingFlask -Entry file: bloggingFlask/src/app.py -Scanned: 2016-10-26 00:06:12.505446 -No vulnerabilities found. - - -DANWINS-LLC/flask-starter -https://github.com/DANWINS-LLC/flask-starter -Entry file: None -Scanned: 2016-10-26 00:06:13.021728 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/DANWINS-LLC/flask-starter. - -coffee-world/flask_wd -https://github.com/coffee-world/flask_wd -Entry file: flask_wd/hello.py -Scanned: 2016-10-26 00:06:14.595107 -No vulnerabilities found. - - -jiang2/flask-rest -https://github.com/jiang2/flask-rest -Entry file: None -Scanned: 2016-10-26 00:06:16.387055 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jiang2/flask-rest. - -progBill/flask_blueprint -https://github.com/progBill/flask_blueprint -Entry file: flask_blueprint/__init__.py -Scanned: 2016-10-26 00:06:17.751660 -No vulnerabilities found. - - -carlsagan21/flask-crawler -https://github.com/carlsagan21/flask-crawler -Entry file: flask-crawler/flask-crawler.py -Scanned: 2016-10-26 00:06:19.031588 -No vulnerabilities found. - - -jdesilvio/flask-deploy -https://github.com/jdesilvio/flask-deploy -Entry file: None -Scanned: 2016-10-26 00:06:19.546025 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jdesilvio/flask-deploy. - -stanliski/flask-dev -https://github.com/stanliski/flask-dev -Entry file: None -Scanned: 2016-10-26 00:06:22.895051 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -paceko/testing-flask -https://github.com/paceko/testing-flask -Entry file: testing-flask/party.py -Scanned: 2016-10-26 00:06:24.788009 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -minyisme/flask-testing -https://github.com/minyisme/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-26 00:06:26.593665 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -cristinamclarkin/Flask-testing -https://github.com/cristinamclarkin/Flask-testing -Entry file: Flask-testing/party.py -Scanned: 2016-10-26 00:06:28.478066 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -kindoprec/flask-boot -https://github.com/kindoprec/flask-boot -Entry file: flask-boot/app.py -Scanned: 2016-10-26 00:06:29.805945 -Vulnerability 1: -File: flask-boot/app.py - > User input at line 15, trigger word "get(": - out = 'Hello ' + request.args.get('name', '') -File: flask-boot/app.py - > reaches line 16, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(output=out) - - - -enlacee/appFlask -https://github.com/enlacee/appFlask -Entry file: appFlask/web/hello.py -Scanned: 2016-10-26 00:06:31.105936 -No vulnerabilities found. - - -shuangfu/learnFlask -https://github.com/shuangfu/learnFlask -Entry file: None -Scanned: 2016-10-26 00:06:32.123709 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/shuangfu/learnFlask. - -andresmguk/flask-blog -https://github.com/andresmguk/flask-blog -Entry file: None -Scanned: 2016-10-26 00:06:36.157098 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -tnygren/flask-testing -https://github.com/tnygren/flask-testing -Entry file: flask-testing/megaTutorial/app/__init__.py -Scanned: 2016-10-26 00:06:38.595947 -No vulnerabilities found. - - -licsh/flask_app -https://github.com/licsh/flask_app -Entry file: None -Scanned: 2016-10-26 00:06:39.115364 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -saampandit/flask-intro -https://github.com/saampandit/flask-intro -Entry file: flask-intro/app.py -Scanned: 2016-10-26 00:06:46.113105 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-intro/venv/lib/python2.7/sre_compile.py - -jlberzal/Flask-User -https://github.com/jlberzal/Flask-User -Entry file: Flask-User/flask_user/tests/tst_app.py -Scanned: 2016-10-26 00:06:48.396747 -Vulnerability 1: -File: Flask-User/flask_user/tests/tst_app.py - > User input at line 119, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserInvitationClass=UserInvitation) -Reassigned in: - File: Flask-User/flask_user/tests/tst_app.py - > Line 120: user_manager = UserManager(db_adapter, app) -File: Flask-User/flask_user/tests/tst_app.py - > reaches line 123, trigger word "filter(": - if not User.query.filter(User.username == 'member').first(): - -Vulnerability 2: -File: Flask-User/flask_user/tests/tst_app.py - > User input at line 119, trigger word "SQLAlchemy": - db_adapter = SQLAlchemyAdapter(db, User,UserInvitationClass=UserInvitation) -Reassigned in: - File: Flask-User/flask_user/tests/tst_app.py - > Line 120: user_manager = UserManager(db_adapter, app) -File: Flask-User/flask_user/tests/tst_app.py - > reaches line 130, trigger word "filter(": - if not User.query.filter(User.username == 'user007').first(): - -Vulnerability 3: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 59, trigger word "url_for(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) - -Vulnerability 4: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 59, trigger word "url_for(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) - -Vulnerability 5: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 71, trigger word "url_for(": - response = client.get_valid_page(url_for('user.manage_emails')) - -Vulnerability 6: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 71, trigger word "url_for(": - response = client.get_valid_page(url_for('user.manage_emails')) - -Vulnerability 7: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 75, trigger word "url_for(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) - -Vulnerability 8: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 75, trigger word "url_for(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) - -Vulnerability 9: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 98, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/confirm')) - -Vulnerability 10: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 98, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/confirm')) - -Vulnerability 11: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 101, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/make-primary')) - -Vulnerability 12: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 101, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email2.id, action='https://github.com/make-primary')) - -Vulnerability 13: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 59, trigger word "form(": - response = client.post_valid_form(url_for('user.register'),email=EMAIL1, password=PASSWORD) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 104, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email1.id, action='https://github.com/delete')) - -Vulnerability 14: -File: Flask-User/flask_user/tests/test_multiple_emails.py - > User input at line 75, trigger word "form(": - response = client.post_valid_form(url_for('user.manage_emails'),email=EMAIL2) -File: Flask-User/flask_user/tests/test_multiple_emails.py - > reaches line 104, trigger word "url_for(": - response = client.get_valid_page(url_for('user.email_action',id=user_email1.id, action='https://github.com/delete')) - - - -Danielyao0312/flask-intro -https://github.com/Danielyao0312/flask-intro -Entry file: flask-intro/app.py -Scanned: 2016-10-26 00:06:50.157671 -No vulnerabilities found. - - -eduardoferrandezr/flask-bokeh -https://github.com/eduardoferrandezr/flask-bokeh -Entry file: flask-bokeh/app.py -Scanned: 2016-10-26 00:06:51.466521 -No vulnerabilities found. - - -zachwooddoughty/flask-tester -https://github.com/zachwooddoughty/flask-tester -Entry file: flask-tester/hello.py -Scanned: 2016-10-26 00:06:52.749383 -No vulnerabilities found. - - -rd82/flask-tute -https://github.com/rd82/flask-tute -Entry file: flask-tute/app/__init__.py -Scanned: 2016-10-26 00:06:54.182937 -No vulnerabilities found. - - -dencynluv/testing-flask -https://github.com/dencynluv/testing-flask -Entry file: testing-flask/party.py -Scanned: 2016-10-26 00:07:01.100973 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -efrainmunoz/flask-blog -https://github.com/efrainmunoz/flask-blog -Entry file: None -Scanned: 2016-10-26 00:07:01.633959 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -bdhammel/asteroid-flask -https://github.com/bdhammel/asteroid-flask -Entry file: asteroid-flask/game.py -Scanned: 2016-10-26 00:07:11.269929 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -dflee/testing-flask -https://github.com/dflee/testing-flask -Entry file: testing-flask/party.py -Scanned: 2016-10-26 00:07:13.191784 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Ihyatt/testing-flask -https://github.com/Ihyatt/testing-flask -Entry file: testing-flask/party.py -Scanned: 2016-10-26 00:07:14.974621 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -gyermolenko/flask-modelhistory -https://github.com/gyermolenko/flask-modelhistory -Entry file: flask-modelhistory/example/app/__init__.py -Scanned: 2016-10-26 00:07:16.377808 -No vulnerabilities found. - - -hiro93n/sample_flask -https://github.com/hiro93n/sample_flask -Entry file: sample_flask/tutorial/flaskr/__init__.py -Scanned: 2016-10-26 00:07:17.717242 -No vulnerabilities found. - - -DraZoro/flask_learning -https://github.com/DraZoro/flask_learning -Entry file: flask_learning/flaskr.py -Scanned: 2016-10-26 00:07:19.017833 -No vulnerabilities found. - - -skols/flask_blog -https://github.com/skols/flask_blog -Entry file: None -Scanned: 2016-10-26 00:07:19.534686 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -eleweek/Mastering_Flask -https://github.com/eleweek/Mastering_Flask -Entry file: Mastering_Flask/section2/app.py -Scanned: 2016-10-26 00:07:21.993239 -No vulnerabilities found. - - -Mingz2013/demo.flasky -https://github.com/Mingz2013/demo.flasky -Entry file: None -Scanned: 2016-10-26 00:07:22.547960 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ahumeijun/RestfulTest -https://github.com/ahumeijun/RestfulTest -Entry file: RestfulTest/app/__init__.py -Scanned: 2016-10-26 00:07:23.836500 -No vulnerabilities found. - - -jlberzal/my_app -https://github.com/jlberzal/my_app -Entry file: my_app/app/__init__.py -Scanned: 2016-10-26 00:07:25.409671 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Kathure/microblg -https://github.com/Kathure/microblg -Entry file: microblg/app/__init__.py -Scanned: 2016-10-26 00:07:37.485208 -No vulnerabilities found. - - -hufan-Akari/BookLibrary -https://github.com/hufan-Akari/BookLibrary -Entry file: BookLibrary/app/__init__.py -Scanned: 2016-10-26 00:07:39.818030 -Vulnerability 1: -File: BookLibrary/app/main/auth/views.py - > User input at line 14, trigger word ".data": - the_user = User.query.filter(User.email.ilike(login_form.email.data)).first() -File: BookLibrary/app/main/auth/views.py - > reaches line 14, trigger word "filter(": - the_user = User.query.filter(User.email.ilike(login_form.email.data)).first() - -Vulnerability 2: -File: BookLibrary/app/main/auth/views.py - > User input at line 14, trigger word ".data": - the_user = User.query.filter(User.email.ilike(login_form.email.data)).first() -File: BookLibrary/app/main/auth/views.py - > reaches line 17, trigger word "flash(": - flash('登录成功! 欢迎您 %s!' % the_user.name, 'success') - -Vulnerability 3: -File: BookLibrary/app/main/book/views.py - > User input at line 14, trigger word "get(": - search_word = request.args.get('search', None) -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 23: search_word = search_word.strip() - File: BookLibrary/app/main/book/views.py - > Line 28: search_form.search.data = search_word -File: BookLibrary/app/main/book/views.py - > reaches line 24, trigger word "filter(": - the_books = the_books.filter(db.or_(Book.title.ilike('%%%s%%' % search_word), Book.author.ilike('%%%s%%' % search_word), Book.isbn.ilike('%%%s%%' % search_word), Book.tags.any(Tag.name.ilike('%%%s%%' % search_word)), Book.subtitle.ilike('%%%s%%' % search_word))).outerjoin(Log).group_by(Book.id).order_by(db.func.count(Log.id).desc()) - -Vulnerability 4: -File: BookLibrary/app/main/book/views.py - > User input at line 16, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 32: pagination = the_books.paginate(page,per_page=8) - File: BookLibrary/app/main/book/views.py - > Line 33: result_books = pagination.items -File: BookLibrary/app/main/book/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book.html',books=result_books, pagination=pagination, search_form=search_form, title='书籍清单') - -Vulnerability 5: -File: BookLibrary/app/main/book/views.py - > User input at line 46, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 50: pagination = the_book.logs.filter_by(returned=show - 1).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=5) - File: BookLibrary/app/main/book/views.py - > Line 53: pagination = the_book.comments.filter_by(deleted=0).order_by(Comment.edit_timestamp.desc()).paginate(page,per_page=5) - File: BookLibrary/app/main/book/views.py - > Line 56: data = pagination.items -File: BookLibrary/app/main/book/views.py - > reaches line 57, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book_detail.html',book=the_book, data=data, pagination=pagination, form=form, title=the_book.title) - -Vulnerability 6: -File: BookLibrary/app/main/book/views.py - > User input at line 112, trigger word ".data": - new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '') -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书') -File: BookLibrary/app/main/book/views.py - > reaches line 131, trigger word "flash(": - flash('书籍 %s 已添加至图书馆!' % new_book.title, 'success') - -Vulnerability 7: -File: BookLibrary/app/main/book/views.py - > User input at line 112, trigger word ".data": - new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '') -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书') -File: BookLibrary/app/main/book/views.py - > reaches line 132, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book.detail',book_id=new_book.id)) - -Vulnerability 8: -File: BookLibrary/app/main/book/views.py - > User input at line 112, trigger word ".data": - new_book = Book(isbn=form.isbn.data, title=form.title.data, origin_title=form.origin_title.data, subtitle=form.subtitle.data, author=form.author.data, translator=form.translator.data, publisher=form.publisher.data, image=form.image.data, pubdate=form.pubdate.data, tags_string=form.tags.data, pages=form.pages.data, price=form.price.data, binding=form.binding.data, numbers=form.numbers.data, summary=form.summary.data or '', catalog=form.catalog.data or '') -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 133: ret_MAYBE_FUNCTION_NAME = render_template('book_edit.html',form=form, title='添加新书') -File: BookLibrary/app/main/book/views.py - > reaches line 132, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(url_for('book.detail',book_id=new_book.id)) - -Vulnerability 9: -File: BookLibrary/app/main/book/views.py - > User input at line 161, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/book/views.py - > Line 179: pagination = the_books.paginate(page,per_page=8) - File: BookLibrary/app/main/book/views.py - > Line 180: data = pagination.items - File: BookLibrary/app/main/book/views.py - > Line 167: data = None - File: BookLibrary/app/main/book/views.py - > Line 168: pagination = None -File: BookLibrary/app/main/book/views.py - > reaches line 182, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('book_tag.html',tags=the_tags, title='Tags', search_form=search_form, books=data, pagination=pagination) - -Vulnerability 10: -File: BookLibrary/app/main/log/views.py - > User input at line 14, trigger word "get(": - book_id = request.args.get('book_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 15: the_book = Book.query.get_or_404(book_id) - File: BookLibrary/app/main/log/views.py - > Line 19: result = current_user.borrow_book(the_book) - File: BookLibrary/app/main/log/views.py - > Line 19: message = current_user.borrow_book(the_book) -File: BookLibrary/app/main/log/views.py - > reaches line 20, trigger word "flash(": - flash(message, result'success''danger') - -Vulnerability 11: -File: BookLibrary/app/main/log/views.py - > User input at line 14, trigger word "get(": - book_id = request.args.get('book_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 15: the_book = Book.query.get_or_404(book_id) - File: BookLibrary/app/main/log/views.py - > Line 19: result = current_user.borrow_book(the_book) - File: BookLibrary/app/main/log/views.py - > Line 19: message = current_user.borrow_book(the_book) -File: BookLibrary/app/main/log/views.py - > reaches line 22, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=book_id)) - -Vulnerability 12: -File: BookLibrary/app/main/log/views.py - > User input at line 14, trigger word "get(": - book_id = request.args.get('book_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 15: the_book = Book.query.get_or_404(book_id) - File: BookLibrary/app/main/log/views.py - > Line 19: result = current_user.borrow_book(the_book) - File: BookLibrary/app/main/log/views.py - > Line 19: message = current_user.borrow_book(the_book) -File: BookLibrary/app/main/log/views.py - > reaches line 22, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=book_id)) - -Vulnerability 13: -File: BookLibrary/app/main/log/views.py - > User input at line 29, trigger word "get(": - log_id = request.args.get('log_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 33: the_log = Log.query.get(log_id) - File: BookLibrary/app/main/log/views.py - > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first() - File: BookLibrary/app/main/log/views.py - > Line 39: result = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 39: message = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 31: the_log = None -File: BookLibrary/app/main/log/views.py - > reaches line 40, trigger word "flash(": - flash(message, result'success''danger') - -Vulnerability 14: -File: BookLibrary/app/main/log/views.py - > User input at line 33, trigger word "get(": - the_log = Log.query.get(log_id) -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 31: the_log = None - File: BookLibrary/app/main/log/views.py - > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first() - File: BookLibrary/app/main/log/views.py - > Line 39: result = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 39: message = current_user.return_book(the_log) -File: BookLibrary/app/main/log/views.py - > reaches line 40, trigger word "flash(": - flash(message, result'success''danger') - -Vulnerability 15: -File: BookLibrary/app/main/log/views.py - > User input at line 29, trigger word "get(": - log_id = request.args.get('log_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 33: the_log = Log.query.get(log_id) - File: BookLibrary/app/main/log/views.py - > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first() - File: BookLibrary/app/main/log/views.py - > Line 39: result = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 39: message = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 31: the_log = None -File: BookLibrary/app/main/log/views.py - > reaches line 42, trigger word "redirect(": - ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=log_id)) - -Vulnerability 16: -File: BookLibrary/app/main/log/views.py - > User input at line 29, trigger word "get(": - log_id = request.args.get('log_id') -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 33: the_log = Log.query.get(log_id) - File: BookLibrary/app/main/log/views.py - > Line 35: the_log = Log.query.filter_by(user_id=current_user.id, book_id=book_id).first() - File: BookLibrary/app/main/log/views.py - > Line 39: result = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 39: message = current_user.return_book(the_log) - File: BookLibrary/app/main/log/views.py - > Line 31: the_log = None -File: BookLibrary/app/main/log/views.py - > reaches line 42, trigger word "url_for(": - ret_MAYBE_FUNCTION_NAME = redirect(request.args.get('next') or url_for('book.detail',book_id=log_id)) - -Vulnerability 17: -File: BookLibrary/app/main/log/views.py - > User input at line 52, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/log/views.py - > Line 53: pagination = Log.query.filter_by(returned=show).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=10) - File: BookLibrary/app/main/log/views.py - > Line 54: logs = pagination.items -File: BookLibrary/app/main/log/views.py - > reaches line 55, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('logs_info.html',logs=logs, pagination=pagination, title='借阅信息') - -Vulnerability 18: -File: BookLibrary/app/main/user/views.py - > User input at line 14, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/user/views.py - > Line 15: pagination = User.query.order_by(User.id.desc()).paginate(page,per_page=10) - File: BookLibrary/app/main/user/views.py - > Line 16: users = pagination.items -File: BookLibrary/app/main/user/views.py - > reaches line 17, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',users=users, pagination=pagination, title='已注册用户') - -Vulnerability 19: -File: BookLibrary/app/main/user/views.py - > User input at line 28, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: BookLibrary/app/main/user/views.py - > Line 29: pagination = the_user.logs.filter_by(returned=show).order_by(Log.borrow_timestamp.desc()).paginate(page,per_page=5) - File: BookLibrary/app/main/user/views.py - > Line 31: logs = pagination.items -File: BookLibrary/app/main/user/views.py - > reaches line 33, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user_detail.html',user=the_user, logs=logs, pagination=pagination, title='用户: ' + the_user.name) - - - -katietarng/hb-testing-flask -https://github.com/katietarng/hb-testing-flask -Entry file: hb-testing-flask/party.py -Scanned: 2016-10-26 00:07:41.713939 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -lkpanganiban/flask-restful-example -https://github.com/lkpanganiban/flask-restful-example -Entry file: flask-restful-example/run.py -Scanned: 2016-10-26 00:07:43.038584 -No vulnerabilities found. - - -qefir/Black-Jack-Flask-game -https://github.com/qefir/Black-Jack-Flask-game -Entry file: Black-Jack-Flask-game/BJenv/lib/python3.4/site-packages/flask_openid.py -Scanned: 2016-10-26 00:07:52.507948 -No vulnerabilities found. -An Error occurred while scanning the repo: 'NoneType' object has no attribute 'label' - -p00gz/OLD-flask-imdbratings-app -https://github.com/p00gz/OLD-flask-imdbratings-app -Entry file: OLD-flask-imdbratings-app/imdbRatings/__init__.py -Scanned: 2016-10-26 00:07:55.904411 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -lysdexia/flask-svg-barcode -https://github.com/lysdexia/flask-svg-barcode -Entry file: None -Scanned: 2016-10-26 00:07:57.324881 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/lysdexia/flask-svg-barcode. - -Tiago-Lira/cookiecutter-flask-websocket -https://github.com/Tiago-Lira/cookiecutter-flask-websocket -Entry file: None -Scanned: 2016-10-26 00:07:58.740094 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Tiago-Lira/cookiecutter-flask-websocket. - -davejonesbkk/flask_by_example -https://github.com/davejonesbkk/flask_by_example -Entry file: flask_by_example/app.py -Scanned: 2016-10-26 00:08:03.889146 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask_by_example/venv/lib/python3.5/operator.py - -efrainmunoz/flask-hello-world -https://github.com/efrainmunoz/flask-hello-world -Entry file: None -Scanned: 2016-10-26 00:08:04.479567 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -pankajkmrgupta/flask-video-stream -https://github.com/pankajkmrgupta/flask-video-stream -Entry file: flask-video-stream/app.py -Scanned: 2016-10-26 00:08:06.283379 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -askiefer/flask-testing-2 -https://github.com/askiefer/flask-testing-2 -Entry file: flask-testing-2/party.py -Scanned: 2016-10-26 00:08:08.084469 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -apaoing/apaoing-one-flask -https://github.com/apaoing/apaoing-one-flask -Entry file: apaoing-one-flask/hello.py -Scanned: 2016-10-26 00:08:09.435053 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -njurgens/cookbook-api-flask -https://github.com/njurgens/cookbook-api-flask -Entry file: cookbook-api-flask/cookbook_api/app.py -Scanned: 2016-10-26 00:08:11.354814 -No vulnerabilities found. - - -jestoc01/flask-hello-world -https://github.com/jestoc01/flask-hello-world -Entry file: None -Scanned: 2016-10-26 00:08:11.877066 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -responsible/Flask-Restful-Role-Auth -https://github.com/responsible/Flask-Restful-Role-Auth -Entry file: Flask-Restful-Role-Auth/App/__init__.py -Scanned: 2016-10-26 00:08:13.206243 -Vulnerability 1: -File: Flask-Restful-Role-Auth/App/__init__.py - > User input at line 9, trigger word "SQLAlchemy": - db = SQLAlchemy(app) -Reassigned in: - File: Flask-Restful-Role-Auth/App/__init__.py - > Line 15: user_datastore = SQLAlchemyUserDatastore(db, User, Role) - File: Flask-Restful-Role-Auth/App/__init__.py - > Line 16: security = Security().init_app(app, user_datastore,register_blueprint=False) -File: Flask-Restful-Role-Auth/App/__init__.py - > reaches line 25, trigger word "execute(": - db.engine.execute(roles_users.insert(),user_id=1, role_id=1) - - - -dyllanwli/MyFlaskProject -https://github.com/dyllanwli/MyFlaskProject -Entry file: MyFlaskProject/hello.py -Scanned: 2016-10-26 00:08:14.522639 -No vulnerabilities found. - - -Almazi/1.flask_hello_world -https://github.com/Almazi/1.flask_hello_world -Entry file: None -Scanned: 2016-10-26 00:08:19.060641 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/Almazi/1.flask_hello_world. - -johnwheeler/flask-ask -https://github.com/johnwheeler/flask-ask -Entry file: flask-ask/samples/session/session.py -Scanned: 2016-10-26 00:08:22.267073 -Vulnerability 1: -File: flask-ask/samples/session/session.py - > User input at line 39, trigger word "get(": - color = session.attributes.get(COLOR_KEY) -Reassigned in: - File: flask-ask/samples/session/session.py - > Line 42: ret_MAYBE_FUNCTION_NAME = statement(statement_text).simple_card(card_title, statement_text) - File: flask-ask/samples/session/session.py - > Line 45: ret_MAYBE_FUNCTION_NAME = question(question_text).reprompt(question_text).simple_card(card_title, question_text) -File: flask-ask/samples/session/session.py - > reaches line 41, trigger word "render_template(": - statement_text = render_template('known_color_bye',color=color) - - - -parampara/flask -https://github.com/parampara/flask -Entry file: None -Scanned: 2016-10-26 00:08:22.811614 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -maxweiber/flask -https://github.com/maxweiber/flask -Entry file: None -Scanned: 2016-10-26 00:08:23.339498 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -syntaxSizer/flask -https://github.com/syntaxSizer/flask -Entry file: None -Scanned: 2016-10-26 00:08:23.881442 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -gabrielecker/Flask -https://github.com/gabrielecker/Flask -Entry file: None -Scanned: 2016-10-26 00:08:24.408281 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -ryanmthompson/flask -https://github.com/ryanmthompson/flask -Entry file: None -Scanned: 2016-10-26 00:08:24.911699 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -miguelgrinberg/flack -https://github.com/miguelgrinberg/flack -Entry file: flack/flack/__init__.py -Scanned: 2016-10-26 00:08:26.485313 -Vulnerability 1: -File: flack/flack/api/messages.py - > User input at line 36, trigger word "get(": - since = int(request.args.get('updated_since', '0')) -Reassigned in: - File: flack/flack/api/messages.py - > Line 40: since = day_ago -File: flack/flack/api/messages.py - > reaches line 41, trigger word "filter(": - msgs = Message.query.filter(Message.updated_at > since).order_by(Message.updated_at) - -Vulnerability 2: -File: flack/flack/api/users.py - > User input at line 38, trigger word "get(": - users = users.filter_by(online=request.args.get('online') != '0') -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) -File: flack/flack/api/users.py - > reaches line 40, trigger word "filter(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) - -Vulnerability 3: -File: flack/flack/api/users.py - > User input at line 40, trigger word "get(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) - File: flack/flack/api/users.py - > Line 38: users = users.filter_by(online=request.args.get('online') != '0') -File: flack/flack/api/users.py - > reaches line 40, trigger word "filter(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) - -Vulnerability 4: -File: flack/flack/api/users.py - > User input at line 38, trigger word "get(": - users = users.filter_by(online=request.args.get('online') != '0') -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) -File: flack/flack/api/users.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()]) - -Vulnerability 5: -File: flack/flack/api/users.py - > User input at line 40, trigger word "get(": - users = users.filter(User.updated_at > int(request.args.get('updated_since'))) -Reassigned in: - File: flack/flack/api/users.py - > Line 36: users = User.query.order_by(User.updated_at.asc(), User.nickname.asc()) - File: flack/flack/api/users.py - > Line 38: users = users.filter_by(online=request.args.get('online') != '0') -File: flack/flack/api/users.py - > reaches line 42, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('users'[user.to_dict() for user in users.all()]) - - - -TwilioDevEd/sms2fa-flask -https://github.com/TwilioDevEd/sms2fa-flask -Entry file: sms2fa-flask/sms2fa_flask/__init__.py -Scanned: 2016-10-26 00:08:29.288598 -Vulnerability 1: -File: sms2fa-flask/sms2fa_flask/views.py - > User input at line 51, trigger word "get(": - user = User.query.get(session.get('user_email', '')) or abort(401) -Reassigned in: - File: sms2fa-flask/sms2fa_flask/views.py - > Line 56: ret_MAYBE_FUNCTION_NAME = redirect(url_for('secret_page')) -File: sms2fa-flask/sms2fa_flask/views.py - > reaches line 59, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('confirmation.html',user=user) - - - -RoseOu/Flask-learning -https://github.com/RoseOu/Flask-learning -Entry file: None -Scanned: 2016-10-26 00:08:29.819319 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg -https://github.com/YUX-IO/uwsgi-nginx-flask-docker-for-sinaimg -Entry file: uwsgi-nginx-flask-docker-for-sinaimg/flask/app/main.py -Scanned: 2016-10-26 00:08:31.600523 -No vulnerabilities found. - - -datademofun/heroku-basic-flask -https://github.com/datademofun/heroku-basic-flask -Entry file: heroku-basic-flask/app.py -Scanned: 2016-10-26 00:08:33.644797 -No vulnerabilities found. - - -amey-sam/Flask-MailGun -https://github.com/amey-sam/Flask-MailGun -Entry file: None -Scanned: 2016-10-26 00:08:38.165889 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/amey-sam/Flask-MailGun. - -efrainmunoz/flasktaskr -https://github.com/efrainmunoz/flasktaskr -Entry file: None -Scanned: 2016-10-26 00:08:40.677028 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -DullSmile/flasky -https://github.com/DullSmile/flasky -Entry file: None -Scanned: 2016-10-26 00:08:43.678052 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -andresmguk/flasktaskr -https://github.com/andresmguk/flasktaskr -Entry file: None -Scanned: 2016-10-26 00:08:53.216222 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -minc-yang/flaskdemo -https://github.com/minc-yang/flaskdemo -Entry file: None -Scanned: 2016-10-26 00:08:56.741432 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -yvonnendutaw/flaskbook -https://github.com/yvonnendutaw/flaskbook -Entry file: flaskbook/app/__init__.py -Scanned: 2016-10-26 00:08:59.215027 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zjl1110/flaskdemo -https://github.com/zjl1110/flaskdemo -Entry file: None -Scanned: 2016-10-26 00:08:59.758179 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -chestnutme/flaskie -https://github.com/chestnutme/flaskie -Entry file: flaskie/app/__init__.py -Scanned: 2016-10-26 00:09:06.375724 -Vulnerability 1: -File: flaskie/app/main/views.py - > User input at line 18, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 26: pagination = query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 29: posts = pagination.items - File: flaskie/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskie/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 2: -File: flaskie/app/main/views.py - > User input at line 21, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flaskie/app/main/views.py - > Line 19: show_followed = False - File: flaskie/app/main/views.py - > Line 17: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flaskie/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, show_followed=show_followed, pagination=pagination) - -Vulnerability 3: -File: flaskie/app/main/views.py - > User input at line 36, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 37: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 39: posts = pagination.items -File: flaskie/app/main/views.py - > reaches line 40, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flaskie/app/main/views.py - > User input at line 95, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 97: page = post.comments.count() - 1 / current_app.config['FLASKY_COMMENTS_PER_PAGE'] + 1 - File: flaskie/app/main/views.py - > Line 99: pagination = post.comments.order_by(Comment.timestamp.asc()).paginate(page,per_page=current_app.config['FLASKY_COMMENTS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 102: comments = pagination.items - File: flaskie/app/main/views.py - > Line 94: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.post',id=post.id, page=-1)) -File: flaskie/app/main/views.py - > reaches line 103, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('post.html',posts=[post], form=form, comments=comments, pagination=pagination) - -Vulnerability 5: -File: flaskie/app/main/views.py - > User input at line 158, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 159: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flaskie/app/main/views.py - > Line 162: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flaskie/app/main/views.py - > Line 157: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flaskie/app/main/views.py - > reaches line 164, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 6: -File: flaskie/app/main/views.py - > User input at line 174, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flaskie/app/main/views.py - > Line 175: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE']) - File: flaskie/app/main/views.py - > Line 177: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flaskie/app/main/views.py - > Line 173: ret_MAYBE_FUNCTION_NAME = redirect(url_for('index')) -File: flaskie/app/main/views.py - > reaches line 179, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - - - -fengyu225/flaskr -https://github.com/fengyu225/flaskr -Entry file: None -Scanned: 2016-10-26 00:09:06.907765 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/fengyu225/flaskr. - -jbussdieker/flaskr -https://github.com/jbussdieker/flaskr -Entry file: None -Scanned: 2016-10-26 00:09:07.425537 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/jbussdieker/flaskr. - -richardqlin/flaskralchemy -https://github.com/richardqlin/flaskralchemy -Entry file: None -Scanned: 2016-10-26 00:09:08.946938 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/richardqlin/flaskralchemy. - -garaud/flask-restplus-meetup -https://github.com/garaud/flask-restplus-meetup -Entry file: flask-restplus-meetup/musicapp.py -Scanned: 2016-10-26 00:09:11.400852 -No vulnerabilities found. - - -ibrahimirdem/flask-numaradan-isim -https://github.com/ibrahimirdem/flask-numaradan-isim -Entry file: flask-numaradan-isim/app.py -Scanned: 2016-10-26 00:09:12.799141 -Vulnerability 1: -File: flask-numaradan-isim/app.py - > User input at line 18, trigger word "form[": - gelen = request.form['numara'] -Reassigned in: - File: flask-numaradan-isim/app.py - > Line 22: sonuc = fonksiyonlar.numara_denetim(gelen) - File: flask-numaradan-isim/app.py - > Line 29: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home')) - File: flask-numaradan-isim/app.py - > Line 33: ret_MAYBE_FUNCTION_NAME = redirect(url_for('home')) -File: flask-numaradan-isim/app.py - > reaches line 25, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('sonuc.html',dogruluk=sonuc[0], isim=sonuc[1], id=sonuc[2]) - - - -andresmguk/flasktaskr1 -https://github.com/andresmguk/flasktaskr1 -Entry file: flasktaskr1/views.py -Scanned: 2016-10-26 00:09:15.990151 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -andresmguk/flasktaskr2 -https://github.com/andresmguk/flasktaskr2 -Entry file: flasktaskr2/views.py -Scanned: 2016-10-26 00:09:19.313147 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -belljustin/FlaskDeploy -https://github.com/belljustin/FlaskDeploy -Entry file: FlaskDeploy/deploy.py -Scanned: 2016-10-26 00:09:20.652692 -No vulnerabilities found. - - -ArvidQuarshie/FlaskAuthentication -https://github.com/ArvidQuarshie/FlaskAuthentication -Entry file: None -Scanned: 2016-10-26 00:09:23.549071 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/ArvidQuarshie/FlaskAuthentication. - -zjyExcelsior/FlaskSkeleton -https://github.com/zjyExcelsior/FlaskSkeleton -Entry file: FlaskSkeleton/myapp/__init__.py -Scanned: 2016-10-26 00:09:24.884187 -No vulnerabilities found. - - -er3456qi/FlaskTutorial -https://github.com/er3456qi/FlaskTutorial -Entry file: FlaskTutorial/flaskr.py -Scanned: 2016-10-26 00:09:26.300329 -No vulnerabilities found. - - -kelvinmuchui/flaskApp -https://github.com/kelvinmuchui/flaskApp -Entry file: flaskApp/app.py -Scanned: 2016-10-26 00:09:29.510769 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ptomelle/flaskNew -https://github.com/ptomelle/flaskNew -Entry file: flaskNew/wsgi/myflaskapp.py -Scanned: 2016-10-26 00:09:31.305153 -No vulnerabilities found. - - -sr77/Restaurant-Web-Application -https://github.com/sr77/Restaurant-Web-Application -Entry file: Restaurant-Web-Application/project.py -Scanned: 2016-10-26 00:09:32.752271 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Almazi/Flask_Project_RealPython -https://github.com/Almazi/Flask_Project_RealPython -Entry file: Flask_Project_RealPython/app.py -Scanned: 2016-10-26 00:09:34.670104 -No vulnerabilities found. - - -hamidfzm/Rest-in-Flask -https://github.com/hamidfzm/Rest-in-Flask -Entry file: Rest-in-Flask/application/__init__.py -Scanned: 2016-10-26 00:09:36.143317 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zhujinliang/flask-based-web-framework -https://github.com/zhujinliang/flask-based-web-framework -Entry file: flask-based-web-framework/core/__init__.py -Scanned: 2016-10-26 00:09:38.798631 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -lipemorais/todo-flask -https://github.com/lipemorais/todo-flask -Entry file: todo-flask/server.py -Scanned: 2016-10-26 00:09:40.106621 -No vulnerabilities found. - - -tonuidavies/Blog-flask -https://github.com/tonuidavies/Blog-flask -Entry file: None -Scanned: 2016-10-26 00:09:48.976528 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -LpanatoPlanzi/flask-app -https://github.com/LpanatoPlanzi/flask-app -Entry file: flask-app/wsgi/myflaskapp.py -Scanned: 2016-10-26 00:09:50.570046 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -ksripathi/flask-app -https://github.com/ksripathi/flask-app -Entry file: flask-app/apilayer.py -Scanned: 2016-10-26 00:09:52.054956 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -maheskett/flask-testing -https://github.com/maheskett/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-26 00:09:53.843421 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -kellyhiggins/Flask-testing -https://github.com/kellyhiggins/Flask-testing -Entry file: Flask-testing/party.py -Scanned: 2016-10-26 00:09:55.708156 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -laurensila/flask-testing -https://github.com/laurensila/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-26 00:09:57.473096 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -jaronoff97/Flask-Boilerplate -https://github.com/jaronoff97/Flask-Boilerplate -Entry file: Flask-Boilerplate/flaskapp.py -Scanned: 2016-10-26 00:09:58.924337 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -zjl1110/flask-demo -https://github.com/zjl1110/flask-demo -Entry file: None -Scanned: 2016-10-26 00:10:03.885769 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -hadesong/Flask_Issues -https://github.com/hadesong/Flask_Issues -Entry file: None -Scanned: 2016-10-26 00:10:05.193312 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/hadesong/Flask_Issues. - -jayanth2810/Heroku_Flask -https://github.com/jayanth2810/Heroku_Flask -Entry file: Heroku_Flask/app/app.py -Scanned: 2016-10-26 00:10:06.505511 -No vulnerabilities found. - - -ArvidQuarshie/DiscoverFlask -https://github.com/ArvidQuarshie/DiscoverFlask -Entry file: None -Scanned: 2016-10-26 00:10:10.725640 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -kosma24/labrat-flask -https://github.com/kosma24/labrat-flask -Entry file: labrat-flask/lab.py -Scanned: 2016-10-26 00:10:12.544968 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -paceko/testing-flask -https://github.com/paceko/testing-flask -Entry file: testing-flask/party.py -Scanned: 2016-10-26 00:10:14.431727 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -minyisme/flask-testing -https://github.com/minyisme/flask-testing -Entry file: flask-testing/party.py -Scanned: 2016-10-26 00:10:16.320005 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -cristinamclarkin/Flask-testing -https://github.com/cristinamclarkin/Flask-testing -Entry file: Flask-testing/party.py -Scanned: 2016-10-26 00:10:18.284386 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -sangqt/learn-flask -https://github.com/sangqt/learn-flask -Entry file: None -Scanned: 2016-10-26 00:10:18.830988 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -nathanism/flask-app -https://github.com/nathanism/flask-app -Entry file: flask-app/app/__init__.py -Scanned: 2016-10-26 00:10:24.111059 -No vulnerabilities found. - - -iuhsihsow/hello_flask -https://github.com/iuhsihsow/hello_flask -Entry file: hello_flask/app/__init__.py -Scanned: 2016-10-26 00:10:25.531939 -No vulnerabilities found. - - -amsuny/flask-site -https://github.com/amsuny/flask-site -Entry file: flask-site/flask-site.py -Scanned: 2016-10-26 00:10:26.858006 -No vulnerabilities found. - - -bigzhao/Flask-Tasks -https://github.com/bigzhao/Flask-Tasks -Entry file: Flask-Tasks/flasktask/app/__init__.py -Scanned: 2016-10-26 00:10:29.151660 -Vulnerability 1: -File: Flask-Tasks/flasktask/app/auth/views.py - > User input at line 124, trigger word "files[": - file = request.files['file'] -Reassigned in: - File: Flask-Tasks/flasktask/app/auth/views.py - > Line 129: filename = secure_filename(file.filename) -File: Flask-Tasks/flasktask/app/auth/views.py - > reaches line 131, trigger word "url_for(": - current_user.image_url = url_for('auth.static',filename='%s/%s' % ('avatar', filename)) - -Vulnerability 2: -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_posts',page=page - 1, _external=True) - -Vulnerability 3: -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_posts',page=page + 1, _external=True) - -Vulnerability 4: -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 11: pagination = Post.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 14: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/posts.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 5: -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 23: next = None -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > reaches line 22, trigger word "url_for(": - prev = url_for('api.get_user_posts',page=page - 1, _external=True) - -Vulnerability 6: -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 23: next = None -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > reaches line 25, trigger word "url_for(": - next = url_for('api.get_user_posts',page=page + 1, _external=True) - -Vulnerability 7: -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > User input at line 15, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 16: pagination = user.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 19: posts = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 20: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/users.py - > Line 23: next = None -File: Flask-Tasks/flasktask/app/api_1_0/users.py - > reaches line 26, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[post.to_json() for post in posts]prevnextpagination.total) - -Vulnerability 8: -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > reaches line 17, trigger word "url_for(": - prev = url_for('api.get_comments',page=page - 1, _external=True) - -Vulnerability 9: -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > reaches line 20, trigger word "url_for(": - next = url_for('api.get_comments',page=page + 1, _external=True) - -Vulnerability 10: -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > User input at line 10, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 11: pagination = Comment.query.order_by(Comment.create_at.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 14: comments = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 15: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > Line 18: next = None -File: Flask-Tasks/flasktask/app/api_1_0/comments.py - > reaches line 21, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('posts''prev''next''count'[comment.to_json() for comment in comments]prevnextpagination.total) - -Vulnerability 11: -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 13: tasks = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 14: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 17: next = None -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > reaches line 16, trigger word "url_for(": - prev = url_for('api.get_tasks',page=page - 1, _external=True) - -Vulnerability 12: -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 13: tasks = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 14: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 17: next = None -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > reaches line 19, trigger word "url_for(": - next = url_for('api.get_tasks',page=page + 1, _external=True) - -Vulnerability 13: -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > User input at line 9, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 10: pagination = Task.query.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 13: tasks = pagination.items - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 14: prev = None - File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > Line 17: next = None -File: Flask-Tasks/flasktask/app/api_1_0/tasks.py - > reaches line 20, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify('tasks''prev''next''count'[task.to_json() for task in tasks]prevnextpagination.total) - -Vulnerability 14: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 26, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/main/views.py - > Line 28: pagination = current_user.circles[-1].tasks.order_by(Task.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/main/views.py - > Line 31: tasks = pagination.items - File: Flask-Tasks/flasktask/app/main/views.py - > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages)) - -Vulnerability 15: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 33, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -Reassigned in: - File: Flask-Tasks/flasktask/app/main/views.py - > Line 25: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 34, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages)) - -Vulnerability 16: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 53, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/main/views.py - > Line 57: pagination = c.tasks.order_by(Task.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/main/views.py - > Line 60: tasks = pagination.items - File: Flask-Tasks/flasktask/app/main/views.py - > Line 52: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=c.id)) -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 63, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=c.name, new_messages=int(new_messages)) - -Vulnerability 17: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 62, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -Reassigned in: - File: Flask-Tasks/flasktask/app/main/views.py - > Line 52: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=c.id)) -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 63, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, tasks=tasks, pagination=pagination, circle_name=c.name, new_messages=int(new_messages)) - -Vulnerability 18: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 167, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 168, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('circle.html',new_messages=int(new_messages)) - -Vulnerability 19: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 189, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message') -Reassigned in: - File: Flask-Tasks/flasktask/app/main/views.py - > Line 187: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.circle')) -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 190, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('create_circle.html',new_messages=int(new_messages), form=form) - -Vulnerability 20: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 196, trigger word "get(": - message = request.form.get('message') -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 200, trigger word "filter(": - c = db.session.query(Circle).filter(Circle.name.like('%' + message + '%')).all() - -Vulnerability 21: -File: Flask-Tasks/flasktask/app/main/views.py - > User input at line 202, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -File: Flask-Tasks/flasktask/app/main/views.py - > reaches line 203, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('search_circle.html',new_messages=int(new_messages), circles=c) - -Vulnerability 22: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 22, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 23: pagination = current_user.circles[-1].posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 26: posts = pagination.items - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages)) - -Vulnerability 23: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 28, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -Reassigned in: - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 21: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 29, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=current_user.circles[-1].name, new_messages=int(new_messages)) - -Vulnerability 24: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 45, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 46: pagination = c.posts.order_by(Post.create_at.desc()).paginate(page,per_page=current_app.config['TASK_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 49: posts = pagination.items - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=circle_id)) -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 52, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=c.name, new_messages=int(new_messages)) - -Vulnerability 25: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 51, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -Reassigned in: - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 44: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index_circles',circle_id=circle_id)) -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 52, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/blogs.html',postform=postform, posts=posts, pagination=pagination, circle_name=c.name, new_messages=int(new_messages)) - -Vulnerability 26: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 94, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 95: pagination = user.posts.paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 98: posts = pagination.items - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 100: posts = [] - File: Flask-Tasks/flasktask/app/blog/views.py - > Line 101: posts = pagination.items -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 104, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/user_blogs.html',user=user, posts=posts, pagination=pagination, new_messages=int(new_messages)) - -Vulnerability 27: -File: Flask-Tasks/flasktask/app/blog/views.py - > User input at line 103, trigger word "get(": - new_messages = redis_client.hget(current_user.id, 'new_message').decode('utf-8') -File: Flask-Tasks/flasktask/app/blog/views.py - > reaches line 104, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('blog/user_blogs.html',user=user, posts=posts, pagination=pagination, new_messages=int(new_messages)) - - - -nlesc-sherlock/spark-flask -https://github.com/nlesc-sherlock/spark-flask -Entry file: spark-flask/app.py -Scanned: 2016-10-26 00:10:30.566900 -No vulnerabilities found. - - -linked0/first-flask -https://github.com/linked0/first-flask -Entry file: first-flask/main.py -Scanned: 2016-10-26 00:10:31.881987 -No vulnerabilities found. - - -mprather1/flask_hello -https://github.com/mprather1/flask_hello -Entry file: flask_hello/hello_world.py -Scanned: 2016-10-26 00:10:33.193567 -No vulnerabilities found. - - -9217392354A/flask-stuff -https://github.com/9217392354A/flask-stuff -Entry file: flask-stuff/__init__.py -Scanned: 2016-10-26 00:10:37.211168 -No vulnerabilities found. - - -M4riacg/api-flask -https://github.com/M4riacg/api-flask -Entry file: api-flask/api_flask.py -Scanned: 2016-10-26 00:10:38.522176 -No vulnerabilities found. - - -gpgomes/pyFlask -https://github.com/gpgomes/pyFlask -Entry file: pyFlask/server.py -Scanned: 2016-10-26 00:10:39.834313 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Nana2mini/Flask-Blog -https://github.com/Nana2mini/Flask-Blog -Entry file: None -Scanned: 2016-10-26 00:10:40.495536 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -dencynluv/testing-flask -https://github.com/dencynluv/testing-flask -Entry file: testing-flask/party.py -Scanned: 2016-10-26 00:10:42.301526 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -efrainmunoz/flask-blog -https://github.com/efrainmunoz/flask-blog -Entry file: None -Scanned: 2016-10-26 00:10:49.843646 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -BethMwangi/flask-intro -https://github.com/BethMwangi/flask-intro -Entry file: flask-intro/app.py -Scanned: 2016-10-26 00:10:54.341849 -No vulnerabilities found. -An Error occurred while scanning the repo: Input needs to be a file. Path: flask-intro/flask/lib/python2.7/sre_compile.py - -zjl1110/flask-blogmy -https://github.com/zjl1110/flask-blogmy -Entry file: None -Scanned: 2016-10-26 00:10:58.861506 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -skrillex581/flask-insight -https://github.com/skrillex581/flask-insight -Entry file: flask-insight/app/__init__.py -Scanned: 2016-10-26 00:11:00.352910 -No vulnerabilities found. - - -balalay12/flask-cachlka -https://github.com/balalay12/flask-cachlka -Entry file: flask-cachlka/app/__init__.py -Scanned: 2016-10-26 00:11:02.105224 -Vulnerability 1: -File: flask-cachlka/app/views.py - > User input at line 230, trigger word "get(": - repeat = Repeats.query.get(int(id)) -Reassigned in: - File: flask-cachlka/app/views.py - > Line 231: s = Sets.query.get(repeat.set_id) - File: flask-cachlka/app/views.py - > Line 233: ret_MAYBE_FUNCTION_NAME = return_response(404, jsonify(error='Отказано в доступе')) - File: flask-cachlka/app/views.py - > Line 235: ret_MAYBE_FUNCTION_NAME = return_response(500, jsonify(error='Произошлка ошибка во время запроса.')) -File: flask-cachlka/app/views.py - > reaches line 236, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(repeat=repeat.serialize) - -Vulnerability 2: -File: flask-cachlka/app/views.py - > User input at line 293, trigger word "get(": - category = Categories.query.get(int(id)) -File: flask-cachlka/app/views.py - > reaches line 294, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(exercises=[exercise.serialize for exercise in category.exercises.all()]) - -Vulnerability 3: -File: flask-cachlka/app/views.py - > User input at line 312, trigger word "get(": - body_size = BodySize.query.get(int(id)) -Reassigned in: - File: flask-cachlka/app/views.py - > Line 314: ret_MAYBE_FUNCTION_NAME = return_response(404, jsonify(error='Отказано в доступе')) - File: flask-cachlka/app/views.py - > Line 316: ret_MAYBE_FUNCTION_NAME = return_response(500, jsonify(error='Произошлка ошибка во время запроса.')) -File: flask-cachlka/app/views.py - > reaches line 317, trigger word "jsonify(": - ret_MAYBE_FUNCTION_NAME = jsonify(body_size=body_size.serialize) - - - -mythreyaraj/python-flask -https://github.com/mythreyaraj/python-flask -Entry file: python-flask/app.py -Scanned: 2016-10-26 00:11:03.583590 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Lypzero/flask_studing -https://github.com/Lypzero/flask_studing -Entry file: flask_studing/app/__init__.py -Scanned: 2016-10-26 00:11:05.172535 -Vulnerability 1: -File: flask_studing/app/main/views.py - > User input at line 20, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_studing/app/main/views.py - > Line 28: pagination = Post.query.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_studing/app/main/views.py - > Line 29: posts = pagination.items - File: flask_studing/app/main/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_studing/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed) - -Vulnerability 2: -File: flask_studing/app/main/views.py - > User input at line 23, trigger word "get(": - show_followed = bool(request.cookies.get('show_followed', '')) -Reassigned in: - File: flask_studing/app/main/views.py - > Line 21: show_followed = False - File: flask_studing/app/main/views.py - > Line 18: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_studing/app/main/views.py - > reaches line 30, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('index.html',form=form, posts=posts, pagination=pagination, show_followed=show_followed) - -Vulnerability 3: -File: flask_studing/app/main/views.py - > User input at line 42, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_studing/app/main/views.py - > Line 43: pagination = user.posts.order_by(Post.timestamp.desc()).paginate(page,per_page=current_app.config['FLASKY_POSTS_PER_PAGE'], error_out=False) - File: flask_studing/app/main/views.py - > Line 46: posts = pagination.items -File: flask_studing/app/main/views.py - > reaches line 47, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('user.html',user=user, posts=posts, pagination=pagination) - -Vulnerability 4: -File: flask_studing/app/main/views.py - > User input at line 108, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_studing/app/main/views.py - > Line 109: pagination = user.followers.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_studing/app/main/views.py - > Line 110: follows = ['user''timestamp'item.followeritem.timestamp for item in pagination.items] - File: flask_studing/app/main/views.py - > Line 107: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_studing/app/main/views.py - > reaches line 111, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followers of', endpoint='.followers', pagination=pagination, follows=follows) - -Vulnerability 5: -File: flask_studing/app/main/views.py - > User input at line 119, trigger word "get(": - page = request.args.get('page', 1,type=int) -Reassigned in: - File: flask_studing/app/main/views.py - > Line 120: pagination = user.followed.paginate(page,per_page=current_app.config['FLASKY_FOLLOWERS_PER_PAGE'], error_out=False) - File: flask_studing/app/main/views.py - > Line 123: follows = ['user''timestamp'item.followeditem.timestamp for item in pagination.items] - File: flask_studing/app/main/views.py - > Line 118: ret_MAYBE_FUNCTION_NAME = redirect(url_for('.index')) -File: flask_studing/app/main/views.py - > reaches line 125, trigger word "render_template(": - ret_MAYBE_FUNCTION_NAME = render_template('followers.html',user=user, title='Followed by', endpoint='.followed_by', pagination=pagination, follows=follows) - - - -dflee/testing-flask -https://github.com/dflee/testing-flask -Entry file: testing-flask/party.py -Scanned: 2016-10-26 00:11:07.094088 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Ihyatt/testing-flask -https://github.com/Ihyatt/testing-flask -Entry file: testing-flask/party.py -Scanned: 2016-10-26 00:11:08.888637 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -stefanbro/flask-circle -https://github.com/stefanbro/flask-circle -Entry file: flask-circle/app/__init__.py -Scanned: 2016-10-26 00:11:10.693165 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -Clemenshemmerling/flask-docker -https://github.com/Clemenshemmerling/flask-docker -Entry file: flask-docker/app/app.py -Scanned: 2016-10-26 00:11:12.058812 -No vulnerabilities found. - - -rajatgermany/Rajat5 -https://github.com/rajatgermany/Rajat5 -Entry file: Rajat5/newforms.py -Scanned: 2016-10-26 00:11:13.409854 -No vulnerabilities found. - - -amirthn/irpycoderzz -https://github.com/amirthn/irpycoderzz -Entry file: irpycoderzz/app.py -Scanned: 2016-10-26 00:11:14.712784 -No vulnerabilities found. - - -chxy325/studyflask -https://github.com/chxy325/studyflask -Entry file: studyflask/hello.py -Scanned: 2016-10-26 00:11:16.024243 -No vulnerabilities found. - - -moling3650/microblog -https://github.com/moling3650/microblog -Entry file: None -Scanned: 2016-10-26 00:11:17.555613 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/moling3650/microblog. - -gekorob/liebraryrest -https://github.com/gekorob/liebraryrest -Entry file: liebraryrest/liebraryrest/app.py -Scanned: 2016-10-26 00:11:20.114302 -Vulnerability 1: -File: liebraryrest/liebraryrest/api/authors.py - > User input at line 14, trigger word "get(": - qry = qry.filter(Author.name.contains(request.args.get('name'))) -Reassigned in: - File: liebraryrest/liebraryrest/api/authors.py - > Line 11: qry = Author.query -File: liebraryrest/liebraryrest/api/authors.py - > reaches line 14, trigger word "filter(": - qry = qry.filter(Author.name.contains(request.args.get('name'))) - - - -jlanio/Flask-RestlessLoginToken -https://github.com/jlanio/Flask-RestlessLoginToken -Entry file: Flask-RestlessLoginToken/models.py -Scanned: 2016-10-26 00:11:25.446055 -No vulnerabilities found. - - -vibhor1510/COMS-6156-Flask-App -https://github.com/vibhor1510/COMS-6156-Flask-App -Entry file: None -Scanned: 2016-10-26 00:11:29.833980 -No vulnerabilities found. -An Error occurred while scanning the repo: No entry path found in repo https://github.com/vibhor1510/COMS-6156-Flask-App. - -azedlee/flask_hello_world -https://github.com/azedlee/flask_hello_world -Entry file: flask_hello_world/hello_world.py -Scanned: 2016-10-26 00:11:32.600006 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown :-( - -BeenzSyed/flask-random-quote -https://github.com/BeenzSyed/flask-random-quote -Entry file: flask-random-quote/app.py -Scanned: 2016-10-26 00:11:33.920832 -No vulnerabilities found. - - -Firdaus1/Hello_world_Flask -https://github.com/Firdaus1/Hello_world_Flask -Entry file: Hello_world_Flask/FirdausCS3320.py -Scanned: 2016-10-26 00:11:35.235462 -No vulnerabilities found. - - -JesseE/flask-demo-viewer -https://github.com/JesseE/flask-demo-viewer -Entry file: None -Scanned: 2016-10-26 00:11:39.623371 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -katietarng/hb-testing-flask -https://github.com/katietarng/hb-testing-flask -Entry file: None -Scanned: 2016-10-26 00:11:40.162192 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -HenryZivers/Flask-Microblog-App -https://github.com/HenryZivers/Flask-Microblog-App -Entry file: None -Scanned: 2016-10-26 00:11:40.711889 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -stack-templates/cde-flask-init-project -https://github.com/stack-templates/cde-flask-init-project -Entry file: None -Scanned: 2016-10-26 00:11:41.269722 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Skycker/lsa-flask-preview -https://github.com/Skycker/lsa-flask-preview -Entry file: None -Scanned: 2016-10-26 00:11:41.808073 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -aurora71/flask-Smart-seat-realtime -https://github.com/aurora71/flask-Smart-seat-realtime -Entry file: None -Scanned: 2016-10-26 00:11:42.350985 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -s4swadhin/flask-hello-world -https://github.com/s4swadhin/flask-hello-world -Entry file: None -Scanned: 2016-10-26 00:11:42.881762 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -matthewR1993/flask-gant-fun -https://github.com/matthewR1993/flask-gant-fun -Entry file: None -Scanned: 2016-10-26 00:11:50.456578 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -parampara/flask -https://github.com/parampara/flask -Entry file: None -Scanned: 2016-10-26 00:12:00.028840 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -glrh111/flask -https://github.com/glrh111/flask -Entry file: None -Scanned: 2016-10-26 00:12:01.549573 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -rakeshkirola/Flask -https://github.com/rakeshkirola/Flask -Entry file: None -Scanned: 2016-10-26 00:12:03.067923 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -caibitim/Flask -https://github.com/caibitim/Flask -Entry file: None -Scanned: 2016-10-26 00:12:04.598459 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -zhangsen1992/flask -https://github.com/zhangsen1992/flask -Entry file: None -Scanned: 2016-10-26 00:12:06.110296 -No vulnerabilities found. -An Error occurred while scanning the repo: Other Error Unknown while cloning :-( - -Mufflerman/Flask -https://github.com/Mufflerman/Flask -Entry file: None -Scanned: 2016-10-26 00:12:07 \ No newline at end of file